WO2016029413A1 - Terminal, et procédé et appareil de suivi anti-vol - Google Patents
Terminal, et procédé et appareil de suivi anti-vol Download PDFInfo
- Publication number
- WO2016029413A1 WO2016029413A1 PCT/CN2014/085461 CN2014085461W WO2016029413A1 WO 2016029413 A1 WO2016029413 A1 WO 2016029413A1 CN 2014085461 W CN2014085461 W CN 2014085461W WO 2016029413 A1 WO2016029413 A1 WO 2016029413A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- information
- identification card
- operating system
- user
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Definitions
- the present invention relates to the field of terminal technologies, and in particular, to an anti-theft tracking method for a terminal, an anti-theft tracking device for a terminal, and a terminal.
- the invention is based on the above problems, and proposes a new technical solution, which can perform anti-theft tracking on the terminal after the terminal is stolen or lost.
- the present invention provides an anti-theft tracking method for a terminal, where the terminal includes a plurality of operating systems, including: when the terminal is powered on or when the terminal detects that an identification card is inserted, Selecting an operating system to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; the result of the determination is the identification card
- the specified operating system pair The user of the terminal performs user identity verification; when the user identity verification fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; The operating system automatically turns on the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
- the specified operating system such as the secure operating system in the dual-system terminal
- the specified operating system is used to obtain the identification card in the terminal.
- the information is further determined whether the identification card is replaced, and when the identity card is replaced, the identity of the user of the terminal is verified, and according to the result of the user identity verification, whether to obtain communication information in other operating systems, such as the identity of the user, is selected.
- the verification fails, the communication information is obtained, and the data service is automatically started, and the communication information is sent to the cloud server through the account in the cloud.
- the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
- the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
- the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
- the specified operating system performs user identity verification, specifically: collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, Whether the voiceprint information, the avatar information, and/or the cornea information match the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is negative, it is determined that the user identity verification fails, otherwise, the user identity is determined.
- the verification succeeds; or the user of the terminal is prompted to input the entry key of the specified operating system, and the correct entry key is not received within the preset time, or the entry key is incorrectly entered more than the preset number of times At the same time, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
- the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
- the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal. of course, If the specified operating system has set the entry key, the user may also be prompted to enter the entry key of the specified operating system. When the user does not enter the correct entry key within the preset time, or the number of input errors exceeds the preset number of times, this In this case, it is highly probable that the user is not the terminal owner.
- the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is informed of the real-time status information of the terminal and is improved when the terminal is separated from the terminal. Terminal security.
- selecting the specified operating system from the plurality of operating systems includes: selecting an operating system having the highest security level as the specified operation according to a security level of the multiple operating systems system.
- the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
- the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
- determining, according to the information of the current identity card, whether the identity card in the terminal is replaced specifically: the specified operating system reads information of the current identity card, and Comparing the information of the current identity card with the information of the stored at least one identity card; and comparing each of the information of the current identity card with the stored information of the at least one identity card When the information of the card is different, it is determined that the identification card is replaced; in the comparison result, the information of the current identification card and the information of the stored at least one identification card are information of any identification card. When the same, it is determined that the identification card has not been replaced.
- the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
- the method further includes: when the terminal is powered on for the first time after the first identification card is inserted, the designated operating system reads information of the current identification card, and stores information of the current identification card.
- the terminal after the terminal inserts the identification card for the first time and powers on, the terminal records the The identification card is used as a basis for judging the information of the identification card and determining whether the identification card is replaced later. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
- the method further includes: storing information of the current identity card when the user identity verification succeeds, and not storing the information of the current identity card.
- the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
- the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; when the specified operating system is detected When logging in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
- the method further includes: determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and automatically opening the device when the terminal is not in the power-on state Said terminal.
- the terminal user may close the terminal.
- the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
- the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
- an anti-theft tracking device for a terminal, the terminal comprising a plurality of operating systems
- the anti-theft tracking device of the terminal comprising: a processing unit, when the terminal is powered on or detected at the terminal When an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is Replacing; the verification unit, when the judgment result is that the identification card is replaced, controlling the specified operating system to perform user identity verification; and acquiring unit, when the user identity verification fails, controlling the specified operating system to obtain the Location information of the terminal and communication information of other operating systems in the plurality of operating systems; an interaction unit that controls the specified operating system to automatically open data services of the terminal, and attempts to send the location information and the communication information To the cloud server.
- the specified operating system such as the secure operating system in the dual-system terminal
- the specified operating system is used to obtain the identification card in the terminal.
- the information is further determined whether the identification card is replaced, and when the identity card is replaced, the identity of the user of the terminal is verified, and according to the result of the user identity verification, whether to obtain communication information in other operating systems, such as the identity of the user, is selected.
- the verification fails, the communication information is obtained, and the data service is automatically started, and the communication information is sent to the cloud server through the account in the cloud.
- the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
- the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
- the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
- the verification unit is specifically configured to: collect fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determine the fingerprint information, voiceprint information, and avatar. Whether the information and/or the corneal information matches the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or the prompt is determined; Determining the identity of the user when the user of the terminal inputs the entry key of the specified operating system and does not receive the correct entry key within a preset time, or the number of times the entry key is entered incorrectly exceeds a preset number of times The verification failed, otherwise, the user authentication is determined to be successful.
- the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
- the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal.
- you can also prompt the user to enter the specified operating system. Entering the key when the user does not input the correct entry key within the preset time, or the number of input errors exceeds the preset number of times, at this time, it is highly likely that the user is not the terminal owner.
- the communication information of the terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal and improves the security of the terminal.
- the processing unit includes: a selecting unit that selects an operating system having the highest security level as the specified operating system according to a security level of the plurality of operating systems.
- the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
- the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
- the processing unit includes: a comparing unit, the specified operating system reads information of the current identity card, and the information of the current identity card and the stored at least one identity card The information is compared; the judging unit judges the identity when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different from each of the identification cards.
- the identification card is replaced, and when the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, it is determined that the identification card has not been replaced. .
- the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
- the method further includes: a first storage unit, when the terminal is powered on after the terminal is first inserted, controlling the specified operating system to read information of the current identification card, and storing the current Identification card information.
- the terminal after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis.
- the method further includes: storing, by the second storage unit, information about the current identity identification card when the user identity verification succeeds, and not storing the information of the current identity identification card.
- the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
- the method further includes: a login status determining unit, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server;
- the interaction unit is further configured to: when detecting that the specified operating system logs in to the account of the cloud server, send the stored information of the current identification card to the cloud server.
- the method further includes: a state determining unit, determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and opening the unit, where the determining result is that the terminal is not in the When the power is turned on, the terminal is automatically turned on.
- the terminal user may close the terminal.
- the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
- the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
- a terminal comprising: a plurality of operating systems; and the anti-theft tracking device of the terminal according to any one of the above technical solutions.
- the terminal has the same technical effect as the anti-theft tracking device of the terminal, and details are not described herein again.
- FIG. 1 shows a flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention
- FIG. 2 shows a block diagram of an anti-theft tracking device of a terminal in accordance with an embodiment of the present invention
- FIG. 3 shows a structural diagram of a terminal according to an embodiment of the present invention
- Figure 4 is a block diagram showing a terminal in accordance with one embodiment of the present invention.
- FIG. 5 shows a flow chart of setting a system B security policy according to an embodiment of the present invention
- FIG. 6 shows a detailed flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention.
- FIG. 1 shows a flow chart of a theft prevention method of a terminal according to an embodiment of the present invention.
- the anti-theft tracking method of the terminal includes: Step 102, when the terminal is powered on or when the terminal detects the insertion of the identification card, the multiple operating systems of the slave terminal Selecting an operating system to read information of the current identification card, and determining, according to the information of the current identification card, whether the identification card in the terminal is replaced; in step 104, the result of the determination is the identification card
- the specified operating system performs user identity verification
- step 106 when the user identity verification fails, acquiring location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; And the specified operating system automatically starts the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
- the specified operating system such as the secure operating system in the dual system terminal
- the specified operating system is used.
- Obtaining information of the identity card in the terminal thereby determining whether the identity card is replaced, verifying the identity of the user of the terminal when the identity card is replaced, and selecting whether to obtain other operating systems according to the user identity verification result.
- the communication information such as when the user authentication fails, obtains the communication information, and then automatically starts the data service, and sends the communication information to the cloud server through the cloud account.
- the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
- the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
- the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
- the specified operating system performs user identity verification, specifically: collecting fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determining the fingerprint information, Whether the voiceprint information, the avatar information, and/or the cornea information match the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is negative, it is determined that the user identity verification fails, otherwise, the user identity is determined.
- the verification succeeds; or the user of the terminal is prompted to input the entry key of the specified operating system, and the correct entry key is not received within the preset time, or the entry key is incorrectly entered more than the preset number of times At the same time, it is determined that the user identity verification fails, otherwise, the user identity verification is determined to be successful.
- the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
- the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal.
- the specified operating system has set the entry key
- the user may also be prompted to enter the entry key of the specified operating system.
- the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal when separated from the terminal. Improve the security of the terminal.
- selecting a specified operating system from the plurality of operating systems includes: selecting an operating system having the highest security level as the specified operating system according to a security level of the plurality of operating systems.
- the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
- the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
- determining, according to the information of the current identity card, whether the identity card in the terminal is replaced specifically: the specified operating system reads information of the current identity card, and Comparing the information of the current identity card with the information of the stored at least one identity card; and comparing each of the information of the current identity card with the stored information of the at least one identity card When the information of the card is different, it is determined that the identification card is replaced; in the comparison result, the information of the current identification card and the information of the stored at least one identification card are information of any identification card. When the same, it is determined that the identification card has not been replaced.
- the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
- the method further includes: after the terminal first inserts the identification card, the specified operating system reads the information of the current identification card, and stores the current Identification card information.
- the terminal after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
- the method further includes: storing information of the current identity card when the user identity verification succeeds, and not storing the information of the current identity card.
- the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
- the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server; when the specified operating system is detected When logging in to the account of the cloud server, the stored information of the current identification card is sent to the cloud server.
- the method further includes: determining whether the terminal is in a power-on state before automatically starting the data service of the terminal; and automatically opening the device when the terminal is not in the power-on state Said terminal.
- the terminal user may close the terminal.
- the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
- the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
- FIG. 2 shows a block diagram of an anti-theft tracking device of a terminal in accordance with an embodiment of the present invention.
- the anti-theft tracking device 200 of the terminal includes: a processing unit 202, when the terminal is powered on or when the terminal detects that an identification card is inserted, from the plurality of The operating system selects an operating system to read the information of the current identification card, and determines whether the identification card in the terminal is replaced according to the information of the current identification card; and the verification unit 204 determines that the result is When the identity card is replaced, the specified operating system is controlled to perform user identity verification; and the obtaining unit 206 controls the specified operating system to acquire the location information of the terminal and the multiple operating systems when the user identity verification fails.
- the communication information of the other operating system controls the specified operating system to automatically start the data service of the terminal, and attempts to send the location information and the communication information to the cloud server.
- the specified operating system such as the secure operating system in the dual system terminal
- the specified operating system is used.
- Obtaining information of the identity card in the terminal thereby determining whether the identity card is replaced, verifying the identity of the user of the terminal when the identity card is replaced, and selecting whether to obtain other operating systems according to the user identity verification result.
- the communication information such as when the user authentication fails, obtains the communication information, and then automatically starts the data service, and sends the communication information to the cloud server through the cloud account.
- the communication information includes location information of the terminal, an address book in the operating system, a call record, and the like.
- the designated operating system can be selected by the terminal, or the terminal can select according to the user's selection instruction.
- the owner of the terminal can obtain the location information and communication of the thief or the picker by logging in to the cloud server. Recording information, etc., so that the owner of the terminal can understand the real-time status information of the terminal in the case of being separated from the terminal, thereby improving the security of the terminal, thereby improving the user experience.
- the verification unit is specifically configured to: collect fingerprint information, voiceprint information, avatar information, and/or corneal information of the user of the terminal, and determine the fingerprint information, voiceprint information, and avatar. Whether the information and/or the corneal information matches the preset fingerprint information, the voiceprint information, the avatar information, and/or the cornea information, and when the judgment result is no, it is determined that the user identity verification fails; otherwise, the user identity verification is successful; or the prompt is determined; Determining the identity of the user when the user of the terminal inputs the entry key of the specified operating system and does not receive the correct entry key within a preset time, or the number of times the entry key is entered incorrectly exceeds a preset number of times The verification failed, otherwise, the user authentication is determined to be successful.
- the manner of verifying the identity of the user includes, but is not limited to, collecting information such as fingerprint information, voiceprint information, avatar information, and/or corneal information of the user, and then storing the collected information with the owner of the terminal.
- the fingerprint information, voiceprint information, avatar information, and/or corneal information are matched to determine whether the user of the terminal is the owner of the terminal.
- the specified operating system has set the entry key
- the user may also be prompted to enter the entry key of the specified operating system.
- the communication information of the acquisition terminal is uploaded to the cloud server, so that the owner of the terminal is aware of the real-time status information of the terminal when separated from the terminal. Improve the security of the terminal.
- the processing unit 202 includes: a selection unit 2022. Select, according to a security level of the multiple operating systems, an operating system having the highest security level as the specified operating system.
- the operating system with the highest security level (such as the secure operating system in the dual operating system) can be selected from multiple operating systems, and the foregoing operations are performed through the secure operating system. Thereby ensuring the security of the end user.
- the secure operating system due to the operation of the secure operating system, it is invisible in other operating system interfaces, so that the owner of the terminal can know the status information of the terminal without the thief or the unknowing person.
- the processing unit 202 includes: a comparing unit 2024, the specified operating system reads information of the current identity card, and the information of the current identity card and the stored at least one identity The information of the identification card is compared; the determining unit 2046 determines that the information of each of the identification cards is different when the comparison result is that the information of the current identification card and the stored information of the at least one identification card are different.
- the identification card is replaced, and when the comparison result is that the information of the current identification card is the same as the information of any of the stored identification cards of the at least one identification card, the identity identification card is determined. Not replaced.
- the owner of the terminal may use different identification cards at different times. Therefore, in order to reduce unnecessary communication information transmission operations, information of multiple identification cards may be stored in the designated operating system. When the identification card is replaced, it is determined whether the identification card is replaced according to the information of the stored plurality of identification cards.
- the first storage unit 210 controls the specified operating system to read the information of the current identification card, and stores the information when the terminal is powered on after the terminal is first inserted into the identification card. Current identification card information.
- the terminal after the terminal inserts the identification card for the first time and turns on the power, the terminal records the information of the identification card, and when determining whether the identification card is replaced later, the identification card is used as a judgment basis. Specifically, when neither the terminal nor the cloud server stores the information of the identity card, it may be determined that the terminal is inserted into the identity card for the first time.
- the method further includes: the second storage unit 212, when the user identity verification succeeds, storing the information of the current identity card, otherwise, not storing the information of the current identity card .
- the user identity verification succeeds, at this time, the user is the owner of the terminal, and the replacement of the identity identification card belongs to the normal replacement. At this time, the information of the identity identification card is stored, so as to be This identification card is used as a basis for judging whether or not the identification card is replaced.
- the method further includes: a login status determining unit 214, after the terminal stores the information of the current identity card, determining whether the specified operating system is logged into an account of the cloud server;
- the interaction unit 208 is further configured to: when detecting that the specified operating system logs in to the account of the cloud server, send the stored information of the current identification card to the cloud server.
- the method further includes: the state determining unit 216, before the data service of the terminal is automatically turned on, determining whether the terminal is in a power-on state; the opening unit 218, in the judgment result, that the terminal is not in the When the power is turned on, the terminal is automatically turned on.
- the terminal user may close the terminal.
- the designated operating system may also be automatically turned on, and automatically turned on after being turned on.
- the data service sends the communication information to the server, so that even when the terminal is powered off, the user can still know the real-time status information of the terminal, which further improves the security of the terminal.
- FIG. 3 shows a block diagram of a terminal in accordance with an embodiment of the present invention.
- a terminal 300 As shown in FIG. 3, a terminal 300 according to an embodiment of the present invention, a plurality of operating systems 302; and the anti-theft tracking device 200 of the terminal according to any one of the above aspects.
- the terminal 300 has the same technical effects as the anti-theft tracking device 200 of the terminal, and details are not described herein again.
- FIG. 4 shows a block diagram of a terminal in accordance with one embodiment of the present invention.
- the terminal 400 is composed of two systems, System A and System B.
- System A is the daily application system of the end user;
- system B is the security encryption system, and system B has the detection SIM (Subscriber Identity Module) / UIM (User Identity Module, User Identification Module) Whether the card is replaced, the data service is switched, the system A communication record is read, and the location of the terminal is determined.
- SIM Subscriber Identity Module
- UIM User Identity Module
- FIG. 5 shows a flow chart of setting a system B security policy in accordance with an embodiment of the present invention.
- the process of setting the security policy of the system B according to an embodiment of the present invention is as follows:
- step 502 the terminal is opened for the first time.
- step 504 it is determined whether there is a SIM/UIM (ie, identification card) card inserted.
- SIM/UIM ie, identification card
- Step 506 if there is a SIM/UIM card inserted, the system B reads the information of the SIM/UIM card in the terminal and saves it in the system B.
- step 508 it is determined whether the system B logs in to the cloud account.
- Step 510 If the system B logs in to the cloud account, the SIM/UIM card related information is uploaded to the cloud.
- FIG. 6 shows a detailed flow chart of an anti-theft tracking method of a terminal according to an embodiment of the present invention.
- the anti-theft tracking method of the terminal includes:
- step 602 the terminal is opened.
- system B determines if the SIM/UIM card has been replaced. When the result of the determination is YES, the process proceeds to step 606, otherwise the process ends.
- Step 606 When the SIM/UIM card of the terminal is replaced and powered on again, the system B determines whether the terminal user actively inputs the correct key and enters the system B within the preset time. If the determination result is yes, the process proceeds to step 608; otherwise, Proceed to step 610.
- Step 610 If the terminal user actively inputs the correct key and enters the system B within a predetermined time, the process of setting the system B security policy described in FIG. 5 is performed.
- Step 612 if the terminal user does not actively input the correct key and enters the system within a predetermined time System B, system B is switched to the normally open mode, that is, system B is automatically turned on, and there is no relevant boot prompt.
- step 614 system B starts the data service in the background.
- step 616 the system B automatically attempts to log in to the cloud client.
- the process proceeds to step 618. Otherwise, the process proceeds to step 620.
- step 618 the system B uploads the communication record, the location information, and the SIM/UIM card information of the terminal to the cloud server through the cloud client.
- Step 620 after a delay, re-enters step 614.
- the real-time status information of the terminal can be uploaded to the cloud server, so that the owner of the terminal logs in to the cloud account, and can read the communication record, location information, and SIM/UIM card information of the terminal saved in the cloud, and then This information can be used to track the location of the terminal and the identity of the end user.
- the technical solution of the present invention is described in detail above with reference to the accompanying drawings.
- information such as the location and communication record of the terminal can be automatically obtained, and the data service is automatically started and uploaded to the terminal.
- the cloud server enables the user to know the real-time status information of the terminal, and when the terminal is powered off, it can automatically boot and perform the above operations, thereby comprehensively improving the security of the terminal.
- a program product stored on a non-transitory machine readable medium for anti-theft tracking of a terminal comprising a machine for causing a computer system to perform the following steps Executing an instruction: when the terminal is powered on or when the terminal detects that an identification card is inserted, selecting a specified operating system from the plurality of operating systems to read information of the current identification card, and according to the current identity Determining, by the information of the identification card, whether the identification card in the terminal is replaced; when the determination result is that the identification card is replaced, the designated operating system performs user identity verification on the user of the terminal; When the verification fails, the specified operating system acquires location information of the terminal and communication information stored in other operating systems of the plurality of operating systems; the designated operating system automatically starts data services of the terminal, and attempts to The location information and the communication information are sent to a cloud server.
- a non-volatile machine readable medium storing a program product for terminal anti-theft tracking, the program product comprising machine executable instructions for causing a computer system to perform the following steps:
- the terminal is powered on or detects an identity at the terminal
- the designated operating system performs user identity verification on the user of the terminal; when the user identity verification fails, the specified operating system acquires location information of the terminal and Communication information stored in other operating systems of the plurality of operating systems; the designated operating system automatically turning on data services of the terminal, and attempting to send the location information and the communication information to a cloud server.
- a machine readable program the program causing a machine to perform an antitheft tracking method of a terminal according to any one of the above aspects.
- a storage medium storing a machine readable program, wherein the machine readable program causes a machine to perform an antitheft tracking method of a terminal according to any one of the technical solutions described above.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé de suivi anti-vol pour un terminal. Le terminal comprend une pluralité de systèmes d'exploitation. Le procédé comprend les étapes consistant à : lorsque le terminal démarre ou a détecté qu'une carte de reconnaissance d'identité est insérée, choisir un système d'exploitation attribué parmi plusieurs systèmes d'exploitation pour lire des informations concernant la carte de reconnaissance d'identité courante, et juger si la carte de reconnaissance d'identité dans le terminal a été changée en fonction des informations concernant la carte de reconnaissance d'identité courante; lorsque la carte de reconnaissance d'identité est changée, authentifier avec le système d'exploitation attribué, une identité d'un utilisateur; lorsque l'authentification de l'identité de l'utilisateur échoue, acquérir des informations de position concernant le terminal et les informations de communication stockées dans les autre systèmes d'exploitation parmi lesdits plusieurs systèmes d'exploitation; et démarrer automatiquement un service de données du terminal, et essayer d'envoyer les informations de position et les informations de communication à un serveur du cloud. L'invention concerne également un appareil de suivi anti-vol pour un terminal. Au moyen de la solution technique, un propriétaire du terminal peut apprendre des informations d'état en temps réel concernant le terminal dans le cas où il est séparé de celui-ci, et la sécurité du terminal est améliorée.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201480081585.2A CN106797535A (zh) | 2014-08-28 | 2014-08-28 | 终端及其防盗追踪方法和防盗追踪装置 |
PCT/CN2014/085461 WO2016029413A1 (fr) | 2014-08-28 | 2014-08-28 | Terminal, et procédé et appareil de suivi anti-vol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2014/085461 WO2016029413A1 (fr) | 2014-08-28 | 2014-08-28 | Terminal, et procédé et appareil de suivi anti-vol |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016029413A1 true WO2016029413A1 (fr) | 2016-03-03 |
Family
ID=55398625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/085461 WO2016029413A1 (fr) | 2014-08-28 | 2014-08-28 | Terminal, et procédé et appareil de suivi anti-vol |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106797535A (fr) |
WO (1) | WO2016029413A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112261099B (zh) * | 2020-10-15 | 2021-08-31 | 腾讯科技(深圳)有限公司 | 位置信息获取方法、装置和电子设备 |
CN115714809B (zh) * | 2021-08-19 | 2024-09-24 | 深圳市万普拉斯科技有限公司 | 移动终端追踪方法、移动终端及可读存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4265430B2 (ja) * | 2004-02-09 | 2009-05-20 | 日本電気株式会社 | 携帯端末装置 |
CN102790819A (zh) * | 2011-05-17 | 2012-11-21 | 芯讯通无线科技(上海)有限公司 | 保护隐私的移动终端和方法 |
CN103338295A (zh) * | 2013-05-27 | 2013-10-02 | 苏州奇可思信息科技有限公司 | 一种手机防盗安全系统 |
CN103369456A (zh) * | 2012-03-29 | 2013-10-23 | 英华达(上海)科技有限公司 | 手机防盗系统及其方法 |
CN103607697A (zh) * | 2013-11-27 | 2014-02-26 | 宇龙计算机通信科技(深圳)有限公司 | 基于sim卡的终端防盗方法和系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101198119B (zh) * | 2006-12-09 | 2012-02-29 | 北京三星通信技术研究有限公司 | 自动报失方法以及实现该方法的便携式终端 |
CN101340638A (zh) * | 2008-08-12 | 2009-01-07 | 青岛海信移动通信技术股份有限公司 | 一种移动通信设备的告警控制方法和移动通信设备 |
CN102932741A (zh) * | 2012-11-20 | 2013-02-13 | 青岛海信移动通信技术股份有限公司 | 手机防盗追踪方法及防盗追踪手机 |
CN103079203B (zh) * | 2013-02-05 | 2016-01-20 | 北京握奇数据系统有限公司 | 一种终端认证方法与智能卡 |
CN103780754B (zh) * | 2013-12-31 | 2016-07-06 | 闻泰通讯股份有限公司 | 手机防盗跟踪系统及方法 |
-
2014
- 2014-08-28 CN CN201480081585.2A patent/CN106797535A/zh active Pending
- 2014-08-28 WO PCT/CN2014/085461 patent/WO2016029413A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4265430B2 (ja) * | 2004-02-09 | 2009-05-20 | 日本電気株式会社 | 携帯端末装置 |
CN102790819A (zh) * | 2011-05-17 | 2012-11-21 | 芯讯通无线科技(上海)有限公司 | 保护隐私的移动终端和方法 |
CN103369456A (zh) * | 2012-03-29 | 2013-10-23 | 英华达(上海)科技有限公司 | 手机防盗系统及其方法 |
CN103338295A (zh) * | 2013-05-27 | 2013-10-02 | 苏州奇可思信息科技有限公司 | 一种手机防盗安全系统 |
CN103607697A (zh) * | 2013-11-27 | 2014-02-26 | 宇龙计算机通信科技(深圳)有限公司 | 基于sim卡的终端防盗方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
CN106797535A (zh) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10715520B2 (en) | Systems and methods for decentralized biometric enrollment | |
JP5727008B2 (ja) | オペレーティングシステムのロック解除方法及び移動電話機 | |
CN105468950B (zh) | 身份认证方法、装置、终端及服务器 | |
WO2017113380A1 (fr) | Procédé et appareil de reconnaissance d'empreintes digitales, et terminal à écran tactile | |
US9411946B2 (en) | Fingerprint password | |
US9716593B2 (en) | Leveraging multiple biometrics for enabling user access to security metadata | |
WO2016054263A1 (fr) | Appariement d'un dispositif biométrique | |
WO2016082229A1 (fr) | Procédé d'authentification d'identité et dispositif pouvant être porté | |
WO2015043224A1 (fr) | Procédé et appareil de connexion à un service, basés sur des informations tierces | |
CN109067881B (zh) | 远程授权方法及其装置、设备和存储介质 | |
CN107437016B (zh) | 应用控制方法及相关产品 | |
KR102124445B1 (ko) | 애플리케이션의 로그인 패스워드를 입력하기 위한 방법, 디바이스 및 단말기 | |
CN105006077A (zh) | 一种基于指纹识别的atm机安全操作方法、系统及atm机 | |
WO2017016032A1 (fr) | Procédé de vérification d'empreintes digitales, dispositif de vérification d'empreintes digitales et terminal | |
WO2016127448A1 (fr) | Procédé de changement de système, appareil de changement de système et terminal | |
JP2010191680A (ja) | 携帯通信端末、自動取引装置、自動取引システム、および自動取引方法。 | |
WO2016029413A1 (fr) | Terminal, et procédé et appareil de suivi anti-vol | |
CN112712373A (zh) | 电子烟验证方法、电子烟芯片、电子烟、终端设备和存储介质 | |
CN112714141A (zh) | 验证方法、芯片、电子烟、售卖设备、存储介质和计算设备 | |
JP2012234235A (ja) | 生体認証システムおよび生体認証方法 | |
KR101944698B1 (ko) | 컴퓨터 운영체제의 로그인 인증 결과를 이용한 싱글 사인 온 자동 로그인 방법 및 이를 적용한 컴퓨터로 읽을 수 있는 저장매체 | |
CN110084947B (zh) | 门禁信息更新方法、装置 | |
CN110867002A (zh) | 一种开门方式设置方法、智能锁及存储介质 | |
CN111079133A (zh) | 电子烟的童锁控制方法及系统 | |
CN110740043B (zh) | 一种智能密钥设备及其验证方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14900779 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14900779 Country of ref document: EP Kind code of ref document: A1 |