CN102446249A - Electronic device and method for acquiring illegal user information of same - Google Patents
Electronic device and method for acquiring illegal user information of same Download PDFInfo
- Publication number
- CN102446249A CN102446249A CN201010509998XA CN201010509998A CN102446249A CN 102446249 A CN102446249 A CN 102446249A CN 201010509998X A CN201010509998X A CN 201010509998XA CN 201010509998 A CN201010509998 A CN 201010509998A CN 102446249 A CN102446249 A CN 102446249A
- Authority
- CN
- China
- Prior art keywords
- user
- electronic installation
- image
- validated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses an electronic device, which is provided with an image shooting device. The electronic device comprises a shooting module, an analyzing module and an executing module, wherein the shooting module is used for controlling the image shooting device to shoot an image on a user using the electronic device when the electronic device is started, acquiring the image of he user, and judging whether a preset legal user image is stored in a memory of the electronic device; the analyzing module is used for performing comparing analysis on the shot user image and the legal user image when the legal user image is stored in the memory, and judging whether the user is the legal user or an illegal user of the electronic device according to an analysis result; and the executing module is used for sending an abnormal notification mail to a preset electronic mailbox or a cell phone when the user is judged to be the illegal user of the electronic device. The invention further provides a method for acquiring the illegal user information of the electronic device.
Description
Technical field
The present invention relates to a kind of electronic installation and obtain the method for its disabled user's information.
Background technology
Electronic installation situation stolen or that lose such as notebook computer, net book and PDA happen occasionally.If can be at these electronic installations stolen or lose after obtain the thief or the person's of picking up relevant information (like image information), just can effectively help the owner of electronic installation to give electronic installation stolen or that lose for change.Therefore, how at electronic installation stolen or lose after obtain the thief or the person of picking up information be the problem that the present utmost point need solve.
Summary of the invention
In view of above content, be necessary to provide a kind of electronic installation, its can be at this electronic installation stolen or lose after, obtain the disabled user's of this electronic installation information automatically, and the information that obtains be sent in the preset E-mail or mobile phone.
In addition; Also be necessary to provide a kind of method that obtains disabled user's information of above-mentioned electronic installation; It can be at this electronic installation stolen or lose after, obtain the disabled user's of this electronic installation information automatically, and the information that obtains be sent in the preset E-mail or mobile phone.
Said electronic installation is equipped with device for filming image.This electronic installation comprises: taking module; Be used for when electronic installation starts; Control said device for filming image the user who uses this electronic installation is taken, obtain this user's image, and judge in the storer of this electronic installation whether have predefined validated user image; Analysis module; Be used for when said storer has said validated user image; The user's that said shooting is obtained image and this validated user image compare analysis, and judge that according to analysis result this user is the validated user or the disabled user of electronic installation; Execution module is used for when judging that said user is the disabled user of electronic installation, sends unusual circular mail to E-mail of presetting or mobile phone.
The said method that obtains electronic installation disabled user information, this electronic installation is equipped with device for filming image.The method comprising the steps of: when electronic installation starts, control said device for filming image the user who uses this electronic installation is taken, obtain this user's image, and judge in the storer of this electronic installation whether have predefined validated user image; When having said validated user image in the said storer, the user's that said shooting is obtained image and this validated user image compare analysis, and judge that according to analysis result this user is the validated user or the disabled user of electronic installation; When judging that said user is the disabled user of electronic installation, send unusual circular mail to preset E-mail or mobile phone.
Compared to prior art; Said electronic installation and obtain the method for its disabled user's information; Can be at this electronic installation stolen or lose after, obtain the disabled user's of this electronic installation information automatically, and the information that this is obtained be sent in the preset E-mail or mobile phone.The present invention can effectively help the owner of said electronic installation to give electronic installation stolen or that lose for change.
Description of drawings
Fig. 1 is the Organization Chart of electronic installation in the preferred embodiment of the present invention.
Fig. 2 is that device for filming image is installed on the synoptic diagram on the electronic installation in the preferred embodiment of the present invention.
Fig. 3 is the process flow diagram that the present invention obtains the method for electronic installation disabled user information.
The main element symbol description
|
1 |
Device for |
10 |
|
11 |
|
12 |
|
101 |
Taking |
102 |
|
103 |
|
104 |
|
105 |
Embodiment
As shown in Figure 1, be the Organization Chart of electronic installation in the preferred embodiment of the present invention.In the present embodiment, this electronic installation 1 comprises device for filming image 10, processor 11, storer 12, setting module 101, taking module 102, analysis module 103, execution module 104 and authentication module 105.Said electronic installation 1 can be, but be not limited to portable electron devices such as notebook computer, net book or PDA.
Said device for filming image 10 is used for when said electronic installation 1 starts, the user who uses this electronic installation 1 being taken, to obtain this user's image.It can be a charge-coupled device (CCD) (Charge Coupled Device, CCD).With reference to shown in Figure 2, for device for filming image 10 is installed on the synoptic diagram on the electronic installation 1.This device for filming image 10 can be installed on the electronic installation 1 position of conveniently obtaining user image arbitrarily, as be installed in electronic installation shown in Figure 21 display screen directly over.
Said setting module 101, taking module 102, analysis module 103, execution module 104 and authentication module 105 all are installed in the said storer 12 with the form of software program or instruction; Or solidify in the operating system of this electronic installation 1, and carry out by said processor 11.Below in conjunction with Fig. 3 above each module is carried out detailed description.
As shown in Figure 3, be the process flow diagram of the method for the present invention's disabled user's information of obtaining electronic installation.
Step S1, said electronic installation 1 normally starts.
Step S2,10 pairs of the said device for filming image of said taking module 102 controls use the user of this electronic installation 1 to take, and obtain this user's image.
Step S3; Said taking module 102 judges whether there is predefined validated user image in the said storer 12; If have predefined validated user image in this storer 12, execution in step S31 then, otherwise; If do not have predefined validated user image in this storer 12, then execution in step S32.In the present embodiment, said validated user is meant the owner of this electronic installation 1, and this validated user image can be set by said setting module 101 in advance.This setting module 101 can be set one or more images as said validated user image.In other embodiments, this setting module 101 also can set this electronic installation 1 possessory relatives or friend's image as said validated user image.
Step S31, said analysis module 103 compares analysis with said user's the image and the validated user image of said setting.And in step S33, this analysis module 103 judges that according to analysis result this user is the validated user or the disabled user of electronic installation 1, if this user is the validated user of electronic installation 1; Execution in step S35 then; Otherwise, if this user is the disabled user of electronic installation 1, execution in step S4 then.
In the present embodiment, this analysis module 103 can adopt facial recognition techniques that said user's image and said validated user image are compared analysis, judges validated user or the disabled user of this user for electronic installation 1.Particularly; The face feature (like features of skin colors, textural characteristics etc.) that this analysis module 103 can extract in the user's that said shooting obtains the image compares with face feature in the said validated user image; If face feature and the face feature in the said validated user image in this user's the image are same or similar; Then judge the validated user of this user for electronic installation 1, otherwise, then judge the disabled user of this user for this electronic installation 1.Here, stolen or when losing when this electronic installation 1, steal the thief of this electronic installation 1 or pick up the person of this electronic installation 1 and be the disabled user.Validated user can be arbitrary user of owner's setting of this electronic installation 1, and it should not comprise the said thief and the person of picking up.
Step S32, said authentication module 105 receives the authentication password of user's (for example 5 minutes) input in a schedule time.And in step S34; This authentication module 105 judges whether this user has imported correct authentication password in this schedule time; If the user imported correct authentication password in this schedule time, execution in step S35 then, otherwise; If this user is the correct authentication password of input, then execution in step S4 in this schedule time not.
In the present embodiment, if there is not the validated user image of electronic installation 1 in the said storer 12, needs said user in the said schedule time, to import correct authentication password and carry out normally to use electronic installation 1 after the validated user authentication.When said authentication password can be by just subnormal this electronic installation 1 of use of the owner of electronic installation 1, set in advance through said setting module 101, and can when follow-up use, make amendment.This authentication password can be, but be not limited to one section authorization information such as character string that this possessory fingerprint, vocal print or this owner set.
Step S35, said electronic installation 1 normally moves, and said user can normally use this electronic installation 1, process ends.
Step S4, said execution module 104 send unusual circular mail to preset E-mail or mobile phone.Wherein, this content of circulating a notice of mail unusually comprises the user's that said shooting obtains image (said disabled user's image), the shooting time of this image and the information such as IP address of electronic installation 1.The address of said preset E-mail and the number of mobile phone can be set by said setting module 101 in advance, the address of these setting module 101 predeterminable one or more E-mails and one or more phone number, and be kept in the said storer 12.This execution module 104 can be sent to said unusual circular mail in this preset E-mail through wireless network or cable network, or sends in the pairing mobile phone of said preset phone number with the mode of multimedia message.If this electronic installation 1 fails to connect network, this execution module 104 can be treated to send after this electronic installation 1 connects to network earlier with being temporarily stored in the said storer 12 by unusual circular mail again.
In preferred embodiment of the present invention; After said unusual circular mail is sent in said E-mail or the mobile phone; According to the possessory wish of this electronic installation 1, said electronic installation 1 can be set continue to keep normal running status, this electronic installation 1 perhaps is set restarts or close.
In sum; When the user who uses electronic installation 1 is the disabled user of this electronic installation 1; The present invention can be sent to this disabled user's image, the shooting time of this image and the information such as IP address of electronic installation 1 in the said preset E-mail or mobile phone; Thereby make this electronic installation 1 stolen or lose after, the owner can obtain disabled user (thief or the person's of picking up) important informations such as image easily, extends efficient help to giving electronic installation 1 stolen or that lose for change.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although the present invention is specified with reference to preferred embodiment; Those of ordinary skill in the art is to be understood that; Can make amendment or be equal to replacement technical scheme of the present invention, and not break away from the spirit and the scope of technical scheme of the present invention.
Claims (9)
1. electronic installation, this electronic installation is equipped with device for filming image, it is characterized in that, and this electronic installation comprises:
Taking module is used for when electronic installation starts, and controls said device for filming image the user who uses this electronic installation is taken, and obtains this user's image, and judges in the storer of this electronic installation whether have predefined validated user image;
Analysis module; Be used for when said storer has said validated user image; The user's that said shooting is obtained image and this validated user image compare analysis, and judge that according to analysis result this user is the validated user or the disabled user of electronic installation; And
Execution module is used for when judging that said user is the disabled user of electronic installation, sends unusual circular mail to E-mail of presetting or mobile phone.
2. electronic installation as claimed in claim 1 is characterized in that, the content of said unusual circular mail comprises the user's that said shooting obtains image, the shooting time of this image and the IP address of this electronic installation.
3. electronic installation as claimed in claim 1 is characterized in that, this electronic installation also comprises:
Authentication module is used for when said storer does not have said validated user image, receiving the authentication password that the user imports in a schedule time, and judging whether this user has imported correct authentication password in this schedule time.
4. electronic installation as claimed in claim 3 is characterized in that, said execution module also is used for when the said user authentication password that input is incorrect in the said schedule time, sending in said unusual circular mail to the said preset E-mail or mobile phone.
5. electronic installation as claimed in claim 3 is characterized in that, this electronic installation also comprises:
Setting module; Be used to set the address of said validated user image, said authentication password, said E-mail and the number of said mobile phone, and validated user image, authentication password, the address of E-mail and the number of mobile phone set are kept in the said storer.
6. method that obtains electronic installation disabled user information, this electronic installation is equipped with device for filming image, it is characterized in that, and the method comprising the steps of:
When electronic installation starts, control said device for filming image the user who uses this electronic installation is taken, obtain this user's image, and judge in the storer of this electronic installation whether have predefined validated user image;
When having said validated user image in the said storer, the user's that said shooting is obtained image and this validated user image compare analysis, and judge that according to analysis result this user is the validated user or the disabled user of electronic installation; And
When judging that said user is the disabled user of electronic installation, send unusual circular mail to preset E-mail or mobile phone.
7. the method that obtains electronic installation disabled user information as claimed in claim 6 is characterized in that, the content of said unusual circular mail comprises the user's that said shooting obtains image, the shooting time of this image and the IP address of this electronic installation.
8. the method that obtains electronic installation disabled user information as claimed in claim 6 is characterized in that, this method also comprises step:
When not having said validated user image in the said storer, receive the authentication password that the user imports in a schedule time, and judge whether this user has imported correct authentication password in this schedule time; And
When the said user authentication password that input is incorrect in the said schedule time, send in said unusual circular mail to the said preset E-mail or mobile phone.
9. the method that obtains electronic installation disabled user information as claimed in claim 8 is characterized in that, this method also comprises step:
Set the address of said validated user image, said authentication password, said E-mail and the number of said mobile phone, and validated user image, authentication password, the address of E-mail and the number of mobile phone set are kept in the said storer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010509998XA CN102446249A (en) | 2010-10-15 | 2010-10-15 | Electronic device and method for acquiring illegal user information of same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010509998XA CN102446249A (en) | 2010-10-15 | 2010-10-15 | Electronic device and method for acquiring illegal user information of same |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102446249A true CN102446249A (en) | 2012-05-09 |
Family
ID=46008741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010509998XA Pending CN102446249A (en) | 2010-10-15 | 2010-10-15 | Electronic device and method for acquiring illegal user information of same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102446249A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850771A (en) * | 2015-04-30 | 2015-08-19 | 广东欧珀移动通信有限公司 | Identity verification method and related equipment |
CN104915601A (en) * | 2014-03-12 | 2015-09-16 | 三星电子株式会社 | System and method of encrypting folder in device |
CN105243317A (en) * | 2015-10-27 | 2016-01-13 | 上海斐讯数据通信技术有限公司 | Electronic device and decryption method therefor |
CN106055949A (en) * | 2016-05-26 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | System access and authorization method and device |
CN106529254A (en) * | 2016-11-08 | 2017-03-22 | 河南工业大学 | Convenient and safe password management method and system |
CN107690019A (en) * | 2016-08-03 | 2018-02-13 | 中国电信股份有限公司 | Terminal monitoring method and device |
CN108804892A (en) * | 2017-04-28 | 2018-11-13 | 广达电脑股份有限公司 | Electronic device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1589044A (en) * | 2004-08-23 | 2005-03-02 | 大唐微电子技术有限公司 | Digital mobile phone with anti-rob and tracking function and its anti-rob and tracking method |
CN1662022A (en) * | 2004-02-26 | 2005-08-31 | 日本电气株式会社 | Mobile phone with restriction on use thereof and method for restricting use of mobile phone |
CN1753524A (en) * | 2004-09-24 | 2006-03-29 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN1769107A (en) * | 2004-11-03 | 2006-05-10 | 上海杰得微电子有限公司 | Automobile anti-theft method based on human face identification technology |
CN101309479A (en) * | 2008-06-25 | 2008-11-19 | 宇龙计算机通信科技(深圳)有限公司 | Anti-theft mobile terminal and anti-theft method |
CN101556635A (en) * | 2009-05-15 | 2009-10-14 | 西安擎天软件科技有限公司 | Antitheft tracing method for ensuring computer security based on Internet |
-
2010
- 2010-10-15 CN CN201010509998XA patent/CN102446249A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1662022A (en) * | 2004-02-26 | 2005-08-31 | 日本电气株式会社 | Mobile phone with restriction on use thereof and method for restricting use of mobile phone |
CN1589044A (en) * | 2004-08-23 | 2005-03-02 | 大唐微电子技术有限公司 | Digital mobile phone with anti-rob and tracking function and its anti-rob and tracking method |
CN1753524A (en) * | 2004-09-24 | 2006-03-29 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN1769107A (en) * | 2004-11-03 | 2006-05-10 | 上海杰得微电子有限公司 | Automobile anti-theft method based on human face identification technology |
CN101309479A (en) * | 2008-06-25 | 2008-11-19 | 宇龙计算机通信科技(深圳)有限公司 | Anti-theft mobile terminal and anti-theft method |
CN101556635A (en) * | 2009-05-15 | 2009-10-14 | 西安擎天软件科技有限公司 | Antitheft tracing method for ensuring computer security based on Internet |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915601A (en) * | 2014-03-12 | 2015-09-16 | 三星电子株式会社 | System and method of encrypting folder in device |
US9817990B2 (en) | 2014-03-12 | 2017-11-14 | Samsung Electronics Co., Ltd. | System and method of encrypting folder in device |
US10521602B2 (en) | 2014-03-12 | 2019-12-31 | Samsung Electronics Co., Ltd. | System and method of encrypting folder in device |
CN104850771A (en) * | 2015-04-30 | 2015-08-19 | 广东欧珀移动通信有限公司 | Identity verification method and related equipment |
CN105243317A (en) * | 2015-10-27 | 2016-01-13 | 上海斐讯数据通信技术有限公司 | Electronic device and decryption method therefor |
CN106055949A (en) * | 2016-05-26 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | System access and authorization method and device |
CN107690019A (en) * | 2016-08-03 | 2018-02-13 | 中国电信股份有限公司 | Terminal monitoring method and device |
CN106529254A (en) * | 2016-11-08 | 2017-03-22 | 河南工业大学 | Convenient and safe password management method and system |
CN108804892A (en) * | 2017-04-28 | 2018-11-13 | 广达电脑股份有限公司 | Electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102446249A (en) | Electronic device and method for acquiring illegal user information of same | |
CN107483547B (en) | Loss prevention method for user terminal, server, mobile terminal and storage medium | |
US8289130B2 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
JP4633555B2 (en) | Security system, control program, computer-readable recording medium, electronic device, cradle | |
US9369870B2 (en) | Method and apparatus for electronic device access | |
US8473991B2 (en) | Automatic mobile image diary backup and display | |
EP3249570B1 (en) | Method and device for providing prompt indicating loss of terminal | |
CN103678979A (en) | Method and device for intelligently hiding privacy data | |
CN1835578A (en) | Method and apparatus for composing images during video communications | |
CN108298388A (en) | Elevator customer is identified using intelligent mobile terminal and operates the method and system of elevator | |
CN101951443A (en) | File security method, system and mobile terminal | |
WO2009081292A1 (en) | Method, apparatus and computer program product for providing power control security features | |
CN106878525A (en) | A kind of incoming information reminds the display methods and device at interface | |
CN104216723A (en) | Software starting method and mobile device | |
CN105577911A (en) | Terminal management method and terminal | |
CN104346549A (en) | Information processing method and electronic equipment | |
CN111526288B (en) | Image processing method and device and storage medium | |
CN110032887A (en) | A kind of picture method for secret protection, terminal and computer readable storage medium | |
CN104883441A (en) | Antitheft method and mobile terminal | |
TW201216107A (en) | Electronic device and method for obtaining information of an illegal user of the electronic device | |
CN103810447A (en) | Method and apparatus for performing security control by using captured image | |
CN105404808B (en) | A kind of mobile terminal and its method for broadcasting multimedia file | |
CN102306257A (en) | Electronic device and monitoring method used thereby | |
CN107710211A (en) | Intelligent terminal system starts method, apparatus and intelligent terminal | |
JP2013214190A (en) | Information processing terminal, control method for information processing terminal, control program, and computer readable recording medium with the control program recorded thereon |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120509 |