CN101719295A - Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof - Google Patents

Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof Download PDF

Info

Publication number
CN101719295A
CN101719295A CN200810148891A CN200810148891A CN101719295A CN 101719295 A CN101719295 A CN 101719295A CN 200810148891 A CN200810148891 A CN 200810148891A CN 200810148891 A CN200810148891 A CN 200810148891A CN 101719295 A CN101719295 A CN 101719295A
Authority
CN
China
Prior art keywords
electronic equipment
card reader
emergency mode
radio
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810148891A
Other languages
Chinese (zh)
Inventor
赵宇
杨晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
O2Micro Inc
Original Assignee
O2Micro China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by O2Micro China Co Ltd filed Critical O2Micro China Co Ltd
Priority to CN200810148891A priority Critical patent/CN101719295A/en
Publication of CN101719295A publication Critical patent/CN101719295A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses electronic equipment with radio frequency identification (RFID) technology and a losing prevention method thereof. The electronic equipment comprises an RFID card reader and a main controller, wherein the RFID card reader is used for detecting an RFID label, and the main controller is connected to the RFID card reader. When the distance between the RFID card reader and the RFID label is in a preset range, the RFID card reader detects the RFID label. When the distance between the RFID card reader and the RFID label is beyond the preset range, the main controller enables the electronic equipment to work in an emergency mode. In the emergency mode, the electronic equipment is locked. In the invention, the RFID label is detected by the RFID card reader; and when the RFID label is not detected, the electronic equipment works in the emergency mode and is locked.

Description

The electronic equipment and the anti-loss method thereof of band radio-frequency (RF) identification (RFID) technology
Technical field
The present invention relates to a kind of electronic equipment, relate in particular to the electronic equipment and the anti-loss method thereof of a kind of use radio-frequency (RF) identification (RFID) technology.
Background technology
Current, mobile electronic device as mobile phone etc., for people provide a lot of convenient and practical functions, has become in a lot of people's lives necessary tool.For example, mobile phone has been arranged, the people who often works outside worry again can miss some a heavy date or critical activity.Some like the scattered time with operating handset or study.For example, use smart mobile phone browsing page, editor's lantern slide, processing document, reading electronic book, reservation to date, carry out management of personal money or the like.More people as converter tools, as listens to the music mobile phone, take a picture, see a film, play games, even online speculation in stocks, dealing fund, stake lottery ticket, shopping or the like.More senior mobile phone can be used as stored value card and authentication etc.Most of cellphone subscribers can deposit their associated person information in mobile phone, comprise telephone number, address of household, friend, colleague and client etc.Some users can deposit song, photo, video and other files in mobile phone.Even some user can deposit the account and the password of bank card, insurance, mailbox, JICQ (as MSN and ICQ) in mobile phone, and I.D., passport, driving license, birthday, commemoration day and other personal information are as memorandum.Also there are these information on subscriber identification module (SIM) card in some user.
Therefore, lose or stolen, will bring a lot of inconvenience their life when these users' mobile phone.Lost mobile phone means loses workbench, converter tools, customer resources and individual privacy.
Summary of the invention
The technical problem to be solved in the present invention is to provide the electronic equipment and the anti-loss method thereof of a kind of use radio-frequency (RF) identification (RFID) technology, protects electronic equipment to prevent that it is stolen or to lose.
For solving the problems of the technologies described above, the invention provides the electronic equipment of a kind of band radio-frequency (RF) identification (RFID) technology.This electronic equipment comprises the master controller that is used to detect the RFID card reader of RFID label and is connected in the RFID card reader.When the distance of RFID card reader and RFID label was in preset range, the RFID card reader detected the RFID label.When the distance of RFID card reader and RFID label exceeded preset range, master controller made electronic device works in emergency mode.Under emergency mode, this electronic equipment is with locked.
The present invention also provides a kind of anti-loss method of electronic equipment.This method comprises: use the RFID card reader to detect the RFID label, wherein when the distance of RFID label and RFID card reader was in preset range, RFID tag was detected by the RFID card reader; When the distance of RFID label and RFID card reader exceeds preset range, make electronic device works in emergency mode; And under described emergency mode, lock electronic equipment.
The present invention also provides a kind of system.This system comprises RFID card reader, RFID label and master controller.RFID card reader emission radio frequency electromagnetic detects the RFID label by the electromagnetic wave coupling.When the distance of RFID label and RFID card reader was in preset range, RFID label received RF electromagnetic wave was also communicated by letter with the RFID card reader.When the distance of RFID label and RFID card reader exceeded preset range, master controller made the electronic device works that comprises this master controller in emergency mode.Under emergency mode, electronic equipment is locked.
Compared with prior art, the present invention detects the RFID label by the RFID card reader, when the distance of RFID label and RFID card reader is in preset range, the RFID label can be detected by the RFID card reader, when the distance of RFID label and RFID card reader exceeds preset range and is not detected, electronic device works is in emergency mode, and electronic equipment is locked.
Below in conjunction with the drawings and specific embodiments technical scheme of the present invention is described in detail, so that characteristic of the present invention and advantage are more obvious.
Description of drawings
Fig. 1 is the structural representation block diagram of electronic system according to an embodiment of the invention.
Fig. 2 is the structural representation block diagram of electronic system according to another embodiment of the invention.
Fig. 3 is the structural representation block diagram of electronic system according to still another embodiment of the invention.
Fig. 4 is the functional software module stack block diagram of electronic equipment according to an embodiment of the invention.
Fig. 5 is the detail flowchart of the operating process of being carried out by electronic system according to an embodiment of the invention.
Embodiment
Below will provide detailed explanation to embodiments of the invention.Though the present invention will set forth in conjunction with the embodiments, should understand this is not to mean the present invention is defined in these embodiment.On the contrary, the invention is intended to contain defined various options in the spirit and scope of the invention that is defined by the appended claim item, but modification item and be equal to item.
Embodiment described herein will be described in conjunction with the executable instruction of common conceptive computing machine.The executable instruction of computing machine refers to the media that can be used by the computing machine that one or more computing machine or other similar devices are carried out, as program module.As a rule, program module comprises and carries out particular task or the routine that particular abstract is operated, program, object, assembly, data structure or the like.The function of program module can make up according to the demand of different embodiment or split.
By instantiation, but unrestricted, computing machine can with media can comprise computer storage media and telecommunication media.Computer storage media comprises volatibility and non-volatile, removable and non-removable, may be implemented in the media of any method or technology, is used for canned data, as computer-readable instruction, data structure, program module and other data.Computer storage media comprises, but be not limited only to, random-access memory (ram), ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), flash memories and other memory technology, read-only compact disk (CD-ROM), digital multi-purpose CD (DVD) and other optical storage techniques, magnetic tape cassette, magnetic video disc storer and other magnetic storage apparatus, and other can be used for the media of canned data.
Telecommunication media can be computer readable instructions, data structure, program module and other data in the modulated data signal, and modulated data signal comprises any information transmission media, as carrier wave or other transmission mechanism.Term " modulated data signal " expression is in order to be carried in information on certain signal, and certain or multifrequency nature of this signal have been carried out being provided with or changing.For example, but be not limited only to, telecommunication media can comprise wired media and wireless medium.Wired media such as cable network, straight line connect.Wireless medium such as sound wave, radio frequency (RF), infrared and other.Above-mentioned combination in any equally also should be included in the scope of computer readable medium.
In addition, in following detailed description of the present invention,, illustrated a large amount of details in order to provide one at understanding completely of the present invention.Yet it will be understood by those skilled in the art that does not have these details, and the present invention can implement equally.In some other examples, scheme, flow process, element and the circuit known for everybody are not described in detail, so that highlight the present invention's purport.
See also Fig. 1, be electronic system according to an embodiment of the invention, as cell phone system 100, the structural representation block diagram.As shown in Figure 1, this cell phone system 100 comprises mobile phone unit 102 independently and radio-frequency (RF) identification (RFID) label 104 that matches.Mobile phone unit 102 comprises some conventional cell-phone function devices, as master controller 106, storage unit 110, radio receiving transmitting module 108, keyboard or touch-screen 114, LCD 116, audio coding/decoding device 118, microphone 120 and loudspeaker 122.Cell phone system 100 also can comprise a subscriber identification module (SIM) card 112, as can be used in the GSM mobile handset.In the present embodiment, because cell phone system 100 provides anti-lost function, so mobile phone unit 102 also comprises radio-frequency (RF) identification (RFID) card reader 124 and magnetic force electronic lock 126.Below will describe the function and the working method of diagram each device, unit and module in detail.
As shown in Figure 1, storage unit 110, SIM card 112, radio receiving transmitting module 108, keyboard or touch-screen 114, LCD 116, audio coding/decoding device 118 and RFID card reader 124 all are connected in master controller 106 and are controlled by master controller 106.Master controller 106 can be microcontroller (MCU), microprocessor (MPU), digital signal processor (DSP) and similar device.Be stored in software program in the storage unit 110, the hardware in the master controller 106 may command mobile phone units 102 by execution.Storage unit 110 is the storing software program not only, also can store data, as name of contact person address book, song, picture, video, personal verification's information, all kinds of account password etc.SIM card 112 provides the service of mobile operator with the unit 102 that Activates Phone, and can store the above-mentioned data that are stored in the storage unit 110.Radio receiving transmitting module 108 provides wireless communication and exchanges data.Keyboard or touch-screen 114 are used to import user instruction.LCD 116 is used for display menu, talking state, short message, picture, video and other information.Audio coding/decoding device 118 is connected to master controller 106 with microphone 120 and loudspeaker 122, is used to finish the mutual conversion between speech and the digital electric signal.
According to one of them embodiment of the present invention, cell phone system 100 can work in anti-lost pattern.Under anti-lost pattern, RFID card reader 124 is opened and work.This RFID card reader 124 comprises an antenna circuit, and emission radio frequency electromagnetic signal produces radio frequency electromagnetic field.By electromagnetic field couples, RFID card reader 124 is periodically searched for RFID label 104.This RFID label 104 comprises a wlan transceiving integrated circuit (not shown), and this wlan transceiving integrated circuit has an antenna, is used to receive above-mentioned radio frequency electromagnetic signal.When receiving this radio frequency electromagnetic signal, the antenna of wlan transceiving integrated circuit will produce faraday's induction current, with the wlan transceiving integrated circuit activation of RFID label 104.In case be activated, RFID label 104 just can be communicated by letter with RFID card reader 124.
Store a unique identifying code in the RFID label 104.The wlan transceiving integrated circuit identifying code that this is unique is modulated in the radio frequency electromagnetic signal, and sends the radio frequency electromagnetic signal that this has modulated identifying code.RFID card reader 124 can receive this radio frequency electromagnetic signal of modulating.RFID card reader 124 will read this unique verification code and decoding, and the identifying code that this is read contrasts with the identifying code that is stored in the known RFID label 104 in storage unit 110 or the RFID card reader 124 then, if identical, then can identify RFID label 104.
Among one of them embodiment, RFID card reader 124 can periodically be launched radio frequency electromagnetic.So RFID card reader 124 can periodically scan RFID label 104 and periodically be 104 power supplies of RFID label by electromagnetic field couples.Because the power consumption of RFID card reader 124 is directly proportional with emission radio-frequency electromagnetic wave frequency, can set RFID card reader 124 emission radio-frequency electromagnetic wave frequencies as required with power saving.For example, in the easily stolen intown public place of mobile phone unit 102, RFID card reader 124 can be every one second emission radio frequency electromagnetic; And in comparatively safe office or family, get final product every ten seconds or emission radio frequency electromagnetic more of a specified duration.
Will be understood by those skilled in the art that the radio frequency electromagnetic signal of RFID card reader 124 emissions can and be decayed along with the distance growth.In one embodiment, the distance between mobile phone unit 102 and RFID label 104 is in a preset range, and the radio frequency electromagnetic of RFID card reader 124 emissions can activate and detect RFID label 104.In another case, when the distance of the RFID of mobile phone unit 102 card reader 124 and RFID label 104 exceeds this preset range, RFID label 104 can not be activated by the radio frequency electromagnetic of RFID card reader 124 emissions, and RFID card reader 124 can not detect RFID label 104.In this case, will trigger emergency mode.
In one embodiment, the form that RFID label 104 can be little card sticks on the accessories such as wallet, belt, key chain, and mobile phone unit 102 can be positioned in pocket or the briefcase.When the distance of RFID tag 104 and RFID card reader 124 exceeds preset range (steal mobile phone unit 102 as the thief, or the machine master when leaving somewhere, forget conveniently mobile phone unit 102 is taken away), will trigger emergency mode.In case detect less than RFID label 104, RFID card reader 124 will send trigger pip to master controller 106 to trigger and to carry out anti-lost program, mobile phone unit 102 will work in emergency mode then.In case mobile phone unit 102 enters emergency mode, it will work in emergency mode always, unless remove emergency mode by the fingerprint of importing correct unlocking pin or checking registered user.In addition, RFID label 104 is reapposed in preset range also can remove emergency mode.In the present embodiment, RFID card reader 124 also can be launched radio frequency electromagnetic under emergency mode.In case when RFID card reader 124 detected and activate RFID label 104, the emergency mode of mobile phone unit 102 can be disengaged.
Among embodiment, mobile phone unit 102 will be locked under emergency mode immediately therein.In this embodiment, unless the input unlocking pin, or pass through fingerprint authentication, or RFID label 104 is placed in the preset range again, keyboard or touch-screen 114 are with malfunctioning, and the instruction of every other input is all with invalid.Prevent thief's free call on somebody else's expense through illegal means thus, steal a glance at cellphone information, mobile phone unit 102 is shut down and changes the SIM card 112 of the inside.The warning information that also can show this emergency circumstance on the LCD 116.In another embodiment, mobile phone unit 102 also comprises the battery (not shown) of a magnetic force electronic lock 126 in order to locking mobile phone unit 102.126 welding of magnetic force electronic lock or rivet clasp adhere to a dead bolt on the battery of mobile phone on the main circuit board of mobile phone unit 102, can insert in the lockhole of magnetic force electronic lock.At emergency mode, the master controller 106 of mobile phone unit 102 will trigger magnetic force electronic lock 126, the lockhole closure of magnetic force electronic lock 126, and battery is locked.Just be difficult for after battery is locked being chosen by the thief, thus mobile phone unit 102 can obtain that enough electric power carries out will be at the various security procedures of following detailed description.
In addition, in case mobile phone unit 102 is locked, loudspeaker 122 will emit a shrill cry as alerting tone immediately.Can be set to the sound different by this alerting tone with plain old telephone the tinkle of bells, ringing sound of text message or ring of alarm clock.This alerting tone can be downloaded from the Internet or by machine master oneself editor, use true man's recording also can.The user just can notice emergency mode like this.Emergency mode can be removed by the modes such as fingerprint of importing correct unlocking pin or proof machine master.As long as emergency mode is not disengaged the alerting tone that loudspeaker 122 will continue to utter a scream.Continue the ear-piercing alerting tone of screaming and to cause especially machine master's attention of crowd.The thief will be very showy in the crowd.So machine master or passerby can catch him before the thief finds the chance escape.
According to one of them embodiment of the present invention, after emergency mode triggers one period schedule time, will carry out security procedure.These security procedures are used to protect individual/security information of machine master to alleviate infringement.That these security procedures can include but are not limited to is hiding, wipe, encrypt or shift the storage unit 110 that is stored in mobile phone unit 102 or the secure data in the SIM card 112.In one embodiment, these secure datas can include but are not limited to machine master's associated person information (as phone number, address, E-mail address, Instant Messenger (IM) software etc.), Email, short message, downloaded files, picture, video, commemoration day (as kith and kin's birthday, wedding anniversary), and various accounts and password thereof.Therein among embodiment, the scope that the machine master can pre-defined secure data, even mobile phone unit 102 falls into his staff like this, he can not open and see this secure data.
In another embodiment, after the machine master found that mobile phone unit 102 is lost or be stolen, he can send a preset instructions with another mobile phone (not shown), for example with the form of SMS short message, gave mobile phone unit 102.This preset instructions also can be provided by mobile operator or portable terminal manufacturer.After receiving this preset instructions, above-mentioned security procedure just triggers and carries out.In one embodiment, in the mobile phone unit 102 predetermined secure data with deleted.In another embodiment, the secure data in the mobile phone unit 102 is with encrypted, and other people just can not open and visit the data that these were encrypted like this.Thus, the secure data in the mobile phone unit 102 is just protected.
In addition, in another embodiment, security procedure also provides the data forwarding function.This data branching program can be carried out after emergency mode triggers one period schedule time, also can carry out after detecting a undelegated SIM card, or receive a certain default order back execution.The data branching program can make mobile phone unit 102 that the secure data in the mobile phone unit 102 is transferred in the mobile phone of a default phone number, perhaps is transferred in the mobile phone that sends this default order.
In another embodiment, because secure data has been transferred in another mobile phone, these secure datas can be used for following the trail of mobile phone unit 102.The data that shift also can comprise some additional informations, as the local zone identification code and the base station numbering of the new phone number of this uncommitted SIM card, international mobile equipment identification number (IMEI), international mobile subscriber identity (IMSI), GSM network.These information has been arranged, and the machine master can get in touch and pick up the people who obtains this mobile phone unit 102, perhaps gets in touch mobile operator locating cellphone unit 102.
In addition, different embodiment according to the subject invention, RFID card reader 124 can be launched the radio frequency electromagnetic of different radio frequency identification frequency.For example, RFID card reader 124 can launch the about 1 meter low frequency radio frequency electromagnetic wave of preset range (as being lower than 135 kilo hertzs), high-frequency radio frequency electromagnetic wave (as 13.56 megahertzes), reach super high frequency radio frequency electromagnetic wave (as 869 megahertzes or 915 megahertzes).Equally, RFID card reader 124 can be launched the about 3 meters microwave radio electromagnetic wave of preset range (as 2.45 kilo-mega cycles per seconds).
See also Fig. 2, be the electronic system of an alternative embodiment of the invention, as cell phone system 200, the structural representation block diagram.Cell phone system 200 is similar with cell phone system 100 shown in Figure 1.Cell phone system 200 includes the mobile phone unit 202 of RFID label 204, and with this mobile phone unit 202 RFID card reader 224 independently mutually.For simplicity's sake, be not described in detail the element that 200 li of cell phone systems and cell phone system 100 shown in Figure 1 indicate like numerals will at this.
In the present embodiment, RFID card reader 224 equally also can be done smallerly, conveniently places on pocket or the key ring.In use, RFID card reader 224 can be powered by button cell.RFID card reader 124 is periodically launched radio frequency electromagnetic with scanning RFID label 204.When the distance between mobile phone unit 204 and the RFID card reader 224 was in a preset range, RFID label 204 can be detected and activate by RFID card reader 224.After receiving this radio frequency electromagnetic, RFID label 204 can produce faraday's induction current, and unique identifying code of storing in the RFID label 204 is modulated in this radio frequency electromagnetic signal, sends the radio frequency electromagnetic signal of having modulated identifying code then.RFID card reader 224 can receive this radio frequency electromagnetic signal, reads identifying code wherein, and with the known identifying code in itself and the RFID card reader 224 relatively, to identify RFID label 204.In case identified, just can set up the electromagnetic field couples between RFID card reader 224 and the RFID label 204, RFID label 204 just can send a response signal to master controller 206.But mobile phone unit 202 operate as normal.Otherwise, in one embodiment, when the distance between mobile phone unit 202 and the RFID card reader 224 exceeds preset range, the RFID label 204 in the mobile phone unit 202 will detect the radio frequency electromagnetic that sends less than RFID card reader 224, can not send response signal to master controller 206.In this case, master controller 206 will call security procedure to activate emergency mode.
See also Fig. 3, be depicted as the electronic apparatus system of the band RFID technology of an alternative embodiment of the invention, as cell phone system 300, the structural representation block diagram.Cell phone system 300 is similar with cell phone system 200 shown in Figure 2, comprises a mobile phone unit 302 and a RFID card reader 324.Mobile phone unit 302 has a SIM card 312.RFID label 304 can be integrated on the SIM card 312, and SIM card 312 just can be detected by RFID card reader 324 in a preset range like this.When should improved SIM card 312 inserting in the mobile phone, this mobile phone has just had anti-lost function.In case the distance between RFID label 304 and the RFID card reader 324 exceeds preset range, mobile phone unit 302 will send alarm and locked, and the secure data that is stored in wherein can be hidden, deletes, encrypts or shift.This SIM card 312 that has RFID label 304 also can be inserted in another mobile phone, for another mobile phone provides anti-lost function.Because do not need to change any hardware of existing mobile phone, this scheme is more economical and practical.
According to another embodiment of the invention, RFID card reader 324 comprises hummer (not shown).If the distance between RFID label 304 and the RFID card reader 324 exceeds preset range, RFID card reader 324 can not be communicated by letter with mobile phone unit 302.When detecting less than RFID label 304, RFID card reader 324 can trigger hummer and send alarm call.This SIM card 312 that has RFID label 304 can be inserted in any mobile phone.RFID card reader 324 can be battery-powered, periodically launches the radio frequency electromagnetic signal with scanning RFID label 304.In case the distance between mobile phone unit 302 and the RFID card reader 324 exceeds preset range, RFID card reader 324 will be sent alerting tone.
See also Fig. 4, be depicted as the functional software module stack block diagram 400 of electronic equipment according to an embodiment of the invention (as mobile phone).For example, the form that this functional software module stack 400 can software program is used in cell phone system shown in Figure 1 100, or cell phone system 200 shown in Figure 2, or in the cell phone system 300 shown in Figure 3.For convenience of description, hereinafter with reference to cell phone system shown in Figure 1 100 representation function software module storehouses 400.Functional software module stack 400 is made up of some software modules, is stored in the storage unit 110.By downloading and carry out the functional software module in the functional software module stack 400, master controller 106 initialization also drive the corresponding hardware of mobile phone unit 102.This functional software module stack 400 comprises four layers: operating system layer 402, application software layer 404, configuration management layer 406 and user interface layer 408.
Operating system layer 402 is the basic platform of other three layers at the bottom of functional software module stack 400.Operating system layer 402 comprises an operating system.For example, according to different embodiment, this operating system can be Linux, Symbian, Windows Mobile, Windows CE, Palm OS or the like.This operating system layer 402 comprises some direct and mutual device driver of hardware.Master controller 106 can pass through this device driver control hardware.Such as, by RFID card-reader driver program program 410 may command RFID card reader 124, by magnetic force electronic lock driver 412 may command magnetic force electronic locks 126.
Application software layer 404 is to develop on the platform of operating system layer 402.Application programming interfaces (API) can be supported communicating by letter between application software layer 404 and the operating system layer 402.Application software layer 404 comprises that some are the functional module of some specific functional design.Specifically, in one embodiment, for anti-lost function is provided, application software layer 404 comprises RFID detection module 416, system lock module 418, alarm module 420 and data protection module 422.
As long as mobile phone unit 102 works in anti-lost pattern, RFID detection module 416 is just in running order always.RFID detection module 416 is used to call RFID card-reader driver program program 410 control RFID card reader 124.RFID card reader 124 emission radio frequency electromagnetics periodically scan the existence of RFID label 104.When the distance between RFID label 104 and the RFID card reader 124 was in preset range, RFID label 104 can be detected and activate by RFID card reader 124.Otherwise,, will can not detect RFID label 104 when this distance exceeds preset range.In this case, RFID card reader 124 will produce a trigger pip and makes mobile phone unit 102 work in emergency mode.
Under emergency mode, system lock module 418 makes keyboard or touch-screen 114, audio coding/decoding device 118 and LCD 116 invalid by corresponding driving program in the call operation system layer 402.Alarm module 420 triggers loudspeaker 122 and sends alerting tone.The secure data that is stored in storage unit 110, pluggable SIM card 112 and/or the flash storage card (not shown) can be hidden, deletes, encrypts or be shifted to data protection module 422.According to different embodiment, can use different cryptographic algorithm, as digital signature standard (Digital Signature Standard) or Digital Signature Algorithm (DigitalSignature Algorithm), ElGamal, data encryption standards (Data Encryption Standard), and IDEA (International Data Encryption Algorithm), encryption safe data.By data protection module 422,, also can protect secure data to prevent to be stolen a glance at by it even mobile phone falls into his staff.
Configuration management layer 406 is adjacent with application software layer 404, comprises configuration module 424 and logger module 426.Configuration module 424 is used to the suitable operating parameter of functional module configuration in the application software layer 404.For example, when calling RFID detection module 416, configuration module 424 will be provided with suitable operating parameter for RFID detection module 416, as sending the radio-frequency electromagnetic wave frequency.Configuration module 424 is used for the corresponding function module of organization arrangement's application software layer 404 equally so that they are by correct inferior sort run.For example, when triggering emergency mode, configuration module 424 with schedule system locking module 418, alarm module 420, and data protection module 422 move in order.And logger module 426 is in order to write down each event.As writing down the date and time that mobile phone unit 102 enters emergency mode.Thus, when bringing back mobile phone unit 102, but machine master review history record and analyze event as a reference.
User interface layer 408 is positioned at the superiors of functional software module stack 400, and the window of input instruction is provided for the user.In one embodiment, this user interface layer 408 can be the graphical user interface (GUI) of current popular.After receiving input instruction, as response, configuration management layer 406 calls, disposes and organize corresponding functional modules in the application software layer 404.The functional module called of these configurations is started working then.Final injunction is transferred to the corresponding devices driver, and corresponding devices is carried out this instruction in the control mobile phone unit 102.
Then, see also Fig. 5, wherein show an electronic apparatus system according to an embodiment of the invention, as a mobile phone system, the process flow diagram of the operating process 500 of execution.Operating process 500 can program form realize, this program can be with the programming language of one or more forms, as collect language or interpreted language write, and this program can be used as a program independently, also can be used as the form that module, assembly, subroutine and other can be carried out by mobile phone.Please refer to Fig. 1, mobile phone can comprise RFID card reader 124, and this card reader 124 can be monitored the RFID label 104 that matches in a preset range.For example, if usefulness is high frequency or ultrahigh frequency RFID card reader 124, this preset range is 1 meter.The form that the RFID label 104 of this coupling can be made a little card sticks on the accessories such as wallet or belt, and mobile phone then can be positioned in pocket or the briefcase.Thus, when the distance of RFID card reader 124 and RFID label 104 in this preset range, RFID label 104 can be detected and activate by RFID card reader 124.
In step 502, starting hand-set.The hardware of mobile phone is initialised as master controller 106, internal memory 110 and external device.The driver of each hardware is loaded in the mobile phone.Application program is configured and begins to carry out.Thus, mobile phone successfully guides (boot) and enters holding state.
Mobile phone can work in anti-lost pattern or traditional mode.In step 504, the user will select whether to open anti-lost pattern.Can occur an option dialog box on the mobile phone screen selects for the user.If the user selects to use anti-lost pattern, then process flow diagram goes to step 508; Otherwise go to step 506.In step 506, mobile phone enters traditional mode.In traditional mode, RFID card reader 124 is closed, and mobile phone does not have anti-lost function.When not needing protection, as be in or office in, for power saving or reduce electromagenetic wave radiation, can use traditional mode.In another embodiment, after the initialization, the mobile phone acquiescence enters anti-lost pattern, direct execution in step 508 after the step 502.The user is the anti-lost pattern of manual-lock afterwards, opens traditional mode.
In the step 508, operating handset is in anti-lost pattern.Open RFID card reader 124 and can periodically launch radio frequency electromagnetic with scanning RFID label 104.Emission radio-frequency electromagnetic wave frequency can be adjusted according to actual needs.In the step 510, determine whether to detect RFID label 104.When the distance between this RFID label 104 and this RFID card reader 124 was in preset range, RFID label 104 can be detected and activate by this RFID card reader 124.If detect RFID label 104, then this process flow diagram is back to step 510, and RFID card reader 124 continues scanning RFID label 104.As long as RFID label 104 is detected, execution in step 510 just circulates.Otherwise when the distance of this RFID label 104 and this RFID card reader 124 exceeds preset range, RFID card reader 124 will produce a trigger pip and trigger emergency mode, and process flow diagram will go to step 512.
In the step 512, mobile phone enters emergency mode.Under emergency mode, mobile phone is locked.This locking comprises two aspects: system lock and battery locking.For example, for system lock, keyboard or touch-screen 114 are with malfunctioning, and other input instruction except that default unlocking pin or checking registered user's fingerprint is all with invalid.Mobile phone can not be used or shutdown by other undelegated user.In addition, for the battery locking, this trigger pip will trigger the battery of magnetic force electronic lock 126 locking mobile phones, and battery of mobile phone is difficult for being removed at short notice thus.But mobile phone just normal power supply is carried out various security procedures.In the step 514, trigger alerting tone immediately to cause machine master and passerby's attention.In the step 516, carry out data protection program.In one embodiment, the secure data that is stored in SIM cards of mobile phones or the flash storage card can be hidden or delete.In another embodiment, this secure data can be encrypted through a cryptographic algorithm.Even this SIM card or flash storage card insert in the new cell-phone, as long as do not decipher this secure data, just nobody can open or see this secure data.In another embodiment, this secure data can be transferred in another mobile phone by SMS (short message service) or GPRS technology.
In the step 518, above-mentioned emergency mode incident is recorded in the daily record.Or rather, daily record will be write down the time and date that this emergency mode incident takes place.In the step 520, judge whether emergency mode is removed.If emergency mode is not disengaged, then process flow diagram is got back to step 520, otherwise will go to step 522.Unless the releasing emergency mode, alerting tone will continue always, and mobile phone will be locked always.According to different embodiment, can be by checking input correct password or registered fingerprint, or detect mode such as RFID label 104 again and remove emergency mode.
In the step 522, mobile phone is unlocked and can works in anti-lost pattern.Alerting tone stops.The secure data of encrypting is decrypted.
In the step 524, unlock events is recorded in the daily record equally, and process flow diagram will be back to step 508.Historical information can after check, look back, with as analyzing reference.
Although above description to Fig. 5 is to carry out in conjunction with the cell phone system 100 that Fig. 1 discloses, those of ordinary skill in the art will understand, and the operation steps that discloses among Fig. 5 is applicable to the cell phone system 200 and 300 that Fig. 2 and Fig. 3 disclose too.
In sum, embodiments of the invention provide the electronic equipment of a kind of RFID of outfit card reader or RFID label.When the distance of RFID card reader and RFID label exceeded a preset range, this electronic equipment can work in emergency mode.Under emergency mode, electronic equipment can be locked and be sent alerting tone.Emergency mode can be removed by the fingerprint of importing correct unlocking pin or checking registered user.This electronic equipment can include but not limited to, mobile phone, PDA(Personal Digital Assistant), media player, GPS receiver, game machine, notebook computer.
Though explanation before and accompanying drawing have been described preferred embodiment of the present invention, be to be understood that under the prerequisite of the spirit of the principle of the invention that does not break away from claims and defined and protection domain, can have and variously augment, revise and replace.It should be appreciated by those skilled in the art that the present invention can change aspect form, structure, layout, ratio, material, element, assembly and other to some extent according to concrete environment and job requirement in actual applications under the prerequisite that does not deviate from the invention criterion.Therefore, embodiment disclosed here only is illustrative rather than definitive thereof, and protection scope of the present invention is defined by technical scheme in claims and legal equivalents thereof, and the description before being not limited thereto.

Claims (26)

1. an electronic equipment is characterized in that, comprising:
The radio-frequency (RF) identification card reader is used to launch radio frequency electromagnetic detecting a RFID tag, and when the distance of described RFID tag and described radio-frequency (RF) identification card reader was in preset range, described RFID tag was detected by described radio-frequency (RF) identification card reader; And
Master controller, be connected to described radio-frequency (RF) identification card reader, when the distance of described RFID tag and described radio-frequency (RF) identification card reader exceeded described preset range, this master controller made described electronic device works in emergency mode, under this emergency mode, described electronic equipment is locked.
2. electronic equipment according to claim 1 is characterized in that described electronic equipment also comprises loudspeaker, is connected to described master controller, is used for sending under described emergency mode described alerting tone.
3. electronic equipment according to claim 1 is characterized in that described electronic equipment also comprises keyboard, is connected to described master controller, is used for input instruction, and described keyboard is locked under described emergency mode.
4. electronic equipment according to claim 3 is characterized in that, described emergency mode is disengaged to described keyboard at the correct unlocking pin of input.
5. electronic equipment according to claim 1 is characterized in that described electronic equipment also comprises storage unit, is connected to described master controller, is used to store data, and described master controller is encrypted this data under described emergency mode.
6. electronic equipment according to claim 1 is characterized in that described electronic equipment also comprises storage unit, is connected to described master controller, is used to store data, and described data are transferred to external electronic device under described emergency mode.
7. electronic equipment according to claim 1 is characterized in that described electronic equipment also comprises storage unit, is connected to described master controller, is used to store data, and described data are deleted under described emergency mode.
8. electronic equipment according to claim 1 is characterized in that, described electronic equipment also comprises:
Battery is in order to give described power electronic equipment; And
The magnetic force electronic lock is used for the described battery of locking under described emergency mode.
9. electronic equipment according to claim 1, it is characterized in that, described electronic equipment also comprises storage unit, is used to store radio-frequency (RF) identification card-reader driver program program, and described master controller is operated this radio-frequency (RF) identification card-reader driver program program to control described radio-frequency (RF) identification card reader.
10. the anti-loss method of an electronic equipment is characterized in that, this method may further comprise the steps:
Use the radio-frequency (RF) identification card reader to detect RFID tag, wherein when the distance of described RFID tag and described radio-frequency (RF) identification card reader was in preset range, described RFID tag was detected by described radio-frequency (RF) identification card reader;
When the distance of described RFID tag and described radio-frequency (RF) identification card reader exceeds described preset range, make described electronic device works in emergency mode; And
The described electronic equipment of locking under described emergency mode.
11. the anti-loss method of electronic equipment according to claim 10 is characterized in that, described method also is included in and encrypts the data that are stored in described electronic equipment under the described emergency mode.
12. the anti-loss method of electronic equipment according to claim 10 is characterized in that, described method also is included in to shift under the described emergency mode and is stored in the data of described electronic equipment to external electronic device.
13. the anti-loss method of electronic equipment according to claim 10 is characterized in that, described method also is included in and deletes the data that are stored in described electronic equipment under the described emergency mode.
14. the anti-loss method of electronic equipment according to claim 10 is characterized in that, described method also comprises the battery that uses the magnetic force electronic lock to lock described electronic equipment.
15. the anti-loss method of electronic equipment according to claim 10 is characterized in that, described method also comprises by receiving the described electronic equipment of predetermined cipher release.
16. the anti-loss method of electronic equipment according to claim 10 is characterized in that, described method also is included under the described emergency mode and sends alerting tone.
17. a system is characterized in that, comprising:
The radio-frequency (RF) identification card reader is used to launch radio frequency electromagnetic;
RFID tag is used for distance when this RFID tag and described radio-frequency (RF) identification card reader in preset range the time, receives described radio frequency electromagnetic and communicates by letter with described radio-frequency (RF) identification card reader; And
Master controller is used for making the electronic device works that comprises described master controller in emergency mode when the distance of described RFID tag and described radio-frequency (RF) identification card reader exceeds described preset range, and under this emergency mode, described electronic equipment is locked.
18. system according to claim 17 is characterized in that, described electronic equipment also comprises loudspeaker, is used for sending alerting tone under described emergency mode.
19. system according to claim 17 is characterized in that, described electronic equipment also comprises keyboard, is used to import user instruction, and this keyboard is locked under described emergency mode.
20. system according to claim 19 is characterized in that, described emergency mode is disengaged to described keyboard at the correct unlocking pin of input.
21. system according to claim 17 is characterized in that, described electronic equipment is a mobile phone, and described mobile phone comprises subscriber identify module card, and this subscriber identify module card is locked under described emergency mode.
22. system according to claim 21 is characterized in that, described subscriber identify module card is used to store the subscriber identify module card data, and described subscriber identify module card data are transferred to outside mobile phone under described emergency mode.
23. system according to claim 21 is characterized in that, described RFID tag is integrated on the described subscriber identify module card.
24. system according to claim 17 is characterized in that, described electronic equipment also comprises:
Battery is in order to give described power electronic equipment; And
The magnetic force electronic lock is used for the described battery of locking under described emergency mode.
25. system according to claim 17 is characterized in that, described electronic equipment comprises described radio-frequency (RF) identification card reader, and described master controller is connected to described radio-frequency (RF) identification card reader.
26. system according to claim 17 is characterized in that, described electronic equipment comprises described RFID tag, and described master controller is connected to described RFID tag.
CN200810148891A 2008-10-09 2008-10-09 Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof Pending CN101719295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810148891A CN101719295A (en) 2008-10-09 2008-10-09 Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810148891A CN101719295A (en) 2008-10-09 2008-10-09 Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof

Publications (1)

Publication Number Publication Date
CN101719295A true CN101719295A (en) 2010-06-02

Family

ID=42433864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810148891A Pending CN101719295A (en) 2008-10-09 2008-10-09 Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof

Country Status (1)

Country Link
CN (1) CN101719295A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404776A (en) * 2011-10-27 2012-04-04 南京中兴力维软件有限公司 Base station maintenance management method and system based on radio frequency identification (RFID)
CN102469408A (en) * 2010-11-10 2012-05-23 上海申铁信息工程有限公司 Driver track location system
CN102739861A (en) * 2012-06-08 2012-10-17 广东欧珀移动通信有限公司 Anti-theft alarming method for mobile phone
CN103425603A (en) * 2012-05-24 2013-12-04 深圳市天方信安电子科技有限公司 Electronic device with RFID (radio frequency identification) function
CN103425604A (en) * 2012-05-24 2013-12-04 深圳市天方信安电子科技有限公司 Method of unlocking electronic device with RFID function
CN104766022A (en) * 2014-01-08 2015-07-08 深圳富泰宏精密工业有限公司 File protection system and method
CN105549521A (en) * 2015-11-16 2016-05-04 曹树槐 Trigger control method based on time domain, acceleration, motion frequency and node aggregation
WO2016131343A1 (en) * 2015-07-24 2016-08-25 中兴通讯股份有限公司 Decryption method and device, and decryption card
CN106911997A (en) * 2015-12-22 2017-06-30 中电科技(北京)有限公司 A kind of geo-fencing system and its implementation based on UEFI firmwares
CN107368761A (en) * 2016-05-11 2017-11-21 Es德拉厄控股有限责任公司 Security system and safety label assembly
CN107590969A (en) * 2017-09-29 2018-01-16 安徽瓦尔特机械贸易有限公司 A kind of anti-loss device based on wireless radio-frequency
CN108885657A (en) * 2016-03-29 2018-11-23 西门子股份公司 access control
CN111062225A (en) * 2019-12-17 2020-04-24 中铁信安(北京)信息安全技术有限公司 Storage cabinet article identification method and intelligent storage cabinet

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469408A (en) * 2010-11-10 2012-05-23 上海申铁信息工程有限公司 Driver track location system
CN102404776A (en) * 2011-10-27 2012-04-04 南京中兴力维软件有限公司 Base station maintenance management method and system based on radio frequency identification (RFID)
CN103425603A (en) * 2012-05-24 2013-12-04 深圳市天方信安电子科技有限公司 Electronic device with RFID (radio frequency identification) function
CN103425604A (en) * 2012-05-24 2013-12-04 深圳市天方信安电子科技有限公司 Method of unlocking electronic device with RFID function
CN102739861A (en) * 2012-06-08 2012-10-17 广东欧珀移动通信有限公司 Anti-theft alarming method for mobile phone
CN104766022A (en) * 2014-01-08 2015-07-08 深圳富泰宏精密工业有限公司 File protection system and method
WO2016131343A1 (en) * 2015-07-24 2016-08-25 中兴通讯股份有限公司 Decryption method and device, and decryption card
CN105549521A (en) * 2015-11-16 2016-05-04 曹树槐 Trigger control method based on time domain, acceleration, motion frequency and node aggregation
CN106911997A (en) * 2015-12-22 2017-06-30 中电科技(北京)有限公司 A kind of geo-fencing system and its implementation based on UEFI firmwares
CN106911997B (en) * 2015-12-22 2021-05-28 中电科技(北京)有限公司 Geographic fence system based on UEFI firmware and implementation method thereof
CN108885657A (en) * 2016-03-29 2018-11-23 西门子股份公司 access control
US11403384B2 (en) 2016-03-29 2022-08-02 Siemens Aktiengesellschaft Access control
CN108885657B (en) * 2016-03-29 2022-08-23 西门子股份公司 Access control
CN107368761A (en) * 2016-05-11 2017-11-21 Es德拉厄控股有限责任公司 Security system and safety label assembly
CN107368761B (en) * 2016-05-11 2021-06-08 Es德拉厄控股有限责任公司 Security system and security tag assembly
CN107590969A (en) * 2017-09-29 2018-01-16 安徽瓦尔特机械贸易有限公司 A kind of anti-loss device based on wireless radio-frequency
CN111062225A (en) * 2019-12-17 2020-04-24 中铁信安(北京)信息安全技术有限公司 Storage cabinet article identification method and intelligent storage cabinet
CN111062225B (en) * 2019-12-17 2023-07-07 中铁信安(北京)信息安全技术有限公司 Article identification method for storage cabinet and intelligent storage cabinet

Similar Documents

Publication Publication Date Title
CN101719295A (en) Electronic equipment with radio frequency identification (RFID) technology and losing prevention method thereof
EP1411709B1 (en) System and method of security function activation for a mobile electronic device
US20100090831A1 (en) Electronic device with radio frequency identification (RFID) technology
US9519808B2 (en) Method and apparatus for protecting data in a portable electronic device
KR20040075915A (en) Wireless authentication system
US20090251318A1 (en) Anti-theft system of mobile device
WO2005073843A1 (en) Secure device, terminal device, gate device, and device
JP2006338480A (en) Processor
CN202617350U (en) Mobile phone safety management and control system
KR101422122B1 (en) Pairing digital system and providing method thereof
WO2006134971A1 (en) Document management system
CN1277440C (en) Method and apparatus for preventing mobile terminal from being illegally used
CN101222558B (en) Mobile phone with secret protection function and its method
CN101755436A (en) Control device, communication device, control system, control method, and storage medium
EP2780900B1 (en) Systems and methods for recovering low power devices
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
KR101527635B1 (en) Apparatus and method for protectioing privarcy of user in mobile device
EP2071486A1 (en) Method and arrangement for managing sensitive personal data
JP2008234168A (en) Terminal device with electronic money function
JP2004363732A (en) Personal information protecting method, personal information protecting program and portable telephone terminal
JP4091611B2 (en) Authentication registration processing apparatus and authentication registration processing method
JP6148503B2 (en) Lock control method for mobile communication terminal device
Wu et al. The digital signature technology for access control system of mobile
JP2005094171A (en) Mobile phone with ic tag authentication function
WO2007090042A2 (en) Module including a memory holding user personal information and a method of transfer of the information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: O2 TECH. INTERNATIONAL LTD.

Free format text: FORMER OWNER: AOTU ELECTRONIC (WUHAN) CO., LTD.

Effective date: 20120213

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120213

Address after: Grand Cayman British Cayman Islands

Applicant after: O2 Tech. International Ltd.

Address before: Wuhan City, Hubei province 430074 Luoyu Road No. 716 Hua Le Business Center Room 806

Applicant before: O2Micro International Ltd.

ASS Succession or assignment of patent right

Owner name: AIYOUKE SERVICE CO., LTD.

Free format text: FORMER OWNER: O2 TECH. INTERNATIONAL LTD.

Effective date: 20120820

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20120820

Address after: Delaware

Applicant after: O2Micro Inc.

Address before: Grand Cayman British Cayman Islands

Applicant before: O2 Tech. International Ltd.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100602