WO2016029413A1 - Terminal, and anti-theft tracking method and apparatus therefor - Google Patents

Terminal, and anti-theft tracking method and apparatus therefor Download PDF

Info

Publication number
WO2016029413A1
WO2016029413A1 PCT/CN2014/085461 CN2014085461W WO2016029413A1 WO 2016029413 A1 WO2016029413 A1 WO 2016029413A1 CN 2014085461 W CN2014085461 W CN 2014085461W WO 2016029413 A1 WO2016029413 A1 WO 2016029413A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
information
identification card
operating system
user
Prior art date
Application number
PCT/CN2014/085461
Other languages
French (fr)
Chinese (zh)
Inventor
艾浩峰
张涛
岳蓬星
Original Assignee
酷派软件技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 酷派软件技术(深圳)有限公司 filed Critical 酷派软件技术(深圳)有限公司
Priority to PCT/CN2014/085461 priority Critical patent/WO2016029413A1/en
Priority to CN201480081585.2A priority patent/CN106797535A/en
Publication of WO2016029413A1 publication Critical patent/WO2016029413A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to an anti-theft tracking method for a terminal, an anti-theft tracking device for a terminal, and a terminal.
  • the invention is based on the above problems, and proposes a new technical solution, which can perform anti-theft tracking on the terminal after the terminal is stolen or lost.
  • the present invention provides an anti-theft tracking method for a terminal, where the terminal includes a plurality of operating systems, including: when the terminal is powered on or when the terminal detects that an identification card is inserted, Selecting an operating system to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; the result of the determination is the identification card
  • the specified operating system pair The user of the terminal performs user identity verification; when the user identity verification fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; The operating system automatically turns on the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
  • the specified operating system such as the secure operating system in the dual-system terminal
  • the specified operating system is used to obtain the identification card in the terminal.
  • the information is further determined whether the identification card is replaced, and when the identity card is replaced, the identity of the user of the terminal is verified, and according to the result of the user identity verification, whether to obtain communication information in other operating systems, such as the identity of the user, is selected.
  • the verification fails, the communication information is obtained, and the data service is automatically started, and the communication information is sent to the cloud server through the account in the cloud.
  • the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
  • the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
  • the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
  • the specified operating system performs user identity verification, specifically: collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, Whether the voiceprint information, the avatar information, and/or the cornea information match the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is negative, it is determined that the user identity verification fails, otherwise, the user identity is determined.
  • the verification succeeds; or the user of the terminal is prompted to input the entry key of the specified operating system, and the correct entry key is not received within the preset time, or the entry key is incorrectly entered more than the preset number of times At the same time, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
  • the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
  • the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal. of course, If the specified operating system has set the entry key, the user may also be prompted to enter the entry key of the specified operating system. When the user does not enter the correct entry key within the preset time, or the number of input errors exceeds the preset number of times, this In this case, it is highly probable that the user is not the terminal owner.
  • the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is informed of the real-time status information of the terminal and is improved when the terminal is separated from the terminal. Terminal security.
  • selecting the specified operating system from the plurality of operating systems includes: selecting an operating system having the highest security level as the specified operation according to a security level of the multiple operating systems system.
  • the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
  • the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
  • determining, according to the information of the current identity card, whether the identity card in the terminal is replaced specifically: the specified operating system reads information of the current identity card, and Comparing the information of the current identity card with the information of the stored at least one identity card; and comparing each of the information of the current identity card with the stored information of the at least one identity card When the information of the card is different, it is determined that the identification card is replaced; in the comparison result, the information of the current identification card and the information of the stored at least one identification card are information of any identification card. When the same, it is determined that the identification card has not been replaced.
  • the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
  • the method further includes: when the terminal is powered on for the first time after the first identification card is inserted, the designated operating system reads information of the current identification card, and stores information of the current identification card.
  • the terminal after the terminal inserts the identification card for the first time and powers on, the terminal records the The identification card is used as a basis for judging the information of the identification card and determining whether the identification card is replaced later. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
  • the method further includes: storing information of the current identity card when the user identity verification succeeds, and not storing the information of the current identity card.
  • the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
  • the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; when the specified operating system is detected When logging in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
  • the method further includes: determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and automatically opening the device when the terminal is not in the power-on state Said terminal.
  • the terminal user may close the terminal.
  • the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
  • the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
  • an anti-theft tracking device for a terminal, the terminal comprising a plurality of operating systems
  • the anti-theft tracking device of the terminal comprising: a processing unit, when the terminal is powered on or detected at the terminal When an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is Replacing; the verification unit, when the judgment result is that the identification card is replaced, controlling the specified operating system to perform user identity verification; and acquiring unit, when the user identity verification fails, controlling the specified operating system to obtain the Location information of the terminal and communication information of other operating systems in the plurality of operating systems; an interaction unit that controls the specified operating system to automatically open data services of the terminal, and attempts to send the location information and the communication information To the cloud server.
  • the specified operating system such as the secure operating system in the dual-system terminal
  • the specified operating system is used to obtain the identification card in the terminal.
  • the information is further determined whether the identification card is replaced, and when the identity card is replaced, the identity of the user of the terminal is verified, and according to the result of the user identity verification, whether to obtain communication information in other operating systems, such as the identity of the user, is selected.
  • the verification fails, the communication information is obtained, and the data service is automatically started, and the communication information is sent to the cloud server through the account in the cloud.
  • the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
  • the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
  • the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
  • the verification unit is specifically configured to: collect fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determine the fingerprint information, voiceprint information, and avatar. Whether the information and/or the corneal information matches the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or the prompt is determined; Determining the identity of the user when the user of the terminal inputs the entry key of the specified operating system and does not receive the correct entry key within a preset time, or the number of times the entry key is entered incorrectly exceeds a preset number of times The verification failed, otherwise, the user authentication is determined to be successful.
  • the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
  • the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal.
  • you can also prompt the user to enter the specified operating system. Entering the key when the user does not input the correct entry key within the preset time, or the number of input errors exceeds the preset number of times, at this time, it is highly likely that the user is not the terminal owner.
  • the communication information of the terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal and improves the security of the terminal.
  • the processing unit includes: a selecting unit that selects an operating system having the highest security level as the specified operating system according to a security level of the plurality of operating systems.
  • the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
  • the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
  • the processing unit includes: a comparing unit, the specified operating system reads information of the current identity card, and the information of the current identity card and the stored at least one identity card The information is compared; the judging unit judges the identity when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different from each of the identification cards.
  • the identification card is replaced, and when the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, it is determined that the identification card has not been replaced. .
  • the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
  • the method further includes: a first storage unit, when the terminal is powered on after the terminal is first inserted, controlling the specified operating system to read information of the current identification card, and storing the current Identification card information.
  • the terminal after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis.
  • the method further includes: storing, by the second storage unit, information about the current identity identification card when the user identity verification succeeds, and not storing the information of the current identity identification card.
  • the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
  • the method further includes: a login status determining unit, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server;
  • the interaction unit is further configured to: when detecting that the specified operating system logs in to the account of the cloud server, send the stored information of the current identification card to the cloud server.
  • the method further includes: a state determining unit, determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and opening the unit, where the determining result is that the terminal is not in the When the power is turned on, the terminal is automatically turned on.
  • the terminal user may close the terminal.
  • the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
  • the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
  • a terminal comprising: a plurality of operating systems; and the anti-theft tracking device of the terminal according to any one of the above technical solutions.
  • the terminal has the same technical effect as the anti-theft tracking device of the terminal, and details are not described herein again.
  • FIG. 1 shows a flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention
  • FIG. 2 shows a block diagram of an anti-theft tracking device of a terminal in accordance with an embodiment of the present invention
  • FIG. 3 shows a structural diagram of a terminal according to an embodiment of the present invention
  • Figure 4 is a block diagram showing a terminal in accordance with one embodiment of the present invention.
  • FIG. 5 shows a flow chart of setting a system B security policy according to an embodiment of the present invention
  • FIG. 6 shows a detailed flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention.
  • FIG. 1 shows a flow chart of a theft prevention method of a terminal according to an embodiment of the present invention.
  • the anti-theft tracking method of the terminal includes: Step 102, when the terminal is powered on or when the terminal detects the insertion of the identification card, the multiple operating systems of the slave terminal Selecting an operating system to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; in step 104, the result of the determination is the identification card
  • the specified operating system performs user identity verification
  • step 106 when the user identity verification fails, acquiring location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; And the specified operating system automatically starts the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
  • the specified operating system such as the secure operating system in the dual system terminal
  • the specified operating system is used.
  • Obtaining information of the identity card in the terminal thereby determining whether the identity card is replaced, verifying the identity of the user of the terminal when the identity card is replaced, and selecting whether to obtain other operating systems according to the user identity verification result.
  • the communication information such as when the user authentication fails, obtains the communication information, and then automatically starts the data service, and sends the communication information to the cloud server through the cloud account.
  • the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
  • the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
  • the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
  • the specified operating system performs user identity verification, specifically: collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, Whether the voiceprint information, the avatar information, and/or the cornea information match the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is negative, it is determined that the user identity verification fails, otherwise, the user identity is determined.
  • the verification succeeds; or the user of the terminal is prompted to input the entry key of the specified operating system, and the correct entry key is not received within the preset time, or the entry key is incorrectly entered more than the preset number of times At the same time, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
  • the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
  • the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal.
  • the specified operating system has set the entry key
  • the user may also be prompted to enter the entry key of the specified operating system.
  • the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal when separated from the terminal. Improve the security of the terminal.
  • selecting a specified operating system from the plurality of operating systems includes: selecting an operating system having the highest security level as the specified operating system according to a security level of the plurality of operating systems.
  • the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
  • the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
  • determining, according to the information of the current identity card, whether the identity card in the terminal is replaced specifically: the specified operating system reads information of the current identity card, and Comparing the information of the current identity card with the information of the stored at least one identity card; and comparing each of the information of the current identity card with the stored information of the at least one identity card When the information of the card is different, it is determined that the identification card is replaced; in the comparison result, the information of the current identification card and the information of the stored at least one identification card are information of any identification card. When the same, it is determined that the identification card has not been replaced.
  • the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
  • the method further includes: after the terminal first inserts the identification card, the specified operating system reads the information of the current identification card, and stores the current Identification card information.
  • the terminal after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
  • the method further includes: storing information of the current identity card when the user identity verification succeeds, and not storing the information of the current identity card.
  • the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
  • the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; when the specified operating system is detected When logging in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
  • the method further includes: determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and automatically opening the device when the terminal is not in the power-on state Said terminal.
  • the terminal user may close the terminal.
  • the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
  • the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
  • FIG. 2 shows a block diagram of an anti-theft tracking device of a terminal in accordance with an embodiment of the present invention.
  • the anti-theft tracking device 200 of the terminal includes: a processing unit 202, when the terminal is powered on or when the terminal detects that an identification card is inserted, from the plurality of The operating system selects an operating system to read the information of the current identification card, and determines whether the identification card in the terminal is replaced according to the information of the current identification card; and the verification unit 204 determines that the result is When the identity card is replaced, the specified operating system is controlled to perform user identity verification; and the obtaining unit 206 controls the specified operating system to acquire the location information of the terminal and the multiple operating systems when the user identity verification fails.
  • the communication information of the other operating system controls the specified operating system to automatically start the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
  • the specified operating system such as the secure operating system in the dual system terminal
  • the specified operating system is used.
  • Obtaining information of the identity card in the terminal thereby determining whether the identity card is replaced, verifying the identity of the user of the terminal when the identity card is replaced, and selecting whether to obtain other operating systems according to the user identity verification result.
  • the communication information such as when the user authentication fails, obtains the communication information, and then automatically starts the data service, and sends the communication information to the cloud server through the cloud account.
  • the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
  • the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
  • the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
  • the verification unit is specifically configured to: collect fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determine the fingerprint information, voiceprint information, and avatar. Whether the information and/or the corneal information matches the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or the prompt is determined; Determining the identity of the user when the user of the terminal inputs the entry key of the specified operating system and does not receive the correct entry key within a preset time, or the number of times the entry key is entered incorrectly exceeds a preset number of times The verification failed, otherwise, the user authentication is determined to be successful.
  • the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
  • the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal.
  • the specified operating system has set the entry key
  • the user may also be prompted to enter the entry key of the specified operating system.
  • the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal when separated from the terminal. Improve the security of the terminal.
  • the processing unit 202 includes: a selection unit 2022. Select, according to a security level of the multiple operating systems, an operating system having the highest security level as the specified operating system.
  • the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
  • the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
  • the processing unit 202 includes: a comparing unit 2024, the specified operating system reads information of the current identity card, and the information of the current identity card and the stored at least one identity The information of the identification card is compared; the determining unit 2046 determines that the information of each of the identification cards is different when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different.
  • the identification card is replaced, and when the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, the identity identification card is determined. Not replaced.
  • the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
  • the first storage unit 210 controls the specified operating system to read the information of the current identification card, and stores the information when the terminal is powered on after the terminal is first inserted into the identification card. Current identification card information.
  • the terminal after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
  • the method further includes: the second storage unit 212, when the user identity verification succeeds, storing the information of the current identity card, otherwise, not storing the information of the current identity card .
  • the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
  • the method further includes: a login status determining unit 214, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server;
  • the interaction unit 208 is further configured to: when detecting that the specified operating system logs in to the account of the cloud server, send the stored information of the current identification card to the cloud server.
  • the method further includes: the state determining unit 216, before the data service of the terminal is automatically turned on, determining whether the terminal is in a power-on state; the opening unit 218, in the judgment result, that the terminal is not in the When the power is turned on, the terminal is automatically turned on.
  • the terminal user may close the terminal.
  • the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
  • the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
  • FIG. 3 shows a block diagram of a terminal in accordance with an embodiment of the present invention.
  • a terminal 300 As shown in FIG. 3, a terminal 300 according to an embodiment of the present invention, a plurality of operating systems 302; and the anti-theft tracking device 200 of the terminal according to any one of the above aspects.
  • the terminal 300 has the same technical effects as the anti-theft tracking device 200 of the terminal, and details are not described herein again.
  • FIG. 4 shows a block diagram of a terminal in accordance with one embodiment of the present invention.
  • the terminal 400 is composed of two systems, System A and System B.
  • System A is the daily application system of the end user;
  • system B is the security encryption system, and system B has the detection SIM (Subscriber Identity Module) / UIM (User Identity Module, User Identification Module) Whether the card is replaced, the data service is switched, the system A communication record is read, and the location of the terminal is determined.
  • SIM Subscriber Identity Module
  • UIM User Identity Module
  • FIG. 5 shows a flow chart of setting a system B security policy in accordance with an embodiment of the present invention.
  • the process of setting the security policy of the system B according to an embodiment of the present invention is as follows:
  • step 502 the terminal is opened for the first time.
  • step 504 it is determined whether there is a SIM/UIM (ie, identification card) card inserted.
  • SIM/UIM ie, identification card
  • Step 506 if there is a SIM/UIM card inserted, the system B reads the information of the SIM/UIM card in the terminal and saves it in the system B.
  • step 508 it is determined whether the system B logs in to the cloud account.
  • Step 510 If the system B logs in to the cloud account, the SIM/UIM card related information is uploaded to the cloud.
  • FIG. 6 shows a detailed flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention.
  • the anti-theft tracking method of the terminal includes:
  • step 602 the terminal is opened.
  • system B determines if the SIM/UIM card has been replaced. When the result of the determination is YES, the process proceeds to step 606, otherwise the process ends.
  • Step 606 When the SIM/UIM card of the terminal is replaced and powered on again, the system B determines whether the terminal user actively inputs the correct key and enters the system B within the preset time. If the determination result is yes, the process proceeds to step 608; otherwise, Proceed to step 610.
  • Step 610 If the terminal user actively inputs the correct key and enters the system B within a predetermined time, the process of setting the system B security policy described in FIG. 5 is performed.
  • Step 612 if the terminal user does not actively input the correct key and enters the system within a predetermined time System B, system B is switched to the normally open mode, that is, system B is automatically turned on, and there is no relevant boot prompt.
  • step 614 system B starts the data service in the background.
  • step 616 the system B automatically attempts to log in to the cloud client.
  • the process proceeds to step 618. Otherwise, the process proceeds to step 620.
  • step 618 the system B uploads the communication record, the location information, and the SIM/UIM card information of the terminal to the cloud server through the cloud client.
  • Step 620 after a delay, re-enters step 614.
  • the real-time status information of the terminal can be uploaded to the cloud server, so that the owner of the terminal logs in to the cloud account, and can read the communication record, location information, and SIM/UIM card information of the terminal saved in the cloud, and then This information can be used to track the location of the terminal and the identity of the end user.
  • the technical solution of the present invention is described in detail above with reference to the accompanying drawings.
  • information such as the location and communication record of the terminal can be automatically obtained, and the data service is automatically started and uploaded to the terminal.
  • the cloud server enables the user to know the real-time status information of the terminal, and when the terminal is powered off, it can automatically boot and perform the above operations, thereby comprehensively improving the security of the terminal.
  • a program product stored on a non-transitory machine readable medium for anti-theft tracking of a terminal comprising a machine for causing a computer system to perform the following steps Executing an instruction: when the terminal is powered on or when the terminal detects that an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and according to the current identity Determining, by the information of the identification card, whether the identification card in the terminal is replaced; when the determination result is that the identification card is replaced, the designated operating system performs user identity verification on the user of the terminal; When the verification fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; the designated operating system automatically starts data services of the terminal, and attempts to The location information and the communication information are sent to a cloud server.
  • a non-volatile machine readable medium storing a program product for terminal anti-theft tracking, the program product comprising machine executable instructions for causing a computer system to perform the following steps:
  • the terminal is powered on or detects an identity at the terminal
  • the designated operating system performs user identity verification on the user of the terminal; when the user identity verification fails, the specified operating system acquires location information of the terminal and Communication information stored in other operating systems of the plurality of operating systems; the designated operating system automatically turning on data services of the terminal, and attempting to send the location information and the communication information to a cloud server.
  • a machine readable program the program causing a machine to perform an antitheft tracking method of a terminal according to any one of the above aspects.
  • a storage medium storing a machine readable program, wherein the machine readable program causes a machine to perform an antitheft tracking method of a terminal according to any one of the technical solutions described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided is an anti-theft tracking method for a terminal. The terminal comprises a plurality of operating systems. The method comprises: when the terminal is started or has detected that an identity recognition card is inserted, choosing an assigned operating system from the plurality of operating systems to read information about the current identity recognition card, and judging whether the identity recognition card in the terminal has been changed according to the information about the current identity recognition card; when the identity recognition card is changed, authenticating, by the assigned operating system, an identity of a user; when the authentication of the identity of the user fails, acquiring position information about the terminal and communication information stored in the other operating systems in the plurality of operating systems; and automatically starting a data service of the terminal, and trying to send the position information and the communication information to a cloud server. Accordingly, also provided is an anti-theft tracking apparatus for a terminal. By means of the technical solution, an owner of the terminal can learn real-time state information about the terminal in the case of being separated from the terminal, and the security of the terminal is improved.

Description

终端及其防盗追踪方法和防盗追踪装置Terminal and its anti-theft tracking method and anti-theft tracking device 技术领域Technical field
本发明涉及终端技术领域,具体而言,涉及一种终端的防盗追踪方法、一种终端的防盗追踪装置和一种终端。The present invention relates to the field of terminal technologies, and in particular, to an anti-theft tracking method for a terminal, an anti-theft tracking device for a terminal, and a terminal.
背景技术Background technique
随着社会的发展,在当今的移动互联网时代,越来越多的个人移动终端层出不穷,如智能手机、平板电脑等,随着移动终端的不断发展进步,其已经成为人们生活和工作中必不可少的通讯工具,用户对移动终端的使用体验要求也越来越高。With the development of society, in the era of mobile Internet, more and more personal mobile terminals are emerging, such as smart phones, tablet computers, etc. With the continuous development and progress of mobile terminals, they have become a must in people's lives and work. With fewer communication tools, users have higher and higher requirements for the use of mobile terminals.
随着移动终端品质和价格的提高,其被盗的概率也大大增加,目前已有相关技术方案就单系统终端提出防盗追踪方案。而目前,一些用户在终端上安装双系统,该双系统包括普通系统和安全系统(安全系统的权限等级高于普通系统)。而对于这种双系统终端,并没有对应的防盗追踪方案。As the quality and price of mobile terminals increase, the probability of being stolen is also greatly increased. At present, related technical solutions have proposed an anti-theft tracking scheme for single system terminals. At present, some users install dual systems on the terminal, which include common systems and security systems (the security system has a higher level of authority than the ordinary system). For this dual system terminal, there is no corresponding anti-theft tracking scheme.
因此,如何解决双系统终端的防盗追踪问题成为目前亟待解决的技术问题。Therefore, how to solve the anti-theft tracking problem of the dual-system terminal has become a technical problem to be solved at present.
发明内容Summary of the invention
本发明正是基于上述问题,提出了一种新的技术方案,可以在终端被盗或丢失后,对终端进行防盗追踪。The invention is based on the above problems, and proposes a new technical solution, which can perform anti-theft tracking on the terminal after the terminal is stolen or lost.
有鉴于此,本发明提出了一种终端的防盗追踪方法,所述终端包括多个操作系统,包括:在所述终端开机或在所述终端检测到有身份识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;在判断结果为所述身份识别卡被更换时,所述指定操作系统对 所述终端的使用者进行用户身份验证;在用户身份验证失败时,所述指定操作系统获取所述终端的位置信息以及所述多个操作系统中其他操作系统中存储的通信信息;所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。In view of the above, the present invention provides an anti-theft tracking method for a terminal, where the terminal includes a plurality of operating systems, including: when the terminal is powered on or when the terminal detects that an identification card is inserted, Selecting an operating system to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; the result of the determination is the identification card When the switch is replaced, the specified operating system pair The user of the terminal performs user identity verification; when the user identity verification fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; The operating system automatically turns on the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
在该技术方案中,在多系统终端中,在终端开机或在终端检测到有身份识别卡插入时,使用指定操作系统,如双系统终端中的安全操作系统,获取终端中的身份识别卡的信息,进而判断身份识别卡是否被更换,在身份识别卡被更换时,对终端的用户的身份进行验证,并根据用户身份验证结果,选择是否获取其他操作系统中的通信信息,如在用户身份验证失败时,获取通信信息,进而自动开启数据业务,并通过云端的账户将通信信息发送至云服务器中。具体地,通信信息包括终端的位置信息、操作系统中的通讯录、通话记录等信息。而该指定操作系统既可以由终端选择,也可以是终端根据用户的选择指令进行选择。这样,在终端被盗或丢失时,如果盗窃者或者拾到终端的用户将自己的身份识别卡插入终端时,终端的机主可以通过登录云服务器获取盗窃者或拾到者的位置信息和通讯录信息等,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性,从而提高用户的使用体验。In the technical solution, in the multi-system terminal, when the terminal is powered on or when the terminal detects the insertion of the identification card, the specified operating system, such as the secure operating system in the dual-system terminal, is used to obtain the identification card in the terminal. The information is further determined whether the identification card is replaced, and when the identity card is replaced, the identity of the user of the terminal is verified, and according to the result of the user identity verification, whether to obtain communication information in other operating systems, such as the identity of the user, is selected. When the verification fails, the communication information is obtained, and the data service is automatically started, and the communication information is sent to the cloud server through the account in the cloud. Specifically, the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like. The designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction. In this way, when the terminal is stolen or lost, if the thief or the user who picks up the terminal inserts his/her own identification card into the terminal, the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
在上述技术方案中,优选地,所述指定操作系统进行用户身份验证,具体包括:采集所述终端的用户的指纹信息、声纹信息、头像信息和/或角膜信息,判断所述指纹信息、声纹信息、头像信息和/或角膜信息与预设的指纹信息、声纹信息、头像信息和/或角膜信息是否匹配,在判断结果为否时,判定用户身份验证失败,否则,判定用户身份验证成功;或者提示所述终端的用户输入所述指定操作系统的进入密钥,以及在预设时间内未接收到正确的进入密钥,或者所述进入密钥输入错误的次数超过预设次数时,判定用户身份验证失败,否则,判定用户身份验证成功。In the above technical solution, preferably, the specified operating system performs user identity verification, specifically: collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, Whether the voiceprint information, the avatar information, and/or the cornea information match the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is negative, it is determined that the user identity verification fails, otherwise, the user identity is determined. The verification succeeds; or the user of the terminal is prompted to input the entry key of the specified operating system, and the correct entry key is not received within the preset time, or the entry key is incorrectly entered more than the preset number of times At the same time, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
在该技术方案中,对用户的身份进行验证的方式包括但是不限于采集用户的指纹信息、声纹信息、头像信息和/或角膜信息等信息,进而通过采集的信息与终端的机主之前存储的指纹信息、声纹信息、头像信息和/或角膜信息等信息进行匹配,判断终端的使用者是否是机主本人。当然, 如果指定操作系统已设置进入密钥,还可以提示用户输入指定操作系统的进入密钥,在用户在预设时间内未输入正确的进入密钥,或者输入错误的次数超过预设次数时,此时,说明使用者不是终端机主的可能性很大,此时,获取终端的通信信息上传到云服务器,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性。In the technical solution, the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal. The fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal. of course, If the specified operating system has set the entry key, the user may also be prompted to enter the entry key of the specified operating system. When the user does not enter the correct entry key within the preset time, or the number of input errors exceeds the preset number of times, this In this case, it is highly probable that the user is not the terminal owner. At this time, the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is informed of the real-time status information of the terminal and is improved when the terminal is separated from the terminal. Terminal security.
在上述技术方案中,优选地,从所述多个操作系统中选择指定操作系统,包括:根据所述多个操作系统的安全级别,选择具有最高所述安全级别的操作系统作为所述指定操作系统。In the above technical solution, preferably, selecting the specified operating system from the plurality of operating systems includes: selecting an operating system having the highest security level as the specified operation according to a security level of the multiple operating systems system.
在该技术方案中,在选择指定操作系统时,可以从多个操作系统中选择出安全级别最高的操作系统(如双操作系统中的安全操作系统),通过安全操作系统执行上述各项操作,从而保证终端用户的安全。同时,由于安全操作系统的操作,在其他操作系统界面中是不可见的,从而在盗窃者或拾到者不知情的情况下,就可以让终端的机主了解终端的状态信息。In the technical solution, when the specified operating system is selected, the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user. At the same time, due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
在上述技术方案中,优选地,根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换,具体包括:所述指定操作系统读取当前身份识别卡的信息,并将所述当前身份识别卡的信息与存储的至少一个身份识别卡的信息进行对比;在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中每个身份识别卡的信息均不相同时,判断为所述身份识别卡被更换;在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中任一身份识别卡的信息相同时,判断为所述身份识别卡未被更换。In the above technical solution, preferably, determining, according to the information of the current identity card, whether the identity card in the terminal is replaced, specifically: the specified operating system reads information of the current identity card, and Comparing the information of the current identity card with the information of the stored at least one identity card; and comparing each of the information of the current identity card with the stored information of the at least one identity card When the information of the card is different, it is determined that the identification card is replaced; in the comparison result, the information of the current identification card and the information of the stored at least one identification card are information of any identification card. When the same, it is determined that the identification card has not been replaced.
在该技术方案中,终端的机主在不同时期可能使用不同的身份识别卡,因此,为了减少不必要的通信信息发送操作,在指定操作系统中可以存储多张身份识别卡的信息,在判断身份识别卡是否更换时,根据存储的多张身份识别卡的信息判断身份识别卡是否被更换。In this technical solution, the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
在上述技术方案中,优选地,还包括:在所述终端首次插入身份识别卡后开机时,所述指定操作系统读取当前身份识别卡的信息,并存储所述当前身份识别卡的信息。In the above technical solution, preferably, the method further includes: when the terminal is powered on for the first time after the first identification card is inserted, the designated operating system reads information of the current identification card, and stores information of the current identification card.
在该技术方案中,在终端首次插入身份识别卡并开机后,终端记录此 身份识别卡的信息,并在以后进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。具体地,在终端和云服务器中均没有存储身份识别卡的信息时,可以判定终端是首次插入身份识别卡。In the technical solution, after the terminal inserts the identification card for the first time and powers on, the terminal records the The identification card is used as a basis for judging the information of the identification card and determining whether the identification card is replaced later. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
在上述技术方案中,优选地,还包括:在用户身份验证成功时,对所述当前身份识别卡的信息进行存储,否则,不对所述当前身份识别卡的信息进行存储。In the above technical solution, preferably, the method further includes: storing information of the current identity card when the user identity verification succeeds, and not storing the information of the current identity card.
在该技术方案中,在用户身份验证成功时,此时,说明用户是终端的机主,此次身份识别卡的更换属于正常更换,此时,将该身份识别卡的信息进行存储,以便下次进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。In this technical solution, when the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
在上述技术方案中,优选地,还包括:在所述终端存储所述当前身份识别卡的信息后,判断所述指定操作系统是否登录所述云服务器的账户;在检测到所述指定操作系统登录所述云服务器的账户时,将存储的当前身份识别卡的信息发送至所述云服务器。In the above technical solution, preferably, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; when the specified operating system is detected When logging in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
在上述技术方案中,优选地,还包括:在自动开启所述终端的数据业务之前,判断所述终端是否处于开机状态;在判断结果为所述终端未处于所述开机状态时,自动开启所述终端。In the above technical solution, preferably, the method further includes: determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and automatically opening the device when the terminal is not in the power-on state Said terminal.
在该技术方案中,在终端进行用户身份识别,或者是获取通信信息时,终端使用者可能会关闭终端,在此过程中,如果终端关机,指定操作系统还可以自动开机,在开机后自动开启数据业务,进而将通信信息发送至服务器,这样,即使在终端关机的情况下,用户仍可了解终端的实时状态信息,进一步提升了终端的安全性。In the technical solution, when the terminal performs user identification or obtains communication information, the terminal user may close the terminal. In the process, if the terminal is powered off, the designated operating system may also be automatically turned on, and automatically turned on after being turned on. The data service, in turn, sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
根据本发明的另一方面,还提供了一种终端的防盗追踪装置,所述终端包括多个操作系统,终端的防盗追踪装置包括:处理单元,在所述终端开机或在所述终端检测到有身份识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;验证单元,在判断结果为所述身份识别卡被更换时,控制所述指定操作系统进行用户身份验证;获取单元,在用户身份验证失败时,控制所述指定操作系统获取所述 终端的位置信息以及所述多个操作系统中其他操作系统的通信信息;交互单元,控制所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。According to another aspect of the present invention, there is also provided an anti-theft tracking device for a terminal, the terminal comprising a plurality of operating systems, the anti-theft tracking device of the terminal comprising: a processing unit, when the terminal is powered on or detected at the terminal When an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is Replacing; the verification unit, when the judgment result is that the identification card is replaced, controlling the specified operating system to perform user identity verification; and acquiring unit, when the user identity verification fails, controlling the specified operating system to obtain the Location information of the terminal and communication information of other operating systems in the plurality of operating systems; an interaction unit that controls the specified operating system to automatically open data services of the terminal, and attempts to send the location information and the communication information To the cloud server.
在该技术方案中,在多系统终端中,在终端开机或在终端检测到有身份识别卡插入时,使用指定操作系统,如双系统终端中的安全操作系统,获取终端中的身份识别卡的信息,进而判断身份识别卡是否被更换,在身份识别卡被更换时,对终端的用户的身份进行验证,并根据用户身份验证结果,选择是否获取其他操作系统中的通信信息,如在用户身份验证失败时,获取通信信息,进而自动开启数据业务,并通过云端的账户将通信信息发送至云服务器中。具体地,通信信息包括终端的位置信息、操作系统中的通讯录、通话记录等信息。而该指定操作系统既可以由终端选择,也可以是终端根据用户的选择指令进行选择。这样,在终端被盗或丢失时,如果盗窃者或者拾到终端的用户将自己的身份识别卡插入终端时,终端的机主可以通过登录云服务器获取盗窃者或拾到者的位置信息和通讯录信息等,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性,从而提高用户的使用体验。In the technical solution, in the multi-system terminal, when the terminal is powered on or when the terminal detects the insertion of the identification card, the specified operating system, such as the secure operating system in the dual-system terminal, is used to obtain the identification card in the terminal. The information is further determined whether the identification card is replaced, and when the identity card is replaced, the identity of the user of the terminal is verified, and according to the result of the user identity verification, whether to obtain communication information in other operating systems, such as the identity of the user, is selected. When the verification fails, the communication information is obtained, and the data service is automatically started, and the communication information is sent to the cloud server through the account in the cloud. Specifically, the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like. The designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction. In this way, when the terminal is stolen or lost, if the thief or the user who picks up the terminal inserts his/her own identification card into the terminal, the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
在上述技术方案中,优选地,所述验证单元具体用于:采集所述终端的用户的指纹信息、声纹信息、头像信息和/或角膜信息,判断所述指纹信息、声纹信息、头像信息和/或角膜信息与预设的指纹信息、声纹信息、头像信息和/或角膜信息是否匹配,在判断结果为否时,判定用户身份验证失败,否则,判定用户身份验证成功;或者提示所述终端的用户输入所述指定操作系统的进入密钥,以及在预设时间内未接收到正确的进入密钥,或者所述进入密钥输入错误的次数超过预设次数时,判定用户身份验证失败,否则,判定用户身份验证成功。In the above technical solution, preferably, the verification unit is specifically configured to: collect fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determine the fingerprint information, voiceprint information, and avatar. Whether the information and/or the corneal information matches the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or the prompt is determined; Determining the identity of the user when the user of the terminal inputs the entry key of the specified operating system and does not receive the correct entry key within a preset time, or the number of times the entry key is entered incorrectly exceeds a preset number of times The verification failed, otherwise, the user authentication is determined to be successful.
在该技术方案中,对用户的身份进行验证的方式包括但是不限于采集用户的指纹信息、声纹信息、头像信息和/或角膜信息等信息,进而通过采集的信息与终端的机主之前存储的指纹信息、声纹信息、头像信息和/或角膜信息等信息进行匹配,判断终端的使用者是否是机主本人。当然,如果指定操作系统已设置进入密钥,还可以提示用户输入指定操作系统的 进入密钥,在用户在预设时间内未输入正确的进入密钥,或者输入错误的次数超过预设次数时,此时,说明使用者不是终端机主的可能性很大,此时,获取终端的通信信息上传到云服务器,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性。In the technical solution, the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal. The fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal. Of course, if the specified operating system has set the entry key, you can also prompt the user to enter the specified operating system. Entering the key, when the user does not input the correct entry key within the preset time, or the number of input errors exceeds the preset number of times, at this time, it is highly likely that the user is not the terminal owner. The communication information of the terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal and improves the security of the terminal.
在上述技术方案中,优选地,所述处理单元包括:选择单元,根据所述多个操作系统的安全级别,选择具有最高所述安全级别的操作系统作为所述指定操作系统。In the above technical solution, preferably, the processing unit includes: a selecting unit that selects an operating system having the highest security level as the specified operating system according to a security level of the plurality of operating systems.
在该技术方案中,在选择指定操作系统时,可以从多个操作系统中选择出安全级别最高的操作系统(如双操作系统中的安全操作系统),通过安全操作系统执行上述各项操作,从而保证终端用户的安全。同时,由于安全操作系统的操作,在其他操作系统界面中是不可见的,从而在盗窃者或拾到者不知情的情况下,就可以让终端的机主了解终端的状态信息。In the technical solution, when the specified operating system is selected, the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user. At the same time, due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
在上述技术方案中,优选地,所述处理单元包括:对比单元,所述指定操作系统读取当前身份识别卡的信息,并将所述当前身份识别卡的信息与存储的至少一个身份识别卡的信息进行对比;判断单元,在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中每个身份识别卡的信息均不相同时,判断为所述身份识别卡被更换,在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中任一身份识别卡的信息相同时,判断为所述身份识别卡未被更换。In the above technical solution, preferably, the processing unit includes: a comparing unit, the specified operating system reads information of the current identity card, and the information of the current identity card and the stored at least one identity card The information is compared; the judging unit judges the identity when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different from each of the identification cards. The identification card is replaced, and when the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, it is determined that the identification card has not been replaced. .
在该技术方案中,终端的机主在不同时期可能使用不同的身份识别卡,因此,为了减少不必要的通信信息发送操作,在指定操作系统中可以存储多张身份识别卡的信息,在判断身份识别卡是否更换时,根据存储的多张身份识别卡的信息判断身份识别卡是否被更换。In this technical solution, the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
在上述技术方案中,优选地,还包括:第一存储单元,在所述终端首次插入身份识别卡后开机时,控制所述指定操作系统读取当前身份识别卡的信息,并存储所述当前身份识别卡的信息。In the above technical solution, preferably, the method further includes: a first storage unit, when the terminal is powered on after the terminal is first inserted, controlling the specified operating system to read information of the current identification card, and storing the current Identification card information.
在该技术方案中,在终端首次插入身份识别卡并开机后,终端记录此身份识别卡的信息,并在以后进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。 In the technical solution, after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis.
在上述技术方案中,优选地,还包括:第二存储单元,在用户身份验证成功时,对所述当前身份识别卡的信息进行存储,否则,不对所述当前身份识别卡的信息进行存储。In the above technical solution, preferably, the method further includes: storing, by the second storage unit, information about the current identity identification card when the user identity verification succeeds, and not storing the information of the current identity identification card.
在该技术方案中,在用户身份验证成功时,此时,说明用户是终端的机主,此次身份识别卡的更换属于正常更换,此时,将该身份识别卡的信息进行存储,以便下次进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。In this technical solution, when the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
在上述技术方案中,优选地,还包括:登录状态判断单元,在所述终端存储所述当前身份识别卡的信息后,判断所述指定操作系统是否登录所述云服务器的账户;以及所述交互单元还用于:在检测到所述指定操作系统登录所述云服务器的账户时,将存储的当前身份识别卡的信息发送至所述云服务器。In the above technical solution, preferably, the method further includes: a login status determining unit, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; The interaction unit is further configured to: when detecting that the specified operating system logs in to the account of the cloud server, send the stored information of the current identification card to the cloud server.
在上述技术方案中,优选地,还包括:状态判断单元,在自动开启所述终端的数据业务之前,判断所述终端是否处于开机状态;开启单元,在判断结果为所述终端未处于所述开机状态时,自动开启所述终端。In the above technical solution, the method further includes: a state determining unit, determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and opening the unit, where the determining result is that the terminal is not in the When the power is turned on, the terminal is automatically turned on.
在该技术方案中,在终端进行用户身份识别,或者是获取通信信息时,终端使用者可能会关闭终端,在此过程中,如果终端关机,指定操作系统还可以自动开机,在开机后自动开启数据业务,进而将通信信息发送至服务器,这样,即使在终端关机的情况下,用户仍可了解终端的实时状态信息,进一步提升了终端的安全性。In the technical solution, when the terminal performs user identification or obtains communication information, the terminal user may close the terminal. In the process, if the terminal is powered off, the designated operating system may also be automatically turned on, and automatically turned on after being turned on. The data service, in turn, sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
根据本发明的再一方面,还提供了一种终端,包括:多个操作系统;以及如上述技术方案中任一项所述的终端的防盗追踪装置。该终端具有与终端的防盗追踪装置相同的技术效果,在此不再赘述。According to still another aspect of the present invention, a terminal is provided, comprising: a plurality of operating systems; and the anti-theft tracking device of the terminal according to any one of the above technical solutions. The terminal has the same technical effect as the anti-theft tracking device of the terminal, and details are not described herein again.
通过以上技术方案,在终端被盗或丢失后,可以自动获取终端的位置和通讯记录等信息,进而自动开启数据业务,将其上传到云服务器,从而使用户了解终端的实时状态信息,并在终端关机时,能自动开机,执行上述操作,从而全面的提升了终端的安全性。 Through the above technical solution, after the terminal is stolen or lost, information such as the location and communication record of the terminal can be automatically obtained, and then the data service is automatically started, and uploaded to the cloud server, so that the user can understand the real-time status information of the terminal, and When the terminal is powered off, it can automatically boot and perform the above operations, thus improving the security of the terminal.
附图说明DRAWINGS
图1示出了根据本发明的实施例的终端的防盗追踪方法的流程图;1 shows a flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention;
图2示出了根据本发明的实施例的终端的防盗追踪装置的框图;2 shows a block diagram of an anti-theft tracking device of a terminal in accordance with an embodiment of the present invention;
图3示出了根据本发明的实施例的终端的结构图;FIG. 3 shows a structural diagram of a terminal according to an embodiment of the present invention; FIG.
图4示出了根据本发明的一个实施例的终端的结构图;Figure 4 is a block diagram showing a terminal in accordance with one embodiment of the present invention;
图5示出了根据本发明的一个实施例的设置系统B安全策略的流程图;FIG. 5 shows a flow chart of setting a system B security policy according to an embodiment of the present invention; FIG.
图6示出了根据本发明的一个实施例的终端的防盗追踪方法的具体流程图。FIG. 6 shows a detailed flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention.
具体实施方式detailed description
为了能够更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。The present invention will be further described in detail below with reference to the drawings and specific embodiments. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。In the following description, numerous specific details are set forth in order to provide a full understanding of the invention, but the invention may be practiced otherwise than as described herein. Limitations of the embodiments.
图1示出了根据本发明的实施例的终端的防盗追踪方法的流程图。FIG. 1 shows a flow chart of a theft prevention method of a terminal according to an embodiment of the present invention.
如图1所示,根据本发明的实施例的终端的防盗追踪方法,包括:步骤102,在所述终端开机或在所述终端检测到有身份识别卡插入时,从终端的多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;步骤104,在判断结果为所述身份识别卡被更换时,所述指定操作系统进行用户身份验证;步骤106,在用户身份验证失败时,获取所述终端的位置信息以及所述多个操作系统中其他操作系统中存储的通信信息;步骤108,所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。As shown in FIG. 1 , the anti-theft tracking method of the terminal according to the embodiment of the present invention includes: Step 102, when the terminal is powered on or when the terminal detects the insertion of the identification card, the multiple operating systems of the slave terminal Selecting an operating system to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; in step 104, the result of the determination is the identification card When the device is replaced, the specified operating system performs user identity verification; step 106, when the user identity verification fails, acquiring location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; And the specified operating system automatically starts the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
在该技术方案中,在多系统终端中,在终端开机或在终端检测到有身份识别卡插入时,使用指定操作系统,如双系统终端中的安全操作系统, 获取终端中的身份识别卡的信息,进而判断身份识别卡是否被更换,在身份识别卡被更换时,对终端的用户的身份进行验证,并根据用户身份验证结果,选择是否获取其他操作系统中的通信信息,如在用户身份验证失败时,获取通信信息,进而自动开启数据业务,并通过云端的账户将通信信息发送至云服务器中。具体地,通信信息包括终端的位置信息、操作系统中的通讯录、通话记录等信息。而该指定操作系统既可以由终端选择,也可以是终端根据用户的选择指令进行选择。这样,在终端被盗或丢失时,如果盗窃者或者拾到终端的用户将自己的身份识别卡插入终端时,终端的机主可以通过登录云服务器获取盗窃者或拾到者的位置信息和通讯录信息等,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性,从而提高用户的使用体验。In the technical solution, in the multi-system terminal, when the terminal is powered on or when the terminal detects the insertion of the identification card, the specified operating system, such as the secure operating system in the dual system terminal, is used. Obtaining information of the identity card in the terminal, thereby determining whether the identity card is replaced, verifying the identity of the user of the terminal when the identity card is replaced, and selecting whether to obtain other operating systems according to the user identity verification result. The communication information, such as when the user authentication fails, obtains the communication information, and then automatically starts the data service, and sends the communication information to the cloud server through the cloud account. Specifically, the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like. The designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction. In this way, when the terminal is stolen or lost, if the thief or the user who picks up the terminal inserts his/her own identification card into the terminal, the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
在上述技术方案中,优选地,所述指定操作系统进行用户身份验证,具体包括:采集所述终端的用户的指纹信息、声纹信息、头像信息和/或角膜信息,判断所述指纹信息、声纹信息、头像信息和/或角膜信息与预设的指纹信息、声纹信息、头像信息和/或角膜信息是否匹配,在判断结果为否时,判定用户身份验证失败,否则,判定用户身份验证成功;或者提示所述终端的用户输入所述指定操作系统的进入密钥,以及在预设时间内未接收到正确的进入密钥,或者所述进入密钥输入错误的次数超过预设次数时,判定用户身份验证失败,否则,判定用户身份验证成功。In the above technical solution, preferably, the specified operating system performs user identity verification, specifically: collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, Whether the voiceprint information, the avatar information, and/or the cornea information match the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is negative, it is determined that the user identity verification fails, otherwise, the user identity is determined. The verification succeeds; or the user of the terminal is prompted to input the entry key of the specified operating system, and the correct entry key is not received within the preset time, or the entry key is incorrectly entered more than the preset number of times At the same time, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
在该技术方案中,对用户的身份进行验证的方式包括但是不限于采集用户的指纹信息、声纹信息、头像信息和/或角膜信息等信息,进而通过采集的信息与终端的机主之前存储的指纹信息、声纹信息、头像信息和/或角膜信息等信息进行匹配,判断终端的使用者是否是机主本人。当然,如果指定操作系统已设置进入密钥,还可以提示用户输入指定操作系统的进入密钥,在用户在预设时间内未输入正确的进入密钥,或者输入错误的次数超过预设次数时,此时,说明使用者不是终端机主的可能性很大,此时,获取终端的通信信息上传到云服务器,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性。In the technical solution, the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal. The fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal. Of course, if the specified operating system has set the entry key, the user may also be prompted to enter the entry key of the specified operating system. When the user does not input the correct entry key within the preset time, or the number of input errors exceeds the preset number of times At this time, it is highly probable that the user is not the terminal owner. At this time, the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal when separated from the terminal. Improve the security of the terminal.
在上述技术方案中,优选地,从所述多个操作系统中选择指定操作系 统,包括:根据所述多个操作系统的安全级别,选择具有最高所述安全级别的操作系统作为所述指定操作系统。In the above technical solution, preferably, selecting a specified operating system from the plurality of operating systems The system includes: selecting an operating system having the highest security level as the specified operating system according to a security level of the plurality of operating systems.
在该技术方案中,在选择指定操作系统时,可以从多个操作系统中选择出安全级别最高的操作系统(如双操作系统中的安全操作系统),通过安全操作系统执行上述各项操作,从而保证终端用户的安全。同时,由于安全操作系统的操作,在其他操作系统界面中是不可见的,从而在盗窃者或拾到者不知情的情况下,就可以让终端的机主了解终端的状态信息。In the technical solution, when the specified operating system is selected, the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user. At the same time, due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
在上述技术方案中,优选地,根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换,具体包括:所述指定操作系统读取当前身份识别卡的信息,并将所述当前身份识别卡的信息与存储的至少一个身份识别卡的信息进行对比;在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中每个身份识别卡的信息均不相同时,判断为所述身份识别卡被更换;在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中任一身份识别卡的信息相同时,判断为所述身份识别卡未被更换。In the above technical solution, preferably, determining, according to the information of the current identity card, whether the identity card in the terminal is replaced, specifically: the specified operating system reads information of the current identity card, and Comparing the information of the current identity card with the information of the stored at least one identity card; and comparing each of the information of the current identity card with the stored information of the at least one identity card When the information of the card is different, it is determined that the identification card is replaced; in the comparison result, the information of the current identification card and the information of the stored at least one identification card are information of any identification card. When the same, it is determined that the identification card has not been replaced.
在该技术方案中,终端的机主在不同时期可能使用不同的身份识别卡,因此,为了减少不必要的通信信息发送操作,在指定操作系统中可以存储多张身份识别卡的信息,在判断身份识别卡是否更换时,根据存储的多张身份识别卡的信息判断身份识别卡是否被更换。In this technical solution, the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
在上述技术方案中,优选地,在所述步骤102之前还包括:在所述终端首次插入身份识别卡后开机时,所述指定操作系统读取当前身份识别卡的信息,并存储所述当前身份识别卡的信息。In the above technical solution, preferably, before the step 102, the method further includes: after the terminal first inserts the identification card, the specified operating system reads the information of the current identification card, and stores the current Identification card information.
在该技术方案中,在终端首次插入身份识别卡并开机后,终端记录此身份识别卡的信息,并在以后进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。具体地,在终端和云服务器中均没有存储身份识别卡的信息时,可以判定终端是首次插入身份识别卡。In the technical solution, after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
在上述技术方案中,优选地,还包括:在用户身份验证成功时,对所述当前身份识别卡的信息进行存储,否则,不对所述当前身份识别卡的信息进行存储。 In the above technical solution, preferably, the method further includes: storing information of the current identity card when the user identity verification succeeds, and not storing the information of the current identity card.
在该技术方案中,在用户身份验证成功时,此时,说明用户是终端的机主,此次身份识别卡的更换属于正常更换,此时,将该身份识别卡的信息进行存储,以便下次进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。In this technical solution, when the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
在上述技术方案中,优选地,还包括:在所述终端存储所述当前身份识别卡的信息后,判断所述指定操作系统是否登录所述云服务器的账户;在检测到所述指定操作系统登录所述云服务器的账户时,将存储的当前身份识别卡的信息发送至所述云服务器。In the above technical solution, preferably, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; when the specified operating system is detected When logging in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
在上述技术方案中,优选地,还包括:在自动开启所述终端的数据业务之前,判断所述终端是否处于开机状态;在判断结果为所述终端未处于所述开机状态时,自动开启所述终端。In the above technical solution, preferably, the method further includes: determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and automatically opening the device when the terminal is not in the power-on state Said terminal.
在该技术方案中,在终端进行用户身份识别,或者是获取通信信息时,终端使用者可能会关闭终端,在此过程中,如果终端关机,指定操作系统还可以自动开机,在开机后自动开启数据业务,进而将通信信息发送至服务器,这样,即使在终端关机的情况下,用户仍可了解终端的实时状态信息,进一步提升了终端的安全性。In the technical solution, when the terminal performs user identification or obtains communication information, the terminal user may close the terminal. In the process, if the terminal is powered off, the designated operating system may also be automatically turned on, and automatically turned on after being turned on. The data service, in turn, sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
图2示出了根据本发明的实施例的终端的防盗追踪装置的框图。2 shows a block diagram of an anti-theft tracking device of a terminal in accordance with an embodiment of the present invention.
如图2所示,根据本发明的实施例的终端的防盗追踪装置200,包括:处理单元202,在所述终端开机或在所述终端检测到有身份识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;验证单元204,在判断结果为所述身份识别卡被更换时,控制所述指定操作系统进行用户身份验证;获取单元206,在用户身份验证失败时,控制所述指定操作系统获取所述终端的位置信息以及所述多个操作系统中其他操作系统的通信信息;交互单元208,控制所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。As shown in FIG. 2, the anti-theft tracking device 200 of the terminal according to the embodiment of the present invention includes: a processing unit 202, when the terminal is powered on or when the terminal detects that an identification card is inserted, from the plurality of The operating system selects an operating system to read the information of the current identification card, and determines whether the identification card in the terminal is replaced according to the information of the current identification card; and the verification unit 204 determines that the result is When the identity card is replaced, the specified operating system is controlled to perform user identity verification; and the obtaining unit 206 controls the specified operating system to acquire the location information of the terminal and the multiple operating systems when the user identity verification fails. The communication information of the other operating system; the interaction unit 208 controls the specified operating system to automatically start the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
在该技术方案中,在多系统终端中,在终端开机或在终端检测到有身份识别卡插入时,使用指定操作系统,如双系统终端中的安全操作系统, 获取终端中的身份识别卡的信息,进而判断身份识别卡是否被更换,在身份识别卡被更换时,对终端的用户的身份进行验证,并根据用户身份验证结果,选择是否获取其他操作系统中的通信信息,如在用户身份验证失败时,获取通信信息,进而自动开启数据业务,并通过云端的账户将通信信息发送至云服务器中。具体地,通信信息包括终端的位置信息、操作系统中的通讯录、通话记录等信息。而该指定操作系统既可以由终端选择,也可以是终端根据用户的选择指令进行选择。这样,在终端被盗或丢失时,如果盗窃者或者拾到终端的用户将自己的身份识别卡插入终端时,终端的机主可以通过登录云服务器获取盗窃者或拾到者的位置信息和通讯录信息等,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性,从而提高用户的使用体验。In the technical solution, in the multi-system terminal, when the terminal is powered on or when the terminal detects the insertion of the identification card, the specified operating system, such as the secure operating system in the dual system terminal, is used. Obtaining information of the identity card in the terminal, thereby determining whether the identity card is replaced, verifying the identity of the user of the terminal when the identity card is replaced, and selecting whether to obtain other operating systems according to the user identity verification result. The communication information, such as when the user authentication fails, obtains the communication information, and then automatically starts the data service, and sends the communication information to the cloud server through the cloud account. Specifically, the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like. The designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction. In this way, when the terminal is stolen or lost, if the thief or the user who picks up the terminal inserts his/her own identification card into the terminal, the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
在上述技术方案中,优选地,所述验证单元具体用于:采集所述终端的用户的指纹信息、声纹信息、头像信息和/或角膜信息,判断所述指纹信息、声纹信息、头像信息和/或角膜信息与预设的指纹信息、声纹信息、头像信息和/或角膜信息是否匹配,在判断结果为否时,判定用户身份验证失败,否则,判定用户身份验证成功;或者提示所述终端的用户输入所述指定操作系统的进入密钥,以及在预设时间内未接收到正确的进入密钥,或者所述进入密钥输入错误的次数超过预设次数时,判定用户身份验证失败,否则,判定用户身份验证成功。In the above technical solution, preferably, the verification unit is specifically configured to: collect fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determine the fingerprint information, voiceprint information, and avatar. Whether the information and/or the corneal information matches the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or the prompt is determined; Determining the identity of the user when the user of the terminal inputs the entry key of the specified operating system and does not receive the correct entry key within a preset time, or the number of times the entry key is entered incorrectly exceeds a preset number of times The verification failed, otherwise, the user authentication is determined to be successful.
在该技术方案中,对用户的身份进行验证的方式包括但是不限于采集用户的指纹信息、声纹信息、头像信息和/或角膜信息等信息,进而通过采集的信息与终端的机主之前存储的指纹信息、声纹信息、头像信息和/或角膜信息等信息进行匹配,判断终端的使用者是否是机主本人。当然,如果指定操作系统已设置进入密钥,还可以提示用户输入指定操作系统的进入密钥,在用户在预设时间内未输入正确的进入密钥,或者输入错误的次数超过预设次数时,此时,说明使用者不是终端机主的可能性很大,此时,获取终端的通信信息上传到云服务器,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性。In the technical solution, the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal. The fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal. Of course, if the specified operating system has set the entry key, the user may also be prompted to enter the entry key of the specified operating system. When the user does not input the correct entry key within the preset time, or the number of input errors exceeds the preset number of times At this time, it is highly probable that the user is not the terminal owner. At this time, the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal when separated from the terminal. Improve the security of the terminal.
在上述技术方案中,优选地,所述处理单元202包括:选择单元 2022,根据所述多个操作系统的安全级别,选择具有最高所述安全级别的操作系统作为所述指定操作系统。In the above technical solution, preferably, the processing unit 202 includes: a selection unit 2022. Select, according to a security level of the multiple operating systems, an operating system having the highest security level as the specified operating system.
在该技术方案中,在选择指定操作系统时,可以从多个操作系统中选择出安全级别最高的操作系统(如双操作系统中的安全操作系统),通过安全操作系统执行上述各项操作,从而保证终端用户的安全。同时,由于安全操作系统的操作,在其他操作系统界面中是不可见的,从而在盗窃者或拾到者不知情的情况下,就可以让终端的机主了解终端的状态信息。In the technical solution, when the specified operating system is selected, the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user. At the same time, due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
在上述技术方案中,优选地,所述处理单元202包括:对比单元2024,所述指定操作系统读取当前身份识别卡的信息,并将所述当前身份识别卡的信息与存储的至少一个身份识别卡的信息进行对比;判断单元2046,在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中每个身份识别卡的信息均不相同时,判断为所述身份识别卡被更换,在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中任一身份识别卡的信息相同时,判断为所述身份识别卡未被更换。In the above technical solution, preferably, the processing unit 202 includes: a comparing unit 2024, the specified operating system reads information of the current identity card, and the information of the current identity card and the stored at least one identity The information of the identification card is compared; the determining unit 2046 determines that the information of each of the identification cards is different when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different. The identification card is replaced, and when the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, the identity identification card is determined. Not replaced.
在该技术方案中,终端的机主在不同时期可能使用不同的身份识别卡,因此,为了减少不必要的通信信息发送操作,在指定操作系统中可以存储多张身份识别卡的信息,在判断身份识别卡是否更换时,根据存储的多张身份识别卡的信息判断身份识别卡是否被更换。In this technical solution, the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
在上述技术方案中,优选地,还包括:第一存储单元210,在所述终端首次插入身份识别卡后开机时,控制所述指定操作系统读取当前身份识别卡的信息,并存储所述当前身份识别卡的信息。In the above technical solution, preferably, the first storage unit 210 controls the specified operating system to read the information of the current identification card, and stores the information when the terminal is powered on after the terminal is first inserted into the identification card. Current identification card information.
在该技术方案中,在终端首次插入身份识别卡并开机后,终端记录此身份识别卡的信息,并在以后进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。具体地,在终端和云服务器中均没有存储身份识别卡的信息时,可以判定终端是首次插入身份识别卡。In the technical solution, after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
在上述技术方案中,优选地,还包括:第二存储单元212,在用户身份验证成功时,对所述当前身份识别卡的信息进行存储,否则,不对所述当前身份识别卡的信息进行存储。 In the above technical solution, preferably, the method further includes: the second storage unit 212, when the user identity verification succeeds, storing the information of the current identity card, otherwise, not storing the information of the current identity card .
在该技术方案中,在用户身份验证成功时,此时,说明用户是终端的机主,此次身份识别卡的更换属于正常更换,此时,将该身份识别卡的信息进行存储,以便下次进行身份识别卡是否更换的判断时,将此身份识别卡作为一个判断依据。In this technical solution, when the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
在上述技术方案中,优选地,还包括:登录状态判断单元214,在所述终端存储所述当前身份识别卡的信息后,判断所述指定操作系统是否登录所述云服务器的账户;以及所述交互单元208还用于:在检测到所述指定操作系统登录所述云服务器的账户时,将存储的当前身份识别卡的信息发送至所述云服务器。In the above technical solution, the method further includes: a login status determining unit 214, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; The interaction unit 208 is further configured to: when detecting that the specified operating system logs in to the account of the cloud server, send the stored information of the current identification card to the cloud server.
在上述技术方案中,优选地,还包括:状态判断单元216,在自动开启所述终端的数据业务之前,判断所述终端是否处于开机状态;开启单元218,在判断结果为所述终端未处于所述开机状态时,自动开启所述终端。In the above technical solution, the method further includes: the state determining unit 216, before the data service of the terminal is automatically turned on, determining whether the terminal is in a power-on state; the opening unit 218, in the judgment result, that the terminal is not in the When the power is turned on, the terminal is automatically turned on.
在该技术方案中,在终端进行用户身份识别,或者是获取通信信息时,终端使用者可能会关闭终端,在此过程中,如果终端关机,指定操作系统还可以自动开机,在开机后自动开启数据业务,进而将通信信息发送至服务器,这样,即使在终端关机的情况下,用户仍可了解终端的实时状态信息,进一步提升了终端的安全性。In the technical solution, when the terminal performs user identification or obtains communication information, the terminal user may close the terminal. In the process, if the terminal is powered off, the designated operating system may also be automatically turned on, and automatically turned on after being turned on. The data service, in turn, sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
图3示出了根据本发明的实施例的终端的结构图。FIG. 3 shows a block diagram of a terminal in accordance with an embodiment of the present invention.
如图3所示,根据本发明的实施例的终端300,多个操作系统302;以及如上述技术方案中任一项所述的终端的防盗追踪装置200。该终端300具有与终端的防盗追踪装置200相同的技术效果,在此不再赘述。As shown in FIG. 3, a terminal 300 according to an embodiment of the present invention, a plurality of operating systems 302; and the anti-theft tracking device 200 of the terminal according to any one of the above aspects. The terminal 300 has the same technical effects as the anti-theft tracking device 200 of the terminal, and details are not described herein again.
下面以终端为双系统终端(系统A和系统B,其中,系统B为指定操作系统,即系统B为安全操作系统)为例,详细说明本发明的技术方案。The following is a detailed description of the technical solution of the present invention by taking a terminal as a dual-system terminal (system A and system B, where system B is a designated operating system, that is, system B is a secure operating system).
图4示出了根据本发明的一个实施例的终端的结构图。FIG. 4 shows a block diagram of a terminal in accordance with one embodiment of the present invention.
如图4所示,终端400由两个系统即系统A和系统B构成。其中,系统A为终端用户的日常应用系统;系统B为安全加密系统,系统B具有检测SIM(Subscriber Identity Module,客户识别模块)/UIM(User  Identity Module,用户识别模块)卡是否被更换、开关数据业务、读取系统A通讯记录及判别终端所在地理位置等其他监控系统A的功能。这样,在系统B检测到SIM/UIM卡被更换时,监控系统A的通讯记录及获取终端所在地理位置等信息,进而上传到云服务器,从而使终端的机主在与终端分离的情况下,了解终端的实时状态信息,提升终端的安全性,从而提高用户的使用体验。As shown in FIG. 4, the terminal 400 is composed of two systems, System A and System B. System A is the daily application system of the end user; system B is the security encryption system, and system B has the detection SIM (Subscriber Identity Module) / UIM (User Identity Module, User Identification Module) Whether the card is replaced, the data service is switched, the system A communication record is read, and the location of the terminal is determined. In this way, when the system B detects that the SIM/UIM card is replaced, the communication record of the monitoring system A and the geographical location of the terminal are acquired, and then uploaded to the cloud server, so that the owner of the terminal is separated from the terminal. Understand the real-time status information of the terminal and improve the security of the terminal, thereby improving the user experience.
图5示出了根据本发明的实施例的设置系统B安全策略的流程图。FIG. 5 shows a flow chart of setting a system B security policy in accordance with an embodiment of the present invention.
如图5所示,根据本发明的实施例的设置系统B安全策略的流程如下:As shown in FIG. 5, the process of setting the security policy of the system B according to an embodiment of the present invention is as follows:
步骤502,初次打开终端。In step 502, the terminal is opened for the first time.
步骤504,判断是否有SIM/UIM(即身份识别卡)卡插入。In step 504, it is determined whether there is a SIM/UIM (ie, identification card) card inserted.
步骤506,如果有SIM/UIM卡插入,则系统B读取终端中SIM/UIM卡的信息并保存在系统B内。 Step 506, if there is a SIM/UIM card inserted, the system B reads the information of the SIM/UIM card in the terminal and saves it in the system B.
步骤508,判断系统B是否登录云端账户。In step 508, it is determined whether the system B logs in to the cloud account.
步骤510,如果系统B登录云端账户,则将SIM/UIM卡相关信息上传至云端。Step 510: If the system B logs in to the cloud account, the SIM/UIM card related information is uploaded to the cloud.
图6示出了根据本发明的一个实施例的终端的防盗追踪方法的具体流程图。FIG. 6 shows a detailed flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention.
如图6所示,根据本发明的一个实施例的终端的防盗追踪方法,包括:As shown in FIG. 6, the anti-theft tracking method of the terminal according to an embodiment of the present invention includes:
步骤602,打开终端。In step 602, the terminal is opened.
步骤604,系统B判断SIM/UIM卡是否被更换。在判断结果为是时,进入步骤606,否则结束流程。At step 604, system B determines if the SIM/UIM card has been replaced. When the result of the determination is YES, the process proceeds to step 606, otherwise the process ends.
步骤606,当终端的SIM/UIM卡被更换再次开机时,系统B判断在预设时间内终端使用者是否主动输入正确秘钥并进入系统B,在判断结果为是时,进入步骤608,否则进入步骤610。Step 606: When the SIM/UIM card of the terminal is replaced and powered on again, the system B determines whether the terminal user actively inputs the correct key and enters the system B within the preset time. If the determination result is yes, the process proceeds to step 608; otherwise, Proceed to step 610.
步骤610,若在预定时间内终端使用者主动输入正确秘钥并进入系统B,执行图5中所述的设置系统B安全策略的过程。Step 610: If the terminal user actively inputs the correct key and enters the system B within a predetermined time, the process of setting the system B security policy described in FIG. 5 is performed.
步骤612,若在预定时间内终端使用者未主动输入正确秘钥并进入系 统B,则系统B转为常开模式,即系统B自动开启,且无相关开机提示。 Step 612, if the terminal user does not actively input the correct key and enters the system within a predetermined time System B, system B is switched to the normally open mode, that is, system B is automatically turned on, and there is no relevant boot prompt.
步骤614,系统B在后台开启数据业务。In step 614, system B starts the data service in the background.
步骤616,系统B自动尝试登陆云端客户端,在登录成功时,进入步骤618,否则,进入步骤620。In step 616, the system B automatically attempts to log in to the cloud client. When the login is successful, the process proceeds to step 618. Otherwise, the process proceeds to step 620.
步骤618,系统B通过云端客户端将该终端的通讯记录、位置信息、SIM/UIM卡信息上传到云端服务器。In step 618, the system B uploads the communication record, the location information, and the SIM/UIM card information of the terminal to the cloud server through the cloud client.
步骤620,延迟一段时间后,重新进入步骤614。 Step 620, after a delay, re-enters step 614.
通过上述步骤,可以将终端的实时状态信息上传到云服务器,这样,终端的机主登录云端账户,即可读取云端保存的该终端的通讯记录、位置信息和SIM/UIM卡等信息,进而可以通过这些信息追踪终端所在位置及终端使用者的身份。Through the above steps, the real-time status information of the terminal can be uploaded to the cloud server, so that the owner of the terminal logs in to the cloud account, and can read the communication record, location information, and SIM/UIM card information of the terminal saved in the cloud, and then This information can be used to track the location of the terminal and the identity of the end user.
以上结合附图详细说明了本发明的技术方案,通过本发明的技术方案,在终端被盗或丢失后,可以自动获取终端的位置和通讯记录等信息,进而自动开启数据业务,将其上传到云服务器,从而使用户了解终端的实时状态信息,并在终端关机时,能自动开机,执行上述操作,从而全面的提升了终端的安全性。The technical solution of the present invention is described in detail above with reference to the accompanying drawings. After the terminal is stolen or lost, information such as the location and communication record of the terminal can be automatically obtained, and the data service is automatically started and uploaded to the terminal. The cloud server enables the user to know the real-time status information of the terminal, and when the terminal is powered off, it can automatically boot and perform the above operations, thereby comprehensively improving the security of the terminal.
根据本发明的实施方式,还提供了一种存储在非易失性机器可读介质上的程序产品,用于终端的防盗追踪,所述程序产品包括用于使计算机系统执行以下步骤的机器可执行指令:在所述终端开机或在所述终端检测到有身份识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;在判断结果为所述身份识别卡被更换时,所述指定操作系统对所述终端的使用者进行用户身份验证;在用户身份验证失败时,所述指定操作系统获取所述终端的位置信息以及所述多个操作系统中其他操作系统中存储的通信信息;所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。According to an embodiment of the present invention, there is also provided a program product stored on a non-transitory machine readable medium for anti-theft tracking of a terminal, the program product comprising a machine for causing a computer system to perform the following steps Executing an instruction: when the terminal is powered on or when the terminal detects that an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and according to the current identity Determining, by the information of the identification card, whether the identification card in the terminal is replaced; when the determination result is that the identification card is replaced, the designated operating system performs user identity verification on the user of the terminal; When the verification fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; the designated operating system automatically starts data services of the terminal, and attempts to The location information and the communication information are sent to a cloud server.
根据本发明的实施方式,还提供了一种非易失机器可读介质,存储有用于终端防盗追踪的程序产品,所述程序产品包括用于使计算机系统执行以下步骤的机器可执行指令:在所述终端开机或在所述终端检测到有身份 识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;在判断结果为所述身份识别卡被更换时,所述指定操作系统对所述终端的使用者进行用户身份验证;在用户身份验证失败时,所述指定操作系统获取所述终端的位置信息以及所述多个操作系统中其他操作系统中存储的通信信息;所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。According to an embodiment of the present invention, there is also provided a non-volatile machine readable medium storing a program product for terminal anti-theft tracking, the program product comprising machine executable instructions for causing a computer system to perform the following steps: The terminal is powered on or detects an identity at the terminal When the identification card is inserted, selecting a specified operating system from the plurality of operating systems to read the information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; When the result of the determination is that the identity card is replaced, the designated operating system performs user identity verification on the user of the terminal; when the user identity verification fails, the specified operating system acquires location information of the terminal and Communication information stored in other operating systems of the plurality of operating systems; the designated operating system automatically turning on data services of the terminal, and attempting to send the location information and the communication information to a cloud server.
根据本发明的实施方式,还提供了一种机器可读程序,所述程序使机器执行如上所述技术方案中任一所述的终端的防盗追踪方法。According to an embodiment of the present invention, there is further provided a machine readable program, the program causing a machine to perform an antitheft tracking method of a terminal according to any one of the above aspects.
根据本发明的实施方式,还提供了一种存储有机器可读程序的存储介质,其中,所述机器可读程序使得机器执行如上所述技术方案中任一所述的终端的防盗追踪方法。According to an embodiment of the present invention, there is further provided a storage medium storing a machine readable program, wherein the machine readable program causes a machine to perform an antitheft tracking method of a terminal according to any one of the technical solutions described above.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (17)

  1. 一种终端的防盗追踪方法,所述终端包括多个操作系统,其特征在于,包括:An anti-theft tracking method for a terminal, the terminal comprising a plurality of operating systems, including:
    在所述终端开机或在所述终端检测到有身份识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;When the terminal is powered on or when the terminal detects the insertion of the identification card, selecting a specified operating system from the plurality of operating systems to read the information of the current identification card, and according to the current identification card The information determines whether the identification card in the terminal is replaced;
    在判断结果为所述身份识别卡被更换时,所述指定操作系统对所述终端的使用者进行用户身份验证;When the judgment result is that the identification card is replaced, the designated operating system performs user identity verification on the user of the terminal;
    在用户身份验证失败时,所述指定操作系统获取所述终端的位置信息以及所述多个操作系统中其他操作系统中存储的通信信息;When the user authentication fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems;
    所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。The designated operating system automatically starts the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
  2. 根据权利要求1所述的终端的防盗追踪方法,其特征在于,所述指定操作系统进行用户身份验证,具体包括:The anti-theft tracking method of the terminal according to claim 1, wherein the specified operating system performs user identity verification, which specifically includes:
    采集所述终端的用户的指纹信息、声纹信息、头像信息和/或角膜信息,判断所述指纹信息、声纹信息、头像信息和/或角膜信息与预设的指纹信息、声纹信息、头像信息和/或角膜信息是否匹配,在判断结果为否时,判定用户身份验证失败,否则,判定用户身份验证成功;或者Collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, voiceprint information, avatar information, and/or corneal information, preset fingerprint information, voiceprint information, Whether the avatar information and/or the cornea information match, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or
    提示所述终端的用户输入所述指定操作系统的进入密钥,以及Prompting a user of the terminal to enter an entry key for the specified operating system, and
    在预设时间内未接收到正确的进入密钥,或者所述进入密钥输入错误的次数超过预设次数时,判定用户身份验证失败,否则,判定用户身份验证成功。If the correct entry key is not received within the preset time, or the number of times the entry key is entered incorrectly exceeds the preset number of times, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
  3. 根据权利要求1所述的终端的防盗追踪方法,其特征在于,从所述多个操作系统中选择指定操作系统,包括:The anti-theft tracking method of the terminal according to claim 1, wherein selecting a specified operating system from the plurality of operating systems comprises:
    根据所述多个操作系统的安全级别,选择具有最高所述安全级别的操作系统作为所述指定操作系统。According to the security level of the plurality of operating systems, an operating system having the highest security level is selected as the designated operating system.
  4. 根据权利要求1所述的终端的防盗追踪方法,其特征在于,根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换,具 体包括:The anti-theft tracking method of the terminal according to claim 1, wherein determining whether the identification card in the terminal is replaced according to the information of the current identification card Body includes:
    所述指定操作系统读取当前身份识别卡的信息,并将所述当前身份识别卡的信息与存储的至少一个身份识别卡的信息进行对比;The specified operating system reads information of the current identification card, and compares the information of the current identification card with the stored information of the at least one identification card;
    在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中每个身份识别卡的信息均不相同时,判断为所述身份识别卡被更换;When the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different from each other, it is determined that the identification card is replaced;
    在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中任一身份识别卡的信息相同时,判断为所述身份识别卡未被更换。When the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, it is determined that the identification card has not been replaced.
  5. 根据权利要求4所述的终端的防盗追踪方法,其特征在于,还包括:The anti-theft tracking method of the terminal according to claim 4, further comprising:
    在所述终端首次插入身份识别卡后开机时,所述指定操作系统读取当前身份识别卡的信息,并存储所述当前身份识别卡的信息。After the terminal is powered on after the first time the identification card is inserted, the specified operating system reads the information of the current identification card and stores the information of the current identification card.
  6. 根据权利要求4所述的终端的防盗追踪方法,其特征在于,还包括:The anti-theft tracking method of the terminal according to claim 4, further comprising:
    在用户身份验证成功时,对所述当前身份识别卡的信息进行存储,否则,不对所述当前身份识别卡的信息进行存储。When the user identity verification succeeds, the information of the current identity card is stored; otherwise, the information of the current identity card is not stored.
  7. 根据权利要求5或6所述的终端的防盗追踪方法,其特征在于,还包括:The anti-theft tracking method of the terminal according to claim 5 or 6, further comprising:
    在所述终端存储所述当前身份识别卡的信息后,判断所述指定操作系统是否登录所述云服务器的账户;After the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server;
    在检测到所述指定操作系统登录所述云服务器的账户时,将存储的当前身份识别卡的信息发送至所述云服务器。When detecting that the specified operating system logs in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
  8. 根据权利要求1至6中任一项所述的终端的防盗追踪方法,其特征在于,还包括:The anti-theft tracking method for a terminal according to any one of claims 1 to 6, further comprising:
    在自动开启所述终端的数据业务之前,判断所述终端是否仍处于开机状态;Before automatically opening the data service of the terminal, determining whether the terminal is still in a power-on state;
    在判断结果为所述终端未处于所述开机状态时,自动开启所述终端。 When the judgment result is that the terminal is not in the power-on state, the terminal is automatically turned on.
  9. 一种终端的防盗追踪装置,所述终端包括多个操作系统,其特征在于,包括:An anti-theft tracking device for a terminal, the terminal comprising a plurality of operating systems, comprising:
    处理单元,在所述终端开机或在所述终端检测到有身份识别卡插入时,从所述多个操作系统中选择指定操作系统来读取当前身份识别卡的信息,并根据所述当前身份识别卡的信息判断所述终端中的身份识别卡是否被更换;a processing unit, when the terminal is powered on or when the terminal detects that an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and according to the current identity The information of the identification card determines whether the identification card in the terminal is replaced;
    验证单元,在判断结果为所述身份识别卡被更换时,控制所述指定操作系统对所述终端的使用者进行用户身份验证;a verification unit, when the determination result is that the identification card is replaced, controlling the designated operating system to perform user identity verification on a user of the terminal;
    获取单元,在用户身份验证失败时,控制所述指定操作系统获取所述终端的位置信息以及所述多个操作系统中其他操作系统的通信信息;An acquiring unit, when the user identity verification fails, controlling the specified operating system to acquire location information of the terminal and communication information of other operating systems in the multiple operating systems;
    交互单元,控制所述指定操作系统自动开启所述终端的数据业务,并尝试将所述位置信息和所述通信信息发送至云服务器。The interaction unit controls the specified operating system to automatically start the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
  10. 根据权利要求9所述的终端的防盗追踪装置,其特征在于,所述验证单元具体用于:The anti-theft tracking device of the terminal according to claim 9, wherein the verification unit is specifically configured to:
    采集所述终端的用户的指纹信息、声纹信息、头像信息和/或角膜信息,判断所述指纹信息、声纹信息、头像信息和/或角膜信息与预设的指纹信息、声纹信息、头像信息和/或角膜信息是否匹配,在判断结果为否时,判定用户身份验证失败,否则,判定用户身份验证成功;或者Collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, voiceprint information, avatar information, and/or corneal information, preset fingerprint information, voiceprint information, Whether the avatar information and/or the cornea information match, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or
    提示所述终端的用户输入所述指定操作系统的进入密钥,以及Prompting a user of the terminal to enter an entry key for the specified operating system, and
    在预设时间内未接收到正确的进入密钥,或者所述进入密钥输入错误的次数超过预设次数时,判定用户身份验证失败,否则,判定用户身份验证成功。If the correct entry key is not received within the preset time, or the number of times the entry key is entered incorrectly exceeds the preset number of times, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
  11. 根据权利要求9所述的终端的防盗追踪装置,其特征在于,所述处理单元包括:The anti-theft tracking device of the terminal according to claim 9, wherein the processing unit comprises:
    选择单元,根据所述多个操作系统的安全级别,选择具有最高所述安全级别的操作系统作为所述指定操作系统。And selecting a unit, according to a security level of the plurality of operating systems, selecting an operating system having the highest security level as the specified operating system.
  12. 根据权利要求9所述的终端的防盗追踪装置,其特征在于,所述处理单元包括:The anti-theft tracking device of the terminal according to claim 9, wherein the processing unit comprises:
    对比单元,所述指定操作系统读取当前身份识别卡的信息,并将所述 当前身份识别卡的信息与存储的至少一个身份识别卡的信息进行对比;a comparison unit, the specified operating system reads information of the current identification card, and the The information of the current identification card is compared with the information of the stored at least one identification card;
    判断单元,在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中每个身份识别卡的信息均不相同时,判断为所述身份识别卡被更换,The determining unit determines that the identity identification card is replaced when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different from each other,
    在对比结果为所述当前身份识别卡的信息与存储的所述至少一个身份识别卡的信息中任一身份识别卡的信息相同时,判断为所述身份识别卡未被更换。When the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, it is determined that the identification card has not been replaced.
  13. 根据权利要求12所述的终端的防盗追踪装置,其特征在于,还包括:The anti-theft tracking device of the terminal according to claim 12, further comprising:
    第一存储单元,在所述终端首次插入身份识别卡后开机时,控制所述指定操作系统读取当前身份识别卡的信息,并存储所述当前身份识别卡的信息。The first storage unit controls the specified operating system to read the information of the current identification card and stores the information of the current identification card when the terminal is powered on after the first time the terminal is inserted.
  14. 根据权利要求12所述的终端的防盗追踪装置,其特征在于,还包括:The anti-theft tracking device of the terminal according to claim 12, further comprising:
    第二存储单元,在用户身份验证成功时,对所述当前身份识别卡的信息进行存储,否则,不对所述当前身份识别卡的信息进行存储。The second storage unit stores the information of the current identity card when the user identity verification succeeds, otherwise, the information of the current identity card is not stored.
  15. 根据权利要求13或14所述的终端的防盗追踪装置,其特征在于,还包括:The anti-theft tracking device of the terminal according to claim 13 or 14, further comprising:
    登录状态判断单元,在所述终端存储所述当前身份识别卡的信息后,判断所述指定操作系统是否登录所述云服务器的账户;以及a login status determining unit, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server;
    所述交互单元还用于:The interaction unit is further configured to:
    在检测到所述指定操作系统登录所述云服务器的账户时,将存储的当前身份识别卡的信息发送至所述云服务器。When detecting that the specified operating system logs in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
  16. 根据权利要求9至14中任一项所述的终端的防盗追踪装置,其特征在于,还包括:The anti-theft tracking device of the terminal according to any one of claims 9 to 14, further comprising:
    状态判断单元,在自动开启所述终端的数据业务之前,判断所述终端是否处于开机状态;The state determining unit determines whether the terminal is in a power-on state before automatically starting the data service of the terminal;
    开启单元,在判断结果为所述终端未处于所述开机状态时,自动开启所述终端。 The unit is turned on, and when the judgment result is that the terminal is not in the power-on state, the terminal is automatically turned on.
  17. 一种终端,其特征在于,包括:A terminal, comprising:
    多个操作系统;以及Multiple operating systems;
    如权利要求9至16中任一项所述的终端的防盗追踪装置。 The anti-theft tracking device of the terminal according to any one of claims 9 to 16.
PCT/CN2014/085461 2014-08-28 2014-08-28 Terminal, and anti-theft tracking method and apparatus therefor WO2016029413A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2014/085461 WO2016029413A1 (en) 2014-08-28 2014-08-28 Terminal, and anti-theft tracking method and apparatus therefor
CN201480081585.2A CN106797535A (en) 2014-08-28 2014-08-28 Terminal and its antitheft tracing method and anti-theft tracking device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/085461 WO2016029413A1 (en) 2014-08-28 2014-08-28 Terminal, and anti-theft tracking method and apparatus therefor

Publications (1)

Publication Number Publication Date
WO2016029413A1 true WO2016029413A1 (en) 2016-03-03

Family

ID=55398625

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/085461 WO2016029413A1 (en) 2014-08-28 2014-08-28 Terminal, and anti-theft tracking method and apparatus therefor

Country Status (2)

Country Link
CN (1) CN106797535A (en)
WO (1) WO2016029413A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261099B (en) * 2020-10-15 2021-08-31 腾讯科技(深圳)有限公司 Position information acquisition method and device and electronic equipment
CN115714809A (en) * 2021-08-19 2023-02-24 深圳市万普拉斯科技有限公司 Mobile terminal tracking method, mobile terminal and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4265430B2 (en) * 2004-02-09 2009-05-20 日本電気株式会社 Mobile terminal device
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN103338295A (en) * 2013-05-27 2013-10-02 苏州奇可思信息科技有限公司 Mobile phone anti-theft security system
CN103369456A (en) * 2012-03-29 2013-10-23 英华达(上海)科技有限公司 Mobile phone antitheft system and method thereof
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198119B (en) * 2006-12-09 2012-02-29 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus
CN102932741A (en) * 2012-11-20 2013-02-13 青岛海信移动通信技术股份有限公司 Mobile phone antitheft tracking method and antitheft tracking mobile phone
CN103079203B (en) * 2013-02-05 2016-01-20 北京握奇数据系统有限公司 A kind of terminal authentication method and smart card
CN103780754B (en) * 2013-12-31 2016-07-06 闻泰通讯股份有限公司 Antitheft mobile phone follows the tracks of system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4265430B2 (en) * 2004-02-09 2009-05-20 日本電気株式会社 Mobile terminal device
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN103369456A (en) * 2012-03-29 2013-10-23 英华达(上海)科技有限公司 Mobile phone antitheft system and method thereof
CN103338295A (en) * 2013-05-27 2013-10-02 苏州奇可思信息科技有限公司 Mobile phone anti-theft security system
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card

Also Published As

Publication number Publication date
CN106797535A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US10715520B2 (en) Systems and methods for decentralized biometric enrollment
JP5727008B2 (en) Operating system unlocking method and mobile phone
CN105468950B (en) Identity authentication method and device, terminal and server
US20160094550A1 (en) Biometric Device Pairing
US9411946B2 (en) Fingerprint password
WO2015043224A1 (en) Method and apparatus for service login based on third party's information
US9716593B2 (en) Leveraging multiple biometrics for enabling user access to security metadata
WO2016082229A1 (en) Identity authentication method and wearable device
WO2021015733A1 (en) Headphones
KR102124445B1 (en) Method, device and terminal for entering the login password of the application
CN105006077A (en) ATM safe operation method and system based on fingerprint identification, and ATM
WO2017016032A1 (en) Fingerprint verification method, fingerprint verification device and terminal
WO2016127448A1 (en) System switching method, system switching apparatus and terminal
CN107437016B (en) Application control method and related product
JP2010191680A (en) Portable communication terminal, automatic transaction apparatus, automatic transaction system, and automatic transaction method
CN110077361B (en) Vehicle control method and device
WO2016029413A1 (en) Terminal, and anti-theft tracking method and apparatus therefor
JP2012234235A (en) Biometric authentication system and biometric authentication method
KR101944698B1 (en) Method for auto login of single sign on using the login result of computer operating system, and computer readable recording medium applying the same
WO2016062200A1 (en) Fingerprint authentication method and apparatus, and server
WO2010116471A1 (en) Biometric authentication device, biometric authentication method, and storage medium
CN110084947B (en) Access control information updating method and device
CN110867002A (en) Door opening mode setting method, intelligent lock and storage medium
CN111079133A (en) Child lock control method and system of electronic cigarette
AU2021101726A4 (en) A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14900779

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14900779

Country of ref document: EP

Kind code of ref document: A1