CN108632758A - Terminal tracing method, processing unit and terminal and storage medium - Google Patents
Terminal tracing method, processing unit and terminal and storage medium Download PDFInfo
- Publication number
- CN108632758A CN108632758A CN201810311346.1A CN201810311346A CN108632758A CN 108632758 A CN108632758 A CN 108632758A CN 201810311346 A CN201810311346 A CN 201810311346A CN 108632758 A CN108632758 A CN 108632758A
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- user
- judge
- tracing method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000003860 storage Methods 0.000 title claims abstract description 11
- 238000012545 processing Methods 0.000 title claims description 24
- 230000006399 behavior Effects 0.000 claims description 43
- 230000003542 behavioural effect Effects 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 9
- 238000003672 processing method Methods 0.000 description 5
- 230000036760 body temperature Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000007405 data analysis Methods 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 238000012905 input function Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000035939 shock Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001351 cycling effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical compound [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 210000001747 pupil Anatomy 0.000 description 1
- 238000007430 reference method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Environmental & Geological Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
This application discloses a kind of terminal tracing method, apparatus, storage medium and terminals.The terminal tracing method includes:Judge the current geographic position whether in preset range;When the current geographic position exceeds preset range, judging user behavior status information, whether consistent and subscriber identity information is legal;When user behavior status information is inconsistent or the subscriber identity information is illegal, the terminal is locked.The application can improve the safety of terminal.
Description
Technical field
This application involves field of terminal technology, and in particular to a kind of terminal tracing method, processing unit and terminal and storage
Medium.
Background technology
With the continuous development of science and technology, the mobile terminals such as mobile phone, tablet computer in people's lives also get over by role
Come more important.However, in daily life, mobile terminal is lost or stolen event happens occasionally, when mobile terminal is lost
Or after being stolen, the mobile terminal can be continuing with by picking up taker or stealer.Therefore, how to reinforce the safety of mobile terminal at
For production firm's urgent need to resolve.
Invention content
A kind of terminal tracing method of the embodiment of the present application offer, processing unit and terminal and storage medium, can improve end
The safety at end.
The embodiment of the present application provides a kind of terminal tracing method, including:
Judge the current geographic position whether in preset range;
When the current geographic position exceeds preset range, judge whether user behavior status information consistent and user
Whether identity information is legal;
When user behavior status information is inconsistent or the subscriber identity information is illegal, the terminal is locked.
Correspondingly, the embodiment of the present application also provides a kind of processing unit, including:
First judging unit, for judging the current geographic position whether in preset range;
Second judgment unit, for when the current geographic position exceeds preset range, judging that user behavior state is believed
Whether whether consistent and subscriber identity information is legal for breath;
First lock cell is used for when user behavior status information is inconsistent or the subscriber identity information is illegal
When, lock the terminal.
The embodiment of the present application also provides a kind of storage mediums, are stored thereon with computer program, and described program is handled
The step of device realizes any terminal tracing method provided by the embodiments of the present application when executing.
The embodiment of the present application provides a kind of terminal, including:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes provided by the embodiments of the present application
Any terminal tracing method.
In the embodiment of the present application, terminal can obtain the current geographic position of the terminal, then judge the current position
Position is managed whether in preset range, when the geographical location exceeds preset range, then whether judges subscriber identity information
It is legal, when the subscriber identity information is illegal, lock the terminal.Therefore, the present embodiment can according to terminal whether
Whether range and user identity in safety are legal, carry out locking terminal, to improve the safety of terminal.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described.It should be evident that the accompanying drawings in the following description is only some embodiments of the present application, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of terminal tracing method provided by the embodiments of the present application.
Fig. 2 is another flow diagram of terminal tracing method provided by the embodiments of the present application.
Fig. 3 is the schematic diagram of a scenario of terminal tracing provided by the embodiments of the present application.
Fig. 4 is a module diagram of processing unit provided by the embodiments of the present application.
Fig. 5 is terminal structure schematic diagram provided by the embodiments of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes.Obviously, described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, the every other implementation that those skilled in the art are obtained without creative efforts
Example, shall fall in the protection scope of this application.
Term " first ", " second ", " third " in the description and claims of this application and above-mentioned attached drawing etc.
(if present) is for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that this
The object of sample description can be interchanged in the appropriate case.In addition, term " comprising " and " having " and their any deformation, meaning
Figure, which is to cover, non-exclusive includes.For example, containing the process of series of steps, method or containing a series of modules or list
The device of member, terminal, system those of are not necessarily limited to clearly to list step or module or unit, can also include unclear
The step of ground is listed or module or unit can also include for intrinsic its of these processes, method, apparatus, terminal or system
Its step or module or unit.
A kind of terminal control method of the embodiment of the present application offer, device and terminal, will be described in detail respectively below.
In a preferred embodiment, above-mentioned processing unit can integrate in the terminal, which can be intelligent hand
The equipment such as machine, tablet computer.
Referring to Fig. 1, Fig. 1 is the flow diagram of terminal tracing method provided by the embodiments of the present application, flow can wrap
It includes:
In step S101, judge the current geographic position whether in preset range.
Terminal is given tacit consent in the present embodiment has the function of GPS (global positioning system), and gives tacit consent to terminal and have been switched on GPS work(
Can, therefore the current geographical location of terminal can be obtained by GPS.If certainly when GPS can not obtain signal, can also lead to
Cross the geographical location that other modes obtain terminal, for example, the signal tower communication that terminal is connect with it, estimate it and signal tower it
Between distance constantly to report its geographical location.But the Position Approximate of terminal can also be got, can also lead in addition
The geographical location of terminal can also accurately be obtained according to the address of WiFi access points by crossing the access point of acquisition WiFi.
Certainly in the present embodiment step S101, terminal can jointly be carried out when obtaining current location according to various ways
It realizes, or when a certain function can not enable, is substituted by other means to obtain the current location of terminal.
Preset range typically first sets safe geographical position range, which refers to some ground
Point is the center of circle, and a range is given off along the center of circle, and the geographical location no more than the range belongs to effective range, for example,
It determines with " family " as the center of circle, giving off a range with 2 kilometers for radius belongs to safe geographical position range, can also refer to certainly
Determine with " company " for the center of circle, giving off a range with 1 kilometer for radius belongs to safe geographical position range, can also be certainly
From " family " to " company " belongs to safe geographical position range along the range that road is formed, for safety geography position in the present embodiment
The quantity for setting range size and safe geographical position range is not specifically limited, for example, can be by the safe geographical location model
It encloses and is defined as a city or some area.According to the current geographic position got and preset safe geographical position range ratio
It is right, if can not be corresponded to, judge that current geographical location is not in preset range.
In step s 102, when the current geographic position exceeds preset range, judge that user behavior status information is
Whether no consistent and subscriber identity information is legal.
When current geographic position exceeds preset range, then make the unsafe mark of out position, is opened according to dangerous mark
It is dynamic to judge whether user behavior state is consistent and judges whether subscriber identity information is legal, which includes
The speed of travel of user, the sound of user, the body temperature of user, user the formation such as heartbeat data acquisition system.For example, test is a certain
The displacement distance of terminal in a period, to estimate the speed of travel of user, for example, the normal walking speed of people is per hour
5 kilometers or so, when the movement speed of terminal, which being in, does not have small 4 to 6 kilometers, starts to calculate, obtain the speed of travel of user.Root
It is compared according to the user's history speed of travel, whether see can be matched.It is carried out pair it is, of course, also possible to be divided into multiple segments
Than, for example at this moment moving velocity of terminal may be the motion state of cycling, at this moment obtains in 20 or so kilometer per hour
Speed be compared with history riding speed, whether see can be matched, if mismatch if illustrate user behavior state
Information is inconsistent.By limiting speed interval, starts the distance that test is moved within a certain period of time, can make comparison in this way
Object is not in error, to obtain more accurate correction data.
For another example, terminal obtains the voice that current high frequency occurs, by the high frequency voice currently occurred and history high frequency voice
It is compared, sees whether current high frequency voice match with history high frequency voice, the state of user is illustrated if mismatching
Information is inconsistent.For another example, obtain the voice front three that current high frequency occurs, by voice front three that current high frequency occurs with go through
History high frequency voice is compared, if it is possible to which it is consistent that matching, which then illustrates user behavior state, is illustrated if mismatching
The behavior state information of user is inconsistent.
For another example, terminal obtains the body temperature of active user, or obtains the temperature for being presently in environment, when terminal is got
Active user body temperature and be presently in the temperature of environment and the body temperature of historical user and be not presently in the temperature of environment not
Timing then illustrates that user behavior status information is inconsistent.In order to avoid because Changes in weather and caused by temperature comparisons' error, lead to
Often the temperature-time of selection historical user's local environment will not be too long, before typically one day or before three days.It should be noted that
For the reduced time and it is not specifically limited.
Certainly judge that the behavior state information of user is not limited to above-mentioned scheme, can also be carried out by other schemes,
Or more accurately judged by way of data acquisition system, the embodiment of the present application, which is not done, excessively to be repeated.By judging to use
Whether family behavior state information is consistent, can exceed in preset range in terminal and begin to execute without notifying, if
When judging that user behavior status information is inconsistent, next program can be started in this way within first time, such as stolen
When, can next program be just triggered to track terminal at the first time.
The subscriber identity information may include:In the account number cipher of user, finger print information, pupil information or personal business card
The identity information of one or more, certain user is also not limited to this, can also include other information, for example, face.It takes
Means can be terminal pop-up subscriber identity information verification interface, confirm for user, if user cannot repeatedly pass through user's body
Part Information Authentication, then judge that the subscriber identity information is illegal, certainly, the number for verifying subscriber identity information can be it is primary,
Twice, three or other numbers are not specifically limited this in the present embodiment.It can also be the camera for starting terminal, lead to
The face of camera acquisition user is crossed to judge whether subscriber identity information is legal.
In step s 103, when user behavior status information is inconsistent or the subscriber identity information is illegal, locking
The terminal.
When user behavior status information is inconsistent illegal with subscriber identity information, then subscriber identity information uneasiness is made
Full mark starts the program of the terminal according to the mark.For example, the chip of locking terminal, causes terminal completely can not work
Make, it is necessary to return factory to after-sales service center and reopen respective chip function, while information can be fed back away, in order to seek
Turn round and stretch out the hand machine.
It is understood that in the embodiment of the present application, terminal can obtain the current geographic position of the terminal, then sentence
The current geographic position break whether in the preset range, when the geographical location exceeds preset range, then user behavior
Whether status information is consistent and judges whether subscriber identity information is legal, when the user behavior status information is inconsistent or institute
State subscriber identity information it is illegal when, lock the terminal.Therefore, whether the present embodiment can be according to terminal in safety
Whether range and user identity are legal, carry out locking terminal, to improve the safety of terminal.
Referring to Fig. 2, Fig. 2 is another flow diagram of terminal tracing method provided by the embodiments of the present application, flow can
To include:
In step s 201, the new access base station of terminal and cordless communication network access-in point information are obtained.
Terminal often enters a place, and terminal will be attached with base station, or works as and be connected into a WiFi access point,
When being exactly cordless communication network access point, terminal records collected base station information and wireless communication networks access-in point information
Come.
In step S202, judge that the access base station information whether there is difference with history base station information.
After getting the base station information of access, history base station information is compared, for example, the usual history base station of terminal
Information is typically the base station of high frequency access, specifically can oneself setting history base station information, naturally it is also possible to according to according to
Base station connects number and carries out a sequence, three before ranking, five base stations as safe history base station information, certainly,
The ranking and quantity of base station ranking are not specifically limited, the present embodiment is intended merely to better illustrate.It certainly can be with
It is that in a period of time before new access base station, terminal is continuously connected into number and reaches a threshold value, regards as history base station letter
Breath.For example, the base station is continuously connected into three times within ten days before new access base station, it can be assumed that being history base station information.
For example, user would generally in common site using terminal, such as family, company a certain range in, that is, terminal
Some common base station access points can be connected into, when terminal enters some strange place, at this moment terminal can be confirmed as connection
New base station access point has been arrived, the base station access point that is newly connected into this when or has been matched with common base station access point, if cannot
Matching, then illustrate that the access base station information has differences with history base station information.
In step S203, if access base station information has differences with history base station information, judge that cordless communication network connects
Access point information whether there is difference with history cordless communication network access-in point information.
When access base station information and history base station information have differences, triggering judges cordless communication network access-in point information
It whether there is difference with history cordless communication network access-in point information.It is, common wireless network can be connected into according to terminal
Access point, when terminal enters some strange place, when the wireless network access point being connected to, this when, wireless network connect
Access point is matched with common wireless network access point, if cannot match, illustrate the access wireless network access point information with
History wireless network access point information has differences.
In step S204, if wireless network access point information has differences with history wireless network access point information, open
The global positioning system is moved, current geographic position is obtained, judges the current geographic position whether in preset range.
It is had differences in wireless network access point information and history wireless network access point information, triggers GPS functions, to
Current geographical location is obtained, judges current geographical location whether in default range, that is, get current
Whether in preset range, preset range typically first sets safe geographical position range in geographical location, and the safety is geographical
Position range refers to giving off a range along the center of circle using some place as the center of circle, is no more than the geographical location of the range
Effective range is belonged to, for example, determining with " family " as the center of circle, giving off a range with 2 kilometers for radius belongs to safe geography
Position range, can also specify certainly with " company " as the center of circle, and giving off a range with 1 kilometer for radius belongs to safe geography
Position range can also be that from " family " to " company " belongs to safe geographical position range along the range that road is formed certainly, this
The quantity of safe geographical position range size and safe geographical position range is not specifically limited in embodiment, for example,
The safe geographical position range can be defined as to a city or some area.According to the current geographic position got and preset
Safe geographical position range compare, if can not be corresponded to, judge that current geographical location is not in preset range.
S205 obtains user's active user's behavioral data.
Wherein, multiple sensors are provided in terminal, the sensor can acquire user behavior data, for example, using
Shock sensor experiences the vibrations of human body to carry out meter step.For example, acquisition active user is whithin a period of time, the step of movement
Number.For another example, it can also be temperature sensor, acquire the temperature of presently described environment.It should be noted that obtaining active user
Behavioral data can also include other a variety of aspects, for example, acquiring the sound that human hair goes out by sound transducer.It is appreciated that
It is that the behavioral data of user includes but not limited to above description, does not do in the embodiment of the present application and excessively repeats.It needs to illustrate
It is that the behavioral data of acquisition can be formed a data acquisition system, be stored in terminal.
S206, judge user active user behavioral data whether with historical behavior Data Matching.
The behavioral data of wherein history is the behavioral data formed before current behavior data, that is, would generally be set
Some threshold value is set as historical behavior data, for example, when the meter step data of shock sensor multi collect is consistent, for example continuously adopt
Historical behavior data can be used as by collecting three subuniform meter step datas.For another example, the voice that high frequency occurs is as historical behavior
Data, for another example, the normality temperature that a period of time occurs.Of course, it is possible to historical behavior data are formed into a set, and it is current
Behavioral data matched.For example, currently counting step data and history meter step data and current voice data and history voice number
According to matching, and current temperature data is mismatched with historical temperature data, by data analysis to judge user's current behavior data
Whether matched with user's history behavioral data.Most covering principles may be used in the foundation of the data analysis, that is, if more
User's current behavior data of a aspect matched with historical user's behavioral data be taken as it is matched, it is, of course, also possible to according to
The type set priority of user behavior data.For example, by the user behavior data of the voice highest condition of grade as priority, come
Judge active user's behavioral data whether with historical behavior Data Matching.
S207 obtains the terminal usage scenario information and people information when terminal screen is lighted.
It is black to give tacit consent to the screen in non-working condition sub-screen, when the screen opening of terminal, that is, prepares operation
When terminal, the terminal usage scenario information and people information are obtained.For example, working as hand-set from stolen, thief prepares to use the hand
Machine, when theft will necessarily light screen, no matter thief can enough unlock, at this moment start automatically terminal front camera and
Rear camera obtains terminal current usage scenario information and people information.Wherein, usage scenario information is mainly by taking the photograph
As the use environment picture that head is shot, people information is the face of camera shooting.
S208, if the currently used scene information of terminal and people information and history usage scenario and historical personage's information are not
Match, then judges that subscriber identity information is illegal.
For example, the face currently acquired does not meet the face pre-saved before terminal, then the subscriber identity information is judged
It is illegal, while being matched according to the user's usage scenario currently acquired with user's usage scenario is pre-saved, if not
Matching, then judge that the subscriber identity information is illegal.Confirmed by user's usage scenario information and the dual judgement of people information
Whether the identity information of user is legal, improves the accuracy of judgement in this way, avoids the simple photo using personage or vacation
People substitutes the loophole of true man, meanwhile, he when judging the subscriber identity information, without deliberately makes prompting, so that theft
The thief of the terminal relaxes vigilant, is different from and confirms whether the identity information of user is legal by verifying to remind, this
Technical solution is more accurate and safe.
It should be noted that obtaining people information by terminal front camera, obtaining scene by rear camera makes
Use information.The data that can be acquired in this way are more accurate.Scene use information can certainly be obtained by front camera, after
It sets camera and obtains people information.User's scene use information and people information, the application can also be just played by sensor
It does not do and excessively repeats for how to obtain subscriber identity information and scene use information in embodiment.
It should be noted that the locking terminal includes locking terminal Global quotient Netcom chip, to lock
The terminal wireless transceiving chip.
Lead to terminal by locking terminal Global quotient Netcom chip to lock the terminal wireless transceiving chip
It can not work completely, it is necessary to return factory to after-sales service center and reopen respective chip function, while can feed back information to
User is in order to recovering terminal.
S209, triggers preset security procedure, then starts self-destruction program and send out alarm.
It should be noted that if the setting of preset security procedure can be not powered on or encounter brush machine for a long time
In the case of etc., certain includes but not limited to the situation.For example, in the case where terminal is not switched on for a long time, for example, continuously
It is not switched within three days or five days, then starts described information self-destruction program, the data for being stored in terminal of user are all destroyed simultaneously
And cannot repair, meanwhile, send out self-destructed alarm.For another example, in the case where encountering violence brush machine, start described information immediately
The data for being stored in terminal of user are all destroyed and cannot be repaired by self-destruction program.
Referring to Fig. 3, Fig. 3 is the schematic diagram of a scenario of terminal tracing method provided by the embodiments of the present application.
In the embodiment of the present application, if the place that 10 to one, terminal is new, terminal 10 and base station 30 be attached or with
WiFi access points connect, and 30 access point of base station and WiFi access points and 20 access point of history base station and WiFi access points carry out pair
Than.Usual 20 access point of history base station and WiFi access points are typically base station and the WiFi access points of high frequency access, when base station 30
Access point has differences with 20 access point of history base station with WiFi access points with WiFi access points, then is confirmed currently by GPS
Whether geographical location is in the geographical location often occurred passes through biography if having exceeded the geographical location that user often occurs
Sensor obtains user behavior status information, wherein user behavior status information includes the speed of travel of user, the sound etc. of user
Big data set.It may determine that whether user is in state of going on business or tourism state by judging user behavior status information
Deng.When user prepares using terminal, confirm whether the identity information of user is legal, if not conforming to rule confirms that terminal has been lost
It loses or stolen, to locking terminal, to give terminal peace for change, meanwhile, if the security procedure triggering of terminal, that is, it is long
Time is not switched on or encounters violence brush machine etc., then starts self-destruction program and send out alarm, self-destruction program will destroy the institute of user
There are data 100 and cannot repair.
For ease of preferably implementing terminal control method provided by the embodiments of the present application, the embodiment of the present application also provides one kind
Device based on above-mentioned terminal tracing method.Wherein the meaning of noun is identical with the processing method of above-mentioned touching information, specifically
Realize that details can be with the explanation in reference method embodiment.
Please refer to the module diagram that 4, Fig. 4 is processing unit provided by the embodiments of the present application.Specifically, the processing fills
Set 300, including:First judging unit 301, second judgment unit 302 and the first lock cell.
First judging unit 301, for judging the current geographic position whether in preset range;
Second judgment unit 302, for when the current geographic position exceeds preset range, judging user behavior state
Whether whether consistent and subscriber identity information is legal for information;
First lock cell 303 is used for when user behavior state is inconsistent or the subscriber identity information is illegal,
Lock the terminal.
In one embodiment, which can be used for obtaining access base station information and wireless communication networks
Network access-in point information judges that the access base station information whether there is difference with history base station information, if new access base station information
It is had differences with history base station information, judges cordless communication network access-in point information and history cordless communication network access-in point information
With the presence or absence of difference, if wireless network access point information also has differences with history wireless network access point information, described in startup
Whether global positioning system obtains current geographic position, judge the current geographic position in preset range.
In one embodiment, which can be used for obtaining user's active user's behavioral data, judge
User active user behavioral data whether with historical behavior Data Matching.
In some embodiments, which can be used for, when terminal screen is lighted, obtaining the terminal
Usage scenario information and people information judge the terminal usage scenario information and people information and history usage scenario and history
Whether people information matches, if the currently used scene information of terminal and people information and history usage scenario and historical personage's information
It mismatches, then judges that subscriber identity information is illegal.
In some embodiments, which can be used for obtaining personage's letter by terminal front camera
Breath obtains scene use information by rear camera.
In some embodiments, which can be used for locking terminal Global quotient Netcom chip, from
And lock the terminal wireless transceiving chip.
Further include the first self-destruction unit in some embodiments, if the first self-destruction unit is for triggering preset safe journey
Sequence then starts self-destruction program and sends out alarm.
The embodiment of the present application also provides a kind of terminal, as shown in figure 5, the terminal 400 may include there are one or one with
The memory 401 of upper computer readable storage medium, sensor 402, input unit 403, display screen 404 and include one
The components such as a or more than one processing core processor 405.It will be understood by those skilled in the art that shown in Fig. 5 eventually
The restriction of end structure not structure paired terminal, may include than illustrating more or fewer components, or the certain components of combination, or
The different component arrangement of person.
Memory 401 can be used for storing application program and data.Include that can hold in the application program that memory 401 stores
Line code.Application program can form various functions module.Processor 405 is stored in the application journey of memory 401 by operation
Sequence, to perform various functions application and data processing.In addition, memory 401 may include high-speed random access memory,
Can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited
Memory device.Correspondingly, memory 401 can also include Memory Controller, right to provide processor 405 and input unit 403
The access of memory 401.
Terminal may also include at least one sensor 402, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or the back of the body when terminal is moved in one's ear
Light.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) acceleration
Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Input unit 403 can be used for receiving number, character information or the user's characteristic information (such as fingerprint) of input, and
Generate keyboard related with user setting and function control, mouse, operating lever, optics or the input of trace ball signal.Specifically
Ground, in a specific embodiment, input unit 403 may include touch sensitive surface and other input equipments.Touch sensitive surface,
Referred to as touch display screen or Trackpad, collect user on it or neighbouring touch operation (such as user using finger, touch
The operations of any suitable object or attachment on touch sensitive surface or near touch sensitive surface such as pen), and according to preset
Formula drives corresponding attachment device.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.
Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, transmit a signal to touch
Controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processing
Device 405, and order that processor 405 is sent can be received and executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray
And the multiple types such as surface acoustic wave realize touch sensitive surface.In addition to touch sensitive surface, input unit 403 can also include other inputs
Equipment.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control button, switch
Button etc.), it is fingerprint recognition module, trace ball, mouse, one or more in operating lever etc..
Display screen 404 can be used for showing information input by user or be supplied to the information of user and the various figures of terminal
Shape user interface, these graphical user interface can be made of figure, text, icon, video and its arbitrary combination.Display screen
404 may include display panel.Optionally, liquid crystal display (LCD, Liquid Crystal Display), organic may be used
The forms such as light emitting diode (OLED, Organic Light-Emitting Diode) configure display panel.Further, it touches
Sensitive surfaces can cover display panel, when touch sensitive surface detects on it or after neighbouring touch operation, send processor 405 to
To determine the type of touch event, it is followed by subsequent processing device 405 and is provided on a display panel according to the type of touch event and regard accordingly
Feel output.Touch sensitive surface and display panel are to realize input and input function as two independent components, but certain
In embodiment, touch sensitive surface and display panel can be integrated and realize and output and input function.
Processor 405 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the application program being stored in memory 401, and call the data being stored in memory 401, execute
The various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 405 may include one or
Multiple processing cores;Preferably, processor 405 can integrate application processor and modem processor, wherein application processor
Main processing operation system, user interface and application program etc..
Although being not shown in Fig. 5, terminal can also include camera, bluetooth module, power supply etc., and details are not described herein.
Specifically in the present embodiment, the processor 405 in terminal can be according to following instruction, will be one or more
The corresponding executable code of process of application program is loaded into memory 401, and is stored in storage by processor 405 to run
Application program in device 401, to realize various functions:
It is handled by processor 405 and obtains the new access base station of terminal and cordless communication network access-in point information.
It is handled by processor 405 and judges that the access base station information whether there is difference with history base station information.
If handling access base station information by processor 405 to have differences with history base station information, wireless communication networks are judged
Network access-in point information whether there is difference with history cordless communication network access-in point information.
If being had differences with history wireless network access point information when processor 405 handles wireless network access point information,
Start the global positioning system, obtain current geographic position, judges the current geographic position whether in preset range.
The processing of processor 405 obtains user's active user's behavioral data.
Processor 405 processing judge user active user behavioral data whether with historical behavior Data Matching.
The processing of processor 405 obtains the terminal usage scenario information and people information when terminal screen is lighted.
If processor 405 handles the currently used scene information of terminal and people information and history usage scenario and historical personage
Information mismatches, then judges that subscriber identity information is illegal.
If the processing of processor 405 triggers preset security procedure, starts self-destruction program and send out alarm.
Since the terminal can execute any terminal tracing method that inventive embodiments are provided, it is thereby achieved that
The advantageous effect achieved by any terminal tracing method that inventive embodiments are provided, refers to the embodiment of front, herein
It repeats no more.
When it is implemented, above each unit can be realized as independent entity, arbitrary combination can also be carried out, is made
It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not
It repeats again.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, the detailed description of the processing method above with respect to terminal tracing is may refer to, details are not described herein again.
Terminal tracing method method, apparatus, storage medium and terminal provided by the embodiments of the present application are for example mobile phone, flat
Plate computer, palm PC (PDA, Personal Digital Assistant) etc., the terminal, the processing unit for touching information
And the processing method of touching information belongs to same design, and touching letter can be run in the processing unit of the terminal tracing method
The either method provided in the processing method embodiment of breath, the processing method that specific implementation process refers to the touching information are implemented
Example, details are not described herein again.
It should be noted that for the method for the application terminal tracing, this field common test personnel are appreciated that
Realize the embodiment of the present application terminal tracing method all or part of flow, be can be controlled by computer program it is relevant
Hardware is completed, which can be stored in a computer read/write memory medium, be such as stored in the memory of terminal
In, and executed by least one processor in the terminal, it may include the implementation such as the terminal tracing method in the process of implementation
The flow of example.Wherein, which can be magnetic disc, CD, read-only memory (ROM, Read Only Memory), deposit at random
Take memory body (RAM, Random Access Memory) etc..
For the processing unit of the terminal tracing of the embodiment of the present application, each function module can be integrated at one
Manage chip in, can also be that modules physically exist alone, can also two or more modules be integrated in a module
In.The form that hardware had both may be used in above-mentioned integrated module is realized, can also be realized in the form of software function module.It should
If integrated module is realized in the form of software function module and when sold or used as an independent product, can also be stored
In a computer read/write memory medium, which is for example read-only memory, disk or CD etc..
A kind of terminal tracing method, apparatus, storage medium and the terminal provided above the embodiment of the present application carries out
It is discussed in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, above example
Illustrate to be merely used to help understand the present processes and its core concept;Meanwhile for those skilled in the art, according to this
The thought of application, there will be changes in the specific implementation manner and application range, is to sum up somebody's turn to do, the content of the present specification should not manage
Solution is the limitation to the application.
Claims (10)
1. a kind of terminal tracing method, which is characterized in that including:
Judge the current geographic position whether in preset range;
When the current geographic position exceeds preset range, judge whether user behavior status information consistent and user identity
Whether information is legal;
When user behavior status information is inconsistent or the subscriber identity information is illegal, the terminal is locked.
2. terminal tracing method according to claim 1, which is characterized in that described whether to judge the current geographic position
Include in preset range:
Obtain access base station information and cordless communication network access-in point information;
Judge that the access base station information whether there is difference with history base station information;
If access base station information has differences with history base station information, judge that cordless communication network access-in point information and history are wireless
Communications network access point information whether there is difference;
If wireless network access point information has differences with history wireless network access point information, start the global positioning system
Whether system obtains current geographic position, judge the current geographic position in preset range.
3. terminal tracing method according to claim 1, which is characterized in that described whether to judge user behavior status information
Include unanimously:
Obtain user's active user's behavioral data;
Judge user active user behavioral data whether with historical behavior Data Matching.
4. terminal tracing method according to claim 1, which is characterized in that described to judge whether subscriber identity information is legal
Including:
When terminal screen is lighted, the terminal usage scenario information and people information are obtained;
Judge whether the terminal usage scenario information and people information match with history usage scenario and historical personage's information;
If the currently used scene information of terminal and people information are mismatched with history usage scenario and historical personage's information, judge
Subscriber identity information is illegal.
5. terminal tracing method according to claim 4, which is characterized in that described to obtain the terminal usage scenario information
Include with people information
People information is obtained by terminal front camera, scene use information is obtained by rear camera.
6. terminal tracing method according to claim 1, which is characterized in that the locking terminal includes:
Terminal Global quotient Netcom chip is locked, to lock the terminal wireless transceiving chip.
7. terminal tracing method according to claim 1, which is characterized in that described when user behavior state is inconsistent or institute
State subscriber identity information it is illegal when, lock after the terminal and further include:
If triggering preset security procedure, starts self-destruction program and send out alarm.
8. a kind of processing unit, which is characterized in that including:
First judging unit, for judging the current geographic position whether in preset range;
Second judgment unit, for when the current geographic position exceeds preset range, judging that user behavior status information is
Whether no consistent and subscriber identity information is legal;
First lock cell is used to, when user behavior state is inconsistent or the subscriber identity information is illegal, lock institute
State terminal.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that realized when described program is executed by processor
Such as the step of claim 1 to claim 7 any one of them terminal tracing method.
10. a kind of terminal, which is characterized in that including:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right
It is required that 7 any one of them terminal tracing methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810311346.1A CN108632758B (en) | 2018-04-09 | 2018-04-09 | Terminal tracking method, processing device, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810311346.1A CN108632758B (en) | 2018-04-09 | 2018-04-09 | Terminal tracking method, processing device, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108632758A true CN108632758A (en) | 2018-10-09 |
CN108632758B CN108632758B (en) | 2021-04-09 |
Family
ID=63704792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810311346.1A Expired - Fee Related CN108632758B (en) | 2018-04-09 | 2018-04-09 | Terminal tracking method, processing device, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108632758B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109462691A (en) * | 2018-10-27 | 2019-03-12 | 中国人民解放军战略支援部队信息工程大学 | A kind of implicit means of defence and system based on Fusion |
CN112353331A (en) * | 2020-10-27 | 2021-02-12 | 上海明略人工智能(集团)有限公司 | Method, device and apparatus for monitoring a dishwasher |
CN113033836A (en) * | 2021-03-04 | 2021-06-25 | 南方电网深圳数字电网研究院有限公司 | Safety management method based on transformer substation, terminal equipment and storage medium |
CN116033070A (en) * | 2021-10-27 | 2023-04-28 | 中移(杭州)信息技术有限公司 | Alarm method and device based on signal detection and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969493A (en) * | 2010-10-28 | 2011-02-09 | 深圳市五巨科技有限公司 | Anti-theft method and device for mobile terminal |
CN103246855A (en) * | 2012-02-07 | 2013-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and terminal security management method |
CN103366745A (en) * | 2012-03-29 | 2013-10-23 | 三星电子(中国)研发中心 | Method for protecting terminal equipment based on speech recognition and terminal equipment |
CN105049424A (en) * | 2015-06-29 | 2015-11-11 | 深圳市美贝壳科技有限公司 | Network terminal antitheft method, network terminal antitheft system and network terminal antitheft device |
CN105550588A (en) * | 2015-07-28 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Terminal locking method and terminal |
CN105574448A (en) * | 2015-12-22 | 2016-05-11 | 惠州Tcl移动通信有限公司 | Method for preventing terminal loss based on human characteristic parameters and terminal |
CN105631351A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal self-destroying method and apparatus as well as mobile terminal |
WO2017051312A1 (en) * | 2015-09-21 | 2017-03-30 | Discovery Limited | A method of enabling a lock button of a mobile device with an ios operating system to be used by a user to effect an action |
CN106599641A (en) * | 2016-12-13 | 2017-04-26 | 广东欧珀移动通信有限公司 | Method and device for limiting terminal locking, and terminal |
CN107852569A (en) * | 2015-09-14 | 2018-03-27 | 三星电子株式会社 | Terminal and its method for the position of measuring terminals |
-
2018
- 2018-04-09 CN CN201810311346.1A patent/CN108632758B/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969493A (en) * | 2010-10-28 | 2011-02-09 | 深圳市五巨科技有限公司 | Anti-theft method and device for mobile terminal |
CN103246855A (en) * | 2012-02-07 | 2013-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and terminal security management method |
CN103366745A (en) * | 2012-03-29 | 2013-10-23 | 三星电子(中国)研发中心 | Method for protecting terminal equipment based on speech recognition and terminal equipment |
CN105049424A (en) * | 2015-06-29 | 2015-11-11 | 深圳市美贝壳科技有限公司 | Network terminal antitheft method, network terminal antitheft system and network terminal antitheft device |
CN105631351A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal self-destroying method and apparatus as well as mobile terminal |
CN105550588A (en) * | 2015-07-28 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Terminal locking method and terminal |
CN107852569A (en) * | 2015-09-14 | 2018-03-27 | 三星电子株式会社 | Terminal and its method for the position of measuring terminals |
WO2017051312A1 (en) * | 2015-09-21 | 2017-03-30 | Discovery Limited | A method of enabling a lock button of a mobile device with an ios operating system to be used by a user to effect an action |
CN105574448A (en) * | 2015-12-22 | 2016-05-11 | 惠州Tcl移动通信有限公司 | Method for preventing terminal loss based on human characteristic parameters and terminal |
CN106599641A (en) * | 2016-12-13 | 2017-04-26 | 广东欧珀移动通信有限公司 | Method and device for limiting terminal locking, and terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109462691A (en) * | 2018-10-27 | 2019-03-12 | 中国人民解放军战略支援部队信息工程大学 | A kind of implicit means of defence and system based on Fusion |
CN112353331A (en) * | 2020-10-27 | 2021-02-12 | 上海明略人工智能(集团)有限公司 | Method, device and apparatus for monitoring a dishwasher |
CN113033836A (en) * | 2021-03-04 | 2021-06-25 | 南方电网深圳数字电网研究院有限公司 | Safety management method based on transformer substation, terminal equipment and storage medium |
CN116033070A (en) * | 2021-10-27 | 2023-04-28 | 中移(杭州)信息技术有限公司 | Alarm method and device based on signal detection and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108632758B (en) | 2021-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103488924B (en) | A kind of unlocking processing method of terminal, device and equipment | |
CN108632758A (en) | Terminal tracing method, processing unit and terminal and storage medium | |
US20170013464A1 (en) | Method and a device to detect and manage non legitimate use or theft of a mobile computerized device | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN112799750A (en) | Terminal equipment information display method and terminal equipment | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
CN107862194A (en) | A kind of method, device and mobile terminal of safety verification | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN107908939B (en) | Terminal alarm method and device and mobile terminal | |
CN107748648A (en) | Prevent the method and terminal device of fingerprint sensor false triggering | |
Yang et al. | Sherlock: Micro-environment sensing for smartphones | |
CN109284150A (en) | A kind of method and terminal starting application program | |
CN107609407A (en) | The guard method of information security and device in a kind of user terminal | |
CN109033779A (en) | A kind of unlock authentication method, wearable device and computer readable storage medium | |
CN108174012A (en) | A kind of authority control method and mobile terminal | |
CN107180178A (en) | The identifying device and its method of a kind of unlocked by fingerprint, mobile terminal | |
CN109410535A (en) | A kind for the treatment of method and apparatus of scene information | |
CN107079527A (en) | Juxtaposition based on equipment on user is come control device | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN109918944A (en) | A kind of information protecting method, device, mobile terminal and storage medium | |
CN110505340A (en) | A kind of message method and terminal device | |
CN108549804A (en) | Mode switching method and device, computer readable storage medium, terminal | |
CN109522706A (en) | A kind of information cuing method and terminal device | |
CN109067979A (en) | A kind of reminding method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210409 |