[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107590404A - Method for tracing and system and terminal device - Google Patents

Method for tracing and system and terminal device Download PDF

Info

Publication number
CN107590404A
CN107590404A CN201610534769.0A CN201610534769A CN107590404A CN 107590404 A CN107590404 A CN 107590404A CN 201610534769 A CN201610534769 A CN 201610534769A CN 107590404 A CN107590404 A CN 107590404A
Authority
CN
China
Prior art keywords
terminal device
information
tracking
user
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610534769.0A
Other languages
Chinese (zh)
Inventor
虞晨磊
黄铖斌
王锦华
匡华龙
姜钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201610534769.0A priority Critical patent/CN107590404A/en
Publication of CN107590404A publication Critical patent/CN107590404A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of method for tracing and system and terminal device, is related to mobile security field.Method for tracing therein includes:Terminal device snugly carries out authentication in response to default trigger condition to the user of currently used terminal device;Terminal device snugly gathers the information for following the trail of terminal device in the case of authentication is unsanctioned;Terminal device sends the information for being used to follow the trail of terminal device of collection, to follow the trail of terminal device.The present invention to the user of currently used terminal device by snugly carrying out authentication, and authentication not by when snugly gather the information for following the trail of terminal device and send, tracking can be completed in the case of stealer is unwitting, the vigilance of stealer is reduced, improves and loses the success rate that terminal device is recovered.

Description

Tracking method and system and terminal equipment
Technical Field
The present invention relates to the field of mobile security, and in particular, to a tracking method and a terminal device.
Background
Terminal devices such as mobile phones and tablet computers usually contain a large amount of personal information, so that it is important to ensure the safety of the terminal devices.
At present, after a terminal device is stolen, a thief often performs operations such as shutdown and account transfer in the first time. In the prior art, security verification means such as a shutdown password and a transfer password can be set, so that sensitive operations such as shutdown and transfer of a thief are prevented.
However, the arrangement of the security verification means is likely to make the thief who fails to input the password repeatedly more vigilant, thereby unplugging the battery to completely cut off the communication between the terminal device and the outside, and further being more unfavorable for recovering the stolen terminal device.
Disclosure of Invention
The embodiment of the invention aims to solve the technical problem that: the success rate of the lost terminal equipment being recovered is improved.
According to an aspect of an embodiment of the present invention, there is provided a tracking method, including: the terminal equipment responds to a preset trigger condition and carries out identity authentication on a user using the terminal equipment in a hidden manner; the method comprises the steps that the terminal equipment concealingly collects information used for tracking the terminal equipment under the condition that the terminal equipment fails in identity verification; and the terminal equipment sends the collected information for tracking the terminal equipment so as to track the terminal equipment.
In one embodiment, the terminal device performs a disguised display for disguising the true state of the terminal device in case the authentication fails.
In one embodiment, performing the disguised display comprises: the terminal device pretends to be shut down or pretends to be dead.
In one embodiment, the terminal device enters a power saving mode and shuts down other applications except for preset applications in the case that the authentication fails, wherein the preset applications include an application for collecting and transmitting information for tracking the terminal device.
In one embodiment, the preset trigger conditions include: the method comprises the steps that the terminal device detects preset user operation, or preset instructions received by the terminal device.
In one embodiment, the preset user operation includes at least one of a shutdown operation, a transfer operation, a payment operation, and a start operation of a preset application.
In one embodiment, the terminal device covertly authenticating the user currently using the terminal device includes: the terminal device concealingly starts a fingerprint identification function, concealingly captures fingerprint information of a user who uses the terminal device currently, and concealingly authenticates the user according to the captured fingerprint information and prestored fingerprint information, and/or the terminal device concealingly starts a camera, concealingly captures facial information of the user who uses the terminal device currently by using the camera, and concealingly authenticates the user according to the captured facial information and prestored facial information.
In one embodiment, the terminal device concealingly collects information for tracking the terminal device using at least one of the following methods: the terminal device concealingly opens the camera and acquires the video and/or image captured by the camera, or the terminal device concealingly opens the positioning function and acquires the current position information of the terminal device, or the terminal device concealingly opens the fingerprint identification function and concealingly captures the fingerprint information of the user who uses the terminal device.
According to a second aspect of the embodiments of the present invention, there is provided a terminal device, including: the hidden identity authentication module is used for responding to a preset trigger condition and carrying out identity authentication on a user using the terminal equipment in a hidden mode; the tracking information acquisition module is used for acquiring information for tracking the terminal equipment in a hidden manner under the condition that the identity authentication is not passed; and the tracking information sending module is used for sending the collected information for tracking the terminal equipment so as to track the terminal equipment.
In one embodiment, the terminal device further comprises a disguised display module for performing a disguised display for disguising the true state of the terminal device in case the authentication fails.
In one embodiment, the disguised display module includes a power-off disguising unit and/or a dead halt disguising unit; the shutdown disguising unit is used for disguising shutdown; the dead halt disguising unit is used for disguising dead halt.
In one embodiment, the terminal device further includes a power saving module for entering a power saving mode and turning off other applications except for a preset application in case the authentication fails, wherein the preset application includes an application for collecting and transmitting information for tracking the terminal device.
In one embodiment, the preset trigger conditions include: the method comprises the steps that the terminal device detects preset user operation, or preset instructions received by the terminal device.
In one embodiment, the preset user operation includes at least one of a shutdown operation, a transfer operation, a payment operation, and a start operation of a preset application.
In one embodiment, the hidden identity authentication module comprises a hidden fingerprint authentication unit and/or a hidden face authentication unit; the hidden fingerprint verification unit is used for opening a fingerprint identification function in a hidden mode, capturing fingerprint information of a user using the terminal equipment at present in a hidden mode, and verifying the identity of the user in a hidden mode according to the captured fingerprint information and prestored fingerprint information; the hidden face verification unit is used for opening the camera in a hidden mode, capturing face information of a user using the terminal equipment at present in the hidden mode through the camera, and performing identity verification on the user in the hidden mode according to the captured face information and pre-stored face information.
In one embodiment, the tracking information acquisition module comprises at least one of an image acquisition unit, a location acquisition unit, and a fingerprint acquisition unit; the image acquisition unit is used for opening the camera in a hidden mode and acquiring a video and/or an image captured by the camera; the position acquisition unit is used for opening a positioning function in a hidden mode and acquiring the current position information of the terminal equipment; the fingerprint acquisition unit is used for opening the fingerprint identification function in a hidden mode and capturing fingerprint information of a user using the terminal equipment at present in a hidden mode.
According to a third aspect of embodiments of the present invention, there is provided a tracking system including: the tracking platform is used for receiving information which is sent by the terminal device and used for tracking the terminal device, and tracking the terminal device according to the information which is used for tracking the terminal device.
According to the invention, the identity of the user using the terminal equipment at present is verified in a hidden manner, and the information for tracking the terminal equipment is collected in a hidden manner and sent out when the identity verification fails, so that the tracking can be completed under the condition that a thief does not know, the alertness of the thief is reduced, and the recovery success rate of the lost terminal equipment is improved.
Other features of the present invention and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flowchart of an embodiment of a tracking method of the present invention.
FIG. 2 is a flowchart illustrating another embodiment of the tracking method of the present invention.
FIG. 3 is a block diagram of one embodiment of the tracking system of the present invention.
Fig. 4 is a block diagram of an embodiment of a terminal device of the present invention.
Fig. 5 is a block diagram of another embodiment of the terminal device of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
FIG. 1 is a flowchart of an embodiment of a tracking method of the present invention. As shown in fig. 1, the method of this embodiment includes:
step S102, the terminal device responds to a preset trigger condition and carries out identity authentication on a user using the terminal device at present in a hidden manner.
The preset trigger condition may include the following two.
The first preset trigger condition is a preset user operation detected by the terminal device, and the trigger condition is based on a sensitive operation of a current user, and may include, for example: shutdown operation, transfer operation, payment operation, startup operation on a preset application, and the like.
At present, many thieves shut down the terminal equipment after acquiring the terminal equipment, so that the terminal equipment is disconnected from communication with other equipment. Therefore, hidden authentication can be performed on the current user when the shutdown operation is performed.
The operations of transfer, payment, etc. are operations that are closely related to the interests of the user. Thus, when such operations are performed, which may cause a loss to the owner of the terminal device, a hidden authentication of the current user is performed.
In addition, applications that the user pays more attention to, such as short messages, address lists, photos, chat applications and the like, can be preset according to needs. When the preset applications are started, the terminal device can be triggered to perform hidden authentication on the current user.
The second preset trigger condition is a preset instruction received by the terminal device. For example, if the owner or other people of the terminal detects that the terminal device is lost, a preset instruction may be sent to the terminal device through the tracking platform or other devices, so as to start the hidden authentication function of the terminal device.
The hidden authentication means that the authentication is performed without the current user's awareness. The traditional verification mode of inputting the password enables a stealer to clearly know the identity verification behavior which is currently carried out, and the stealer is enabled to improve the alertness. The hidden identity authentication mode adopted by the invention, such as fingerprint identification, face identification and the like, can prevent the thieves from being aware of the identity authentication operation currently carried out, thereby reducing the alertness of the thieves.
The process of identity verification by fingerprinting in hidden is described below. The terminal equipment firstly concealingly starts a fingerprint identification function, then concealingly captures fingerprint information of a user using the terminal equipment at present, and then concealingly verifies the identity of the user according to the captured fingerprint information and prestored fingerprint information.
The terminal device may set a fingerprint capturing function on a commonly used operation key, such as a power-off key, a volume key, a return key, and the like, and may also set a fingerprint capturing function at a commonly used position on the screen, such as a confirmation position and a return position in a commonly used application, a confirmation position on the screen when the terminal device is powered off, and the like. According to the requirement, the fingerprint capturing function can be arranged at other positions of the terminal equipment, and the description is omitted.
Because most users use fingers to click the terminal equipment, the fingerprint identification can effectively capture the identity information of the users without being perceived by the users.
The following describes a process of identity verification performed covertly by face recognition. The terminal equipment firstly concealingly starts the camera, then the camera is utilized to concealingly capture the face information of the user using the terminal equipment at present, and then the identity authentication is carried out on the user in a concealed manner according to the captured face information and the pre-stored face information.
When a user normally uses the mobile phone, the face can naturally appear in the range which can be captured by the camera, so that the identity information of the user can be effectively captured by face recognition under the condition that the user is not aware of the face recognition.
And step S104, the terminal equipment concealingly collects information for tracking the terminal equipment under the condition that the authentication is not passed.
Wherein the authentication fails, indicating that the user using the terminal device is likely not the owner at that time, thereby initiating the hidden tracking procedure. First, the information for tracking the terminal device is collected in a hidden manner, and the following information collection method may be adopted, for example.
One way of acquiring information is that a terminal device can turn on a camera in a hidden manner and acquire information such as video and images captured by the camera. When the camera is opened in the terminal equipment hidden mode, the screen of the terminal equipment cannot display any image, and the flash lamp cannot be started. That is, the user cannot know that the camera is turned on. Through the acquisition mode, the terminal equipment can acquire the surrounding environment information and even the face information of a thief.
Another information acquisition mode is that the terminal device concealingly starts the positioning function and acquires the current position information of the terminal device. When the positioning function is opened in a hidden manner, the screen does not display that the positioning function is already opened by the terminal device. Through the acquisition mode, the terminal equipment can acquire the current position in real time, and the positioning and tracking of the terminal equipment are facilitated.
In another information collecting mode, the terminal device concealingly activates the fingerprint recognition function and concealingly captures fingerprint information of a user currently using the terminal device. Through the acquisition mode, the identity of the thief can be acquired.
In addition to the above-described collection method, the terminal device may also collect sound information in a hidden manner through a microphone, speed information in a hidden manner through a sensor inside the mobile phone, and the like, and collect other information that may be used for tracking the terminal device.
The above-mentioned each collection mode can choose one to use, can choose multiple use too.
In addition, the terminal device may enter a power saving mode when the authentication fails, and turn off other applications except for preset applications, where the preset applications include an application that collects and transmits information for tracking the terminal device. Therefore, the endurance time of the terminal equipment is increased, so that the terminal equipment can acquire more information for tracking the terminal equipment.
And step S106, the terminal equipment sends the collected information for tracking the terminal equipment so as to track the terminal equipment.
For example, the terminal device may send the collected information for tracking the terminal device to a tracking platform or other preset terminals, so that the tracker may know the current state and environmental information of the terminal device, and so on, to track the terminal device.
The identity of the user using the terminal equipment at present is verified in a hidden mode, the information used for tracking the terminal equipment is collected in the hidden mode and sent out when the identity verification fails, tracking can be completed under the condition that a thief is unaware of the information, the alertness of the thief is reduced, and the success rate of the lost terminal equipment being recovered is improved.
In order to further prevent the thief from operating the terminal equipment and reduce the loss of the owner of the terminal equipment, the terminal equipment can also carry out disguised display when the identity authentication is not passed. As shown in fig. 2, on the basis of the embodiment shown in fig. 1, after step S102, the method of this embodiment further includes:
in step S203, the terminal device performs a disguised display for disguising the true state of the terminal device in the case where the authentication fails.
This step may be performed before or after step S104, or may be performed simultaneously.
The camouflage display may include the following two.
First, the terminal device pretends that it has entered an unavailable state.
The terminal device may disguise that it is off, for example, the screen may be turned off or a black screen may be displayed. At this time, the thief may think that the terminal device has completely disconnected from the communication with the other device, thereby further relaxing the vigilance.
The terminal device may also disguise a crash, for example, may display a pre-stored image or a captured current screen image. When the terminal device displays a screen, a virus, continuously refreshes a connection or displays that the current operation is still, the current user can consider the problem of the mobile phone system, but the reason that the authentication is not passed is difficult to be imagined.
Secondly, the terminal device displays false results aiming at the operation of the user.
For example, for the operation of disconnecting the network, transferring money, and the like of the current user, the terminal device may not actually perform the operation, but displays the result of successful operation, so that the current user may misunderstand that the operation has been successful.
Therefore, the method can prevent the thief from further operation, reduce the loss of the terminal equipment owner, keep the communicable state of the terminal equipment and be beneficial to improving the success rate of tracking.
An application example of the tracking method of the present invention is described below.
Aiming at the behavior that a thief immediately shuts down after stealing the terminal equipment, the triggering condition of the hiding tracking is set as shutdown operation. After detecting the shutdown operation of the user, the terminal equipment performs fingerprint verification on the user using the terminal equipment at present in a hidden way; then, the terminal device can close the screen to confuse a thief and can close other applications except for preset applications to increase the endurance time of the terminal device under the condition that the identity authentication fails, wherein the preset applications comprise applications for collecting and sending information for tracking the terminal device; finally, the terminal concealingly collects information for tracking the terminal device, for example, information such as a position, a face, or an image of the environment, and sends the collected information for tracking the terminal device, so as to track the terminal device.
By adopting the method, the thief can misunderstand that the terminal equipment is closed, and the terminal equipment can acquire information such as position, image, fingerprint and the like under the condition that the thief is unaware, so that the success rate of recovering the terminal equipment is greatly improved.
A tracking system of one embodiment of the present invention is described below with reference to fig. 3.
FIG. 3 is a block diagram of one embodiment of the tracking system of the present invention. As shown in fig. 3, the system of this embodiment includes: the tracking platform 34 is configured to receive information used for tracking the terminal device and sent by the terminal device, and track the terminal device according to the information used for tracking the terminal device. .
A terminal device of one embodiment of the present invention is described below with reference to fig. 4.
Fig. 4 is a block diagram of an embodiment of a terminal device of the present invention. As shown in fig. 4, the terminal device 32 of this embodiment includes: a hidden identity authentication module 422, configured to perform identity authentication on a user currently using the terminal device in a hidden manner in response to a preset trigger condition; a tracking information collecting module 424, configured to concealably collect information for tracking the terminal device when the authentication fails; and a tracking information sending module 426, configured to send the collected information for tracking the terminal device so as to track the terminal device 32.
The identity of the user using the terminal equipment at present is verified in a hidden mode, the information used for tracking the terminal equipment is collected in the hidden mode and sent out when the identity verification fails, tracking can be completed under the condition that a thief is unaware of the information, the alertness of the thief is reduced, and the success rate of the lost terminal equipment being recovered is improved.
The preset trigger condition may include: the method comprises the steps that the terminal device detects preset user operation, or preset instructions received by the terminal device.
The preset user operation comprises at least one of shutdown operation, transfer operation, payment operation and starting operation of a preset application.
A terminal device of another embodiment of the present invention is described below with reference to fig. 5.
Fig. 5 is a block diagram of another embodiment of the terminal device of the present invention. As shown in fig. 5, the terminal device 32 of this embodiment further includes a disguise display module 528 for performing a disguise display for disguising the true state of the terminal device 32 in the case where the authentication is not passed. Therefore, the module can prevent the thief from further operating, reduce the loss of the terminal equipment owner, keep the communicable state of the terminal equipment and be beneficial to improving the success rate of tracking.
The disguised display module may include a power-off disguise unit 5282 and/or a dead halt disguise unit 5284; the shutdown disguising unit is used for disguising shutdown; the dead halt disguising unit is used for disguising dead halt.
In addition, the terminal device 32 may further include a power saving module 529 for, in the case that the authentication fails, turning off other applications except for a preset application including an application that collects and transmits information for tracking the terminal device, so as to enable the terminal device 32 to enter the power saving mode. Therefore, the endurance time of the terminal equipment is increased, so that the terminal equipment can acquire more information for tracking the terminal equipment.
Wherein, the hidden identity verification module 422 comprises a hidden fingerprint verification unit 5222 and/or a hidden face verification unit 5224; the hidden fingerprint verification unit 5222 is configured to covertly activate a fingerprint identification function, covertly capture fingerprint information of a user currently using the terminal device 32, and covertly perform identity verification on the user according to the captured fingerprint information and pre-stored fingerprint information; the hidden face verification unit 5224 is configured to turn on the camera in a hidden manner, capture face information of a user currently using the terminal device 32 in a hidden manner using the camera, and perform authentication of the user in a hidden manner based on the captured face information and pre-stored face information.
Because the user mostly uses fingers to click the terminal equipment, and when the mobile phone is used, the face can naturally appear in the range which can be captured by the camera, the fingerprint identification and the face identification can effectively capture the identity information of the user without being perceived by the user.
The tracking information collecting module 424 includes at least one of an image collecting unit 5242, a position collecting unit 5244 and a fingerprint collecting unit 5246. The image acquisition unit 5242 is used to turn on the camera in a hidden manner and acquire a video and/or an image captured by the camera; the position acquisition unit 5244 is configured to hide and open a positioning function, and acquire current position information of the terminal device; the fingerprint collection unit 5246 is used to covertly turn on the fingerprint recognition function and covertly capture fingerprint information of a user who is currently using the terminal device. By adopting the module, information such as images, positions, fingerprints and the like can be acquired, and the lost terminal equipment can be recovered.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (17)

1. A method of tracking, comprising:
the terminal equipment responds to a preset trigger condition and carries out identity authentication on a user using the terminal equipment in a hidden mode;
the method comprises the steps that the terminal equipment concealingly collects information used for tracking the terminal equipment under the condition that the terminal equipment fails in identity verification;
and the terminal equipment sends the collected information for tracking the terminal equipment so as to track the terminal equipment.
2. The method according to claim 1, characterized in that the terminal device performs a disguised display for disguising the true state of the terminal device in case of failed authentication.
3. The method of claim 2, wherein the performing a tricky display comprises:
the terminal device pretends to be shut down or pretends to be dead.
4. The method according to claim 1, wherein the terminal device enters a power saving mode and shuts down other applications except for a predetermined application in case of failed authentication, wherein the predetermined application includes an application for collecting and transmitting information for tracking the terminal device.
5. The method of claim 1, wherein the preset trigger condition comprises: the method comprises the steps that the terminal device detects preset user operation, or preset instructions received by the terminal device.
6. The method of claim 5, wherein the preset user operation comprises at least one of a shutdown operation, a transfer operation, a payment operation, and a start operation of a preset application.
7. The method according to any of claims 1-6, wherein the terminal device covertly authenticating the user currently using the terminal device comprises:
the terminal device concealingly starts a fingerprint recognition function, concealingly captures fingerprint information of a user currently using the terminal device, concealingly authenticates the user based on the captured fingerprint information and pre-stored fingerprint information,
and/or the presence of a gas in the gas,
the method comprises the steps that the camera is opened in a hidden mode by the terminal device, the camera is used for capturing face information of a user using the terminal device at present in a hidden mode, and identity authentication is carried out on the user in a hidden mode according to the captured face information and pre-stored face information.
8. The method according to any of claims 1-6, wherein the terminal device concealingly collects information for tracking the terminal device using at least one of the following methods:
the terminal device concealingly turns on the camera and acquires the video and/or image captured by the camera,
or,
the terminal device concealingly starts a positioning function and acquires current position information of the terminal device,
or,
the terminal device concealingly starts a fingerprint recognition function and concealingly captures fingerprint information of a user who is currently using the terminal device.
9. A terminal device, comprising:
the hidden identity authentication module is used for responding to a preset trigger condition and carrying out identity authentication on a user who uses the terminal equipment in a hidden mode;
the tracking information acquisition module is used for acquiring information for tracking the terminal equipment in a hidden manner under the condition that the identity authentication is not passed;
and the tracking information sending module is used for sending the collected information for tracking the terminal equipment so as to track the terminal equipment.
10. The terminal device according to claim 9, further comprising a disguised display module for performing a disguised display for disguising an authentic state of the terminal device in a case where authentication is not passed.
11. The terminal device according to claim 10, wherein the disguised display module comprises a power-off disguise unit and/or a dead halt disguise unit;
the shutdown disguising unit is used for disguising shutdown;
the dead halt disguising unit is used for disguising dead halt.
12. The terminal device according to claim 10, further comprising a power saving module, configured to, in a case that the authentication fails, turn off other applications except for a preset application, so that the terminal device enters a power saving mode, where the preset application includes an application that collects and transmits information for tracking the terminal device.
13. The terminal device according to claim 9, wherein the preset trigger condition comprises: the method comprises the steps that the terminal device detects preset user operation, or preset instructions received by the terminal device.
14. The terminal device according to claim 13, wherein the preset user operation includes at least one of a power-off operation, a transfer operation, a payment operation, and a start-up operation for a preset application.
15. The terminal device according to claims 9-14, wherein the hidden identity verification module comprises a hidden fingerprint verification unit and/or a hidden face verification unit;
the hidden fingerprint verification unit is used for opening a fingerprint identification function in a hidden mode, capturing fingerprint information of a user using the terminal equipment at present in a hidden mode, and verifying the identity of the user in a hidden mode according to the captured fingerprint information and pre-stored fingerprint information;
the hidden face verification unit is used for opening the camera in a hidden mode, capturing face information of a user using the terminal equipment at present in the hidden mode through the camera, and carrying out identity verification on the user in the hidden mode according to the captured face information and pre-stored face information.
16. The terminal device according to claims 9-14, wherein the tracking information acquisition module comprises at least one of an image acquisition unit, a location acquisition unit, and a fingerprint acquisition unit;
the image acquisition unit is used for opening the camera in a hidden mode and acquiring a video and/or an image captured by the camera;
the position acquisition unit is used for opening a positioning function in a hidden mode and acquiring the current position information of the terminal equipment;
the fingerprint acquisition unit is used for opening a fingerprint identification function in a hidden mode and capturing fingerprint information of a user using the terminal equipment at present in a hidden mode.
17. A tracking system, comprising:
the terminal device of any one of claims 9-16,
and the tracking platform is used for receiving the information which is sent by the terminal equipment and used for tracking the terminal equipment, and tracking the terminal equipment according to the information used for tracking the terminal equipment.
CN201610534769.0A 2016-07-08 2016-07-08 Method for tracing and system and terminal device Pending CN107590404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610534769.0A CN107590404A (en) 2016-07-08 2016-07-08 Method for tracing and system and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610534769.0A CN107590404A (en) 2016-07-08 2016-07-08 Method for tracing and system and terminal device

Publications (1)

Publication Number Publication Date
CN107590404A true CN107590404A (en) 2018-01-16

Family

ID=61046546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610534769.0A Pending CN107590404A (en) 2016-07-08 2016-07-08 Method for tracing and system and terminal device

Country Status (1)

Country Link
CN (1) CN107590404A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537061A (en) * 2018-04-17 2018-09-14 辽宁工程技术大学 A kind of financial data security system
CN109886004A (en) * 2019-04-03 2019-06-14 山东超越数控电子股份有限公司 Using the method and device for the protection data in magnetic disk that a variety of authentication modes combine
CN110490038A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of intelligence screen figure acquisition system
CN110619241A (en) * 2019-09-19 2019-12-27 中国联合网络通信集团有限公司 Terminal protection method and device
CN112492587A (en) * 2020-11-26 2021-03-12 珠海格力电器股份有限公司 Personal information protection method and system
CN113312106A (en) * 2021-06-10 2021-08-27 浙江网商银行股份有限公司 Data processing method and device
CN115623114A (en) * 2022-09-28 2023-01-17 中富通集团股份有限公司 Safety monitoring method for electronic equipment and application thereof in mobile phone loss and theft prevention

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573645A (en) * 2014-12-30 2015-04-29 苏州福丰科技有限公司 Face identification method for anti-theft mobile phone
CN104899490A (en) * 2015-05-27 2015-09-09 广东欧珀移动通信有限公司 Terminal positioning method and user terminal
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft
CN104573645A (en) * 2014-12-30 2015-04-29 苏州福丰科技有限公司 Face identification method for anti-theft mobile phone
CN104899490A (en) * 2015-05-27 2015-09-09 广东欧珀移动通信有限公司 Terminal positioning method and user terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537061A (en) * 2018-04-17 2018-09-14 辽宁工程技术大学 A kind of financial data security system
CN109886004A (en) * 2019-04-03 2019-06-14 山东超越数控电子股份有限公司 Using the method and device for the protection data in magnetic disk that a variety of authentication modes combine
CN110490038A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of intelligence screen figure acquisition system
CN110619241A (en) * 2019-09-19 2019-12-27 中国联合网络通信集团有限公司 Terminal protection method and device
CN112492587A (en) * 2020-11-26 2021-03-12 珠海格力电器股份有限公司 Personal information protection method and system
CN112492587B (en) * 2020-11-26 2022-10-11 珠海格力电器股份有限公司 Personal information protection method and system
CN113312106A (en) * 2021-06-10 2021-08-27 浙江网商银行股份有限公司 Data processing method and device
CN115623114A (en) * 2022-09-28 2023-01-17 中富通集团股份有限公司 Safety monitoring method for electronic equipment and application thereof in mobile phone loss and theft prevention

Similar Documents

Publication Publication Date Title
CN107590404A (en) Method for tracing and system and terminal device
US11093731B2 (en) Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems
Wu et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
US8508338B1 (en) Method and system for defeat of replay attacks against biometric authentication systems
CN104850771B (en) A kind of indentity identifying method and relevant device
CN109600519B (en) Mobile phone control method and system
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
US20150113616A1 (en) Mobile device-based authentication with enhanced security measures
WO2016015551A1 (en) Method and system for improving safety of mobile terminal
US20140201537A1 (en) Mobile device-based authentication with enhanced security measures providing feedback on a real time basis
CN104008321A (en) Judging method and judging system for identifying user right based on fingerprint for mobile terminal
CN108664784A (en) Alarm method, apparatus and system
CN105760734A (en) Safety protection method for terminal and terminal equipment
CN104700050A (en) Mobile terminal safety positioning method and device
CN108600504B (en) Electronic equipment and alarm control method
CN105187640A (en) Anti-theft method and system of mobile terminal
CN105913513A (en) Control method and system for door lock system
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
WO2016115760A1 (en) Terminal system control method, device, and terminal
CN111901567A (en) Privacy protection method, device, equipment and computer readable storage medium
CN108347730B (en) Wireless communication processing method and device
JP6809741B1 (en) Information equipment equipment, information equipment equipment programs, and methods for preventing unauthorized access to information equipment equipment
TW201833759A (en) Contact information display method and device, and information display method and device
CN111985401A (en) Area monitoring method, system, machine readable medium and equipment
CN107992733B (en) Intelligent terminal and safety unlocking method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180116