CN108076426A - Terminal tracing method, apparatus, storage medium and terminal device - Google Patents
Terminal tracing method, apparatus, storage medium and terminal device Download PDFInfo
- Publication number
- CN108076426A CN108076426A CN201711308186.7A CN201711308186A CN108076426A CN 108076426 A CN108076426 A CN 108076426A CN 201711308186 A CN201711308186 A CN 201711308186A CN 108076426 A CN108076426 A CN 108076426A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- target image
- information
- location information
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72439—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
Abstract
A kind of terminal tracing method, apparatus, storage medium and the terminal device provided in the embodiment of the present application, this method is by when detecting the unlock operation failure to terminal device, recording the number for unlocking operation failure;After the number of the unlock operation failure reaches setting number, by setting camera acquisition target image and obtaining the current location information of the terminal device and temporal information;The target image, the location information and the temporal information are sent by network.By using above-mentioned technical proposal, it can speculate when unlocking terminal equipment unsuccessfully reaches setting number doubtful stolen, and obtain environment, position and the temporal information of terminal device, and then terminal device can be tracked according to environment, position and temporal information, auxiliary user recovers its terminal device.
Description
Technical field
The invention relates to terminal device technical fields more particularly to a kind of terminal tracing method, apparatus, storage to be situated between
Matter and terminal device.
Background technology
With the development of terminal device equipment, it is essential to be increasingly becoming people's daily life, and portable work
Tool.People can using terminal equipment is entertained, communicated, paid and surfed the Internet in all case operation, due to terminal device
Convenience, thus also occur terminal device easily lose or it is easily stolen the problem of.It is stored with user's on terminal device
Substantial amounts of privacy information and the proprietary information of user, if terminal device is lost or is stolen, can be brought to user can not estimate
The serious consequence of meter.
The content of the invention
The embodiment of the present application provides a kind of terminal tracing method, apparatus, storage medium and terminal device, can be set in terminal
It is standby to lose or be tracked when stolen, user to be aided in recover terminal device.
In a first aspect, the embodiment of the present application provides a kind of terminal tracing method, including:
When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with
And obtain the current location information of the terminal device and temporal information;
The target image, the location information and the temporal information are sent by network.
Second aspect, the embodiment of the present application provide a kind of terminal tracing device, including:
Failure record module is unlocked, for when detecting the unlock operation failure to terminal device, recording the unlock
The number of operation failure;
Tracked information acquisition module, for after the number of the unlock operation failure reaches setting number, passing through setting
Camera obtains target image and obtains the current location information of the terminal device and temporal information;
Sending module, for the target image, the location information and the temporal information to be carried out by network
It sends.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence realizes the terminal tracing method as described in the embodiment of the present application when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of terminal device, including memory, processor and are stored in storage
And can be in the computer program of processor operation on device, the processor is realized when performing the computer program as the application is real
Apply the terminal tracing method described in example.
A kind of terminal tracing scheme provided in the embodiment of the present application, by detecting the operation of the unlock to terminal device
During failure, the number of the unlock operation failure is recorded;After the number of the unlock operation failure reaches setting number, pass through
Camera is set to obtain target image and obtain the current location information of the terminal device and temporal information;By the mesh
Logo image, the location information and the temporal information are sent by network.It, can be with by using above-mentioned technical proposal
Speculate when unlocking terminal equipment unsuccessfully reaches setting number doubtful stolen, and obtain environment, position and the time of terminal device
Information, and then terminal device can be tracked according to environment, position and temporal information, auxiliary user recovers its terminal and sets
It is standby.
Description of the drawings
Fig. 1 is a kind of flow diagram of terminal tracing method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another terminal tracing method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another terminal tracing method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another terminal tracing method provided by the embodiments of the present application;
Fig. 5 is a kind of structure diagram of terminal tracing device provided by the embodiments of the present application;
Fig. 6 is a kind of structure diagram of terminal device provided by the embodiments of the present application;
Fig. 7 is a kind of structure diagram of terminal device provided by the embodiments of the present application.
Specific embodiment
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that
It is that specific embodiment described herein is used only for explaining the application rather than the restriction to the application.It further needs exist for illustrating
, part relevant with the application rather than entire infrastructure are illustrated only for ease of description, in attached drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although each step is described as the processing of order, many of which by flow chart
Step can be implemented concurrently, concomitantly or simultaneously.In addition, the order of each step can be rearranged.When its operation
The processing can be terminated during completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with
Corresponding to method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of flow diagram of terminal tracing method provided by the embodiments of the present application, and this method can be by terminal
Follow-up mechanism performs, and wherein the device can be generally integrated in terminal device, also may be used by software and/or hardware realization
It is equipped with being integrated in other in the equipment of operating system.As shown in Figure 1, this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
Terminal device may include smart mobile phone, tablet computer and other equipment with operating system.With terminal device
Use in life is more and more, has the privacy information or proprietary information of very more users in terminal device, so user
The entrance that generally meeting unlocking terminal equipment is opened sets authenticating identity, to prevent stealing use from terminal device by malicious person
The privacy information or proprietary information at family.General user can be by setting number or letter code, graphical passwords or finger-print cipher etc.
Authentication mode, to protect the privacy information and proprietary information in terminal device.
After if simultaneously the user of non-terminal equipment owner takes terminal device, the operation being authenticated may be attempted.
Illustratively, the different graphical passwords of input are unlocked or attempted by the different numerical ciphers of trial input to carry out
Unlock.If detect the unlock operation failure to terminal device, it may be possible to which the maloperation of the user of terminal device is led
The unlock operation failure of cause, but be also likely to can be non-terminal equipment owner suspect attempt malice unlock terminal set
It is standby.Former is not had generally by the situation that maloperation causes unlock to fail to be continued repeatedly, and the situation of latter malice unlock
Then it is possible that the unlock failure of continuous several times.So by when detecting the unlock operation failure to terminal device, remembering
The number of failure is recorded, to further determine whether that terminal device is maliciously unlocked.
Optionally, in unlock instruction of the detection to terminal device, judge whether the unlock instruction meets unlocking condition.
If the unlock instruction does not meet the unlocking condition, it is determined that unlock operation failure, and records the unlock operation and loses
The number lost.
Wherein, the unlock instruction may include face unlocking information, unlocked by fingerprint information, unlocking pin, pattern unlock letter
It is at least one in breath and iris unlocking information.
Unlocking condition is the preset unlock rule of user.Illustratively, if unlock instruction is face unlocking information,
Then unlocking condition it is corresponding be the pre-stored user of user human face image information, terminal device receiving face solution
When lock information, by it compared with pre-stored human face image information, and then it may determine that whether the unlock instruction accords with
Close unlocking condition, if be unlocked terminal device.
S120, it is described unlock operation failure number reach setting number after, by set camera obtain target figure
Picture and obtain the current location information of the terminal device and temporal information.
If the number of the unlock operation failure reaches setting number, it is likely to terminal device and is maliciously being solved
It locks and there may be the situations that terminal device is stolen.At this point it is possible to be shot by starting setting camera, mesh is obtained
Logo image.Setting camera can be the front camera and/or rear camera of terminal device.Terminal device is being attempted evil
During meaning unlock, carry out shooting and can obtain to include the image of the environmental information residing for suspect by setting camera.Meanwhile also
The current location information of terminal device and temporal information can be obtained, according to target image, obtain target image location information with
And temporal information effectively can help user to be tracked terminal device.Wherein, setting number can be systemic presupposition or
It is set for changing according to user, the embodiment of the present application is not limited thereto.
Terminal device can be arranged to not show the interface taken pictures when obtaining target image by setting camera,
So that suspect can not know that setting camera is being taken pictures, the people that saves oneself from suspicion recognizes that the malicious act of oneself is found,
And then take cover camera or by force shutdown etc. modes prevent setting camera obtain target image operation, can be further
Auxiliary user is tracked terminal device.
Optionally, when setting camera detects face information, the image for including the face information, and conduct are obtained
Target image.
Optionally, if terminal device does not possess face identification functions, corresponding setting number is smaller than possessing face
The corresponding setting number of terminal device of identification function reduces the number requirement of unlock operation failure, can get more
Target image, and then the probability for taking the image comprising face information can be improved.
Wherein, if the camera for the terminal device that suspect is held can be gathered against its face by camera
To suspect face information when shot, then can get the image of clearly suspect.By in setting camera
It is shot when detecting face information, obtains the image for including the face information, as target image, can effectively obtain
The photo of the face of suspect as target image, can aid in user to lock suspect and terminal device is tracked.
S130, the target image, the location information and the temporal information are sent by network.
When getting target image, location information and temporal information, can be sent by network.Illustratively,
It can be sent by the mode or mobile data network of Wireless Fidelity (Wireless Fidelity, Wi-Fi).It is if current
Terminal device does not have available network to be able to carry out the operation sent, then when terminal device accesses network next time, by acquired in
Whole target image, location information and temporal informations given by network hair, facilitate the behavior of user tracking suspect
Trace.
Optionally, the target image, the location information and the temporal information are sent to high in the clouds destiny account.
Wherein, high in the clouds destiny account can be the cloud service function that terminal device developer provides to the user, and user is assigned
One group of high in the clouds account and user password, user can be logged in by high in the clouds account and user password on the terminal device, with
Establish the binding relationship of high in the clouds destiny account and terminal device.
The target image got, location information and temporal information are sent to high in the clouds destiny account, user can be from it
Its high in the clouds destiny account of his terminal device logs, and then target image, location information and temporal information can be obtained.
Optionally, the target image got, location information and temporal information are being sent to the same of high in the clouds destiny account
When further include:Instruction will be reminded to be sent to the high in the clouds destiny account, the prompting instruction is used to indicate the high in the clouds and specifies account
Family sends terminal device to the wearable device of user and is stolen prompting, and wearable device may include smartwatch and Intelligent bracelet
Deng.User is having found that wearable device received after terminal device is stolen prompting, can log in high in the clouds destiny account and check correlation
Information.
Optionally, the function choosing-item for recovering auxiliary is provided on terminal device, user can choose whether to open the function
Option, optionally it is also an option that should opening to decide whether to establish the correspondence of high in the clouds destiny account and terminal device
Recognition of face permission is opened during cloud service function, so that terminal device when performing terminal tracing method, can be taken the photograph by setting
As head detection face information, the image comprising face information is obtained as target image.
It, can also be by by target image, position if user does not establish the relation of high in the clouds destiny account and terminal device
Confidence ceases and temporal information is sent to default mailbox, default contact person etc. by network, can be set for setting according to user,
The embodiment of the present application is not limited thereto.
It can be speculated by the embodiment of the present application when unlocking terminal equipment unsuccessfully reaches setting number doubtful stolen, and obtained
Environment, position and the temporal information of terminal device are taken, and then terminal device can be carried out according to environment, position and temporal information
Tracking, auxiliary user recover its terminal device.
Fig. 2 is the flow diagram of another terminal tracing method provided by the embodiments of the present application, in above-described embodiment institute
On the basis of the technical solution of offer, as shown in Fig. 2, this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
S120, it is described unlock operation failure number reach setting number after, by set camera obtain target figure
Picture and obtain the current location information of the terminal device and temporal information.
S130, the target image, the location information and the temporal information are sent by network.
The specific embodiment of aforesaid operations may be referred to associated description above, and details are not described herein.
S140, the control instruction from the high in the clouds destiny account is received.
S150, target image and location information are reacquired according to the control instruction, and by the target figure of reacquisition
Picture and location information are sent to the high in the clouds destiny account.
Wherein, specify carrying out being sent to high in the clouds the target image, the location information and the temporal information
After account, user can log in high in the clouds destiny account and obtain the target image, the location information and the temporal information.
Because user logs in high in the clouds destiny account not necessarily instantaneity, possible user lost terminal equipment for a period of time it
Afterwards, high in the clouds destiny account is just logged in.And target image, location information and the temporal information stored at this time in the destiny account of high in the clouds
Non-instant information, so further user can also send control instruction to terminal device by high in the clouds destiny account, it is whole
End equipment can obtain target image and location information again when receiving the control instruction, and be sent to high in the clouds and specify
Account is sent to user.High in the clouds destiny account is sent to by obtaining target image and location information again, user can obtain
The instant information of terminal device is got, further to strengthen the auxiliary to user tracking terminal device.
Optionally, target image, location information and temporal information can also be reacquired according to the control instruction, and will
Target image, location information and the temporal information of reacquisition are sent to the high in the clouds destiny account.
If user does not recover its terminal device, trace instruction can also be sent at any time by high in the clouds destiny account to end
End equipment during according to receiving the trace instruction from high in the clouds destiny account, when terminal device enters exposal model, will be shot
Photo upload to high in the clouds destiny account.Terminal device and the progress of using terminal equipment of user so can have been cracked at other people
When taking pictures, continue to track its terminal device.
Fig. 3 is the flow diagram of another terminal tracing method provided by the embodiments of the present application, in above-described embodiment institute
On the basis of the technical solution of offer, to the target image, the location information and the temporal information are passed through network
The operation sent is optimized, and this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
S120, it is described unlock operation failure number reach setting number after, by set camera obtain target figure
Picture and obtain the current location information of the terminal device and temporal information.
The specific embodiment of aforesaid operations may be referred to associated description above, and details are not described herein.
S131, default social networking application program is opened.
S132, by the default social networking application program by the target image, the location information and the time
Information is sent to designated contact or is distributed to social platform.
Wherein, presetting social networking application program includes the social networking application program bound on terminal device.Illustratively, it is social to answer
Include such as microblogging, Alipay, wechat and QQ application programs with program.User can bind social networking application journey on the terminal device
Sequence establishes the user account of social networking application program and the relevance of terminal device, establishes after the relevance of the two, terminal device
Default social networking application program can be opened, and can information be sent by social networking application program.There is user in social networking application program
Contacts list, such as wechat good friend.Social platform issues open platform of the user message to the contact person of user for user,
Such as wechat circle of friends or microblogging distribution platform.
After the target image, the location information and the temporal information is got, default social activity can be opened
Application program, and pass through social networking application program and be sent to the target image, the location information and the temporal information
Designated contact in social networking application program, so that user is not knowing the risk that may be stolen of terminal device loss in time
When, designated contact can know that the terminal device of user has a stolen risk, and by risk-informed user.Multidigit can be selected to refer to
Determine contact person, expand the scope of Message distribution, as early as possible user is made to know risk.
The target image, the location information and the temporal information can also be issued in social platform, such as
Wechat circle of friends or microblogging distribution platform can make seeing that the contact person to give out information informs consumer's risk at the first time.
The target image, the location information and the temporal information are sent out by the default social networking application program
It send to designated contact or is distributed to social platform, user can be made to know that its terminal device has stolen risk as early as possible, and
Corresponding tracking process is carried out, improves the probability for recovering terminal device.
Optionally, by the default social networking application program by the target image, the location information and described
While temporal information is sent to designated contact, further include:The doubtful stolen information of the terminal device is sent to described
Designated contact.Alternatively, by the default social networking application program by the target image, the location information and described
While temporal information is distributed to social platform, further include:The doubtful stolen information of the terminal device is distributed to the society
Hand over platform.
The doubtful stolen information can be the content information of systemic presupposition, can also be the content letter of user's sets itself
Breath.Illustratively, it is text information that user, which can set doubtful stolen information,:" my mobile phone may be stolen, and receive this
My QQ123456 " is please contacted when message soon.
By the way that the doubtful stolen information and target image, the location information and temporal information are sent together
To designated contact or the social platform is distributed to, can make to receive the designated contact of the information or sees the issue
The contact person of content it is known that specifically how to handle, could relate to user as early as possible, and remind user that its terminal device may
There is the risk of loss, user is allow to carry out corresponding tracking process as early as possible, improve the probability for recovering terminal device.
Fig. 4 is the flow diagram of another terminal tracing method provided by the embodiments of the present application, in above-described embodiment institute
On the basis of the technical solution of offer, to by setting camera acquisition target image and obtaining the current position of terminal device
The operation of confidence breath is optimized, and this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
Specific embodiment may be referred to associated description above, and details are not described herein.
S121, it is described unlock operation failure number reach setting number after, persistently obtain mesh by setting camera
Logo image and persistently obtain the current location information of the terminal device.
S122, when receiving releasing and recovering instruction, then stop the camera that passes through and obtain target image and obtain
The operation of the current location information of terminal device;Wherein, instruction is recovered in the contact includes:The symbol obtained by the camera
Close the target image of unlocking condition and/or the releasing instruction of user's transmission.
Wherein, target image is persistently obtained by setting camera, can obtain target image according to the setting cycle, it can
Certain multidate information is obtained with the target image by lasting acquisition, can be obtained according to multidate information more on terminal
The hint information of environment where equipment further can aid in user to be tracked terminal device, and raising is recovered terminal and set
Standby probability.
If user has given its terminal device for change, user can immediately carry out terminal device correctly unlock operation,
Then camera obtains the image of user at this time, that is, meets the target image of unlocking condition, at this time just without by setting
Determine camera persistently to obtain target image and obtain the operation of location information.
Alternatively, if it is determined that its terminal device is not lost or is stolen, terminal device but in the trusted of user
Human hand in, user, which then can send to release by high in the clouds destiny account, recover instruction, stop described in mesh obtained by camera
Logo image and the operation for obtaining the current location information of terminal device.Confirm that terminal device is in the shape of safety in user
During condition, by stopping the operation of the location information current by camera acquisition target image and acquisition terminal device,
The power consumption of terminal device can be reduced.
S130, the target image, the location information and the temporal information are sent by network.Specifically
Embodiment may be referred to associated description above, and details are not described herein.
Fig. 5 is a kind of structure diagram of terminal tracing device provided by the embodiments of the present application, which can perform terminal
Method for tracing, as shown in figure 5, the device includes:
Failure record module 210 is unlocked, for when detecting the unlock operation failure to terminal device, recording the solution
Lock the number of operation failure;
Tracked information acquisition module 220, for it is described unlock operation failure number reach setting number after, by setting
Determine camera to obtain target image and obtain the current location information of the terminal device and temporal information;
Sending module 230, for by the target image, the location information and the temporal information by network into
Row is sent.
The embodiment of the present application is lost by when detecting the unlock operation failure to terminal device, recording the unlock operation
The number lost;After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with
And obtain the current location information of the terminal device and temporal information;By the target image, the location information and institute
Temporal information is stated to be sent by network.Can speculate when unlocking terminal equipment unsuccessfully reaches setting number it is doubtful stolen,
And environment, position and the temporal information of terminal device are obtained, and then can be according to environment, position and temporal information to terminal device
It is tracked, auxiliary user recovers its terminal device.
Optionally, tracked information acquisition module is specifically used for:
When setting camera detects face information, the image for including the face information is obtained, and is used as target figure
Picture.
Optionally, sending module is specifically used for:
The target image, the location information and the temporal information are sent to high in the clouds destiny account.
Optionally, further include:
Command reception module, for receiving the control instruction from the high in the clouds destiny account;
Sending module again, for reacquiring target image and location information according to the control instruction, and will again
The target image and location information of acquisition are sent to the high in the clouds destiny account.
Optionally, sending module is specifically used for:
Social start unit is used to open default social networking application program;
Unit is announced in social activity, for by the default social networking application program by the target image, the location information
And the temporal information is sent to designated contact or is distributed to social platform.
Optionally, social unit of announcing is additionally operable to:
The doubtful stolen information of the terminal device is sent to the designated contact;Or
The doubtful stolen information of the terminal device is distributed to the social platform.
Optionally, the tracked information acquisition module is specifically used for:
Believed by setting camera and persistently obtaining target image and persistently obtain the current position of the terminal device
Breath;
When receiving releasing and recovering instruction, then stop the camera that passes through and obtain target image and obtain terminal
The operation of the current location information of equipment;
Instruction is recovered in the contact to be included:The target image for meeting unlocking condition that is obtained by the camera and/or
The releasing instruction that user sends.
A kind of storage medium for including computer executable instructions that the embodiment of the present application is provided, computer can perform
The terminal tracking operations being not limited to the described above are instructed, can also carry out the terminal tracing side that the application any embodiment is provided
Relevant operation in method.
The embodiment of the present application also provides a kind of storage medium for including computer executable instructions, and the computer can perform
When being performed by computer processor for performing terminal tracing method, this method includes for instruction:
When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with
And obtain the current location information of the terminal device and temporal information;
The target image, the location information and the temporal information are sent by network.
Storage medium --- any various types of memory devices or storage device.Term " storage medium " is intended to wrap
It includes:Install medium, such as CD-ROM, floppy disk or magnetic tape equipment;Computer system memory or random access memory, such as
DRAM, DDR RAM, SRAM, EDO RAM, blue Bath (Rambus) RAM etc.;Nonvolatile memory, such as flash memory, magnetic medium
(such as hard disk or optical storage);Memory component of register or other similar types etc..Storage medium can further include other
The memory of type or its combination.In addition, storage medium can be located at program in the first computer system being wherein performed,
Or can be located in different second computer systems, second computer system is connected to the by network (such as internet)
One computer system.Second computer system can provide program instruction and be used to perform to the first computer." storage is situated between term
Matter " can include may reside in different position two of (such as in different computer systems by network connection) or
More storage mediums.Storage medium can store the program instruction that can be performed by one or more processors and (such as implement
For computer program).
The embodiment of the present application provides a kind of terminal device, and end provided by the embodiments of the present application can be integrated in the terminal device
Hold follow-up mechanism.
Fig. 6 is a kind of structure diagram of terminal device provided by the embodiments of the present application, and the embodiment of the present application provides one
Kind of terminal device including memory 31, processor 32 and is stored on memory 31 and can be in the computer journey of processor operation
Sequence, the processor realize the terminal tracing method described in above-described embodiment when performing the computer program.The application is implemented
The terminal device that example provides, can speculate doubtful stolen when unlocking terminal equipment unsuccessfully reaches setting number, and obtain terminal
Environment, position and the temporal information of equipment, and then terminal device can be tracked according to environment, position and temporal information,
Auxiliary user recovers its terminal device.
Fig. 7 is a kind of structure diagram of terminal device provided by the embodiments of the present application.As shown in fig. 7, the terminal device
It can include:Housing (not shown), touch-screen (not shown), touch key-press (not shown), memory 301,
Central processing unit (Central Processing Unit, CPU) 302 (also known as processor, hereinafter referred to as CPU), circuit board (figure
Not shown in) and power circuit (not shown).The circuit board is placed in the interior volume that the housing surrounds;It is described
CPU302 and the memory 301 are arranged on the circuit board;The power circuit, for for each of the terminal device
Circuit or device power supply;The memory 301, for storing executable program code;The CPU302 described in reading by depositing
The executable program code stored in reservoir 301 runs computer program corresponding with the executable program code, with reality
Existing following steps:
When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with
And obtain the current location information of the terminal device and temporal information;
The target image, the location information and the temporal information are sent by network.
The terminal device further includes:Peripheral Interface 303, RF (Radio Frequency, radio frequency) circuit 305, audio-frequency electric
Road 306, loud speaker 311, power management chip 308, input/output (I/O) subsystem 309, touch-screen 312, other input/controls
Control equipment 310 and outside port 304, these components are communicated by one or more communication bus or signal wire 307.
It should be understood that graphic terminal 300 is only an example of terminal device, and terminal device 300
Can have than more or less components shown in figure, two or more components can be combined or can be with
It is configured with different components.Various parts shown in figure can be including one or more signal processings and/or special
Hardware, software including integrated circuit are realized in the combination of hardware and software.
It is just provided in this embodiment below to be described in detail for performing the terminal device of terminal tracing method, the end
End equipment is by taking mobile phone as an example.
Memory 301, the memory 301 can be by access such as CPU302, Peripheral Interfaces 303, and the memory 301 can
To include high-speed random access memory, nonvolatile memory can also be included, such as one or more disk memory,
Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU302 and deposited by Peripheral Interface 303, the Peripheral Interface 303
Reservoir 301.
I/O subsystems 309, the I/O subsystems 309 can be by the input/output peripherals in equipment, such as touch-screen 312
With other input/control devicess 310, Peripheral Interface 303 is connected to.I/O subsystems 309 can include 3091 He of display controller
For controlling one or more input controllers 3092 of other input/control devicess 310.Wherein, one or more input controls
Device 3092 processed receives electric signal from other input/control devicess 310 or sends electric signal to other input/control devicess 310,
Other input/control devicess 310 can include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour
Vertical pole clicks on idler wheel.What deserves to be explained is input controller 3092 can with it is following any one be connected:Keyboard, infrared port,
The instruction equipment of USB interface and such as mouse.
Touch-screen 312, the touch-screen 312 are the input interface and output interface between subscriber terminal equipment and user,
Visual output is shown to user, visual output can include figure, text, icon, video etc..
Display controller 3091 in I/O subsystems 309 receives electric signal from touch-screen 312 or is sent out to touch-screen 312
Electric signals.Touch-screen 312 detects the contact on touch-screen, and the contact detected is converted to and shown by display controller 3091
The interaction of user interface object on touch-screen 312, that is, realize human-computer interaction, the user interface being shown on touch-screen 312
Icon that object can be the icon of running game, be networked to corresponding network etc..What deserves to be explained is equipment can also include light
Mouse, light mouse are the extensions for not showing the touch sensitive surface visually exported or the touch sensitive surface formed by touch-screen.
RF circuits 305 are mainly used for establishing the communication of mobile phone and wireless network (i.e. network side), realize mobile phone and wireless network
The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuits 305 receive and send RF letters
Number, RF signals are also referred to as electromagnetic signal, and RF circuits 305 convert electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications
Number, and communicated by the electromagnetic signal with communication network and other equipment.RF circuits 305 can include performing
The known circuit of these functions includes but not limited to antenna system, RF transceivers, one or more amplifiers, tuner, one
A or multiple oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, user identifier mould
Block (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 306 is mainly used for receiving voice data from Peripheral Interface 303, which is converted to telecommunications
Number, and the electric signal is sent to loud speaker 311.
Loud speaker 311 for the voice signal for receiving mobile phone from wireless network by RF circuits 305, is reduced to sound
And play the sound to user.
Power management chip 308, the hardware for being connected by CPU302, I/O subsystem and Peripheral Interface are powered
And power management.
Terminal device provided by the embodiments of the present application, can lose or it is stolen when be tracked, user to be aided in recover
Terminal device.
Terminal tracing device, storage medium and the terminal device provided in above-described embodiment, which can perform the application, arbitrarily to be implemented
The terminal tracing method that example is provided possesses and performs the corresponding function module of this method and advantageous effect.Not in above-described embodiment
In detailed description technical detail, reference can be made to the terminal tracing method that the application any embodiment is provided.
Note that it above are only the preferred embodiment of the application and institute's application technology principle.It will be appreciated by those skilled in the art that
The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation,
The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out by above example to the application
It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also
It can include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.
Claims (10)
- A kind of 1. terminal tracing method, which is characterized in that including:When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;After the number of the unlock operation failure reaches setting number, by setting camera acquisition target image and obtaining The location information and temporal information for taking the terminal device current;The target image, the location information and the temporal information are sent by network.
- 2. the method as described in claim 1, which is characterized in that described to be included by setting camera acquisition target image:When setting camera detects face information, the image for including the face information is obtained, and as target image.
- 3. the method as described in claim 1, which is characterized in that described by the target image, the location information and institute Temporal information is stated to be sent by network, including:The target image, the location information and the temporal information are sent to high in the clouds destiny account.
- 4. method as claimed in claim 3, which is characterized in that described by the target image, the location information and institute It states temporal information to be sent to after the destiny account of high in the clouds, further include:Receive the control instruction from the high in the clouds destiny account;Target image and location information are reacquired according to the control instruction, and the target image of reacquisition and position are believed Breath is sent to the high in the clouds destiny account.
- 5. the method as described in claim 1, which is characterized in that described by the target image, the location information and institute Temporal information is stated to be sent by network, including:Open default social networking application program;The target image, the location information and the temporal information are sent to by the default social networking application program Designated contact is distributed to social platform.
- 6. method as claimed in claim 5, which is characterized in that by the default social networking application program by the target figure While picture, the location information and the temporal information are sent to designated contact, further include:The doubtful stolen information of the terminal device is sent to the designated contact;OrThe target image, the location information and the temporal information are being issued by the default social networking application program While to social platform, further include:The doubtful stolen information of the terminal device is distributed to the social platform.
- 7. such as claim 1 to 6 any one of them method, which is characterized in that described to obtain target figure by setting camera Picture and the current location information of terminal device is obtained, including:Target image is persistently obtained by setting camera and persistently obtains the current location information of the terminal device;When receiving releasing and recovering instruction, then stop the camera that passes through and obtain target image and obtain terminal device The operation of current location information;Instruction is recovered in the contact to be included:The target image for meeting unlocking condition obtained by the camera and/or user The releasing instruction of transmission.
- 8. a kind of terminal tracing device, which is characterized in that including:Failure record module is unlocked, for when detecting the unlock operation failure to terminal device, recording the unlock operation The number of failure;Tracked information acquisition module, for after the number of the unlock operation failure reaches setting number, being imaged by setting Head obtains target image and obtains the current location information of the terminal device and temporal information;Sending module, for the target image, the location information and the temporal information to be sent by network.
- 9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The terminal tracing method as any one of claim 1-7 is realized during row.
- 10. a kind of terminal device, which is characterized in that including memory, processor and storage are on a memory and can be in processor The computer program of operation, which is characterized in that the processor realizes that claim 1-7 such as appoints when performing the computer program Terminal tracing method described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711308186.7A CN108076426A (en) | 2017-12-11 | 2017-12-11 | Terminal tracing method, apparatus, storage medium and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711308186.7A CN108076426A (en) | 2017-12-11 | 2017-12-11 | Terminal tracing method, apparatus, storage medium and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108076426A true CN108076426A (en) | 2018-05-25 |
Family
ID=62158003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711308186.7A Pending CN108076426A (en) | 2017-12-11 | 2017-12-11 | Terminal tracing method, apparatus, storage medium and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108076426A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218984A (en) * | 2018-07-10 | 2019-01-15 | 维沃移动通信有限公司 | A kind of method for tracing and mobile terminal |
CN109543390A (en) * | 2018-12-25 | 2019-03-29 | 广州知弘科技有限公司 | A kind of information security management method and system |
CN109543389A (en) * | 2018-12-25 | 2019-03-29 | 广州知弘科技有限公司 | A kind of information protecting method and system |
CN109684810A (en) * | 2018-12-25 | 2019-04-26 | 广州知弘科技有限公司 | A kind of information processing method and system |
CN110099164A (en) * | 2019-03-28 | 2019-08-06 | 华为终端有限公司 | The method and terminal given for change for lost terminal |
CN110173154A (en) * | 2019-05-27 | 2019-08-27 | 安徽桔子智能科技有限公司 | A kind of band clears up the Intelligent door lock capable of recognizing face of structure automatically |
CN110311839A (en) * | 2019-07-30 | 2019-10-08 | 秒针信息技术有限公司 | Pushed information method for tracing, device, server, terminal and storage medium |
CN110766101A (en) * | 2018-07-26 | 2020-02-07 | 杭州海康威视数字技术股份有限公司 | Method and device for determining movement track |
CN111542047A (en) * | 2020-03-30 | 2020-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Data uploading method and device, storage medium and related equipment |
CN112153571A (en) * | 2020-09-18 | 2020-12-29 | 浪潮电子信息产业股份有限公司 | Electronic equipment and equipment retrieval system thereof |
CN112214385A (en) * | 2020-09-30 | 2021-01-12 | 泰州翔升科技服务有限公司 | Terminal device alarming method and terminal device |
WO2021013187A1 (en) * | 2019-07-23 | 2021-01-28 | 深圳市道通智能航空技术有限公司 | Unmanned aerial vehicle searching information generation method and unmanned aerial vehicle |
CN112489339A (en) * | 2020-11-25 | 2021-03-12 | 努比亚技术有限公司 | Anti-theft alarm control method, equipment and computer readable storage medium |
CN115714809A (en) * | 2021-08-19 | 2023-02-24 | 深圳市万普拉斯科技有限公司 | Mobile terminal tracking method, mobile terminal and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104539811A (en) * | 2015-01-23 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Anti-theft method of terminal and mobile terminal |
CN107451464A (en) * | 2017-06-27 | 2017-12-08 | 北京金山安全软件有限公司 | Prompt message output method and device |
-
2017
- 2017-12-11 CN CN201711308186.7A patent/CN108076426A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104539811A (en) * | 2015-01-23 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Anti-theft method of terminal and mobile terminal |
CN107451464A (en) * | 2017-06-27 | 2017-12-08 | 北京金山安全软件有限公司 | Prompt message output method and device |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218984A (en) * | 2018-07-10 | 2019-01-15 | 维沃移动通信有限公司 | A kind of method for tracing and mobile terminal |
CN110766101B (en) * | 2018-07-26 | 2023-10-20 | 杭州海康威视数字技术股份有限公司 | Method and device for determining movement track |
CN110766101A (en) * | 2018-07-26 | 2020-02-07 | 杭州海康威视数字技术股份有限公司 | Method and device for determining movement track |
CN109543390A (en) * | 2018-12-25 | 2019-03-29 | 广州知弘科技有限公司 | A kind of information security management method and system |
CN109543389A (en) * | 2018-12-25 | 2019-03-29 | 广州知弘科技有限公司 | A kind of information protecting method and system |
CN109684810A (en) * | 2018-12-25 | 2019-04-26 | 广州知弘科技有限公司 | A kind of information processing method and system |
CN110099164A (en) * | 2019-03-28 | 2019-08-06 | 华为终端有限公司 | The method and terminal given for change for lost terminal |
CN110099164B (en) * | 2019-03-28 | 2022-04-05 | 华为终端有限公司 | Method for finding lost terminal and terminal |
CN110173154A (en) * | 2019-05-27 | 2019-08-27 | 安徽桔子智能科技有限公司 | A kind of band clears up the Intelligent door lock capable of recognizing face of structure automatically |
US11945583B2 (en) | 2019-07-23 | 2024-04-02 | Autel Robotics Co., Ltd. | Method for generating search information of unmanned aerial vehicle and unmanned aerial vehicle |
WO2021013187A1 (en) * | 2019-07-23 | 2021-01-28 | 深圳市道通智能航空技术有限公司 | Unmanned aerial vehicle searching information generation method and unmanned aerial vehicle |
CN110311839B (en) * | 2019-07-30 | 2021-07-06 | 秒针信息技术有限公司 | Push information tracking method, device, server, terminal and storage medium |
CN110311839A (en) * | 2019-07-30 | 2019-10-08 | 秒针信息技术有限公司 | Pushed information method for tracing, device, server, terminal and storage medium |
CN111542047A (en) * | 2020-03-30 | 2020-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Data uploading method and device, storage medium and related equipment |
CN112153571A (en) * | 2020-09-18 | 2020-12-29 | 浪潮电子信息产业股份有限公司 | Electronic equipment and equipment retrieval system thereof |
CN112214385A (en) * | 2020-09-30 | 2021-01-12 | 泰州翔升科技服务有限公司 | Terminal device alarming method and terminal device |
CN112489339A (en) * | 2020-11-25 | 2021-03-12 | 努比亚技术有限公司 | Anti-theft alarm control method, equipment and computer readable storage medium |
CN115714809A (en) * | 2021-08-19 | 2023-02-24 | 深圳市万普拉斯科技有限公司 | Mobile terminal tracking method, mobile terminal and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108076426A (en) | Terminal tracing method, apparatus, storage medium and terminal device | |
US6466781B1 (en) | Biometric authentication technology for wireless transceiver activation | |
EP3078157B1 (en) | A wearable device and a method for storing credentials associated with an electronic device in said wearable device | |
CN101809581B (en) | Embedded authentication systems in an electronic device | |
CN107451449B (en) | Biometric unlocking method and related product | |
CN110348186B (en) | Display method based on user identity recognition and electronic equipment | |
US20090150993A1 (en) | Mobile Device with Frequently Operated Biometric Sensors | |
CN108563933A (en) | Control method, device, storage medium and the mobile terminal of application program | |
CN106681717B (en) | Terminal application program management method and device and electronic equipment | |
CN108804006B (en) | Unlocking method, device, equipment and storage medium for wearable equipment | |
CN104992099A (en) | Fingerprint recognition application, method, mobile phone shell and system | |
CN110049490B (en) | Safety protection method and device for wearable equipment, wearable equipment and medium | |
EP3403211B1 (en) | User interface for a mobile device | |
CN103442141A (en) | Method for having access to safe mode in one-touch mode | |
EP3403210B1 (en) | User interface for a mobile device | |
EP3428780B1 (en) | Method for enabling biometric recognition pattern and related products | |
CN108022349A (en) | Information input method, equipment, smart lock and storage medium | |
Ohana et al. | Preventing cell phone intrusion and theft using biometrics | |
CN108966367A (en) | A kind of method, apparatus, storage medium and intelligent terminal for managing internet behavior | |
CN110730065A (en) | Token device for key backup device and key backup system | |
CN108520057A (en) | Processing method, device, storage medium and the mobile terminal of terminal data | |
CN108932486A (en) | Finger print matching method, device and electronic device | |
CN112437189A (en) | Identity recognition method, device and medium | |
CN112699354A (en) | User authority management method and terminal equipment | |
CN109254661A (en) | Image display method, device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180525 |
|
RJ01 | Rejection of invention patent application after publication |