CN108076426A - Terminal tracing method, apparatus, storage medium and terminal device - Google Patents

Terminal tracing method, apparatus, storage medium and terminal device Download PDF

Info

Publication number
CN108076426A
CN108076426A CN201711308186.7A CN201711308186A CN108076426A CN 108076426 A CN108076426 A CN 108076426A CN 201711308186 A CN201711308186 A CN 201711308186A CN 108076426 A CN108076426 A CN 108076426A
Authority
CN
China
Prior art keywords
terminal device
target image
information
location information
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711308186.7A
Other languages
Chinese (zh)
Inventor
田汉卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711308186.7A priority Critical patent/CN108076426A/en
Publication of CN108076426A publication Critical patent/CN108076426A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules

Abstract

A kind of terminal tracing method, apparatus, storage medium and the terminal device provided in the embodiment of the present application, this method is by when detecting the unlock operation failure to terminal device, recording the number for unlocking operation failure;After the number of the unlock operation failure reaches setting number, by setting camera acquisition target image and obtaining the current location information of the terminal device and temporal information;The target image, the location information and the temporal information are sent by network.By using above-mentioned technical proposal, it can speculate when unlocking terminal equipment unsuccessfully reaches setting number doubtful stolen, and obtain environment, position and the temporal information of terminal device, and then terminal device can be tracked according to environment, position and temporal information, auxiliary user recovers its terminal device.

Description

Terminal tracing method, apparatus, storage medium and terminal device
Technical field
The invention relates to terminal device technical fields more particularly to a kind of terminal tracing method, apparatus, storage to be situated between Matter and terminal device.
Background technology
With the development of terminal device equipment, it is essential to be increasingly becoming people's daily life, and portable work Tool.People can using terminal equipment is entertained, communicated, paid and surfed the Internet in all case operation, due to terminal device Convenience, thus also occur terminal device easily lose or it is easily stolen the problem of.It is stored with user's on terminal device Substantial amounts of privacy information and the proprietary information of user, if terminal device is lost or is stolen, can be brought to user can not estimate The serious consequence of meter.
The content of the invention
The embodiment of the present application provides a kind of terminal tracing method, apparatus, storage medium and terminal device, can be set in terminal It is standby to lose or be tracked when stolen, user to be aided in recover terminal device.
In a first aspect, the embodiment of the present application provides a kind of terminal tracing method, including:
When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with And obtain the current location information of the terminal device and temporal information;
The target image, the location information and the temporal information are sent by network.
Second aspect, the embodiment of the present application provide a kind of terminal tracing device, including:
Failure record module is unlocked, for when detecting the unlock operation failure to terminal device, recording the unlock The number of operation failure;
Tracked information acquisition module, for after the number of the unlock operation failure reaches setting number, passing through setting Camera obtains target image and obtains the current location information of the terminal device and temporal information;
Sending module, for the target image, the location information and the temporal information to be carried out by network It sends.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes the terminal tracing method as described in the embodiment of the present application when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of terminal device, including memory, processor and are stored in storage And can be in the computer program of processor operation on device, the processor is realized when performing the computer program as the application is real Apply the terminal tracing method described in example.
A kind of terminal tracing scheme provided in the embodiment of the present application, by detecting the operation of the unlock to terminal device During failure, the number of the unlock operation failure is recorded;After the number of the unlock operation failure reaches setting number, pass through Camera is set to obtain target image and obtain the current location information of the terminal device and temporal information;By the mesh Logo image, the location information and the temporal information are sent by network.It, can be with by using above-mentioned technical proposal Speculate when unlocking terminal equipment unsuccessfully reaches setting number doubtful stolen, and obtain environment, position and the time of terminal device Information, and then terminal device can be tracked according to environment, position and temporal information, auxiliary user recovers its terminal and sets It is standby.
Description of the drawings
Fig. 1 is a kind of flow diagram of terminal tracing method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another terminal tracing method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another terminal tracing method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another terminal tracing method provided by the embodiments of the present application;
Fig. 5 is a kind of structure diagram of terminal tracing device provided by the embodiments of the present application;
Fig. 6 is a kind of structure diagram of terminal device provided by the embodiments of the present application;
Fig. 7 is a kind of structure diagram of terminal device provided by the embodiments of the present application.
Specific embodiment
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that It is that specific embodiment described herein is used only for explaining the application rather than the restriction to the application.It further needs exist for illustrating , part relevant with the application rather than entire infrastructure are illustrated only for ease of description, in attached drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing described as flow chart or method.Although each step is described as the processing of order, many of which by flow chart Step can be implemented concurrently, concomitantly or simultaneously.In addition, the order of each step can be rearranged.When its operation The processing can be terminated during completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with Corresponding to method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of flow diagram of terminal tracing method provided by the embodiments of the present application, and this method can be by terminal Follow-up mechanism performs, and wherein the device can be generally integrated in terminal device, also may be used by software and/or hardware realization It is equipped with being integrated in other in the equipment of operating system.As shown in Figure 1, this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
Terminal device may include smart mobile phone, tablet computer and other equipment with operating system.With terminal device Use in life is more and more, has the privacy information or proprietary information of very more users in terminal device, so user The entrance that generally meeting unlocking terminal equipment is opened sets authenticating identity, to prevent stealing use from terminal device by malicious person The privacy information or proprietary information at family.General user can be by setting number or letter code, graphical passwords or finger-print cipher etc. Authentication mode, to protect the privacy information and proprietary information in terminal device.
After if simultaneously the user of non-terminal equipment owner takes terminal device, the operation being authenticated may be attempted. Illustratively, the different graphical passwords of input are unlocked or attempted by the different numerical ciphers of trial input to carry out Unlock.If detect the unlock operation failure to terminal device, it may be possible to which the maloperation of the user of terminal device is led The unlock operation failure of cause, but be also likely to can be non-terminal equipment owner suspect attempt malice unlock terminal set It is standby.Former is not had generally by the situation that maloperation causes unlock to fail to be continued repeatedly, and the situation of latter malice unlock Then it is possible that the unlock failure of continuous several times.So by when detecting the unlock operation failure to terminal device, remembering The number of failure is recorded, to further determine whether that terminal device is maliciously unlocked.
Optionally, in unlock instruction of the detection to terminal device, judge whether the unlock instruction meets unlocking condition. If the unlock instruction does not meet the unlocking condition, it is determined that unlock operation failure, and records the unlock operation and loses The number lost.
Wherein, the unlock instruction may include face unlocking information, unlocked by fingerprint information, unlocking pin, pattern unlock letter It is at least one in breath and iris unlocking information.
Unlocking condition is the preset unlock rule of user.Illustratively, if unlock instruction is face unlocking information, Then unlocking condition it is corresponding be the pre-stored user of user human face image information, terminal device receiving face solution When lock information, by it compared with pre-stored human face image information, and then it may determine that whether the unlock instruction accords with Close unlocking condition, if be unlocked terminal device.
S120, it is described unlock operation failure number reach setting number after, by set camera obtain target figure Picture and obtain the current location information of the terminal device and temporal information.
If the number of the unlock operation failure reaches setting number, it is likely to terminal device and is maliciously being solved It locks and there may be the situations that terminal device is stolen.At this point it is possible to be shot by starting setting camera, mesh is obtained Logo image.Setting camera can be the front camera and/or rear camera of terminal device.Terminal device is being attempted evil During meaning unlock, carry out shooting and can obtain to include the image of the environmental information residing for suspect by setting camera.Meanwhile also The current location information of terminal device and temporal information can be obtained, according to target image, obtain target image location information with And temporal information effectively can help user to be tracked terminal device.Wherein, setting number can be systemic presupposition or It is set for changing according to user, the embodiment of the present application is not limited thereto.
Terminal device can be arranged to not show the interface taken pictures when obtaining target image by setting camera, So that suspect can not know that setting camera is being taken pictures, the people that saves oneself from suspicion recognizes that the malicious act of oneself is found, And then take cover camera or by force shutdown etc. modes prevent setting camera obtain target image operation, can be further Auxiliary user is tracked terminal device.
Optionally, when setting camera detects face information, the image for including the face information, and conduct are obtained Target image.
Optionally, if terminal device does not possess face identification functions, corresponding setting number is smaller than possessing face The corresponding setting number of terminal device of identification function reduces the number requirement of unlock operation failure, can get more Target image, and then the probability for taking the image comprising face information can be improved.
Wherein, if the camera for the terminal device that suspect is held can be gathered against its face by camera To suspect face information when shot, then can get the image of clearly suspect.By in setting camera It is shot when detecting face information, obtains the image for including the face information, as target image, can effectively obtain The photo of the face of suspect as target image, can aid in user to lock suspect and terminal device is tracked.
S130, the target image, the location information and the temporal information are sent by network.
When getting target image, location information and temporal information, can be sent by network.Illustratively, It can be sent by the mode or mobile data network of Wireless Fidelity (Wireless Fidelity, Wi-Fi).It is if current Terminal device does not have available network to be able to carry out the operation sent, then when terminal device accesses network next time, by acquired in Whole target image, location information and temporal informations given by network hair, facilitate the behavior of user tracking suspect Trace.
Optionally, the target image, the location information and the temporal information are sent to high in the clouds destiny account.
Wherein, high in the clouds destiny account can be the cloud service function that terminal device developer provides to the user, and user is assigned One group of high in the clouds account and user password, user can be logged in by high in the clouds account and user password on the terminal device, with Establish the binding relationship of high in the clouds destiny account and terminal device.
The target image got, location information and temporal information are sent to high in the clouds destiny account, user can be from it Its high in the clouds destiny account of his terminal device logs, and then target image, location information and temporal information can be obtained.
Optionally, the target image got, location information and temporal information are being sent to the same of high in the clouds destiny account When further include:Instruction will be reminded to be sent to the high in the clouds destiny account, the prompting instruction is used to indicate the high in the clouds and specifies account Family sends terminal device to the wearable device of user and is stolen prompting, and wearable device may include smartwatch and Intelligent bracelet Deng.User is having found that wearable device received after terminal device is stolen prompting, can log in high in the clouds destiny account and check correlation Information.
Optionally, the function choosing-item for recovering auxiliary is provided on terminal device, user can choose whether to open the function Option, optionally it is also an option that should opening to decide whether to establish the correspondence of high in the clouds destiny account and terminal device Recognition of face permission is opened during cloud service function, so that terminal device when performing terminal tracing method, can be taken the photograph by setting As head detection face information, the image comprising face information is obtained as target image.
It, can also be by by target image, position if user does not establish the relation of high in the clouds destiny account and terminal device Confidence ceases and temporal information is sent to default mailbox, default contact person etc. by network, can be set for setting according to user, The embodiment of the present application is not limited thereto.
It can be speculated by the embodiment of the present application when unlocking terminal equipment unsuccessfully reaches setting number doubtful stolen, and obtained Environment, position and the temporal information of terminal device are taken, and then terminal device can be carried out according to environment, position and temporal information Tracking, auxiliary user recover its terminal device.
Fig. 2 is the flow diagram of another terminal tracing method provided by the embodiments of the present application, in above-described embodiment institute On the basis of the technical solution of offer, as shown in Fig. 2, this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
S120, it is described unlock operation failure number reach setting number after, by set camera obtain target figure Picture and obtain the current location information of the terminal device and temporal information.
S130, the target image, the location information and the temporal information are sent by network.
The specific embodiment of aforesaid operations may be referred to associated description above, and details are not described herein.
S140, the control instruction from the high in the clouds destiny account is received.
S150, target image and location information are reacquired according to the control instruction, and by the target figure of reacquisition Picture and location information are sent to the high in the clouds destiny account.
Wherein, specify carrying out being sent to high in the clouds the target image, the location information and the temporal information After account, user can log in high in the clouds destiny account and obtain the target image, the location information and the temporal information. Because user logs in high in the clouds destiny account not necessarily instantaneity, possible user lost terminal equipment for a period of time it Afterwards, high in the clouds destiny account is just logged in.And target image, location information and the temporal information stored at this time in the destiny account of high in the clouds Non-instant information, so further user can also send control instruction to terminal device by high in the clouds destiny account, it is whole End equipment can obtain target image and location information again when receiving the control instruction, and be sent to high in the clouds and specify Account is sent to user.High in the clouds destiny account is sent to by obtaining target image and location information again, user can obtain The instant information of terminal device is got, further to strengthen the auxiliary to user tracking terminal device.
Optionally, target image, location information and temporal information can also be reacquired according to the control instruction, and will Target image, location information and the temporal information of reacquisition are sent to the high in the clouds destiny account.
If user does not recover its terminal device, trace instruction can also be sent at any time by high in the clouds destiny account to end End equipment during according to receiving the trace instruction from high in the clouds destiny account, when terminal device enters exposal model, will be shot Photo upload to high in the clouds destiny account.Terminal device and the progress of using terminal equipment of user so can have been cracked at other people When taking pictures, continue to track its terminal device.
Fig. 3 is the flow diagram of another terminal tracing method provided by the embodiments of the present application, in above-described embodiment institute On the basis of the technical solution of offer, to the target image, the location information and the temporal information are passed through network The operation sent is optimized, and this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
S120, it is described unlock operation failure number reach setting number after, by set camera obtain target figure Picture and obtain the current location information of the terminal device and temporal information.
The specific embodiment of aforesaid operations may be referred to associated description above, and details are not described herein.
S131, default social networking application program is opened.
S132, by the default social networking application program by the target image, the location information and the time Information is sent to designated contact or is distributed to social platform.
Wherein, presetting social networking application program includes the social networking application program bound on terminal device.Illustratively, it is social to answer Include such as microblogging, Alipay, wechat and QQ application programs with program.User can bind social networking application journey on the terminal device Sequence establishes the user account of social networking application program and the relevance of terminal device, establishes after the relevance of the two, terminal device Default social networking application program can be opened, and can information be sent by social networking application program.There is user in social networking application program Contacts list, such as wechat good friend.Social platform issues open platform of the user message to the contact person of user for user, Such as wechat circle of friends or microblogging distribution platform.
After the target image, the location information and the temporal information is got, default social activity can be opened Application program, and pass through social networking application program and be sent to the target image, the location information and the temporal information Designated contact in social networking application program, so that user is not knowing the risk that may be stolen of terminal device loss in time When, designated contact can know that the terminal device of user has a stolen risk, and by risk-informed user.Multidigit can be selected to refer to Determine contact person, expand the scope of Message distribution, as early as possible user is made to know risk.
The target image, the location information and the temporal information can also be issued in social platform, such as Wechat circle of friends or microblogging distribution platform can make seeing that the contact person to give out information informs consumer's risk at the first time.
The target image, the location information and the temporal information are sent out by the default social networking application program It send to designated contact or is distributed to social platform, user can be made to know that its terminal device has stolen risk as early as possible, and Corresponding tracking process is carried out, improves the probability for recovering terminal device.
Optionally, by the default social networking application program by the target image, the location information and described While temporal information is sent to designated contact, further include:The doubtful stolen information of the terminal device is sent to described Designated contact.Alternatively, by the default social networking application program by the target image, the location information and described While temporal information is distributed to social platform, further include:The doubtful stolen information of the terminal device is distributed to the society Hand over platform.
The doubtful stolen information can be the content information of systemic presupposition, can also be the content letter of user's sets itself Breath.Illustratively, it is text information that user, which can set doubtful stolen information,:" my mobile phone may be stolen, and receive this My QQ123456 " is please contacted when message soon.
By the way that the doubtful stolen information and target image, the location information and temporal information are sent together To designated contact or the social platform is distributed to, can make to receive the designated contact of the information or sees the issue The contact person of content it is known that specifically how to handle, could relate to user as early as possible, and remind user that its terminal device may There is the risk of loss, user is allow to carry out corresponding tracking process as early as possible, improve the probability for recovering terminal device.
Fig. 4 is the flow diagram of another terminal tracing method provided by the embodiments of the present application, in above-described embodiment institute On the basis of the technical solution of offer, to by setting camera acquisition target image and obtaining the current position of terminal device The operation of confidence breath is optimized, and this method includes:
S110, when detecting the unlock operation failure to terminal device, record it is described unlock operation failure number.
Specific embodiment may be referred to associated description above, and details are not described herein.
S121, it is described unlock operation failure number reach setting number after, persistently obtain mesh by setting camera Logo image and persistently obtain the current location information of the terminal device.
S122, when receiving releasing and recovering instruction, then stop the camera that passes through and obtain target image and obtain The operation of the current location information of terminal device;Wherein, instruction is recovered in the contact includes:The symbol obtained by the camera Close the target image of unlocking condition and/or the releasing instruction of user's transmission.
Wherein, target image is persistently obtained by setting camera, can obtain target image according to the setting cycle, it can Certain multidate information is obtained with the target image by lasting acquisition, can be obtained according to multidate information more on terminal The hint information of environment where equipment further can aid in user to be tracked terminal device, and raising is recovered terminal and set Standby probability.
If user has given its terminal device for change, user can immediately carry out terminal device correctly unlock operation, Then camera obtains the image of user at this time, that is, meets the target image of unlocking condition, at this time just without by setting Determine camera persistently to obtain target image and obtain the operation of location information.
Alternatively, if it is determined that its terminal device is not lost or is stolen, terminal device but in the trusted of user Human hand in, user, which then can send to release by high in the clouds destiny account, recover instruction, stop described in mesh obtained by camera Logo image and the operation for obtaining the current location information of terminal device.Confirm that terminal device is in the shape of safety in user During condition, by stopping the operation of the location information current by camera acquisition target image and acquisition terminal device, The power consumption of terminal device can be reduced.
S130, the target image, the location information and the temporal information are sent by network.Specifically Embodiment may be referred to associated description above, and details are not described herein.
Fig. 5 is a kind of structure diagram of terminal tracing device provided by the embodiments of the present application, which can perform terminal Method for tracing, as shown in figure 5, the device includes:
Failure record module 210 is unlocked, for when detecting the unlock operation failure to terminal device, recording the solution Lock the number of operation failure;
Tracked information acquisition module 220, for it is described unlock operation failure number reach setting number after, by setting Determine camera to obtain target image and obtain the current location information of the terminal device and temporal information;
Sending module 230, for by the target image, the location information and the temporal information by network into Row is sent.
The embodiment of the present application is lost by when detecting the unlock operation failure to terminal device, recording the unlock operation The number lost;After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with And obtain the current location information of the terminal device and temporal information;By the target image, the location information and institute Temporal information is stated to be sent by network.Can speculate when unlocking terminal equipment unsuccessfully reaches setting number it is doubtful stolen, And environment, position and the temporal information of terminal device are obtained, and then can be according to environment, position and temporal information to terminal device It is tracked, auxiliary user recovers its terminal device.
Optionally, tracked information acquisition module is specifically used for:
When setting camera detects face information, the image for including the face information is obtained, and is used as target figure Picture.
Optionally, sending module is specifically used for:
The target image, the location information and the temporal information are sent to high in the clouds destiny account.
Optionally, further include:
Command reception module, for receiving the control instruction from the high in the clouds destiny account;
Sending module again, for reacquiring target image and location information according to the control instruction, and will again The target image and location information of acquisition are sent to the high in the clouds destiny account.
Optionally, sending module is specifically used for:
Social start unit is used to open default social networking application program;
Unit is announced in social activity, for by the default social networking application program by the target image, the location information And the temporal information is sent to designated contact or is distributed to social platform.
Optionally, social unit of announcing is additionally operable to:
The doubtful stolen information of the terminal device is sent to the designated contact;Or
The doubtful stolen information of the terminal device is distributed to the social platform.
Optionally, the tracked information acquisition module is specifically used for:
Believed by setting camera and persistently obtaining target image and persistently obtain the current position of the terminal device Breath;
When receiving releasing and recovering instruction, then stop the camera that passes through and obtain target image and obtain terminal The operation of the current location information of equipment;
Instruction is recovered in the contact to be included:The target image for meeting unlocking condition that is obtained by the camera and/or The releasing instruction that user sends.
A kind of storage medium for including computer executable instructions that the embodiment of the present application is provided, computer can perform The terminal tracking operations being not limited to the described above are instructed, can also carry out the terminal tracing side that the application any embodiment is provided Relevant operation in method.
The embodiment of the present application also provides a kind of storage medium for including computer executable instructions, and the computer can perform When being performed by computer processor for performing terminal tracing method, this method includes for instruction:
When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with And obtain the current location information of the terminal device and temporal information;
The target image, the location information and the temporal information are sent by network.
Storage medium --- any various types of memory devices or storage device.Term " storage medium " is intended to wrap It includes:Install medium, such as CD-ROM, floppy disk or magnetic tape equipment;Computer system memory or random access memory, such as DRAM, DDR RAM, SRAM, EDO RAM, blue Bath (Rambus) RAM etc.;Nonvolatile memory, such as flash memory, magnetic medium (such as hard disk or optical storage);Memory component of register or other similar types etc..Storage medium can further include other The memory of type or its combination.In addition, storage medium can be located at program in the first computer system being wherein performed, Or can be located in different second computer systems, second computer system is connected to the by network (such as internet) One computer system.Second computer system can provide program instruction and be used to perform to the first computer." storage is situated between term Matter " can include may reside in different position two of (such as in different computer systems by network connection) or More storage mediums.Storage medium can store the program instruction that can be performed by one or more processors and (such as implement For computer program).
The embodiment of the present application provides a kind of terminal device, and end provided by the embodiments of the present application can be integrated in the terminal device Hold follow-up mechanism.
Fig. 6 is a kind of structure diagram of terminal device provided by the embodiments of the present application, and the embodiment of the present application provides one Kind of terminal device including memory 31, processor 32 and is stored on memory 31 and can be in the computer journey of processor operation Sequence, the processor realize the terminal tracing method described in above-described embodiment when performing the computer program.The application is implemented The terminal device that example provides, can speculate doubtful stolen when unlocking terminal equipment unsuccessfully reaches setting number, and obtain terminal Environment, position and the temporal information of equipment, and then terminal device can be tracked according to environment, position and temporal information, Auxiliary user recovers its terminal device.
Fig. 7 is a kind of structure diagram of terminal device provided by the embodiments of the present application.As shown in fig. 7, the terminal device It can include:Housing (not shown), touch-screen (not shown), touch key-press (not shown), memory 301, Central processing unit (Central Processing Unit, CPU) 302 (also known as processor, hereinafter referred to as CPU), circuit board (figure Not shown in) and power circuit (not shown).The circuit board is placed in the interior volume that the housing surrounds;It is described CPU302 and the memory 301 are arranged on the circuit board;The power circuit, for for each of the terminal device Circuit or device power supply;The memory 301, for storing executable program code;The CPU302 described in reading by depositing The executable program code stored in reservoir 301 runs computer program corresponding with the executable program code, with reality Existing following steps:
When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
After the number of the unlock operation failure reaches setting number, target image is obtained by setting camera, with And obtain the current location information of the terminal device and temporal information;
The target image, the location information and the temporal information are sent by network.
The terminal device further includes:Peripheral Interface 303, RF (Radio Frequency, radio frequency) circuit 305, audio-frequency electric Road 306, loud speaker 311, power management chip 308, input/output (I/O) subsystem 309, touch-screen 312, other input/controls Control equipment 310 and outside port 304, these components are communicated by one or more communication bus or signal wire 307.
It should be understood that graphic terminal 300 is only an example of terminal device, and terminal device 300 Can have than more or less components shown in figure, two or more components can be combined or can be with It is configured with different components.Various parts shown in figure can be including one or more signal processings and/or special Hardware, software including integrated circuit are realized in the combination of hardware and software.
It is just provided in this embodiment below to be described in detail for performing the terminal device of terminal tracing method, the end End equipment is by taking mobile phone as an example.
Memory 301, the memory 301 can be by access such as CPU302, Peripheral Interfaces 303, and the memory 301 can To include high-speed random access memory, nonvolatile memory can also be included, such as one or more disk memory, Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU302 and deposited by Peripheral Interface 303, the Peripheral Interface 303 Reservoir 301.
I/O subsystems 309, the I/O subsystems 309 can be by the input/output peripherals in equipment, such as touch-screen 312 With other input/control devicess 310, Peripheral Interface 303 is connected to.I/O subsystems 309 can include 3091 He of display controller For controlling one or more input controllers 3092 of other input/control devicess 310.Wherein, one or more input controls Device 3092 processed receives electric signal from other input/control devicess 310 or sends electric signal to other input/control devicess 310, Other input/control devicess 310 can include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour Vertical pole clicks on idler wheel.What deserves to be explained is input controller 3092 can with it is following any one be connected:Keyboard, infrared port, The instruction equipment of USB interface and such as mouse.
Touch-screen 312, the touch-screen 312 are the input interface and output interface between subscriber terminal equipment and user, Visual output is shown to user, visual output can include figure, text, icon, video etc..
Display controller 3091 in I/O subsystems 309 receives electric signal from touch-screen 312 or is sent out to touch-screen 312 Electric signals.Touch-screen 312 detects the contact on touch-screen, and the contact detected is converted to and shown by display controller 3091 The interaction of user interface object on touch-screen 312, that is, realize human-computer interaction, the user interface being shown on touch-screen 312 Icon that object can be the icon of running game, be networked to corresponding network etc..What deserves to be explained is equipment can also include light Mouse, light mouse are the extensions for not showing the touch sensitive surface visually exported or the touch sensitive surface formed by touch-screen.
RF circuits 305 are mainly used for establishing the communication of mobile phone and wireless network (i.e. network side), realize mobile phone and wireless network The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuits 305 receive and send RF letters Number, RF signals are also referred to as electromagnetic signal, and RF circuits 305 convert electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications Number, and communicated by the electromagnetic signal with communication network and other equipment.RF circuits 305 can include performing The known circuit of these functions includes but not limited to antenna system, RF transceivers, one or more amplifiers, tuner, one A or multiple oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, user identifier mould Block (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 306 is mainly used for receiving voice data from Peripheral Interface 303, which is converted to telecommunications Number, and the electric signal is sent to loud speaker 311.
Loud speaker 311 for the voice signal for receiving mobile phone from wireless network by RF circuits 305, is reduced to sound And play the sound to user.
Power management chip 308, the hardware for being connected by CPU302, I/O subsystem and Peripheral Interface are powered And power management.
Terminal device provided by the embodiments of the present application, can lose or it is stolen when be tracked, user to be aided in recover Terminal device.
Terminal tracing device, storage medium and the terminal device provided in above-described embodiment, which can perform the application, arbitrarily to be implemented The terminal tracing method that example is provided possesses and performs the corresponding function module of this method and advantageous effect.Not in above-described embodiment In detailed description technical detail, reference can be made to the terminal tracing method that the application any embodiment is provided.
Note that it above are only the preferred embodiment of the application and institute's application technology principle.It will be appreciated by those skilled in the art that The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation, The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out by above example to the application It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also It can include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.

Claims (10)

  1. A kind of 1. terminal tracing method, which is characterized in that including:
    When detecting the unlock operation failure to terminal device, the number of the unlock operation failure is recorded;
    After the number of the unlock operation failure reaches setting number, by setting camera acquisition target image and obtaining The location information and temporal information for taking the terminal device current;
    The target image, the location information and the temporal information are sent by network.
  2. 2. the method as described in claim 1, which is characterized in that described to be included by setting camera acquisition target image:
    When setting camera detects face information, the image for including the face information is obtained, and as target image.
  3. 3. the method as described in claim 1, which is characterized in that described by the target image, the location information and institute Temporal information is stated to be sent by network, including:
    The target image, the location information and the temporal information are sent to high in the clouds destiny account.
  4. 4. method as claimed in claim 3, which is characterized in that described by the target image, the location information and institute It states temporal information to be sent to after the destiny account of high in the clouds, further include:
    Receive the control instruction from the high in the clouds destiny account;
    Target image and location information are reacquired according to the control instruction, and the target image of reacquisition and position are believed Breath is sent to the high in the clouds destiny account.
  5. 5. the method as described in claim 1, which is characterized in that described by the target image, the location information and institute Temporal information is stated to be sent by network, including:
    Open default social networking application program;
    The target image, the location information and the temporal information are sent to by the default social networking application program Designated contact is distributed to social platform.
  6. 6. method as claimed in claim 5, which is characterized in that by the default social networking application program by the target figure While picture, the location information and the temporal information are sent to designated contact, further include:
    The doubtful stolen information of the terminal device is sent to the designated contact;
    Or
    The target image, the location information and the temporal information are being issued by the default social networking application program While to social platform, further include:
    The doubtful stolen information of the terminal device is distributed to the social platform.
  7. 7. such as claim 1 to 6 any one of them method, which is characterized in that described to obtain target figure by setting camera Picture and the current location information of terminal device is obtained, including:
    Target image is persistently obtained by setting camera and persistently obtains the current location information of the terminal device;
    When receiving releasing and recovering instruction, then stop the camera that passes through and obtain target image and obtain terminal device The operation of current location information;
    Instruction is recovered in the contact to be included:The target image for meeting unlocking condition obtained by the camera and/or user The releasing instruction of transmission.
  8. 8. a kind of terminal tracing device, which is characterized in that including:
    Failure record module is unlocked, for when detecting the unlock operation failure to terminal device, recording the unlock operation The number of failure;
    Tracked information acquisition module, for after the number of the unlock operation failure reaches setting number, being imaged by setting Head obtains target image and obtains the current location information of the terminal device and temporal information;
    Sending module, for the target image, the location information and the temporal information to be sent by network.
  9. 9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The terminal tracing method as any one of claim 1-7 is realized during row.
  10. 10. a kind of terminal device, which is characterized in that including memory, processor and storage are on a memory and can be in processor The computer program of operation, which is characterized in that the processor realizes that claim 1-7 such as appoints when performing the computer program Terminal tracing method described in one.
CN201711308186.7A 2017-12-11 2017-12-11 Terminal tracing method, apparatus, storage medium and terminal device Pending CN108076426A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711308186.7A CN108076426A (en) 2017-12-11 2017-12-11 Terminal tracing method, apparatus, storage medium and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711308186.7A CN108076426A (en) 2017-12-11 2017-12-11 Terminal tracing method, apparatus, storage medium and terminal device

Publications (1)

Publication Number Publication Date
CN108076426A true CN108076426A (en) 2018-05-25

Family

ID=62158003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711308186.7A Pending CN108076426A (en) 2017-12-11 2017-12-11 Terminal tracing method, apparatus, storage medium and terminal device

Country Status (1)

Country Link
CN (1) CN108076426A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218984A (en) * 2018-07-10 2019-01-15 维沃移动通信有限公司 A kind of method for tracing and mobile terminal
CN109543390A (en) * 2018-12-25 2019-03-29 广州知弘科技有限公司 A kind of information security management method and system
CN109543389A (en) * 2018-12-25 2019-03-29 广州知弘科技有限公司 A kind of information protecting method and system
CN109684810A (en) * 2018-12-25 2019-04-26 广州知弘科技有限公司 A kind of information processing method and system
CN110099164A (en) * 2019-03-28 2019-08-06 华为终端有限公司 The method and terminal given for change for lost terminal
CN110173154A (en) * 2019-05-27 2019-08-27 安徽桔子智能科技有限公司 A kind of band clears up the Intelligent door lock capable of recognizing face of structure automatically
CN110311839A (en) * 2019-07-30 2019-10-08 秒针信息技术有限公司 Pushed information method for tracing, device, server, terminal and storage medium
CN110766101A (en) * 2018-07-26 2020-02-07 杭州海康威视数字技术股份有限公司 Method and device for determining movement track
CN111542047A (en) * 2020-03-30 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Data uploading method and device, storage medium and related equipment
CN112153571A (en) * 2020-09-18 2020-12-29 浪潮电子信息产业股份有限公司 Electronic equipment and equipment retrieval system thereof
CN112214385A (en) * 2020-09-30 2021-01-12 泰州翔升科技服务有限公司 Terminal device alarming method and terminal device
WO2021013187A1 (en) * 2019-07-23 2021-01-28 深圳市道通智能航空技术有限公司 Unmanned aerial vehicle searching information generation method and unmanned aerial vehicle
CN112489339A (en) * 2020-11-25 2021-03-12 努比亚技术有限公司 Anti-theft alarm control method, equipment and computer readable storage medium
CN115714809A (en) * 2021-08-19 2023-02-24 深圳市万普拉斯科技有限公司 Mobile terminal tracking method, mobile terminal and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN107451464A (en) * 2017-06-27 2017-12-08 北京金山安全软件有限公司 Prompt message output method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN107451464A (en) * 2017-06-27 2017-12-08 北京金山安全软件有限公司 Prompt message output method and device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218984A (en) * 2018-07-10 2019-01-15 维沃移动通信有限公司 A kind of method for tracing and mobile terminal
CN110766101B (en) * 2018-07-26 2023-10-20 杭州海康威视数字技术股份有限公司 Method and device for determining movement track
CN110766101A (en) * 2018-07-26 2020-02-07 杭州海康威视数字技术股份有限公司 Method and device for determining movement track
CN109543390A (en) * 2018-12-25 2019-03-29 广州知弘科技有限公司 A kind of information security management method and system
CN109543389A (en) * 2018-12-25 2019-03-29 广州知弘科技有限公司 A kind of information protecting method and system
CN109684810A (en) * 2018-12-25 2019-04-26 广州知弘科技有限公司 A kind of information processing method and system
CN110099164A (en) * 2019-03-28 2019-08-06 华为终端有限公司 The method and terminal given for change for lost terminal
CN110099164B (en) * 2019-03-28 2022-04-05 华为终端有限公司 Method for finding lost terminal and terminal
CN110173154A (en) * 2019-05-27 2019-08-27 安徽桔子智能科技有限公司 A kind of band clears up the Intelligent door lock capable of recognizing face of structure automatically
US11945583B2 (en) 2019-07-23 2024-04-02 Autel Robotics Co., Ltd. Method for generating search information of unmanned aerial vehicle and unmanned aerial vehicle
WO2021013187A1 (en) * 2019-07-23 2021-01-28 深圳市道通智能航空技术有限公司 Unmanned aerial vehicle searching information generation method and unmanned aerial vehicle
CN110311839B (en) * 2019-07-30 2021-07-06 秒针信息技术有限公司 Push information tracking method, device, server, terminal and storage medium
CN110311839A (en) * 2019-07-30 2019-10-08 秒针信息技术有限公司 Pushed information method for tracing, device, server, terminal and storage medium
CN111542047A (en) * 2020-03-30 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Data uploading method and device, storage medium and related equipment
CN112153571A (en) * 2020-09-18 2020-12-29 浪潮电子信息产业股份有限公司 Electronic equipment and equipment retrieval system thereof
CN112214385A (en) * 2020-09-30 2021-01-12 泰州翔升科技服务有限公司 Terminal device alarming method and terminal device
CN112489339A (en) * 2020-11-25 2021-03-12 努比亚技术有限公司 Anti-theft alarm control method, equipment and computer readable storage medium
CN115714809A (en) * 2021-08-19 2023-02-24 深圳市万普拉斯科技有限公司 Mobile terminal tracking method, mobile terminal and readable storage medium

Similar Documents

Publication Publication Date Title
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
US6466781B1 (en) Biometric authentication technology for wireless transceiver activation
EP3078157B1 (en) A wearable device and a method for storing credentials associated with an electronic device in said wearable device
CN101809581B (en) Embedded authentication systems in an electronic device
CN107451449B (en) Biometric unlocking method and related product
CN110348186B (en) Display method based on user identity recognition and electronic equipment
US20090150993A1 (en) Mobile Device with Frequently Operated Biometric Sensors
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
CN106681717B (en) Terminal application program management method and device and electronic equipment
CN108804006B (en) Unlocking method, device, equipment and storage medium for wearable equipment
CN104992099A (en) Fingerprint recognition application, method, mobile phone shell and system
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
EP3403211B1 (en) User interface for a mobile device
CN103442141A (en) Method for having access to safe mode in one-touch mode
EP3403210B1 (en) User interface for a mobile device
EP3428780B1 (en) Method for enabling biometric recognition pattern and related products
CN108022349A (en) Information input method, equipment, smart lock and storage medium
Ohana et al. Preventing cell phone intrusion and theft using biometrics
CN108966367A (en) A kind of method, apparatus, storage medium and intelligent terminal for managing internet behavior
CN110730065A (en) Token device for key backup device and key backup system
CN108520057A (en) Processing method, device, storage medium and the mobile terminal of terminal data
CN108932486A (en) Finger print matching method, device and electronic device
CN112437189A (en) Identity recognition method, device and medium
CN112699354A (en) User authority management method and terminal equipment
CN109254661A (en) Image display method, device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180525

RJ01 Rejection of invention patent application after publication