CN108632758A - Terminal tracing method, processing unit and terminal and storage medium - Google Patents

Terminal tracing method, processing unit and terminal and storage medium Download PDF

Info

Publication number
CN108632758A
CN108632758A CN201810311346.1A CN201810311346A CN108632758A CN 108632758 A CN108632758 A CN 108632758A CN 201810311346 A CN201810311346 A CN 201810311346A CN 108632758 A CN108632758 A CN 108632758A
Authority
CN
China
Prior art keywords
terminal
information
user
judge
tracing method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810311346.1A
Other languages
Chinese (zh)
Other versions
CN108632758B (en
Inventor
熊先平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810311346.1A priority Critical patent/CN108632758B/en
Publication of CN108632758A publication Critical patent/CN108632758A/en
Application granted granted Critical
Publication of CN108632758B publication Critical patent/CN108632758B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Environmental & Geological Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

This application discloses a kind of terminal tracing method, apparatus, storage medium and terminals.The terminal tracing method includes:Judge the current geographic position whether in preset range;When the current geographic position exceeds preset range, judging user behavior status information, whether consistent and subscriber identity information is legal;When user behavior status information is inconsistent or the subscriber identity information is illegal, the terminal is locked.The application can improve the safety of terminal.

Description

Terminal tracing method, processing unit and terminal and storage medium
Technical field
This application involves field of terminal technology, and in particular to a kind of terminal tracing method, processing unit and terminal and storage Medium.
Background technology
With the continuous development of science and technology, the mobile terminals such as mobile phone, tablet computer in people's lives also get over by role Come more important.However, in daily life, mobile terminal is lost or stolen event happens occasionally, when mobile terminal is lost Or after being stolen, the mobile terminal can be continuing with by picking up taker or stealer.Therefore, how to reinforce the safety of mobile terminal at For production firm's urgent need to resolve.
Invention content
A kind of terminal tracing method of the embodiment of the present application offer, processing unit and terminal and storage medium, can improve end The safety at end.
The embodiment of the present application provides a kind of terminal tracing method, including:
Judge the current geographic position whether in preset range;
When the current geographic position exceeds preset range, judge whether user behavior status information consistent and user Whether identity information is legal;
When user behavior status information is inconsistent or the subscriber identity information is illegal, the terminal is locked.
Correspondingly, the embodiment of the present application also provides a kind of processing unit, including:
First judging unit, for judging the current geographic position whether in preset range;
Second judgment unit, for when the current geographic position exceeds preset range, judging that user behavior state is believed Whether whether consistent and subscriber identity information is legal for breath;
First lock cell is used for when user behavior status information is inconsistent or the subscriber identity information is illegal When, lock the terminal.
The embodiment of the present application also provides a kind of storage mediums, are stored thereon with computer program, and described program is handled The step of device realizes any terminal tracing method provided by the embodiments of the present application when executing.
The embodiment of the present application provides a kind of terminal, including:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes provided by the embodiments of the present application Any terminal tracing method.
In the embodiment of the present application, terminal can obtain the current geographic position of the terminal, then judge the current position Position is managed whether in preset range, when the geographical location exceeds preset range, then whether judges subscriber identity information It is legal, when the subscriber identity information is illegal, lock the terminal.Therefore, the present embodiment can according to terminal whether Whether range and user identity in safety are legal, carry out locking terminal, to improve the safety of terminal.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described.It should be evident that the accompanying drawings in the following description is only some embodiments of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of terminal tracing method provided by the embodiments of the present application.
Fig. 2 is another flow diagram of terminal tracing method provided by the embodiments of the present application.
Fig. 3 is the schematic diagram of a scenario of terminal tracing provided by the embodiments of the present application.
Fig. 4 is a module diagram of processing unit provided by the embodiments of the present application.
Fig. 5 is terminal structure schematic diagram provided by the embodiments of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation describes.Obviously, described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, the every other implementation that those skilled in the art are obtained without creative efforts Example, shall fall in the protection scope of this application.
Term " first ", " second ", " third " in the description and claims of this application and above-mentioned attached drawing etc. (if present) is for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that this The object of sample description can be interchanged in the appropriate case.In addition, term " comprising " and " having " and their any deformation, meaning Figure, which is to cover, non-exclusive includes.For example, containing the process of series of steps, method or containing a series of modules or list The device of member, terminal, system those of are not necessarily limited to clearly to list step or module or unit, can also include unclear The step of ground is listed or module or unit can also include for intrinsic its of these processes, method, apparatus, terminal or system Its step or module or unit.
A kind of terminal control method of the embodiment of the present application offer, device and terminal, will be described in detail respectively below.
In a preferred embodiment, above-mentioned processing unit can integrate in the terminal, which can be intelligent hand The equipment such as machine, tablet computer.
Referring to Fig. 1, Fig. 1 is the flow diagram of terminal tracing method provided by the embodiments of the present application, flow can wrap It includes:
In step S101, judge the current geographic position whether in preset range.
Terminal is given tacit consent in the present embodiment has the function of GPS (global positioning system), and gives tacit consent to terminal and have been switched on GPS work( Can, therefore the current geographical location of terminal can be obtained by GPS.If certainly when GPS can not obtain signal, can also lead to Cross the geographical location that other modes obtain terminal, for example, the signal tower communication that terminal is connect with it, estimate it and signal tower it Between distance constantly to report its geographical location.But the Position Approximate of terminal can also be got, can also lead in addition The geographical location of terminal can also accurately be obtained according to the address of WiFi access points by crossing the access point of acquisition WiFi.
Certainly in the present embodiment step S101, terminal can jointly be carried out when obtaining current location according to various ways It realizes, or when a certain function can not enable, is substituted by other means to obtain the current location of terminal.
Preset range typically first sets safe geographical position range, which refers to some ground Point is the center of circle, and a range is given off along the center of circle, and the geographical location no more than the range belongs to effective range, for example, It determines with " family " as the center of circle, giving off a range with 2 kilometers for radius belongs to safe geographical position range, can also refer to certainly Determine with " company " for the center of circle, giving off a range with 1 kilometer for radius belongs to safe geographical position range, can also be certainly From " family " to " company " belongs to safe geographical position range along the range that road is formed, for safety geography position in the present embodiment The quantity for setting range size and safe geographical position range is not specifically limited, for example, can be by the safe geographical location model It encloses and is defined as a city or some area.According to the current geographic position got and preset safe geographical position range ratio It is right, if can not be corresponded to, judge that current geographical location is not in preset range.
In step s 102, when the current geographic position exceeds preset range, judge that user behavior status information is Whether no consistent and subscriber identity information is legal.
When current geographic position exceeds preset range, then make the unsafe mark of out position, is opened according to dangerous mark It is dynamic to judge whether user behavior state is consistent and judges whether subscriber identity information is legal, which includes The speed of travel of user, the sound of user, the body temperature of user, user the formation such as heartbeat data acquisition system.For example, test is a certain The displacement distance of terminal in a period, to estimate the speed of travel of user, for example, the normal walking speed of people is per hour 5 kilometers or so, when the movement speed of terminal, which being in, does not have small 4 to 6 kilometers, starts to calculate, obtain the speed of travel of user.Root It is compared according to the user's history speed of travel, whether see can be matched.It is carried out pair it is, of course, also possible to be divided into multiple segments Than, for example at this moment moving velocity of terminal may be the motion state of cycling, at this moment obtains in 20 or so kilometer per hour Speed be compared with history riding speed, whether see can be matched, if mismatch if illustrate user behavior state Information is inconsistent.By limiting speed interval, starts the distance that test is moved within a certain period of time, can make comparison in this way Object is not in error, to obtain more accurate correction data.
For another example, terminal obtains the voice that current high frequency occurs, by the high frequency voice currently occurred and history high frequency voice It is compared, sees whether current high frequency voice match with history high frequency voice, the state of user is illustrated if mismatching Information is inconsistent.For another example, obtain the voice front three that current high frequency occurs, by voice front three that current high frequency occurs with go through History high frequency voice is compared, if it is possible to which it is consistent that matching, which then illustrates user behavior state, is illustrated if mismatching The behavior state information of user is inconsistent.
For another example, terminal obtains the body temperature of active user, or obtains the temperature for being presently in environment, when terminal is got Active user body temperature and be presently in the temperature of environment and the body temperature of historical user and be not presently in the temperature of environment not Timing then illustrates that user behavior status information is inconsistent.In order to avoid because Changes in weather and caused by temperature comparisons' error, lead to Often the temperature-time of selection historical user's local environment will not be too long, before typically one day or before three days.It should be noted that For the reduced time and it is not specifically limited.
Certainly judge that the behavior state information of user is not limited to above-mentioned scheme, can also be carried out by other schemes, Or more accurately judged by way of data acquisition system, the embodiment of the present application, which is not done, excessively to be repeated.By judging to use Whether family behavior state information is consistent, can exceed in preset range in terminal and begin to execute without notifying, if When judging that user behavior status information is inconsistent, next program can be started in this way within first time, such as stolen When, can next program be just triggered to track terminal at the first time.
The subscriber identity information may include:In the account number cipher of user, finger print information, pupil information or personal business card The identity information of one or more, certain user is also not limited to this, can also include other information, for example, face.It takes Means can be terminal pop-up subscriber identity information verification interface, confirm for user, if user cannot repeatedly pass through user's body Part Information Authentication, then judge that the subscriber identity information is illegal, certainly, the number for verifying subscriber identity information can be it is primary, Twice, three or other numbers are not specifically limited this in the present embodiment.It can also be the camera for starting terminal, lead to The face of camera acquisition user is crossed to judge whether subscriber identity information is legal.
In step s 103, when user behavior status information is inconsistent or the subscriber identity information is illegal, locking The terminal.
When user behavior status information is inconsistent illegal with subscriber identity information, then subscriber identity information uneasiness is made Full mark starts the program of the terminal according to the mark.For example, the chip of locking terminal, causes terminal completely can not work Make, it is necessary to return factory to after-sales service center and reopen respective chip function, while information can be fed back away, in order to seek Turn round and stretch out the hand machine.
It is understood that in the embodiment of the present application, terminal can obtain the current geographic position of the terminal, then sentence The current geographic position break whether in the preset range, when the geographical location exceeds preset range, then user behavior Whether status information is consistent and judges whether subscriber identity information is legal, when the user behavior status information is inconsistent or institute State subscriber identity information it is illegal when, lock the terminal.Therefore, whether the present embodiment can be according to terminal in safety Whether range and user identity are legal, carry out locking terminal, to improve the safety of terminal.
Referring to Fig. 2, Fig. 2 is another flow diagram of terminal tracing method provided by the embodiments of the present application, flow can To include:
In step s 201, the new access base station of terminal and cordless communication network access-in point information are obtained.
Terminal often enters a place, and terminal will be attached with base station, or works as and be connected into a WiFi access point, When being exactly cordless communication network access point, terminal records collected base station information and wireless communication networks access-in point information Come.
In step S202, judge that the access base station information whether there is difference with history base station information.
After getting the base station information of access, history base station information is compared, for example, the usual history base station of terminal Information is typically the base station of high frequency access, specifically can oneself setting history base station information, naturally it is also possible to according to according to Base station connects number and carries out a sequence, three before ranking, five base stations as safe history base station information, certainly, The ranking and quantity of base station ranking are not specifically limited, the present embodiment is intended merely to better illustrate.It certainly can be with It is that in a period of time before new access base station, terminal is continuously connected into number and reaches a threshold value, regards as history base station letter Breath.For example, the base station is continuously connected into three times within ten days before new access base station, it can be assumed that being history base station information.
For example, user would generally in common site using terminal, such as family, company a certain range in, that is, terminal Some common base station access points can be connected into, when terminal enters some strange place, at this moment terminal can be confirmed as connection New base station access point has been arrived, the base station access point that is newly connected into this when or has been matched with common base station access point, if cannot Matching, then illustrate that the access base station information has differences with history base station information.
In step S203, if access base station information has differences with history base station information, judge that cordless communication network connects Access point information whether there is difference with history cordless communication network access-in point information.
When access base station information and history base station information have differences, triggering judges cordless communication network access-in point information It whether there is difference with history cordless communication network access-in point information.It is, common wireless network can be connected into according to terminal Access point, when terminal enters some strange place, when the wireless network access point being connected to, this when, wireless network connect Access point is matched with common wireless network access point, if cannot match, illustrate the access wireless network access point information with History wireless network access point information has differences.
In step S204, if wireless network access point information has differences with history wireless network access point information, open The global positioning system is moved, current geographic position is obtained, judges the current geographic position whether in preset range.
It is had differences in wireless network access point information and history wireless network access point information, triggers GPS functions, to Current geographical location is obtained, judges current geographical location whether in default range, that is, get current Whether in preset range, preset range typically first sets safe geographical position range in geographical location, and the safety is geographical Position range refers to giving off a range along the center of circle using some place as the center of circle, is no more than the geographical location of the range Effective range is belonged to, for example, determining with " family " as the center of circle, giving off a range with 2 kilometers for radius belongs to safe geography Position range, can also specify certainly with " company " as the center of circle, and giving off a range with 1 kilometer for radius belongs to safe geography Position range can also be that from " family " to " company " belongs to safe geographical position range along the range that road is formed certainly, this The quantity of safe geographical position range size and safe geographical position range is not specifically limited in embodiment, for example, The safe geographical position range can be defined as to a city or some area.According to the current geographic position got and preset Safe geographical position range compare, if can not be corresponded to, judge that current geographical location is not in preset range.
S205 obtains user's active user's behavioral data.
Wherein, multiple sensors are provided in terminal, the sensor can acquire user behavior data, for example, using Shock sensor experiences the vibrations of human body to carry out meter step.For example, acquisition active user is whithin a period of time, the step of movement Number.For another example, it can also be temperature sensor, acquire the temperature of presently described environment.It should be noted that obtaining active user Behavioral data can also include other a variety of aspects, for example, acquiring the sound that human hair goes out by sound transducer.It is appreciated that It is that the behavioral data of user includes but not limited to above description, does not do in the embodiment of the present application and excessively repeats.It needs to illustrate It is that the behavioral data of acquisition can be formed a data acquisition system, be stored in terminal.
S206, judge user active user behavioral data whether with historical behavior Data Matching.
The behavioral data of wherein history is the behavioral data formed before current behavior data, that is, would generally be set Some threshold value is set as historical behavior data, for example, when the meter step data of shock sensor multi collect is consistent, for example continuously adopt Historical behavior data can be used as by collecting three subuniform meter step datas.For another example, the voice that high frequency occurs is as historical behavior Data, for another example, the normality temperature that a period of time occurs.Of course, it is possible to historical behavior data are formed into a set, and it is current Behavioral data matched.For example, currently counting step data and history meter step data and current voice data and history voice number According to matching, and current temperature data is mismatched with historical temperature data, by data analysis to judge user's current behavior data Whether matched with user's history behavioral data.Most covering principles may be used in the foundation of the data analysis, that is, if more User's current behavior data of a aspect matched with historical user's behavioral data be taken as it is matched, it is, of course, also possible to according to The type set priority of user behavior data.For example, by the user behavior data of the voice highest condition of grade as priority, come Judge active user's behavioral data whether with historical behavior Data Matching.
S207 obtains the terminal usage scenario information and people information when terminal screen is lighted.
It is black to give tacit consent to the screen in non-working condition sub-screen, when the screen opening of terminal, that is, prepares operation When terminal, the terminal usage scenario information and people information are obtained.For example, working as hand-set from stolen, thief prepares to use the hand Machine, when theft will necessarily light screen, no matter thief can enough unlock, at this moment start automatically terminal front camera and Rear camera obtains terminal current usage scenario information and people information.Wherein, usage scenario information is mainly by taking the photograph As the use environment picture that head is shot, people information is the face of camera shooting.
S208, if the currently used scene information of terminal and people information and history usage scenario and historical personage's information are not Match, then judges that subscriber identity information is illegal.
For example, the face currently acquired does not meet the face pre-saved before terminal, then the subscriber identity information is judged It is illegal, while being matched according to the user's usage scenario currently acquired with user's usage scenario is pre-saved, if not Matching, then judge that the subscriber identity information is illegal.Confirmed by user's usage scenario information and the dual judgement of people information Whether the identity information of user is legal, improves the accuracy of judgement in this way, avoids the simple photo using personage or vacation People substitutes the loophole of true man, meanwhile, he when judging the subscriber identity information, without deliberately makes prompting, so that theft The thief of the terminal relaxes vigilant, is different from and confirms whether the identity information of user is legal by verifying to remind, this Technical solution is more accurate and safe.
It should be noted that obtaining people information by terminal front camera, obtaining scene by rear camera makes Use information.The data that can be acquired in this way are more accurate.Scene use information can certainly be obtained by front camera, after It sets camera and obtains people information.User's scene use information and people information, the application can also be just played by sensor It does not do and excessively repeats for how to obtain subscriber identity information and scene use information in embodiment.
It should be noted that the locking terminal includes locking terminal Global quotient Netcom chip, to lock The terminal wireless transceiving chip.
Lead to terminal by locking terminal Global quotient Netcom chip to lock the terminal wireless transceiving chip It can not work completely, it is necessary to return factory to after-sales service center and reopen respective chip function, while can feed back information to User is in order to recovering terminal.
S209, triggers preset security procedure, then starts self-destruction program and send out alarm.
It should be noted that if the setting of preset security procedure can be not powered on or encounter brush machine for a long time In the case of etc., certain includes but not limited to the situation.For example, in the case where terminal is not switched on for a long time, for example, continuously It is not switched within three days or five days, then starts described information self-destruction program, the data for being stored in terminal of user are all destroyed simultaneously And cannot repair, meanwhile, send out self-destructed alarm.For another example, in the case where encountering violence brush machine, start described information immediately The data for being stored in terminal of user are all destroyed and cannot be repaired by self-destruction program.
Referring to Fig. 3, Fig. 3 is the schematic diagram of a scenario of terminal tracing method provided by the embodiments of the present application.
In the embodiment of the present application, if the place that 10 to one, terminal is new, terminal 10 and base station 30 be attached or with WiFi access points connect, and 30 access point of base station and WiFi access points and 20 access point of history base station and WiFi access points carry out pair Than.Usual 20 access point of history base station and WiFi access points are typically base station and the WiFi access points of high frequency access, when base station 30 Access point has differences with 20 access point of history base station with WiFi access points with WiFi access points, then is confirmed currently by GPS Whether geographical location is in the geographical location often occurred passes through biography if having exceeded the geographical location that user often occurs Sensor obtains user behavior status information, wherein user behavior status information includes the speed of travel of user, the sound etc. of user Big data set.It may determine that whether user is in state of going on business or tourism state by judging user behavior status information Deng.When user prepares using terminal, confirm whether the identity information of user is legal, if not conforming to rule confirms that terminal has been lost It loses or stolen, to locking terminal, to give terminal peace for change, meanwhile, if the security procedure triggering of terminal, that is, it is long Time is not switched on or encounters violence brush machine etc., then starts self-destruction program and send out alarm, self-destruction program will destroy the institute of user There are data 100 and cannot repair.
For ease of preferably implementing terminal control method provided by the embodiments of the present application, the embodiment of the present application also provides one kind Device based on above-mentioned terminal tracing method.Wherein the meaning of noun is identical with the processing method of above-mentioned touching information, specifically Realize that details can be with the explanation in reference method embodiment.
Please refer to the module diagram that 4, Fig. 4 is processing unit provided by the embodiments of the present application.Specifically, the processing fills Set 300, including:First judging unit 301, second judgment unit 302 and the first lock cell.
First judging unit 301, for judging the current geographic position whether in preset range;
Second judgment unit 302, for when the current geographic position exceeds preset range, judging user behavior state Whether whether consistent and subscriber identity information is legal for information;
First lock cell 303 is used for when user behavior state is inconsistent or the subscriber identity information is illegal, Lock the terminal.
In one embodiment, which can be used for obtaining access base station information and wireless communication networks Network access-in point information judges that the access base station information whether there is difference with history base station information, if new access base station information It is had differences with history base station information, judges cordless communication network access-in point information and history cordless communication network access-in point information With the presence or absence of difference, if wireless network access point information also has differences with history wireless network access point information, described in startup Whether global positioning system obtains current geographic position, judge the current geographic position in preset range.
In one embodiment, which can be used for obtaining user's active user's behavioral data, judge User active user behavioral data whether with historical behavior Data Matching.
In some embodiments, which can be used for, when terminal screen is lighted, obtaining the terminal Usage scenario information and people information judge the terminal usage scenario information and people information and history usage scenario and history Whether people information matches, if the currently used scene information of terminal and people information and history usage scenario and historical personage's information It mismatches, then judges that subscriber identity information is illegal.
In some embodiments, which can be used for obtaining personage's letter by terminal front camera Breath obtains scene use information by rear camera.
In some embodiments, which can be used for locking terminal Global quotient Netcom chip, from And lock the terminal wireless transceiving chip.
Further include the first self-destruction unit in some embodiments, if the first self-destruction unit is for triggering preset safe journey Sequence then starts self-destruction program and sends out alarm.
The embodiment of the present application also provides a kind of terminal, as shown in figure 5, the terminal 400 may include there are one or one with The memory 401 of upper computer readable storage medium, sensor 402, input unit 403, display screen 404 and include one The components such as a or more than one processing core processor 405.It will be understood by those skilled in the art that shown in Fig. 5 eventually The restriction of end structure not structure paired terminal, may include than illustrating more or fewer components, or the certain components of combination, or The different component arrangement of person.
Memory 401 can be used for storing application program and data.Include that can hold in the application program that memory 401 stores Line code.Application program can form various functions module.Processor 405 is stored in the application journey of memory 401 by operation Sequence, to perform various functions application and data processing.In addition, memory 401 may include high-speed random access memory, Can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited Memory device.Correspondingly, memory 401 can also include Memory Controller, right to provide processor 405 and input unit 403 The access of memory 401.
Terminal may also include at least one sensor 402, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or the back of the body when terminal is moved in one's ear Light.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) acceleration Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Input unit 403 can be used for receiving number, character information or the user's characteristic information (such as fingerprint) of input, and Generate keyboard related with user setting and function control, mouse, operating lever, optics or the input of trace ball signal.Specifically Ground, in a specific embodiment, input unit 403 may include touch sensitive surface and other input equipments.Touch sensitive surface, Referred to as touch display screen or Trackpad, collect user on it or neighbouring touch operation (such as user using finger, touch The operations of any suitable object or attachment on touch sensitive surface or near touch sensitive surface such as pen), and according to preset Formula drives corresponding attachment device.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller. Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, transmit a signal to touch Controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processing Device 405, and order that processor 405 is sent can be received and executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray And the multiple types such as surface acoustic wave realize touch sensitive surface.In addition to touch sensitive surface, input unit 403 can also include other inputs Equipment.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control button, switch Button etc.), it is fingerprint recognition module, trace ball, mouse, one or more in operating lever etc..
Display screen 404 can be used for showing information input by user or be supplied to the information of user and the various figures of terminal Shape user interface, these graphical user interface can be made of figure, text, icon, video and its arbitrary combination.Display screen 404 may include display panel.Optionally, liquid crystal display (LCD, Liquid Crystal Display), organic may be used The forms such as light emitting diode (OLED, Organic Light-Emitting Diode) configure display panel.Further, it touches Sensitive surfaces can cover display panel, when touch sensitive surface detects on it or after neighbouring touch operation, send processor 405 to To determine the type of touch event, it is followed by subsequent processing device 405 and is provided on a display panel according to the type of touch event and regard accordingly Feel output.Touch sensitive surface and display panel are to realize input and input function as two independent components, but certain In embodiment, touch sensitive surface and display panel can be integrated and realize and output and input function.
Processor 405 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the application program being stored in memory 401, and call the data being stored in memory 401, execute The various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 405 may include one or Multiple processing cores;Preferably, processor 405 can integrate application processor and modem processor, wherein application processor Main processing operation system, user interface and application program etc..
Although being not shown in Fig. 5, terminal can also include camera, bluetooth module, power supply etc., and details are not described herein.
Specifically in the present embodiment, the processor 405 in terminal can be according to following instruction, will be one or more The corresponding executable code of process of application program is loaded into memory 401, and is stored in storage by processor 405 to run Application program in device 401, to realize various functions:
It is handled by processor 405 and obtains the new access base station of terminal and cordless communication network access-in point information.
It is handled by processor 405 and judges that the access base station information whether there is difference with history base station information.
If handling access base station information by processor 405 to have differences with history base station information, wireless communication networks are judged Network access-in point information whether there is difference with history cordless communication network access-in point information.
If being had differences with history wireless network access point information when processor 405 handles wireless network access point information, Start the global positioning system, obtain current geographic position, judges the current geographic position whether in preset range.
The processing of processor 405 obtains user's active user's behavioral data.
Processor 405 processing judge user active user behavioral data whether with historical behavior Data Matching.
The processing of processor 405 obtains the terminal usage scenario information and people information when terminal screen is lighted.
If processor 405 handles the currently used scene information of terminal and people information and history usage scenario and historical personage Information mismatches, then judges that subscriber identity information is illegal.
If the processing of processor 405 triggers preset security procedure, starts self-destruction program and send out alarm.
Since the terminal can execute any terminal tracing method that inventive embodiments are provided, it is thereby achieved that The advantageous effect achieved by any terminal tracing method that inventive embodiments are provided, refers to the embodiment of front, herein It repeats no more.
When it is implemented, above each unit can be realized as independent entity, arbitrary combination can also be carried out, is made It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not It repeats again.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, the detailed description of the processing method above with respect to terminal tracing is may refer to, details are not described herein again.
Terminal tracing method method, apparatus, storage medium and terminal provided by the embodiments of the present application are for example mobile phone, flat Plate computer, palm PC (PDA, Personal Digital Assistant) etc., the terminal, the processing unit for touching information And the processing method of touching information belongs to same design, and touching letter can be run in the processing unit of the terminal tracing method The either method provided in the processing method embodiment of breath, the processing method that specific implementation process refers to the touching information are implemented Example, details are not described herein again.
It should be noted that for the method for the application terminal tracing, this field common test personnel are appreciated that Realize the embodiment of the present application terminal tracing method all or part of flow, be can be controlled by computer program it is relevant Hardware is completed, which can be stored in a computer read/write memory medium, be such as stored in the memory of terminal In, and executed by least one processor in the terminal, it may include the implementation such as the terminal tracing method in the process of implementation The flow of example.Wherein, which can be magnetic disc, CD, read-only memory (ROM, Read Only Memory), deposit at random Take memory body (RAM, Random Access Memory) etc..
For the processing unit of the terminal tracing of the embodiment of the present application, each function module can be integrated at one Manage chip in, can also be that modules physically exist alone, can also two or more modules be integrated in a module In.The form that hardware had both may be used in above-mentioned integrated module is realized, can also be realized in the form of software function module.It should If integrated module is realized in the form of software function module and when sold or used as an independent product, can also be stored In a computer read/write memory medium, which is for example read-only memory, disk or CD etc..
A kind of terminal tracing method, apparatus, storage medium and the terminal provided above the embodiment of the present application carries out It is discussed in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, above example Illustrate to be merely used to help understand the present processes and its core concept;Meanwhile for those skilled in the art, according to this The thought of application, there will be changes in the specific implementation manner and application range, is to sum up somebody's turn to do, the content of the present specification should not manage Solution is the limitation to the application.

Claims (10)

1. a kind of terminal tracing method, which is characterized in that including:
Judge the current geographic position whether in preset range;
When the current geographic position exceeds preset range, judge whether user behavior status information consistent and user identity Whether information is legal;
When user behavior status information is inconsistent or the subscriber identity information is illegal, the terminal is locked.
2. terminal tracing method according to claim 1, which is characterized in that described whether to judge the current geographic position Include in preset range:
Obtain access base station information and cordless communication network access-in point information;
Judge that the access base station information whether there is difference with history base station information;
If access base station information has differences with history base station information, judge that cordless communication network access-in point information and history are wireless Communications network access point information whether there is difference;
If wireless network access point information has differences with history wireless network access point information, start the global positioning system Whether system obtains current geographic position, judge the current geographic position in preset range.
3. terminal tracing method according to claim 1, which is characterized in that described whether to judge user behavior status information Include unanimously:
Obtain user's active user's behavioral data;
Judge user active user behavioral data whether with historical behavior Data Matching.
4. terminal tracing method according to claim 1, which is characterized in that described to judge whether subscriber identity information is legal Including:
When terminal screen is lighted, the terminal usage scenario information and people information are obtained;
Judge whether the terminal usage scenario information and people information match with history usage scenario and historical personage's information;
If the currently used scene information of terminal and people information are mismatched with history usage scenario and historical personage's information, judge Subscriber identity information is illegal.
5. terminal tracing method according to claim 4, which is characterized in that described to obtain the terminal usage scenario information Include with people information
People information is obtained by terminal front camera, scene use information is obtained by rear camera.
6. terminal tracing method according to claim 1, which is characterized in that the locking terminal includes:
Terminal Global quotient Netcom chip is locked, to lock the terminal wireless transceiving chip.
7. terminal tracing method according to claim 1, which is characterized in that described when user behavior state is inconsistent or institute State subscriber identity information it is illegal when, lock after the terminal and further include:
If triggering preset security procedure, starts self-destruction program and send out alarm.
8. a kind of processing unit, which is characterized in that including:
First judging unit, for judging the current geographic position whether in preset range;
Second judgment unit, for when the current geographic position exceeds preset range, judging that user behavior status information is Whether no consistent and subscriber identity information is legal;
First lock cell is used to, when user behavior state is inconsistent or the subscriber identity information is illegal, lock institute State terminal.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that realized when described program is executed by processor Such as the step of claim 1 to claim 7 any one of them terminal tracing method.
10. a kind of terminal, which is characterized in that including:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right It is required that 7 any one of them terminal tracing methods.
CN201810311346.1A 2018-04-09 2018-04-09 Terminal tracking method, processing device, terminal and storage medium Expired - Fee Related CN108632758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810311346.1A CN108632758B (en) 2018-04-09 2018-04-09 Terminal tracking method, processing device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810311346.1A CN108632758B (en) 2018-04-09 2018-04-09 Terminal tracking method, processing device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN108632758A true CN108632758A (en) 2018-10-09
CN108632758B CN108632758B (en) 2021-04-09

Family

ID=63704792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810311346.1A Expired - Fee Related CN108632758B (en) 2018-04-09 2018-04-09 Terminal tracking method, processing device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN108632758B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462691A (en) * 2018-10-27 2019-03-12 中国人民解放军战略支援部队信息工程大学 A kind of implicit means of defence and system based on Fusion
CN112353331A (en) * 2020-10-27 2021-02-12 上海明略人工智能(集团)有限公司 Method, device and apparatus for monitoring a dishwasher
CN113033836A (en) * 2021-03-04 2021-06-25 南方电网深圳数字电网研究院有限公司 Safety management method based on transformer substation, terminal equipment and storage medium
CN116033070A (en) * 2021-10-27 2023-04-28 中移(杭州)信息技术有限公司 Alarm method and device based on signal detection and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN103246855A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal security management method
CN103366745A (en) * 2012-03-29 2013-10-23 三星电子(中国)研发中心 Method for protecting terminal equipment based on speech recognition and terminal equipment
CN105049424A (en) * 2015-06-29 2015-11-11 深圳市美贝壳科技有限公司 Network terminal antitheft method, network terminal antitheft system and network terminal antitheft device
CN105550588A (en) * 2015-07-28 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Terminal locking method and terminal
CN105574448A (en) * 2015-12-22 2016-05-11 惠州Tcl移动通信有限公司 Method for preventing terminal loss based on human characteristic parameters and terminal
CN105631351A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Mobile terminal self-destroying method and apparatus as well as mobile terminal
WO2017051312A1 (en) * 2015-09-21 2017-03-30 Discovery Limited A method of enabling a lock button of a mobile device with an ios operating system to be used by a user to effect an action
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 Method and device for limiting terminal locking, and terminal
CN107852569A (en) * 2015-09-14 2018-03-27 三星电子株式会社 Terminal and its method for the position of measuring terminals

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN103246855A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal security management method
CN103366745A (en) * 2012-03-29 2013-10-23 三星电子(中国)研发中心 Method for protecting terminal equipment based on speech recognition and terminal equipment
CN105049424A (en) * 2015-06-29 2015-11-11 深圳市美贝壳科技有限公司 Network terminal antitheft method, network terminal antitheft system and network terminal antitheft device
CN105631351A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Mobile terminal self-destroying method and apparatus as well as mobile terminal
CN105550588A (en) * 2015-07-28 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Terminal locking method and terminal
CN107852569A (en) * 2015-09-14 2018-03-27 三星电子株式会社 Terminal and its method for the position of measuring terminals
WO2017051312A1 (en) * 2015-09-21 2017-03-30 Discovery Limited A method of enabling a lock button of a mobile device with an ios operating system to be used by a user to effect an action
CN105574448A (en) * 2015-12-22 2016-05-11 惠州Tcl移动通信有限公司 Method for preventing terminal loss based on human characteristic parameters and terminal
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 Method and device for limiting terminal locking, and terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462691A (en) * 2018-10-27 2019-03-12 中国人民解放军战略支援部队信息工程大学 A kind of implicit means of defence and system based on Fusion
CN112353331A (en) * 2020-10-27 2021-02-12 上海明略人工智能(集团)有限公司 Method, device and apparatus for monitoring a dishwasher
CN113033836A (en) * 2021-03-04 2021-06-25 南方电网深圳数字电网研究院有限公司 Safety management method based on transformer substation, terminal equipment and storage medium
CN116033070A (en) * 2021-10-27 2023-04-28 中移(杭州)信息技术有限公司 Alarm method and device based on signal detection and storage medium

Also Published As

Publication number Publication date
CN108632758B (en) 2021-04-09

Similar Documents

Publication Publication Date Title
CN103488924B (en) A kind of unlocking processing method of terminal, device and equipment
CN108632758A (en) Terminal tracing method, processing unit and terminal and storage medium
US20170013464A1 (en) Method and a device to detect and manage non legitimate use or theft of a mobile computerized device
CN105912905A (en) Fingerprint unlocking method and terminal
CN112799750A (en) Terminal equipment information display method and terminal equipment
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN107862194A (en) A kind of method, device and mobile terminal of safety verification
CN106327193B (en) A kind of system unlocking method and equipment
CN107908939B (en) Terminal alarm method and device and mobile terminal
CN107748648A (en) Prevent the method and terminal device of fingerprint sensor false triggering
Yang et al. Sherlock: Micro-environment sensing for smartphones
CN109284150A (en) A kind of method and terminal starting application program
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN109033779A (en) A kind of unlock authentication method, wearable device and computer readable storage medium
CN108174012A (en) A kind of authority control method and mobile terminal
CN107180178A (en) The identifying device and its method of a kind of unlocked by fingerprint, mobile terminal
CN109410535A (en) A kind for the treatment of method and apparatus of scene information
CN107079527A (en) Juxtaposition based on equipment on user is come control device
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN109918944A (en) A kind of information protecting method, device, mobile terminal and storage medium
CN110505340A (en) A kind of message method and terminal device
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal
CN109522706A (en) A kind of information cuing method and terminal device
CN109067979A (en) A kind of reminding method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210409