CN103491514A - Mobile phone guarding machine - Google Patents

Mobile phone guarding machine Download PDF

Info

Publication number
CN103491514A
CN103491514A CN201310483830.XA CN201310483830A CN103491514A CN 103491514 A CN103491514 A CN 103491514A CN 201310483830 A CN201310483830 A CN 201310483830A CN 103491514 A CN103491514 A CN 103491514A
Authority
CN
China
Prior art keywords
mobile phone
button
defender
guarded
situation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310483830.XA
Other languages
Chinese (zh)
Inventor
王鹤儒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310483830.XA priority Critical patent/CN103491514A/en
Priority to CN201310599909.9A priority patent/CN103634492B/en
Publication of CN103491514A publication Critical patent/CN103491514A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a mobile phone guarding machine. The mobile phone guarding machine is provided with an independent additional power supply system and can be used for sending conditions to the outside in case of danger, a button, which can be used for starting up when being continuously pressed for n seconds, is arranged at the upper part or side part of a mobile phone, the mobile phone carries out startup, networking, image pick-up startup, sound recording, positioning and time recording after the button is pressed down for starting up, and information is sent to a guardian through mobile phone software and can also be sent to a public security system or an official website. Hardware for operating the system adopts a waterproof, shockproof and high-temperature-resistant design; the guarding machine can be used for well positioning people and merchants in cooperation with a station positioning machine, and relatives and friends are informed when people encounter accidents; a group-buying function is strengthened; the security of the mobile phone is enhanced. The mobile phone guarding machine is characterized in that a victim can tell clues for case solving or leave the last words when the victim is not killed; or the victim can conveniently communicate with the outside, even seriously injured, when the victim experiences natural disasters (e.g. earthquake and tsunami); the loss of contact with the outside due to no power cannot be caused; by alarm ringing, criminals can be frightened and the seeking of the missing is facilitated.

Description

Mobile phone is guarded machine
Technical field
Information network technique and public safety.
Background technology
The mobile phone the Internet.
Summary of the invention
Link up in order to strengthen personal safety and Strengthens network, the invention provides a kind of mobile phone and guard machine, there is not the function of security protection in existing mobile phone, and the present invention proposes a kind of security protection mobile phone can protect personal safety.
The technical solution adopted for the present invention to solve the technical problems is: 1.a kind of mobile phone is guarded machine, it is characterized in that: mobile phone top or sidepiece or other convenient by position have one to continue the button just started second by n, define this button for guarding button.
After pressing startup, mobile phone is started shooting, and networking starts light, open shooting, recording, location and writing time, generate a note in danger automatically, then the information exchange of these records is crossed to the phone that cell phone software sends in defender's mobile phone and puts through the conversation defender, can select to send to public security system, medical system, official website, website.
If after pressing and guarding button, mobile phone is at open state, automatically preserve need the program of preserving and exit all with guard irrelevant program.
The all n of this paper are set by the user, and n is greater than 0 numeral or mark.
Flashlight light sets up brightness on their own to reach best photographic effect according to extraneous brightness.
When facing a danger, continue for the first time or for the second time to guard second after button can select to increase by n to send high-power alarm bell function, then record as far as possible lower suspect's face and stature feature, after lower suspect's feature is recorded in success, this will become after strong evidence and the important clue of solving a case in court, if can abandon continuing to implement crime when the suspect worries legal sanction.
After the defender receives the note that the other side sends, interconnection network can be checked all information that the other side sends, when finding really to have emergency and needing emergency, directly dial 110,120 and inform by defender's cell-phone number and position, then police and doctor inquire about the information of being sent by the defender and implement rescue on public security system and medical system by cell-phone number, once guardian system starts, by continuous service n minute.
If pushed the wrong because of carelessness or danger removed can be by closing guardian system to mobile phone input password and automatically notifying that all defenders are dangerous to remove.
Public security department can hand over the people of cash pledge that the awaiting orders service without defender's notice in 24 hours is provided for part, no matter what reason, once guard pushbutton enable, cash pledge is a deduction part just, will deduct less a part of cash pledge by input password releasing crisis in time.
Without cellphone subscriber or defender's operation or mandate, other people can't consult the cellphone subscriber and upload information and image.
The vehicle-mounted computer platform, panel computer, desktop computer, notebook computer all can increase and guard button, and Method And Principle is the same.
Two mobile phones according to claim 1 are guarded machine, it is characterized in that, described defender's method to set up refers to: at first the cellphone subscriber is thought that the human hair carry information of likely guarding oneself shows oneself to want to invite the other side to become guarding of oneself; Then in two kinds of situation, situation one, the other side agrees just to reply and agree, and the other side's number is indexed on cell phone software, situation two, the other side disagrees with, replys refusal, can add reason for rejection.
If the cellphone subscriber is not the other side defender, can send information to the other side, apply to become the other side defender, then in two kinds of situation, situation one, the other side's agreement, cellphone subscriber's number will exist on the other side's cell phone software, situation two, the other side disagrees with, replys refusal.
Guard relation if cellphone subscriber or the other side want to cancel, can operate on the cell phone software of oneself voluntarily, then cell phone software can transmission information be notified the other side.
Each mobile phone is guarded chance, and the toots of several and owner is set be the defender, and quantity is not limit, and the defender that converses is set on cell phone software.
Three mobile phones according to claim 1 are guarded machine, it is characterized in that, mobile phone is guarded the method that machine utilizes login function to guard, and divide two kinds:
Method one, if mobile phone is not had to any operation in owner n days, mobile phone is guarded chance and is sent information to the defender.
Method two, only have to login after mobile phone n every day point and could use mobile phone, and it is 3:00 AM that the n point is recommended, if mobile phone surpasses, within n days, do not log in successfully, and mobile phone can send information to the defender.
The information effect of indication is to guard with pressing the effect that button is the same.
Website, computer system, computer software, cell phone software all can adopt said method to be guarded.
Four mobile phones according to claim 1 are guarded machine, it is characterized in that, mobile phone positioning combination station or near landmark building location, when the handset starting guardian system, mobile phone guard chance nearest interchange of position, name of station, apart from station or the distance of landmark building, apart from station or the landmark building orientation send to the defender.
This mobile phone is guarded the machine function and can be applied to and purchase by group on platform, in conjunction with Localization of railway station, can facilitate the user to calculate the consumption distance, the road amount of consumption and find businessman by distance post distance orientation and mobile phone compass functional.
Concrete grammar is: at first the user finds station or landmark building, then in conjunction with the mobile phone compass functional, finds orientation, finally by distance, finds out Position Approximate.
Five mobile phones according to claim 1 are guarded machine, it is characterized in that: mobile phone has additionally independently electric power system only for guarding, can be button cell or another piece battery of mobile phone or same battery, last electric weight at least can be for claim 1 function operation 20 minutes.
If another set of electric power system: press to guard after button and directly use another set of electric power system, each charging is preferentially filled and is guarded the special electric power system, wants highlight indication while not having electricity.
If only use a battery: electric weight is divided into full electricity from big to small, warning value two, warning value one, empty electricity; Divide three kinds of situations, situation one, meeting reminding user electric weight deficiency when electric weight approaches warning value two, situation two, when electric weight reaches warning value two, preserve all save routine backed off after randoms that need automatically, and can only dial 110 and 120, situation three, automatic shutdown when electric weight reaches the warning value one-level, now only guard button and can start shooting ?.
The six roots of sensation is guarded machine according to mobile phone claimed in claim 1, it is characterized in that: the hardware using waterproof of operation said system, shockproof, anti-high temperature design, can assemble falling-proof apparatus.
Described waterproof refers to, mobile phone is all-in-one, and the user can't dismantle battery, and all outside junctions and external interface all have the water proof design.
Described shockproof referring to, moulding adopts all-in-one without renovating, and thin and thick is moderate, and corner angle are as far as possible round and smooth.
Described anti-high temperature refers to, adopt anti-high temperature enclosure, and the shell thermal conductivity is poor, as used ceramic fibre or high-temperature resistance plastice, can thermal sensor be installed on mobile phone, automatically sends information when temperature reaches certain value.
Falling-proof apparatus: an aperture is arranged on mobile phone, can couple together mobile phone and clothes as fastened on waist belt by rope, by band tape structure, coded lock, the mobile phone hole forms.Bleed off the meaning of device
Unique difference of band tape structure and existing 2 meters steel tapes is that the iron chi in tape measure has become rope or chain, and the rope in band tape structure is connected with coded lock and is non-removable connection.
The draw ring of coded lock can link together by mobile phone hole and mobile phone, and band tape structure can be clipped in or tie up on clothes.
Seven mobile phones according to claim 1 are guarded machine, it is characterized in that: about the substitute mode of guarding button can be acoustic control, rock, the desktop shortcut icon, guarding like this machine function can be applied on now existing most of intelligent machines by cell phone software; But any other mode is not all guarded the button practicality.
Acoustic control: at first enroll one section speech cipher, start when facing to mobile phone, reading out speech cipher.
Rock: design is rocked number of times left and to the right, sequentially, when rocking like this, starts.
Desktop shortcut icon: can a shortcut icon be set at mobile phone desktop, continue to start after second by n.
Mobile phone according to claim 1 is guarded machine, it is characterized in that: and guard the software that purchases by group of combination, if the user does not purchase by group explanation for a long time, life is more uninteresting, and at this moment group buying websites can send information to the defender, and then the user carries out following operation.
At first the user arranges the hobby of oneself on group buying websites, nuisance, and the thing of taboo, can bear amount of money scope, allows to invite user's people; The people in allowed band can't not send invitation to the user, and the minor can't accept any invitation, and will remind and go on a journey riskyly with the stranger, determine to want prudent.
The hobby arranged can be food and drink, film, tourism etc.; Nuisance can be peppery, tired, far away etc.; Can bear amount of money scope and divide the scope of paying the bill with the other side of paying for oneself; Allow to invite user's people to be divided into the defender, relatives, classmate, good friend etc.
Minute two kinds of invitation patterns: invitation pattern one, when wanting to invite second, first can first browse the hobby of second, abstain from amount of money scope then select a consumption and consumption information is sent to the Party B, and whether explanation is accompanied by first.
Then in two kinds of situation, situation one, the Party B agrees, replys and agrees, then first payment, then notifications Party B first received payment, then first and second the designated time is gone consumption with the consumption password separately; Situation two, the Party B disagrees with, replys refusal, can add reason for rejection.
Invitation pattern two, the Party B first browses purchasing by group of first explanation is set, and purchasing by group of then oneself being liked sends to the Party A, wishes that the Party A pays the bill, and whom explanation accompanied or do not needed the people to accompany by.
Then in two kinds of situation, situation one, the Party A agrees, replys and agrees and pay the bill, then notifications Party B first received payment, then the first and second designated times were gone consumption with the consumption password; Situation two, the Party A disagrees with, replys refusal, can add reason for rejection.
If surpass unmanned payment in a day or Party A, refuse payment, bill is cancelled.
Group buying websites can be sent and recommends consumption and will have preferential according to both sides' taste.
Eight guard machine according to the described mobile phone of claim 1 or 8, it is characterized in that, Mobile phone card has the service of identity card real name verification, also can be in conjunction with fingerprint, retina checking, go out and purchase by group when consumption and can confirm the other side's identity and ID card information be passed to group buying websites and examined and record the time with passerby's fingerprint or scanning identity card by mobile telephone scanning, the consumption place with common friend.
When the people meets with an accident or be missing, whom the defender that can inquire the user by the group buying websites with mobile phone association has, and who the consumption that purchases by group the user accept recently, goes which consumption.
Nine mobile phones according to claim 1 are guarded machine, it is characterized in that: the sound of alarm bell is frequency and the acoustics of unified uniqueness, can when solving a case, conductively-closed not fall to affect the crime sound recordings, and this frequency can lean on frequency collection device to collect a long way off.
The invention has the beneficial effects as follows can be when the people meets with an accident the very first time notify to relatives and strengthen the Internet and purchase by group function.The video/audio that can stay when facing a danger while being injured is produced evidence for solving a case.The victim says clue for solving a case or leaving a letter before death when not being murdered.Perhaps run into natural calamity (as seismic sea wave) though the time be subject to severe injury and also can conveniently get in touch with the external world.Can be not out of touch with the external world because not having electricity.Can depend on alarm bell and video recording evidence fright offender and be convenient to find the missing.Can be when the people meet accident and during natural calamity, allow very easily the extraneous situation of understanding oneself; There is for merit stays evidence the effect of fright crime; When the people sustains a severe injury or during burst disease, convenient notice is extraneous; Empty nestor and children are had to very large application value; Promote the social safety harmony; The rate that diminishes crime and increase case-solving rate.The anti-lost cell-phone cover of mobile phone can prevent mobile phone fall on the ground break, mobile phone is lost, mobile phone is stolen, the effect because of external force or natural force (flood earthquake) while running into accident makes mobile phone and user's disengaging.For businessman, the profit part comprises the sale new cell-phone, sells the anti-lost cell-phone cover of mobile phone (new and old mobile phones universal), and cell phone software is downloaded, and the network traffics charge, purchase by group deduction, purchases by group the product promotion advertising expense; Public security department can be ready to spend the people of extra money that the service of awaiting orders without defender's notice in 24 hours is provided for part.If a city public security has been got well, the people of tourism, the people who settles down nature is just many.
the accompanying drawing explanation:
Below in conjunction with drawings and Examples, the present invention is further described: accompanying drawing 1 is the assembly drawing of falling-proof apparatus of the present invention, and accompanying drawing 2 is locations drawing of guarding button.
1. cell-phone cover, 2. cell-phone cover connects hole, 3 coded locks, 4 connection cords, 5 guard button, 6 band tape structures, 7 binding devices.
embodiment:
On 1 cell-phone cover, have a cell-phone cover to connect hole, cell-phone cover connects hole can be by the lock ring of coded lock through just having pinned mobile phone.
2 coded locks, connection cord, band tape structure, binding device is integrally connected, and can not break.
The principle of 3 band tape structures is similar with the small-sized band tape structure in life, and just the iron chi has become connection cord, and when there is no external force, connection cord can automatic drawing back.
The general 50cm of 4 connection cord is to 70cm, slightly is longer than the waist of trousers and takes the people to mobile phone is lifted to distance in one's ear, can adopt transparent material.
In 5 band tape structures, the withdrawal pulling force of connection cord is greater than the weight of coded lock, is less than the weight of mobile phone.
6 when mobile phone charges or picture while taking down mobile phone, by opening coded lock, unloads mobile phone.
7 while answering the call, and lifts mobile phone, and connection cord has just pulled out.While putting mobile phone in pocket, connection cord is with regard to automatic drawing back
8 binding devices can be that a clip or rope can be clipped on clothes or tie up on clothes or clamp the cloth in pocket.
8 guard button when only having one: if the mobile phone power-on button on mobile phone top, is guarded button just at sidepiece; If the mobile phone power-on button at the mobile phone sidepiece, is guarded button just on mobile phone top; This for left and right regardless of the people highly significant.When starting or only by guard button n second or guard button and the start button simultaneously by n second.
9 guard button when having two, and each of mobile phone both sides must press, and lasting n started after second simultaneously.
10 to guard button too not outstanding, in order to avoid mistake is touched.
11 guard button does not want too pine or too tight yet.
12 from by guarding n that button to guardian system starts second, and mobile phone can send beeping sound and not want error starting with reminding user.

Claims (10)

1. a mobile phone is guarded machine, it is characterized in that: mobile phone top or sidepiece or other convenient by position have one or two to continue the button just started second by n, define this button for guarding button;
After pressing startup, mobile phone is started shooting, and networking starts light, open shooting, recording, location and writing time, generate a note in danger automatically, then the information exchange of these records is crossed to the phone that cell phone software sends in defender's mobile phone and puts through the conversation defender, can select to send to public security system, medical system, official website, website;
If after pressing and guarding button, mobile phone is at open state, automatically preserve need the program of preserving and exit all with guard irrelevant program;
In claims, all n are set by the user, and are to be greater than 0 numeral or mark;
Flashlight light sets up brightness on their own to reach best photographic effect according to extraneous brightness;
When facing a danger, continue for the first time or for the second time to guard second after button can select to increase by n to send high-power alarm bell function, then record as far as possible lower suspect's face and stature feature, after lower suspect's feature is recorded in success, this will become after strong evidence and the important clue of solving a case in court, if can abandon continuing to implement crime when the suspect worries legal sanction;
After the defender receives the note that the other side sends, interconnection network can be checked all information that the other side sends, when finding really to have emergency and needing emergency, directly dial 110,120 and inform by defender's cell-phone number and position, then police and doctor inquire about the information of being sent by the defender and implement rescue on public security system and medical system by cell-phone number, once guardian system starts, by continuous service n minute;
If pushed the wrong because of carelessness or danger removed can be by closing guardian system to mobile phone input password and automatically notifying all defenders and public security system is dangerous removes;
Public security department can hand over the people of cash pledge that the service of awaiting orders without defender's notice in 24 hours is provided for part, no matter what reason, once guard pushbutton enable, cash pledge is a deduction part just, removes the situation of crisis in the short time by inputting password and will deduct less a part of cash pledge;
Without cellphone subscriber or defender's operation or mandate, other people can't consult the cellphone subscriber and upload information and image;
The vehicle-mounted computer platform, panel computer, desktop computer, notebook computer all can increase and guard button, and Method And Principle is the same.
2. mobile phone according to claim 1 is guarded machine, it is characterized in that, described defender's method to set up refers to: at first the cellphone subscriber is thought that the human hair carry information of likely guarding oneself shows oneself to want to invite the other side to become guarding of oneself; Then in two kinds of situation, situation one, the other side agrees just to reply and agree, and the other side's number is indexed on cell phone software, situation two, the other side disagrees with, replys refusal, can add reason for rejection;
If the cellphone subscriber is not the other side defender, can send information to the other side, apply to become the other side defender, then in two kinds of situation, situation one, the other side's agreement, cellphone subscriber's number will exist on the other side's cell phone software, situation two, the other side disagrees with, replys refusal;
Guard relation if cellphone subscriber or the other side want to cancel, can operate on the cell phone software of oneself voluntarily, then cell phone software can send SMS notification the other side;
Each mobile phone is guarded chance, and the toots of several and owner is set be the defender, and quantity is not limit, and the defender that converses is set on cell phone software.
3. mobile phone according to claim 1 is guarded machine, it is characterized in that, mobile phone is guarded the method that machine utilizes login function to guard, and divides two kinds:
Method one, if mobile phone is not had to any operation in owner n days, mobile phone is guarded chance and is sent information to the defender;
Method two, only have to login after mobile phone n every day point and could use mobile phone, and it is 3:00 AM that the n point is recommended, if mobile phone surpasses, within n days, do not log in successfully, and mobile phone can send information to the defender;
The information effect of indication is to guard with pressing the effect that button is the same;
Website, computer system, computer software, cell phone software all can adopt said method to be guarded.
4. mobile phone according to claim 1 is guarded machine, it is characterized in that, mobile phone positioning combination station or near landmark building location, when the handset starting guardian system, mobile phone guard chance nearest interchange of position, name of station, apart from station or the distance of landmark building, apart from station or the landmark building orientation send to the defender;
This mobile phone is guarded the machine function and can be applied to and purchase by group on platform, in conjunction with Localization of railway station, can facilitate the user to calculate the consumption distance, the road amount of consumption and find businessman by distance post distance orientation and mobile phone compass functional;
Concrete grammar is: at first the user finds station or landmark building, then in conjunction with the mobile phone compass functional, finds orientation, finally by distance, finds out Position Approximate.
5. mobile phone according to claim 1 is guarded machine, it is characterized in that: mobile phone has additionally independently electric power system only for guarding, can be button cell or another piece battery of mobile phone or same battery, last electric weight at least can move 20 minutes for claim 1 function:
If another set of electric power system: press to guard after button and directly use another set of electric power system, each charging is preferentially filled and is guarded the special electric power system, wants highlight indication while not having electricity;
If only use a battery: electric weight is divided into full electricity from big to small, warning value two, warning value one, empty electricity; Divide three kinds of situations, situation one, meeting reminding user electric weight deficiency when electric weight approaches warning value two, situation two, when electric weight reaches warning value two, preserve all save routine backed off after randoms that need automatically, and can only dial 110 and 120, situation three, automatic shutdown when electric weight reaches the warning value one-level, now only guard button and can start shooting ?.
6. mobile phone according to claim 1 is guarded machine, it is characterized in that: the hardware using waterproof of operation said system, and shockproof, anti-high temperature design, can assemble falling-proof apparatus, and guard button and multiple position is arranged for design;
Described waterproof refers to, mobile phone is all-in-one, and the user can't dismantle battery, and all outside junctions and external interface all have the water proof design;
Described shockproof referring to, moulding adopts all-in-one without renovating, and thin and thick is moderate, and corner angle are as far as possible round and smooth;
Described anti-high temperature refers to, adopt anti-high temperature enclosure, and the shell thermal conductivity is poor, as used ceramic fibre or high-temperature resistance plastice, can thermal sensor be installed on mobile phone, automatically sends information when temperature reaches certain value;
Falling-proof apparatus: by cell-phone cover, cell-phone cover connects hole, coded lock, and connection cord, band tape structure, binding device forms
Embodiment is as follows, on cell-phone cover, has a cell-phone cover to connect hole, and cell-phone cover connects hole can be by the lock ring of coded lock through just having pinned mobile phone;
Coded lock, connection cord, band tape structure, binding device is integrally connected, and can not break;
The principle of band tape structure is similar with the small-sized band tape structure in life, and just the iron chi has become connection cord, when there is no external force, and connection cord meeting automatic drawing back;
The general 50cm of connection cord is to 70cm, slightly is longer than the waist of trousers and takes the people to mobile phone is lifted to distance in one's ear, can adopt transparent material;
In band tape structure, the withdrawal pulling force of connection cord is greater than the weight of coded lock, is less than the weight of mobile phone;
When mobile phone charges or picture while taking down mobile phone, by opening coded lock, unload mobile phone;
Answer the call or while playing mobile phone, take out mobile phone, connection cord has just pulled out; While putting mobile phone in pocket, connection cord is with regard to automatic drawing back;
Binding device can be that a clip or rope can be clipped on clothes or tie up on clothes or clamp the cloth in pocket;
About guarding button positions: when guarding button and only have one, if the mobile phone power-on button on mobile phone top, is guarded button just at sidepiece; If the mobile phone power-on button at the mobile phone sidepiece, is guarded button just on mobile phone top; When starting, have two kinds of modes selective, one of mode is by guarding button n second, and mode two is guarded button and start button simultaneously by n second;
When guarding button and have two, each of mobile phone both sides must press, and lasting n started after second simultaneously;
Guard n that button starts to guardian system second from pinning, mobile phone can send the beeping sound reminding user and not touch by mistake.
7. mobile phone according to claim 1 is guarded machine, it is characterized in that: about the substitute mode of guarding button can be acoustic control, rock, the desktop shortcut icon, guarding like this machine function can be applied on now existing most of intelligent machines by cell phone software;
Acoustic control: at first enroll one section speech cipher, start when facing to mobile phone, reading out speech cipher;
Rock: number of times, is sequentially rocked in design left and to the right, when rocking like this, starts;
Desktop shortcut icon: can a shortcut icon be set at mobile phone desktop, continue to start after second by n.
8. mobile phone according to claim 1 is guarded machine, it is characterized in that: and guard the software that purchases by group of combination, if the user does not purchase by group explanation for a long time, life is more uninteresting, and at this moment group buying websites can send information to the defender, and then the user carries out following operation;
At first the user arranges the hobby of oneself on group buying websites, nuisance, and the thing of taboo, can bear amount of money scope, allows to invite user's people; The people in allowed band can't not send invitation to the user, and the minor can't accept any invitation, and will remind and go on a journey riskyly with the stranger, determine to want prudent;
The hobby arranged can be food and drink, film, tourism etc.; Nuisance can be peppery, tired, far away etc.; Can bear amount of money scope and divide the scope of paying the bill with the other side of paying for oneself; Allow to invite user's people to be divided into the defender, relatives, classmate, good friend etc.;
Divide two kinds of invitation patterns:
Invitation pattern one can first be browsed the hobby of second when first is wanted to invite second, abstains from amount of money scope then select a consumption and consumption information is sent to the Party B, and whether explanation is accompanied by first;
Then in two kinds of situation, situation one, the Party B agrees, replys and agrees, then first payment, then notifications Party B first received payment, then first and second the designated time is gone consumption with the consumption password separately; Situation two, the Party B disagrees with, replys refusal, can add reason for rejection;
Invitation pattern two, the Party B first browses purchasing by group of first explanation is set, and purchasing by group of then oneself being liked sends to the Party A, wishes that the Party A pays the bill, and whom explanation accompanied or do not needed the people to accompany by;
Then in two kinds of situation, situation one, the Party A agrees, replys and agrees and pay the bill, then notifications Party B first received payment, then the first and second designated times were gone consumption with the consumption password; Situation two, the Party A disagrees with, replys refusal, can add reason for rejection;
If surpass unmanned payment in a day or Party A, refuse payment, bill is cancelled;
Group buying websites can be sent and recommends consumption and will have preferential according to both sides' taste.
9. guard machine according to the described mobile phone of claim 1 or 8, it is characterized in that, Mobile phone card has the service of identity card real name verification, also can be in conjunction with fingerprint, retina checking, go out and purchase by group when consumption and can confirm the other side's identity and ID card information be passed to group buying websites and examined and record the time with passerby's fingerprint or scanning identity card by mobile telephone scanning, the consumption place with common friend;
When the people meets with an accident or be missing, whom the defender that can inquire the user by the group buying websites with mobile phone association has, and who the consumption that purchases by group the user accept recently, goes which consumption.
10. mobile phone according to claim 1 is guarded machine, it is characterized in that: the sound of alarm bell is frequency and the acoustics of unified uniqueness, can when solving a case, conductively-closed not fall to affect the crime sound recordings, and this frequency can lean on frequency collection device to collect a long way off.
CN201310483830.XA 2013-05-06 2013-10-16 Mobile phone guarding machine Pending CN103491514A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310483830.XA CN103491514A (en) 2013-10-16 2013-10-16 Mobile phone guarding machine
CN201310599909.9A CN103634492B (en) 2013-05-06 2013-11-25 The guardian system and coordinate cryptographic system of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310483830.XA CN103491514A (en) 2013-10-16 2013-10-16 Mobile phone guarding machine

Publications (1)

Publication Number Publication Date
CN103491514A true CN103491514A (en) 2014-01-01

Family

ID=49831408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310483830.XA Pending CN103491514A (en) 2013-05-06 2013-10-16 Mobile phone guarding machine

Country Status (1)

Country Link
CN (1) CN103491514A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957250A (en) * 2014-04-23 2014-07-30 深圳市金立通信设备有限公司 Terminal locating device and method
CN108337349A (en) * 2018-02-08 2018-07-27 刘二丽 The main integrated novel and multifunctional mobile phone of accessory

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957250A (en) * 2014-04-23 2014-07-30 深圳市金立通信设备有限公司 Terminal locating device and method
CN108337349A (en) * 2018-02-08 2018-07-27 刘二丽 The main integrated novel and multifunctional mobile phone of accessory

Similar Documents

Publication Publication Date Title
JP3799354B2 (en) How to provide security
US20120282884A1 (en) System and method for the emergency voice and image e-mail transmitter device
US7751534B2 (en) System and method for the emergency voice and image e-mail transmitter device
CN202650162U (en) Antitheft alarm system
US10176693B2 (en) Security and tracking systems and related methods
US20090181640A1 (en) Interactive Personal Surveillance and Security (IPSS) System
CN103634492B (en) The guardian system and coordinate cryptographic system of mobile phone
US20190005795A1 (en) Person of Interest Location Confirmation System
US20170372550A1 (en) Wireless door lock system with an emergency reporting function and method for operating the same
CN106846724A (en) A kind of locator and its locator alarm method
CN105162962B (en) A kind of automatic calling for help method and terminal
CN206224631U (en) A kind of family expenses gate inhibition face identification device
CN110910607A (en) Intelligent alarm terminal
CN105847561A (en) Environmental monitoring method, device and handset
US10431065B2 (en) Security and tracking systems and associated methods
CN103491514A (en) Mobile phone guarding machine
CN104333655A (en) Mobile phone guard machine
CN107506669A (en) The theft preventing method and device of a kind of mobile terminal
CN205959262U (en) Intelligent fingerprint identification lock
JP2011035517A (en) Position tracking and reporting system for mobile communication terminal
SE1351104A1 (en) Security system and electronic locking device for use therein, and an associated method for monitoring the handling of a security alarm event in a security alarm system
KR20140022705A (en) The safety keeper using the pre registry system
CN106297185A (en) A kind of Portable type safety protection system and method
JP2021052821A (en) Care system
Premi et al. FRNDY: A Women's Safety App

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140101