CN117135581A - Terminal equipment retrieving method and device, terminal equipment and storage medium - Google Patents
Terminal equipment retrieving method and device, terminal equipment and storage medium Download PDFInfo
- Publication number
- CN117135581A CN117135581A CN202210551359.2A CN202210551359A CN117135581A CN 117135581 A CN117135581 A CN 117135581A CN 202210551359 A CN202210551359 A CN 202210551359A CN 117135581 A CN117135581 A CN 117135581A
- Authority
- CN
- China
- Prior art keywords
- terminal equipment
- user
- terminal device
- equipment
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000011084 recovery Methods 0.000 claims abstract description 95
- 230000001960 triggered effect Effects 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 17
- 230000007613 environmental effect Effects 0.000 claims description 15
- 238000013507 mapping Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 5
- 230000009191 jumping Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 18
- 238000004891 communication Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application provides a terminal device retrieving method, a terminal device retrieving device, a terminal device and a storage medium. The method comprises the following steps: the method comprises the steps that a first terminal device responds to operation of a first user and sends a first short message comprising first content preset in the second terminal device to the second terminal device; the first content is used for controlling the second terminal equipment to execute the terminal equipment retrieving operation; receiving a second short message sent by the equipment management cloud platform; the second short message is sent by the second terminal equipment triggering equipment management cloud platform, and the second short message is used for prompting the first user to carry out identity authentication; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs; and responding to the second short message, and sending identity information used for representing the first user as the user to which the second terminal equipment belongs to the equipment management cloud platform, so that the equipment management cloud platform instructs the second terminal equipment to execute terminal equipment recovery operation after the authentication of the first user is passed. The application improves the flexibility and efficiency of equipment recovery.
Description
Technical Field
The present application relates to computer technologies, and in particular, to a method and apparatus for retrieving a terminal device, and a storage medium.
Background
People frequently use mobile phones in daily life, and the situation that the mobile phones are lost often occurs. In order to protect privacy security of a user, it is important to quickly find a lost mobile phone after the mobile phone is lost.
Taking the example that the user A loses the mobile phone A, the main flow of the existing mobile phone retrieving method is as follows: the user A needs to log out the cloud account of the user B currently logged in on the mobile phone B through the mobile phone B belonging to the same manufacturer as the mobile phone A, and then logs in the cloud account of the user A through the mobile phone B. After the operation is finished, the user A can look up the software through the equipment installed on the mobile phone B, check the position of the mobile phone A, and retrieve the mobile phone A according to the position of the mobile phone A displayed by the mobile phone B.
However, the existing mobile phone retrieving method has the problems of poor flexibility and low efficiency.
Disclosure of Invention
The application provides a terminal equipment recovery method, a device, terminal equipment and a storage medium, which are used for solving the problems of poor recovery flexibility and low efficiency of the terminal equipment.
In a first aspect, the present application provides a method for retrieving a terminal device, where the method is applied to a first terminal device, and the method includes:
Responding to the operation of a first user, and sending a first short message to second terminal equipment; the first short message comprises first content preset in the second terminal equipment, and the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation;
receiving a second short message sent by the equipment management cloud platform; the second short message is sent by the equipment management cloud platform triggered by the second terminal equipment, and the second short message is used for prompting the first user to carry out identity authentication; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
and responding to the second short message, and sending identity information used for representing that the first user belongs to the second terminal equipment to the equipment management cloud platform, so that the equipment management cloud platform instructs the second terminal equipment to execute terminal equipment recovery operation after the authentication of the first user is passed.
Optionally, the second sms includes: authenticating the website of the webpage; the identity authentication webpage is generated by the equipment management cloud platform according to the type of identity information required by the second terminal equipment to be retrieved;
The responding to the second short message sends identity information used for representing the first user as the user to which the second terminal equipment belongs to the equipment management cloud platform, and the method comprises the following steps:
displaying the second short message;
responding to the operation of the first user on the website of the identity authentication webpage in the second short message, and jumping to a user interface of the identity authentication webpage;
and responding to the identity information input by the first user at the user interface, and sending the identity information to the equipment management cloud platform.
Optionally, after the sending, to the device management cloud platform, identity information for characterizing that the first user is a user to which the second terminal device belongs, the method further includes:
receiving information of the position of the second terminal equipment, which is sent by the second terminal equipment for executing a terminal equipment retrieving operation; the information of the position includes: positioning information and/or environmental information.
Optionally, the first terminal device and the second terminal device belong to the same manufacturer, and the method further includes:
receiving account information which corresponds to a user to which the second terminal equipment belongs and is used for logging in the equipment management cloud platform and is input by the first user;
Responding to the operation of logging in the equipment management cloud platform triggered by the first user, and logging in the equipment management cloud platform by using the account information;
receiving and displaying information of the position of the second terminal device sent by the device management cloud platform; the information of the position includes: positioning information and/or environmental information;
and/or sending a terminal device retrieving instruction to the second terminal device through the device management cloud platform.
In a second aspect, the present application provides a method for retrieving a terminal device, where the method is applied to a second terminal device, and the method includes:
receiving and analyzing a first short message sent by a first user through first terminal equipment;
when the first short message comprises first content preset in the second terminal equipment, an authentication request is sent to an equipment management cloud platform; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
Receiving a start finding instruction sent by the equipment management cloud platform when the authentication of the first user passes;
and responding to the starting retrieving instruction, and executing the retrieving operation of the terminal equipment.
Optionally, the responding to the start retrieving instruction, executing a retrieving operation of the terminal device, includes:
and responding to the starting recovery instruction, disabling the physical key of the second terminal equipment, and collecting information of the position of the second terminal equipment, wherein the information of the position comprises: positioning information and/or environmental information;
transmitting information of the position of the second terminal equipment to the equipment management cloud platform;
and/or sending a third short message to the first terminal equipment, wherein the third short message carries information of the position of the second terminal equipment.
Optionally, the method further comprises:
responding to a device recovery mode setting request triggered by a user to which the second terminal device belongs, and displaying a device recovery mode setting interface;
and receiving the first content input by the user to which the second terminal equipment belongs through the equipment retrieving mode setting interface.
Optionally, the method further comprises:
setting an interface through the equipment retrieving mode, and receiving the type of identity information required by retrieving the second terminal equipment; the identity information is used for carrying out identity authentication on a user when the second terminal equipment is triggered by other terminal equipment to execute terminal equipment retrieving operation;
And sending the type of the identity information to the equipment management cloud platform.
Optionally, the first terminal device and the second terminal device belong to the same manufacturer, and the method further includes:
receiving a terminal equipment retrieving instruction sent by the first terminal equipment through the equipment management cloud platform;
and responding to the terminal equipment retrieving instruction, and executing the operation corresponding to the terminal equipment retrieving instruction.
In a third aspect, the present application provides a method for retrieving a terminal device, where the method is applied to a device management cloud platform, and the method includes:
receiving an authentication request sent by second terminal equipment, wherein the authentication request is sent to the equipment management cloud platform when the second terminal equipment determines that a first short message from first terminal equipment is received and comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
Sending a second short message to the first terminal equipment; the second short message is used for prompting the first user to carry out identity authentication;
receiving identity information which is sent by the first terminal equipment and used for representing that the first user is the user to which the second terminal equipment belongs;
and when the authentication of the first user is determined to pass according to the identity information, sending a start recovery instruction to the second terminal equipment, so that the second terminal equipment responds to the start recovery instruction and executes a terminal equipment recovery operation.
Optionally, the authentication request includes: before the identification of the second terminal device and the sending of the second short message to the first terminal device, the method further includes:
determining the type of the identity information required for retrieving the second terminal equipment according to the identifier of the second terminal equipment and the mapping relation between the identifier of the terminal equipment and the type of the identity information required for retrieving the terminal equipment;
generating an identity authentication webpage according to the type of the identity information required by the second terminal equipment; the second short message comprises: the web site of the web page is authenticated.
Optionally, after the sending the command for starting recovery to the second terminal device, the method further includes:
Receiving information of the position of the second terminal equipment, which is sent by the second terminal equipment for executing a terminal equipment retrieving operation; the information of the position includes: positioning information and/or environmental information.
In a fourth aspect, the present application provides a terminal device retrieving apparatus, where the apparatus is applied to a first terminal device, and the apparatus includes:
the first sending module is used for responding to the operation of the first user and sending a first short message to the second terminal equipment; the first short message comprises first content preset in the second terminal equipment, and the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation;
the receiving module is used for receiving a second short message sent by the equipment management cloud platform; the second short message is sent by the equipment management cloud platform triggered by the second terminal equipment, and the second short message is used for prompting the first user to carry out identity authentication; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
the second sending module is configured to send, to the device management cloud platform in response to the second short message, identity information for characterizing that the first user is a user to which the second terminal device belongs, so that the device management cloud platform instructs the second terminal device to perform a terminal device recovery operation after authentication of the first user passes.
In a fifth aspect, the present application provides a terminal device retrieving apparatus, where the apparatus is applied to a second terminal device, the apparatus includes:
the first receiving module is used for receiving and analyzing a first short message sent by a first user through first terminal equipment;
the sending module is used for sending an authentication request to the equipment management cloud platform when the first short message comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
the second receiving module is used for receiving a starting and retrieving instruction sent by the equipment management cloud platform when the authentication of the first user passes;
and the execution module is used for responding to the starting recovery instruction and executing recovery operation of the terminal equipment.
In a sixth aspect, the present application provides a terminal device retrieving apparatus, where the apparatus is applied to a device management cloud platform, and the apparatus includes:
the first receiving module is used for receiving an authentication request sent by second terminal equipment, wherein the authentication request is sent to the equipment management cloud platform when the second terminal equipment determines that a first short message from first terminal equipment is received and comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
The first sending module is used for sending a second short message to the first terminal equipment; the second short message is used for prompting the first user to carry out identity authentication;
the second receiving module is used for receiving identity information which is sent by the first terminal equipment and used for representing that the first user is the user to which the second terminal equipment belongs;
and the second sending module is used for sending a start recovery instruction to the second terminal equipment when the authentication of the first user is determined to pass according to the identity information, so that the second terminal equipment responds to the start recovery instruction and executes the recovery operation of the terminal equipment.
In a seventh aspect, the present application provides a terminal device, including: at least one processor, memory;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored in the memory to cause the terminal device to perform the method of any one of the first or second aspects.
In an eighth aspect, the present application provides a computer-readable storage medium having stored thereon computer-executable instructions which, when executed by a processor, implement the method of any one of the first or second aspects.
In a ninth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of any one of the first or second aspects.
According to the terminal equipment retrieving method, the terminal equipment retrieving device, the terminal equipment and the storage medium, the second terminal equipment is triggered to start to execute terminal equipment retrieving operation in a mode that the first terminal equipment sends the first short message comprising the first content to the lost second terminal equipment. Compared with the recovery method requiring the first terminal device and the second terminal device to be the same manufacturer in the prior art, the first terminal device can be any device capable of receiving and sending short messages, and the probability of rapidly finding out a terminal device capable of receiving and sending short messages is higher, so that the flexibility and the efficiency of recovery of the terminal device are improved. After the equipment management cloud platform passes the identity authentication of the first user through the first terminal equipment, the equipment management cloud platform sends a command for starting the recovery to the second terminal equipment so that the second terminal equipment can execute the recovery operation of the terminal equipment. By authenticating the identity of the first user, the user of the first user for the second terminal equipment is ensured, and the safety of the second terminal equipment recovery method is ensured.
Drawings
In order to more clearly illustrate the application or the technical solutions of the prior art, the following description will be given for a brief introduction to the drawings used in the embodiments or the description of the prior art, it being obvious that the drawings in the following description are some embodiments of the application and that other drawings can be obtained from these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an application scenario of a method for retrieving a terminal device provided by the present application;
fig. 2 is a schematic flow chart of a method for retrieving a terminal device according to the present application;
fig. 3 is an interface schematic diagram of a first terminal device provided by the present application;
fig. 4 is an interface schematic diagram of a second terminal device provided by the present application;
fig. 5a is an interface schematic diagram of another second terminal device according to the present application;
fig. 5b is a schematic diagram of another application scenario of the method for retrieving a terminal device according to the present application;
fig. 6 is a flow chart of another method for retrieving a terminal device according to the present application;
fig. 7 is a schematic structural diagram of a retrieving device for a terminal device provided by the present application;
FIG. 8 is a schematic structural diagram of another retrieving device for terminal equipment according to the present application;
Fig. 9 is a schematic structural diagram of another retrieving device for terminal equipment provided by the present application;
fig. 10 is a schematic structural diagram of a terminal device according to the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Taking the example that the user loses the mobile phone A, the user can mainly retrieve the lost mobile phone as soon as possible at present by the following method:
the user needs to find a mobile phone B or a computer belonging to the same manufacturer as the mobile phone a. Taking the case that the user retrieves the mobile phone A through the mobile phone B belonging to the same manufacturer as the mobile phone A, the user can use the mobile phone B to log out the cloud account of the user B which is logged in on the mobile phone B, and log in the cloud account of the user A through the mobile phone B. After the operation is finished, a user can look up the position of the mobile phone A through the equipment searching software installed on the mobile phone B, and the mobile phone A is retrieved according to the position of the mobile phone A displayed by the mobile phone B.
That is, the mobile phone retrieving method requires that the mobile phone B for retrieving the lost mobile phone a is required to belong to the same manufacturer as the lost mobile phone a. Therefore, the mobile phone retrieving method has the problems of poor flexibility and low efficiency. In addition, in fact, in many scenarios (for example, during the scenic spot playing process), the possibility that the user can quickly find the computer belonging to the same manufacturer as the mobile phone a is small, and the user may not remember the website of the website, so the mobile phone retrieving method also has the problems of poor flexibility and low efficiency. However, the longer the handset is lost, the less likely the handset can be retrieved.
Considering that the existing device retrieving method has the problems of poor flexibility and low efficiency because the method needs to rely on specific devices belonging to the same manufacturer as the lost device, the application provides a method which only requires that the first terminal device used for retrieving the lost second terminal device has a short message receiving and sending function so as to improve the flexibility and efficiency of retrieving the terminal device.
It should be understood that the method for retrieving the terminal device provided by the application can be used for any terminal device capable of receiving and sending short messages, such as a mobile phone, a tablet personal computer capable of receiving and sending short messages, a smart watch and the like. Furthermore, it should be understood that the lost second terminal device may be the same type of terminal device as the first terminal device used to retrieve the lost second terminal device, e.g. the first terminal device and the second terminal device may both be mobile phones. Alternatively, the first terminal device and the second terminal device may be different types of terminal devices, for example, the first terminal device may be a mobile phone, and the second terminal device may be a tablet computer or a smart watch.
Taking a lost terminal device as an example of a mobile phone and a terminal device for retrieving the lost mobile phone as an example of a mobile phone, fig. 1 is a schematic diagram of an application scenario of the method for retrieving a terminal device provided by the present application. As shown in fig. 1, assuming that the second terminal device mobile phone L is a lost mobile phone, the first terminal device mobile phone F is a mobile phone for retrieving the mobile phone L, and the device management cloud platform is a cloud platform used by a manufacturer of the mobile phone L for performing mobile phone management. The mobile phone F may be a mobile phone of any manufacturer, may belong to the same manufacturer as the mobile phone L, or may belong to a different manufacturer from the mobile phone L.
As shown in fig. 1, after the user loses the mobile phone L, a first short message may be sent to the mobile phone L by the mobile phone F, so that the mobile phone L may send an authentication request to the device management cloud platform for requesting to perform identity authentication on the user by the mobile phone F. When the equipment management cloud platform determines that the authentication passes, the mobile phone L can be instructed to carry out the recovery operation of the terminal equipment, so that the user is assisted to find the mobile phone L as soon as possible.
The technical scheme of the present application will be described in detail with reference to specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
Fig. 2 is a flow chart of a method for retrieving a terminal device according to the present application. As shown in fig. 2, the method comprises the steps of:
s101, the first terminal equipment responds to the operation of a first user and sends a first short message to the second terminal equipment.
The first short message may include a first content preset in the second terminal device for controlling the second terminal device to perform a terminal device retrieving operation. It should be understood that the present application is not limited to the specific form of the first content described above. The first content may include, for example, at least one of: numbers, letters, chinese characters, punctuation marks, etc.
Correspondingly, the second terminal device may receive the first short message.
S102, the second terminal equipment analyzes the first short message, and determines whether the first short message comprises first content preset in the second terminal equipment.
It should be understood that the present application does not limit how the second terminal device parses the first short message, and may refer to any existing short message parsing method to obtain the content included in the first short message.
The second terminal device may compare the content of the first short message with the first content, so as to determine whether the first short message includes the first content. If the second terminal device determines that the first short message includes the first content, the following step S103 may be executed to send an authentication request to the device management cloud platform.
If the second terminal device determines that the first short message does not include the first content, optionally, the second terminal device may display the content of the first short message, for example, and output a short message prompt tone.
And S103, when the first short message comprises the first content preset in the second terminal equipment, the second terminal equipment sends an authentication request to the equipment management cloud platform.
The authentication request is used for requesting identity authentication of the first user through the first terminal device. The identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs.
In some embodiments, the authentication request may include, for example, an identification of the first terminal device, an identification of the second terminal device. Taking the first terminal device and the second terminal device as mobile phones as examples, the identifier of the first terminal device may be the mobile phone number of the first terminal device, and the identifier of the second terminal device may be the mobile phone number of the second terminal device.
Accordingly, the device management cloud platform may receive the authentication request.
S104, the equipment management cloud platform sends a second short message to the first terminal equipment.
After receiving the authentication request, the device management cloud platform can perform identity authentication through the first terminal device, so that a second short message for prompting the first user to perform identity authentication can be sent to the first terminal device.
Correspondingly, the first terminal device can receive the second short message sent by the second terminal device triggering device management cloud platform.
S105, the first terminal equipment responds to the second short message, and identity information used for representing that the first user is a user to which the second terminal equipment belongs is sent to the equipment management cloud platform.
Optionally, the identity information may include at least one of the following: the method comprises the steps of identifying the identity card number of a user to which the second terminal equipment belongs, a section of statement preset by the user to which the second terminal equipment belongs, an answer corresponding to a preset question of the user to which the second terminal equipment belongs, biometric information (such as a face, a fingerprint and the like) of the user to which the second terminal equipment belongs, or a user name, a password and the like of the user to which the second terminal equipment belongs, wherein the user name, the password and the like are used for logging in the equipment management cloud platform.
Optionally, the first terminal device may collect the identity information used to characterize that the first user is a user to which the second terminal device belongs and send the identity information to the device management cloud platform in response to the second short message.
Accordingly, the device management cloud platform may receive the identity information to authenticate the first user.
And S106, when the equipment management cloud platform authenticates the first user according to the identity information, sending a start-up recovery instruction to the second terminal equipment.
It should be understood that the present application is not limited to how the device management cloud platform authenticates the first user. For example, taking the identity information as face information of the user as an example, the device management cloud platform may match the face information sent by the first terminal device with the face information of the user to which the second terminal device belongs, for example. If the matching is successful, the authentication passing of the first user is indicated. If the matching fails, the first user is not authenticated.
When the equipment management cloud platform authenticates and passes the first user according to the identity information, the equipment management cloud platform can send a start-up and recovery instruction to the second terminal equipment. If the device management cloud platform does not pass the authentication of the first user, optionally, the device management cloud platform may, for example, feed back, to the first terminal device, prompt information for indicating that the authentication of the first user does not pass, so that the first user may know that the authentication does not pass.
Correspondingly, the second terminal device can receive the start-up and recovery instruction when the device management cloud platform authenticates the first user according to the identity information.
S107, the second terminal equipment responds to the starting retrieving instruction and executes the retrieving operation of the terminal equipment.
The terminal device retrieving operation may include at least one of the following: and acquiring positioning information of the current position of the second terminal equipment, transmitting the positioning information to the first terminal equipment, acquiring the positioning information and transmitting the positioning information to the equipment management cloud platform and the like.
In this embodiment, the first terminal device is triggered to start to perform the terminal device retrieving operation by sending the first short message including the first content to the lost second terminal device by the first terminal device. Compared with the recovery method requiring the first terminal device and the second terminal device to be the same manufacturer in the prior art, the first terminal device can be any device capable of receiving and sending short messages, and the probability of rapidly finding out a terminal device capable of receiving and sending short messages is higher, so that the flexibility and the efficiency of recovery of the terminal device are improved. After the equipment management cloud platform passes the identity authentication of the first user through the first terminal equipment, the equipment management cloud platform sends a command for starting the recovery to the second terminal equipment so that the second terminal equipment can execute the recovery operation of the terminal equipment. By authenticating the identity of the first user, the user of the first user for the second terminal equipment is ensured, and the safety of the second terminal equipment recovery method is ensured.
The following describes in detail how the first terminal device responds to the second short message and sends identity information for characterizing that the first user is a user to which the second terminal device belongs to the device management cloud platform:
as a possible implementation manner, the second short message may include: the web site of the web page is authenticated. In this implementation manner, the first terminal device may display the second short message after receiving the second short message. Then, the first terminal device may jump to the user interface of the authentication web page in response to the operation of the first user on the web address of the authentication web page in the second short message. The first terminal device may send the identity information to the device management cloud platform in response to the identity information input by the first user at the user interface. Optionally, the step of inputting identity information by the first user at the user interface may mean that the first terminal device collects identity information (such as face information, fingerprint information, etc.) of the user and displays the collected identity information at the first user interface. Or the user interface may include a text input box, through which the first terminal device may receive the identity information input by the first user.
For example, taking the first terminal device as a mobile phone or a tablet pc as an example, fig. 3 is an interface schematic diagram of the first terminal device provided by the present application. As shown in fig. 3, the first terminal device may display the second short message after receiving the second short message. The second short message comprises a website of the identity authentication webpage. And the first terminal equipment responds to the operation of clicking the website by the user and jumps to the user interface of the identity authentication webpage. For example, taking the above identity information as an example, as shown in fig. 3, the user interface of the authentication web page may include a preset question and an input box for receiving the answer. The first terminal device may send an answer input by the first user in the input box of the user interface to the device management cloud platform as identity information.
The following details how the device management cloud platform obtains the second sms including the website of the authentication web page:
as a possible implementation manner, the authentication request sent by the second terminal device to the device management cloud platform may include: and the identity of the second terminal device. In this implementation manner, before the device management cloud platform sends the second short message to the first terminal device, the type of identity information required for retrieving the second terminal device may be determined according to the identifier of the second terminal device and the mapping relationship between the identifier of the terminal device and the type of identity information required for retrieving the terminal device. Then, the device management cloud platform can generate an identity authentication webpage according to the type of the identity information required by the second terminal device. The second sms may include a website of the authentication web page.
For example, taking the above second terminal device as a mobile phone, the identifier of the second terminal device may be a mobile phone number of the second terminal device. Alternatively, taking the second terminal device as an example of the smart watch, the identifier of the second terminal device may be, for example, a serial number of the second terminal device.
Optionally, the type of the identity information required for retrieving the terminal device may be any of the following: biometric information (such as a face, a fingerprint, etc.), an identification card number, a preset statement, an answer corresponding to a preset question, or a user name and a password for logging in the device management cloud platform, etc.
For example, the mapping relationship between the terminal device identifier and the type of identity information required for retrieving the terminal device may be as shown in the following table 1:
TABLE 1
Terminal equipment identification | Type of identity information |
Sign 1 | Type 1 |
Sign 2 | Type 2 |
Sign 3 | Type 3 |
… | … |
Assuming that the terminal device identifier of the second terminal device is identifier 2, according to the mapping relationship shown in table 1, the device management cloud platform may determine that the type of identity information required for retrieving the second terminal device is mode 2.
Taking the example that the type of the identity information required for retrieving the second terminal device is authentication through an answer corresponding to a user preset question, optionally, the device management cloud platform may generate the identity authentication webpage according to the user preset question to which the second terminal device belongs, and then send the website of the identity authentication webpage to the first terminal device as the content included in the second short message.
The type of the identity information required for retrieving the second terminal device may be that the second terminal device sends the identity information to the device management cloud platform in advance. As a possible implementation manner, when the second terminal device is not lost yet, the second terminal device may set an interface through a device retrieving manner, and receive a type of identity information required for retrieving the second terminal device. And then sending the type of identity information required for retrieving the second terminal equipment to the equipment management cloud platform. The identity information is used for authenticating the identity of the user when the second terminal device is triggered by other terminal devices to execute the terminal device retrieving operation.
For example, taking the second terminal device as a mobile phone or a tablet pc as an example, fig. 4 is an interface schematic diagram of the second terminal device provided by the present application. The second terminal device responds to the operation that the user opens the device retrieving mode setting interface, and can display the device retrieving mode device interface. As shown in fig. 4, the device retrieving mode device interface may include a plurality of types of identity information required for retrieving the second terminal device, so as to be selected by a user. Taking the case that the user clicks the answer corresponding to the preset question, as shown in fig. 4, the terminal device may further display an interface for receiving the preset question and the preset answer, so as to receive the user identity information to which the second terminal device belongs through the interface.
In this embodiment, the second terminal device may receive the type of identity information required for retrieving the second terminal device, and send the type of identity information to the device management cloud platform. After the second equipment is lost, the equipment management cloud platform can generate an identity authentication webpage according to the type of identity information required by the second terminal equipment, and send the website of the identity authentication webpage to the first terminal equipment as second short message content. The first terminal equipment can respond to the operation of the first user on the website of the identity authentication webpage in the second short message, jump to the user interface of the identity authentication webpage, and respond to the identity information input by the first user on the user interface. The equipment management cloud platform can acquire the identity information and conduct user identity authentication. By the method, the user can be authenticated according to the type of the identity information set by the user, so that the flexibility of authenticating the user is improved, and the flexibility of retrieving the second terminal equipment is further improved.
How the second terminal device obtains the first content is described in detail below:
as a possible implementation manner, the second terminal device may respond to a device retrieving mode setting request triggered by the user to which the second terminal device belongs, and display a device retrieving mode setting interface. And then, the second terminal equipment can set an interface through the equipment retrieving mode, and receives the first content input by the user to which the second terminal equipment belongs.
For example, taking the second terminal device as a mobile phone or a tablet pc as an example, fig. 5a is an interface schematic diagram of another second terminal device provided in the present application. As shown in fig. 5a, the user may trigger a device recovery mode setting request, for example, by clicking a "set recovery mode setting" control of the setting interface. The second terminal device may respond to the device recovery mode setting request, and display a device recovery mode setting interface. The device retrieval mode setting interface may include a "first content input" control. The second terminal device may respond to the operation of clicking the control by the user, and receive the first content input by the user to which the second terminal device belongs and used for controlling the second terminal device to execute the terminal device retrieving operation.
It should be understood that the present application is not limited to whether the device retrieving mode setting interface further includes other content. As shown in fig. 5a, the device retrieving mode setting interface may further include a control for triggering setting of a type of identity information required for retrieving the terminal device, and the like. In some embodiments, as shown in fig. 5a, when receiving the first content, the second smart device may further output a prompt message for prompting the user that the set first content cannot exceed the preset word number. The preset word number may be the maximum word number that the short message can send. By the method, the first terminal equipment can be ensured to send the first short message, the accuracy of the terminal equipment retrieving method is improved, and the terminal equipment retrieving efficiency is further improved.
In some embodiments, before displaying the device recovery mode setting interface, the second terminal device may further respond to the device recovery mode setting request to display a user authentication interface, so as to determine whether the user performing the device recovery mode setting operation after that is the user to which the second terminal device belongs. The second terminal device may receive any one of the face information, fingerprint information, an unlocking password, and an unlocking gesture of the user through the user authentication interface, so as to authenticate whether the user performing the device retrieving mode setting operation is the user to which the second terminal device belongs. If the verification is passed, the second terminal device can display a device retrieving mode setting interface. If the verification is not passed, optionally, the second terminal device may output a prompt message for prompting that the verification is passed.
In this embodiment, the second terminal device may receive the first content input by the user to which the second terminal device belongs and used for controlling the second terminal device to perform the terminal device retrieving operation, so that the user to which the second terminal device belongs is guaranteed to know the triggering mode of retrieving the second terminal device, the first content is prevented from being known by multiple people, and the security of retrieving the terminal device is improved.
The following details how the second terminal device responds to the start-up retrieving instruction to execute the retrieving operation of the terminal device:
as a possible implementation manner, the second terminal device may disable the physical key of the second terminal device and collect the information of the location of the second terminal device in response to the start-up recovery command. The information of the location may include, for example: positioning information, or environmental information, or positioning information and environmental information.
The physical key of the second terminal device may include, for example, a shutdown key, a volume key, and the like of the second terminal device. By disabling the physical key of the second terminal device, after the second terminal device is lost, other users cannot operate the second terminal device, so that the safety of the second terminal device is improved. Optionally, the second terminal device may disable the physical key of the second terminal device, for example, by not responding to the operation of the user on each physical key. It should be understood that the present application is not limited to how to re-enable the physical keys of the second terminal device. Optionally, reference may be made to any existing operation manner of enabling the physical key of the second terminal device, which is not described herein.
It will be appreciated that the present application does not make a determination as to how the second terminal device collects the positioning information of the second terminal device. The second terminal device may, for example, be global positioning system (Global Positioning System, GPS) information of the second terminal device as positioning information of the second terminal device.
The above-mentioned environmental information may include, for example, at least one of: the audio information of the environment where the second terminal device is located, and the video information of the environment where the second terminal device is located. The second terminal equipment can assist the user to identify the environment where the second terminal equipment is located by collecting the environment information as the information of the position where the second terminal equipment is located, so that the efficiency of the user for retrieving the second terminal equipment is further improved. For example, the second terminal device may, for example, respond to the above-mentioned command for starting the recovery, and start a sound collecting device (for example, a microphone) of the second terminal device to obtain the audio information of the environment where the second terminal device is located. For example, the second terminal device may respond to the above-mentioned command for starting the retrieving, and start a video capturing device (for example, a camera) of the second terminal device to obtain video information of the environment where the second terminal device is located.
After the information of the position of the second terminal device is collected, the second terminal device may send the information of the position of the second terminal device to the device management cloud platform. Correspondingly, the device management cloud platform can receive information of the position of the second terminal device after sending a start-up recovery instruction to the second terminal device. By sending the information of the position of the second terminal equipment to the equipment management cloud platform, the equipment management cloud platform can record the information of the position, so that a user to which the second terminal equipment belongs can log in the equipment management cloud platform through other terminal equipment to check the information of the position of the second terminal equipment, and the flexibility of retrieving the second terminal equipment is improved.
Or the second terminal device may send a third short message carrying information of the location of the second terminal device to the first terminal device. Correspondingly, the first terminal device may receive information of a location where the second terminal device belongs after sending identity information for representing that the first user belongs to the second terminal device to the device management cloud platform. By sending the third short message to the first terminal equipment, the first user can check the information of the position of the second terminal equipment as soon as possible, and only the recovery efficiency of the terminal equipment is improved.
Or after the second terminal equipment collects the information of the position of the second terminal equipment, the information of the position of the second terminal equipment can be sent to the equipment management cloud platform, and a third short message carrying the information of the position of the second terminal equipment is sent to the first terminal equipment.
It should be understood that the implementation manner of performing the terminal device retrieving operation described above is only a possible implementation manner provided by the present application, and the second terminal device may also perform any existing terminal device retrieving operation, which is not limited by the present application.
If the first terminal device and the second terminal device belong to the same manufacturer, as a possible implementation manner, the first terminal device may further receive account information, corresponding to a user to which the second terminal device belongs, that is input by the first user, where the account information is used for logging in the device management cloud platform. Then, the first terminal device may log in the device management cloud platform using the account information in response to a first user-triggered operation of logging in the device management cloud platform.
Optionally, the account information includes, for example: the system is used for logging in the account number and the password of the equipment management cloud platform.
Then, optionally, the first terminal device may receive and display information of the location of the second terminal device sent by the device management cloud platform. As mentioned above, the information of the location may include: location information, and/or environmental information. Or the first terminal equipment can send a terminal equipment recovery instruction to the second terminal equipment through the equipment management cloud platform. Or, the first terminal device may receive and display information of the location of the second terminal device sent by the device management cloud platform, and send a terminal device recovery instruction to the second terminal device through the device management cloud platform.
The terminal device retrieving instruction may include at least one of the following: instructions for instructing the second terminal device to delete the address book stored by the second terminal device, instructions for instructing the second terminal device to delete the picture in the album, instructions for instructing the second terminal device to uninstall the target application, instructions for instructing the second terminal device to disable the target application, and the like.
Correspondingly, the second terminal device can receive a terminal device retrieving instruction sent by the first terminal device through the device management cloud platform, and then respond to the terminal device retrieving instruction to execute an operation corresponding to the terminal device retrieving instruction. For example, taking the terminal device retrieving instruction as an instruction for instructing the second terminal device to delete the address book stored in the second terminal device, the second terminal device may delete the address book stored in the second terminal device in response to the terminal device retrieving instruction, so as to avoid information leakage in the second terminal device.
For example, fig. 5b is still another application scenario schematic diagram of the terminal device retrieving method provided by the present application, where the first terminal device and the second terminal device are both mobile phones or tablet computers. As shown in fig. 5b, the first terminal device may display a device management cloud platform login interface in response to a user logging in to the device management cloud platform. Through the device management cloud platform login interface, the first terminal device can receive account information which is input by a user and used for receiving the device management cloud platform login. Using the account information, the first terminal device may log into the device management cloud platform.
After successful login, the first terminal device can jump to the terminal device retrieving instruction triggering interface. For example, as shown in fig. 5b, the interface may include a plurality of terminal device retrieval instructions for selection by the user. Through the interface, the first terminal device can respond to the terminal device recovery instruction selected by the user, and the terminal device recovery instruction is sent to the second terminal device through the device management cloud platform. After receiving the terminal equipment recovery instruction, the second terminal equipment can execute the operation corresponding to the terminal equipment recovery instruction.
Taking the first terminal device as a mobile phone F and the second terminal device as a mobile phone L as an example, fig. 6 is a flow chart of another method for retrieving terminal devices provided by the present application.
The mobile phone L provides a device retrieving mode setting interface through an operating system, and is used for setting a 'secret word' for retrieving the mobile phone L, namely the first content in advance. The "idiom" may be any text that is convenient for the user to remember. In some embodiments, the length of the code cannot exceed 70 Chinese characters or 160 English, which accords with the limit of the common mobile phone on the short message length. The mobile phone L can store the 'secret words' in a mobile phone safety area, so that the safety of the mobile phone L is ensured.
As shown in fig. 6, the lost owner of the mobile phone L may write and retrieve the "whisper" short message, that is, the first short message, through the short message module of the mobile phone F, and send the short message to the mobile phone L. After receiving the first short message, the short message module in the mobile phone L can increase a comparison flow to compare whether the content of the first short message is consistent with the retrieving 'secret words' of the mobile phone L. If the first short message is consistent, the mobile phone L can not display the first short message on the mobile phone L and also does not send out a short message notification sound so as to ensure the safety of the second terminal equipment. Then, the mobile phone L can call a mobile phone retrieving module interface to start mobile phone retrieving so as to send an authentication request to the equipment management cloud platform. The authentication request includes mobile phone number information of the mobile phone F.
Then, the device management cloud platform can produce an authentication webpage for retrieving the mobile phone L according to the identifier of the mobile phone L, and send an authentication short message, that is, the second short message, to the mobile phone F. The short message carries website information of the authentication webpage.
After the owner checks the authentication short message through the mobile phone F, clicking the website in the short message, and logging in the webpage through the identity information of the user. The device management cloud platform can complete identity verification of the owner on line. After the identity verification is passed, the device management cloud platform can send a recovery starting instruction to the mobile phone L so as to start a recovery function of the mobile phone L.
After receiving the instruction for starting and retrieving, the mobile phone L can immediately disable the physical key of the mobile phone L so as to prevent the mobile phone L from being forced to be powered off. In addition, the mobile phone L can also collect positioning information and environment information of the position of the mobile phone L and continuously report the positioning information and the environment information to the equipment management cloud platform.
Optionally, the mobile phone L may also reply to the mobile phone F with a confirmation message (may reply in the form of a short message), where the short message may carry the brief location information of the mobile phone L.
After the subsequent user condition allows, a mobile phone which is the same manufacturer as the mobile phone L can be found, and the cloud account of the user to which the mobile phone L belongs is used for logging in the equipment management cloud platform or the cloud service website through the mobile phone. And retrieving an application program through the equipment on the mobile phone to check the uploaded position, environment information and the like of the mobile phone L. The mobile phone of the same manufacturer can be used for continuously sending a mobile phone retrieving instruction to the mobile phone L through the equipment management cloud platform, for example, the address book and the like in the mobile phone are deleted.
Fig. 7 is a schematic structural diagram of a retrieving device for a terminal device provided by the present application. The apparatus 200 is applied to a first terminal device, as shown in fig. 7, and the apparatus 200 includes: a first transmitting module 201, a receiving module 202, and a second transmitting module 203. Wherein,
The first sending module 201 is configured to send a first short message to the second terminal device in response to an operation of the first user. The first short message comprises first content preset in the second terminal equipment, and the first content is used for controlling the second terminal equipment to execute terminal equipment retrieving operation.
And the receiving module 202 is configured to receive a second short message sent by the device management cloud platform. The second short message is sent by the equipment management cloud platform triggered by the second terminal equipment, and the second short message is used for prompting the first user to carry out identity authentication; the identity authentication is used for determining whether the first user is a user to which the second terminal device belongs.
And the second sending module 203 is configured to send, in response to the second short message, identity information for characterizing that the first user is a user to which the second terminal device belongs to the device management cloud platform, so that the device management cloud platform instructs the second terminal device to perform a terminal device recovery operation after the authentication of the first user passes.
Optionally, the second sms includes: authenticating the website of the webpage; the identity authentication webpage is generated by the equipment management cloud platform according to the type of the identity information required by the second terminal equipment to be retrieved. In this implementation manner, the apparatus 200 may further include a display module 204, configured to display the second short message; and responding to the operation of the first user on the website of the identity authentication webpage in the second short message, and jumping to a user interface of the identity authentication webpage. The second sending module 203 is further configured to send the identity information to the device management cloud platform in response to the identity information input by the first user at the user interface.
Optionally, the receiving module 202 is further configured to receive, after the sending, to the device management cloud platform, information indicating that the first user is the user to which the second terminal device belongs, where the second terminal device is located, where the second terminal device is sent by performing a terminal device retrieving operation. The information of the position includes: positioning information and/or environmental information.
Optionally, taking the case that the first terminal device and the second terminal device belong to the same manufacturer as an example, the receiving module 202 is further configured to receive account information, corresponding to a user to which the second terminal device belongs and used for logging in the device management cloud platform, input by the first user. The apparatus 200 may further include a login module 205 configured to login to the device management cloud platform using the account information in response to the operation triggered by the first user to login to the device management cloud platform. The second sending module 203 is further configured to send a terminal device recovery instruction to the second terminal device through the device management cloud platform.
The terminal device retrieving device provided by the application is used for executing the terminal device retrieving method embodiment executed by the first terminal device, and the implementation principle and the technical effect are similar, and are not repeated.
Fig. 8 is a schematic structural diagram of another retrieving device for terminal equipment provided by the present application. The apparatus 300 is applied to a second terminal device, as shown in fig. 8, and the apparatus 300 includes: a first receiving module 301, a transmitting module 302, a second receiving module 303, and an executing module 304. Wherein,
the first receiving module 301 is configured to receive and parse a first short message sent by a first user through a first terminal device.
And the sending module 302 is configured to send an authentication request to the device management cloud platform when the first short message includes a first content preset in the second terminal device. The first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal device belongs.
And the second receiving module 303 is configured to receive a startup recovery instruction sent by the device management cloud platform when the authentication of the first user passes.
And the execution module 304 is configured to execute a recovery operation of the terminal device in response to the start recovery instruction.
Optionally, the execution module 304 is specifically configured to disable the physical key of the second terminal device and collect information of the location of the second terminal device in response to the start recovery instruction. The information of the position includes: positioning information and/or environmental information. The sending module 302 is specifically configured to send information of the location of the second terminal device to the device management cloud platform; and/or sending a third short message to the first terminal equipment. The third short message carries information of the position of the second terminal device.
Optionally, the apparatus 300 may further include a display module 305, configured to display a device recovery mode setting interface in response to a device recovery mode setting request triggered by a user to which the second terminal device belongs. The first receiving module 301 is further configured to receive, through the device retrieving mode setting interface, the first content input by a user to which the second terminal device belongs.
Optionally, the first receiving module 301 is further configured to set an interface through the device retrieving mode, and receive a type of identity information required for retrieving the second terminal device. And the sending module 302 is further configured to send the type of the identity information to the device management cloud platform. The identity information is used for authenticating the identity of the user when the second terminal device is triggered by other terminal devices to execute the terminal device retrieving operation.
Optionally, taking the case that the first terminal device and the second terminal device belong to the same manufacturer as an example, the second receiving module 303 is further configured to receive a terminal device recovery instruction sent by the first terminal device through the device management cloud platform. The execution module 304 is further configured to respond to the terminal device retrieving instruction, and execute an operation corresponding to the terminal device retrieving instruction.
The terminal device retrieving device provided by the application is used for executing the terminal device retrieving method embodiment executed by the second terminal device, and the implementation principle and the technical effect are similar, and are not repeated.
Fig. 9 is a schematic structural diagram of another retrieving device for terminal equipment provided by the present application. The apparatus 400 is applied to a device management cloud platform, as shown in fig. 9, the apparatus 400 includes: a first receiving module 401, a first transmitting module 402, a second receiving module 403, and a second transmitting module 404. Wherein,
the first receiving module 401 is configured to receive an authentication request sent by the second terminal device. The authentication request is sent to the equipment management cloud platform when the second terminal equipment determines that the received first short message from the first terminal equipment comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal device belongs.
A first sending module 402, configured to send a second short message to the first terminal device. The second short message is used for prompting the first user to carry out identity authentication.
And a second receiving module 403, configured to receive identity information sent by the first terminal device and used for characterizing that the first user is a user to which the second terminal device belongs.
And the second sending module 404 is configured to send a start recovery instruction to the second terminal device when the authentication of the first user is determined to pass according to the identity information, so that the second terminal device responds to the start recovery instruction and performs a recovery operation of the terminal device.
Optionally, the authentication request includes: and the identification of the second terminal equipment. The apparatus 400 may further include a processing module 405, configured to determine, before sending the second short message to the first terminal device, a type of identity information required for retrieving the second terminal device according to the identifier of the second terminal device and a mapping relationship between the identifier of the terminal device and the type of identity information required for retrieving the terminal device; and generating an identity authentication webpage according to the type of the identity information required by the second terminal equipment. Wherein, the second short message includes: the web site of the web page is authenticated.
Optionally, the second receiving module 403 is further configured to receive, after sending a command for starting recovery to the second terminal device, information about a location of the second terminal device, where the second terminal device is sent by the second terminal device to perform a terminal device recovery operation. The information of the position includes: positioning information and/or environmental information.
The terminal equipment retrieving device provided by the application is used for executing the terminal equipment retrieving method embodiment executed by the equipment management cloud platform, and the implementation principle and the technical effect are similar, and are not repeated.
Fig. 10 is a schematic structural diagram of a terminal device according to the present application. Alternatively, the terminal device may be the aforementioned first terminal device, or the second terminal device. As shown in fig. 10, the terminal device 500 may include: at least one processor 501 and a memory 502.
A memory 502 for storing a program. In particular, the program may include program code including computer-operating instructions.
The memory 502 may comprise high-speed RAM memory or may further comprise non-volatile memory (non-volatile memory), such as at least one disk memory.
The processor 501 is configured to execute the computer-executable instructions stored in the memory 502 to implement the terminal device retrieving method described in the foregoing method embodiment. The processor 501 may be a central processing unit (Central Processing Unit, abbreviated as CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, abbreviated as ASIC), or one or more integrated circuits configured to implement embodiments of the present application.
Optionally, the terminal device 500 may further comprise a communication interface 503. In a specific implementation, if the communication interface 503, the memory 502, and the processor 501 are implemented independently, the communication interface 503, the memory 502, and the processor 501 may be connected to each other and perform communication with each other through buses. The bus may be an industry standard architecture (Industry Standard Architecture, abbreviated ISA) bus, an external device interconnect (Peripheral Component, abbreviated PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated EISA) bus, among others. Buses may be divided into address buses, data buses, control buses, etc., but do not represent only one bus or one type of bus.
Alternatively, in a specific implementation, if the communication interface 503, the memory 502, and the processor 501 are integrated on a chip, the communication interface 503, the memory 502, and the processor 501 may complete communication through internal interfaces.
The present application also provides a computer-readable storage medium, which may include: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk or an optical disk, etc., in which program codes may be stored, and in particular, the computer-readable storage medium stores program instructions for the methods in the above embodiments.
The present application also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the terminal device may read the execution instruction from the readable storage medium, and execution of the execution instruction by the at least one processor causes the terminal device to implement the terminal device recovery method provided in the above-described various embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.
Claims (18)
1. A method for retrieving a terminal device, wherein the method is applied to a first terminal device, and the method comprises:
responding to the operation of a first user, and sending a first short message to second terminal equipment; the first short message comprises first content preset in the second terminal equipment, and the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation;
Receiving a second short message sent by the equipment management cloud platform; the second short message is sent by the equipment management cloud platform triggered by the second terminal equipment, and the second short message is used for prompting the first user to carry out identity authentication; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
and responding to the second short message, and sending identity information used for representing that the first user belongs to the second terminal equipment to the equipment management cloud platform, so that the equipment management cloud platform instructs the second terminal equipment to execute terminal equipment recovery operation after the authentication of the first user is passed.
2. The method of claim 1, wherein the second sms includes: authenticating the website of the webpage; the identity authentication webpage is generated by the equipment management cloud platform according to the type of identity information required by the second terminal equipment to be retrieved;
the responding to the second short message sends identity information used for representing the first user as the user to which the second terminal equipment belongs to the equipment management cloud platform, and the method comprises the following steps:
displaying the second short message;
Responding to the operation of the first user on the website of the identity authentication webpage in the second short message, and jumping to a user interface of the identity authentication webpage;
and responding to the identity information input by the first user at the user interface, and sending the identity information to the equipment management cloud platform.
3. The method according to claim 1 or 2, wherein after the sending, to the device management cloud platform, identity information for characterizing the first user as the user to which the second terminal device belongs, the method further comprises:
receiving information of the position of the second terminal equipment, which is sent by the second terminal equipment for executing a terminal equipment retrieving operation; the information of the position includes: positioning information and/or environmental information.
4. The method according to claim 1 or 2, wherein the first terminal device and the second terminal device belong to the same manufacturer, the method further comprising:
receiving account information which corresponds to a user to which the second terminal equipment belongs and is used for logging in the equipment management cloud platform and is input by the first user;
responding to the operation of logging in the equipment management cloud platform triggered by the first user, and logging in the equipment management cloud platform by using the account information;
Receiving and displaying information of the position of the second terminal device sent by the device management cloud platform; the information of the position includes: positioning information and/or environmental information;
and/or sending a terminal device retrieving instruction to the second terminal device through the device management cloud platform.
5. A method for retrieving a terminal device, wherein the method is applied to a second terminal device, the method comprising:
receiving and analyzing a first short message sent by a first user through first terminal equipment;
when the first short message comprises first content preset in the second terminal equipment, an authentication request is sent to an equipment management cloud platform; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
receiving a start finding instruction sent by the equipment management cloud platform when the authentication of the first user passes;
and responding to the starting retrieving instruction, and executing the retrieving operation of the terminal equipment.
6. The method of claim 5, wherein the performing a terminal device recovery operation in response to the start recovery command comprises:
and responding to the starting recovery instruction, disabling the physical key of the second terminal equipment, and collecting information of the position of the second terminal equipment, wherein the information of the position comprises: positioning information and/or environmental information;
transmitting information of the position of the second terminal equipment to the equipment management cloud platform;
and/or sending a third short message to the first terminal equipment, wherein the third short message carries information of the position of the second terminal equipment.
7. The method according to claim 5 or 6, characterized in that the method further comprises:
responding to a device recovery mode setting request triggered by a user to which the second terminal device belongs, and displaying a device recovery mode setting interface;
and receiving the first content input by the user to which the second terminal equipment belongs through the equipment retrieving mode setting interface.
8. The method of claim 7, wherein the method further comprises:
setting an interface through the equipment retrieving mode, and receiving the type of identity information required by retrieving the second terminal equipment; the identity information is used for carrying out identity authentication on a user when the second terminal equipment is triggered by other terminal equipment to execute terminal equipment retrieving operation;
And sending the type of the identity information to the equipment management cloud platform.
9. The method according to claim 5 or 6, wherein the first terminal device and the second terminal device belong to the same manufacturer, the method further comprising:
receiving a terminal equipment retrieving instruction sent by the first terminal equipment through the equipment management cloud platform;
and responding to the terminal equipment retrieving instruction, and executing the operation corresponding to the terminal equipment retrieving instruction.
10. A method for retrieving a terminal device, wherein the method is applied to a device management cloud platform, and the method comprises the following steps:
receiving an authentication request sent by second terminal equipment, wherein the authentication request is sent to the equipment management cloud platform when the second terminal equipment determines that a first short message from first terminal equipment is received and comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
Sending a second short message to the first terminal equipment; the second short message is used for prompting the first user to carry out identity authentication;
receiving identity information which is sent by the first terminal equipment and used for representing that the first user is the user to which the second terminal equipment belongs;
and when the authentication of the first user is determined to pass according to the identity information, sending a start recovery instruction to the second terminal equipment, so that the second terminal equipment responds to the start recovery instruction and executes a terminal equipment recovery operation.
11. The method of claim 10, wherein the authentication request comprises: before the identification of the second terminal device and the sending of the second short message to the first terminal device, the method further includes:
determining the type of the identity information required for retrieving the second terminal equipment according to the identifier of the second terminal equipment and the mapping relation between the identifier of the terminal equipment and the type of the identity information required for retrieving the terminal equipment;
generating an identity authentication webpage according to the type of the identity information required by the second terminal equipment; the second short message comprises: the web site of the web page is authenticated.
12. The method according to claim 10 or 11, wherein after said sending a start-up retrieve instruction to said second terminal device, the method further comprises:
receiving information of the position of the second terminal equipment, which is sent by the second terminal equipment for executing a terminal equipment retrieving operation; the information of the position includes: positioning information and/or environmental information.
13. A terminal device retrieving apparatus, wherein the apparatus is applied to a first terminal device, the apparatus comprising:
the first sending module is used for responding to the operation of the first user and sending a first short message to the second terminal equipment; the first short message comprises first content preset in the second terminal equipment, and the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation;
the receiving module is used for receiving a second short message sent by the equipment management cloud platform; the second short message is sent by the equipment management cloud platform triggered by the second terminal equipment, and the second short message is used for prompting the first user to carry out identity authentication; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
The second sending module is configured to send, to the device management cloud platform in response to the second short message, identity information for characterizing that the first user is a user to which the second terminal device belongs, so that the device management cloud platform instructs the second terminal device to perform a terminal device recovery operation after authentication of the first user passes.
14. A terminal device retrieving apparatus, wherein the apparatus is applied to a second terminal device, the apparatus comprising:
the first receiving module is used for receiving and analyzing a first short message sent by a first user through first terminal equipment;
the sending module is used for sending an authentication request to the equipment management cloud platform when the first short message comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
the second receiving module is used for receiving a starting and retrieving instruction sent by the equipment management cloud platform when the authentication of the first user passes;
And the execution module is used for responding to the starting recovery instruction and executing recovery operation of the terminal equipment.
15. A terminal device retrieving apparatus, wherein the apparatus is applied to a device management cloud platform, the apparatus comprising:
the first receiving module is used for receiving an authentication request sent by second terminal equipment, wherein the authentication request is sent to the equipment management cloud platform when the second terminal equipment determines that a first short message from first terminal equipment is received and comprises first content preset in the second terminal equipment; the first content is used for controlling the second terminal equipment to execute terminal equipment recovery operation, and the authentication request is used for requesting identity authentication of the first user through the first terminal equipment; the identity authentication is used for determining whether the first user is a user to which the second terminal equipment belongs;
the first sending module is used for sending a second short message to the first terminal equipment; the second short message is used for prompting the first user to carry out identity authentication;
the second receiving module is used for receiving identity information which is sent by the first terminal equipment and used for representing that the first user is the user to which the second terminal equipment belongs;
And the second sending module is used for sending a start recovery instruction to the second terminal equipment when the authentication of the first user is determined to pass according to the identity information, so that the second terminal equipment responds to the start recovery instruction and executes the recovery operation of the terminal equipment.
16. A terminal device, characterized in that the terminal device comprises: at least one processor, memory;
the memory stores computer-executable instructions;
the at least one processor executing computer-executable instructions stored in the memory to cause the terminal device to perform the method of any one of claims 1-9.
17. A computer readable storage medium having stored thereon computer executable instructions which, when executed by a processor, implement the method of any of claims 1-9.
18. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the method of any of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210551359.2A CN117135581A (en) | 2022-05-20 | 2022-05-20 | Terminal equipment retrieving method and device, terminal equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210551359.2A CN117135581A (en) | 2022-05-20 | 2022-05-20 | Terminal equipment retrieving method and device, terminal equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117135581A true CN117135581A (en) | 2023-11-28 |
Family
ID=88860568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210551359.2A Pending CN117135581A (en) | 2022-05-20 | 2022-05-20 | Terminal equipment retrieving method and device, terminal equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117135581A (en) |
-
2022
- 2022-05-20 CN CN202210551359.2A patent/CN117135581A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110392054B (en) | Login verification method, device, system, equipment and readable storage medium | |
CN109684799B (en) | Account login method, login device, account login equipment and storage medium | |
US8881251B1 (en) | Electronic authentication using pictures and images | |
CN110691085B (en) | Login method, login device, password management system and computer readable medium | |
EP2693782B1 (en) | Method for backuping and recovering data of mobile terminal and mobile terminal thereof | |
CN110519294B (en) | Identity authentication method, device, equipment and system | |
WO2015041981A1 (en) | Automatic injection of security confirmation | |
US11004163B2 (en) | Terminal-implemented method, server-implemented method and terminal for acquiring certification document | |
CN109194689B (en) | Abnormal behavior recognition method, device, server and storage medium | |
CN106465076B (en) | Method and terminal for controlling short message reading | |
CN107437016B (en) | Application control method and related product | |
CN107533598B (en) | Input method and device of login password of application program and terminal | |
CN109460653B (en) | Rule engine based verification method, verification device, storage medium and apparatus | |
US20210312023A1 (en) | Agent Login Method, Electronic Device And Storage Medium Based On Voiceprint Identification | |
CN109104430B (en) | Identity authentication method, identity authentication device and computer readable storage medium | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
CN105830079A (en) | Authentication information management system, authentication information management device, program, recording medium, and authentication information management method | |
WO2018137309A1 (en) | Wireless communication processing method and device | |
CN114268461B (en) | User identity authentication method, device, server, terminal and storage medium | |
CN105100005B (en) | Identity verification method and device | |
CN107294981B (en) | Authentication method and equipment | |
CN116055067B (en) | Weak password detection method, device, electronic equipment and medium | |
CN108537086A (en) | Method for information display, device, storage medium and mobile terminal | |
CN113946739A (en) | Sensitive data query method, device, equipment and storage medium | |
CN117135581A (en) | Terminal equipment retrieving method and device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |