Disclosure of Invention
The embodiment of the invention provides a method and a core device for protecting electronic equipment safety, which are used for avoiding property loss and information leakage caused by the fact that the loss of the electronic equipment is not found in time.
The embodiment of the invention provides the following specific technical scheme:
the method comprises the steps that a first electronic device establishes signal connection with a second electronic device in a preset mode;
and triggering an alarm signal when the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's electronic equipment of management that moreover can be better has improved factor of safety.
Preferably, the first electronic device is connected to the second electronic device through a predetermined method, including:
the first electronic device is connected by any one of communication connection methods.
Preferably, the communication connection mode at least comprises a bluetooth connection, a WIFI connection, a wireless network card connection and a non-contact radio frequency identification connection.
Preferably, after the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, before triggering the alarm signal, the method further includes:
the first electronic equipment performs user sign parameter measurement to obtain a measurement result;
and when the first electronic equipment determines that the measurement result exceeds the range of the second set threshold value, the first electronic equipment determines to alarm.
Preferably, further comprising:
and in a set time range, if the first electronic device is not detected to be connected with the second electronic device again, the first electronic device generates an unlocking password, and the unlocking password is used for locking the first electronic device or locking a set application installed in the first electronic device.
Preferably, the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlocking password is a randomly generated password, the method further comprises the following steps: and sending the unlocking password to the second electronic equipment or a designated third equipment.
Preferably, the method further comprises:
the first electronic equipment releases the locking state after receiving the unlocking password input by the user; or after detecting that the first electronic equipment is connected with the second electronic equipment again, releasing the locking state.
Preferably, the first electronic device sends the alarm signal, and the alarm signal includes:
the first electronic equipment periodically sends an alarm signal according to a preset time length.
Preferably, after the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, the method further includes:
the first electronic device determining a user account locally and commonly associated with the second electronic device;
the first electronic equipment requests the network service platform corresponding to the user account to remove the association relationship between the second electronic equipment and the user account; or the first electronic device sends an instruction to the second electronic device, where the instruction is used to release the association relationship between the second electronic device and the user account.
Preferably, further comprising:
and after the first electronic device detects that the connection with the second electronic device is reestablished, establishing the association relationship between the second electronic device and the user account.
Preferably, the alarm signal comprises:
and displaying the prompt message on the first electronic equipment.
Preferably, the prompt message includes:
the first operation entrance is used for triggering the locking of the second equipment or the setting application in the second equipment; and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is a user account jointly associated with the first electronic equipment and the second electronic equipment.
Preferably, the first electronic device includes: intelligent wearing equipment or intelligent terminal.
An apparatus for electronic device security, comprising:
the communication unit is used for establishing signal connection with another electronic device in a preset mode;
and the processing unit is used for triggering an alarm signal when the strength of the signal connection is detected to be lower than a preset signal threshold and the duration time reaches a preset time threshold.
Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's electronic equipment of management that moreover can be better has improved factor of safety.
Preferably, when the communication unit is connected to another electronic device in a preset manner, the communication unit is configured to:
the connection is made by any of the communication connections.
Preferably, the communication connection mode at least comprises a bluetooth connection, a WIFI connection, a wireless network card connection and a non-contact radio frequency identification connection.
Preferably, after detecting that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, before triggering an alarm signal, the processing unit is further configured to:
executing user sign parameter measurement to obtain a measurement result;
and when the measurement result is determined to exceed the range of a second set threshold value, determining to alarm.
Preferably, the processing unit is further configured to:
and in a set time range, if no reconnection with the other electronic equipment is detected, generating an unlocking password, wherein the unlocking password is used for locking the electronic equipment or locking the installed set application.
Preferably, the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlocking password is a randomly generated password, the processing unit is further configured to: and sending the unlocking password to another electronic device or a designated third device.
Preferably, the processing unit is further configured to:
after receiving the unlocking password input by the user, unlocking the locking state; or,
and after detecting that the electronic equipment is connected with the other electronic equipment again, releasing the locking state.
Preferably, when the alarm signal is sent, the processing unit is configured to:
and sending alarm signals periodically according to a preset time length.
Preferably, after detecting that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, the processing unit is further configured to:
determining a user account locally and commonly associated with the other electronic device;
requesting to a network service platform corresponding to the user account to release the association relationship between the other electronic equipment and the user account; or sending an instruction to the other electronic device, wherein the instruction is used for releasing the association relationship between the other electronic device and the user account.
Preferably, the communication unit is further configured to:
and after the connection with the other electronic equipment is detected to be reestablished, establishing the association relationship between the other electronic equipment and the user account.
Preferably, the alarm signal includes:
and prompt information displayed on the electronic equipment.
Preferably, the prompt message includes:
a first operation entry for triggering locking of the other device or a setting application in the other device; and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is the user account commonly associated with the other electronic equipment.
Preferably, the electronic device is: intelligent wearing equipment or intelligent terminal.
Detailed Description
In practical application, there is an electronic device that can receive a service use request from a user, call a corresponding user account based on the service use request, call user verification information set for the corresponding user account to generate a verification barcode, present the verification barcode to a service use device, and trigger a corresponding service process after the service use device passes security verification based on the verification barcode.
For example, the student a borrows books in a library, the student account number can be input into the electronic device, the electronic device can borrow books when determining that the account number is consistent with a preset account, and the identity information (including name, class, age, mobile phone number, borrowed books, date and the like) of the student a can be inquired through the account.
Therefore, the identity information of the user can be acquired through the electronic equipment, and once the identity information is lost, personal information can be leaked.
For another example, the user B may perform the third-party remittance service through the electronic device, and input the password into the electronic device, and when the electronic device determines that the password is consistent with the preset password, the payment is successful, and may query the current account balance (e.g., the balance of the payer and the balance of the bound bank card) through the password.
It can be seen that third party money transfer services are available via electronic devices and, once lost, result in economic loss.
Therefore, security protection of electronic devices is particularly important. In the embodiment of the invention, a method for protecting the safety of electronic equipment is provided, and the scheme is as follows: the first electronic device triggers an alarm signal by detecting the signal intensity between the first electronic device and the second electronic device when the intensity of signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings. In the embodiment of the present invention, the first electronic device may be an intelligent wearable device, such as an intelligent watch, an intelligent bracelet, and intelligent glasses, or an intelligent device, such as a tablet computer, a mobile phone, and the like, and the second electronic device may also be an intelligent wearable device, such as an intelligent watch, an intelligent bracelet, and intelligent glasses, or an intelligent device, such as a tablet computer, a mobile phone, and the like.
Referring to fig. 1, in the embodiment of the present invention, an overview flow of the electronic device security protection is as follows:
step 100: the first electronic equipment establishes signal connection with the second electronic equipment through a preset mode.
In this embodiment of the present invention, the first electronic device is connected through any one of communication connection manners, where the connection manner at least includes: bluetooth, Wireless local area network (WIFI), Wireless network card connection, and contactless radio frequency identification connection.
Step 110: and triggering an alarm signal when the first electronic device detects that the strength of signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
In the embodiment of the present invention, in step 110, after the first electronic device detects that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, before the alarm signal is triggered, the first electronic device performs measurement of the user physical sign parameter to obtain a measurement result, and when the measurement result is determined to exceed the second set threshold range, it is determined to alarm.
The user physical sign parameter measurement refers to measurement of parameters such as human heart rate and body temperature, the second set threshold range refers to a normal range of human heart rate and body temperature, generally, the human heart rate is set to be 50-90 per second, and the body temperature is set to be 35.5-39 ℃ and belongs to the normal range.
For example, after the first electronic device detects that the intensity of the signal connection between the first electronic device and the second electronic device is lower than-100 dbm and the duration reaches 15 minutes (generally, the preset signal threshold is set to-100 dbm, and the preset duration threshold is 15 minutes), the first electronic device starts the user physical sign parameter measurement, the measured heart rate is 10 per second, the body temperature is about 10 ℃, and the measured heart rate is not within the normal range, and then the alarm is determined.
Optionally, within the set time range, if it is not detected that the first electronic device is reconnected with the second electronic device, the first electronic device generates an unlocking password, where the unlocking password is used to lock itself, and may also lock the set application installed in the first electronic device. When the unlocking password is set, the user can set the password in advance or randomly generate the password, the password generated randomly can be sent to the second electronic device or the appointed third device after the password is generated, and the user can obtain the unlocking password through the second device or the appointed third device.
Here, if it is not detected that the first electronic device is reconnected to the second electronic device, it means that the strength of the signal connection detected by the first electronic device to the second electronic device is still lower than the preset signal threshold.
In general, the setting application installed in the first electronic device may be a QQ mailbox, a memo, a payroll client, a short message, and the like on the first electronic device. The designated third device may be a QQ mailbox, a short message, etc. on other devices, and the third device may be a device of the user or its associated user.
For example, the time range is set to be half an hour, after the half hour, if it is not detected that the first electronic device is reconnected with the second electronic device, the first electronic device may lock only a memo in the device itself and send the randomly generated decryption password to the QQ mailbox, if the first electronic device of the user is not lost, the user may obtain the unlocking password as long as logging in the QQ mailbox, when the first electronic device receives the unlocking password input by the user, the locking state of the memo is released, and when it is detected that the first electronic device is reconnected with the second electronic device, the locking state may also be automatically released; if the first electronic equipment of the user is lost, other users cannot obtain a memo for entering the electronic equipment by the unlocking password.
For another example, the time range is set to be half an hour, after the half hour, if the reconnection between the first electronic device and the second electronic device is not detected, the first electronic device locks itself and generates a preset decryption password, if the first electronic device of the user is not lost, the user can unlock by directly inputting the preset password, when the first electronic device receives the unlocking password input by the user, the locking state is released, and when the reconnection between the first electronic device and the second electronic device is detected, the locking state can be automatically released; if the first electronic device of the user is lost, other users cannot obtain the unlocking password to operate the electronic device.
In addition, the function of generating the unlocking password can be set by a user, the function of closing the generated unlocking password can be set when the user takes a bath, has a rest or learns, and therefore the user can avoid unnecessary locking and unlocking operations.
On the other hand, the first electronic device periodically sends an alarm signal according to a preset time period, and the alarm signal can automatically set an audio file.
For example, assuming that the preset time period is 5 minutes, the first electronic device sends an alarm signal to the user every 5 minutes.
Further, after the first electronic device detects that the strength of the signal connection is lower than the preset signal threshold and the duration time reaches the preset time threshold, the first electronic device determines a local user account associated with the second electronic device together, requests the network service platform corresponding to the user account to release the association between the second electronic device and the user account, and the first electronic device may also send an indication to the second electronic device to indicate that the association between the second electronic device and the user account is released.
Here, the first electronic device may establish an account association relationship with a different electronic device, or may establish a plurality of account association relationships with the same electronic device. For example, in the same office, the first electronic device may establish a microblog account association relationship with the B electronic device, a mailbox association relationship with the C electronic device, and a third-party remittance service account association relationship with the D electronic device; the first electronic device can also establish a plurality of association relations such as a QQ mailbox, WeChat, book borrowing account and the like with the E electronic device.
For example, after the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, if the first electronic device determines that a user account locally associated with the second electronic device is an electronic coupon account, the electronic coupon account can be discounted when used in a mall a, at this time, a request is made to a network service platform corresponding to the electronic coupon account to release the association relationship between the second electronic device and the electronic coupon account, and the second electronic device cannot reuse the electronic coupon account after the release, so that in case of loss of the second electronic device, other users cannot use the electronic coupon account of the second electronic device.
For another example, after the first electronic device detects that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, it is assumed that the first electronic device determines that the user account locally associated with the second electronic device is a short message service, at this time, the first electronic device sends an instruction to the second electronic device to instruct to release the association relationship between the second electronic device and the short message service, and after release, the second electronic device cannot refer to the short message service and cannot continue sending and receiving short messages related to the number of the electronic device.
In addition, the alarm signal is displayed on prompt information on the first electronic equipment, and the prompt information is used for triggering a first operation entrance for locking the second electronic equipment or the set application in the second electronic equipment;
and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is a user account jointly associated with the first electronic equipment and the second electronic equipment.
For example, when it is determined that an alarm is to be given, the first electronic device may display a prompt message, such as: if the first operation entry for locking the second electronic device (or the setting application in the second electronic device) is triggered, the user operates according to the prompt information, for example, if the user selects the first operation entry, the first electronic device may be triggered to execute an operation corresponding to the first operation entry, that is, if the first electronic device detects that the user triggers the first operation entry, the step of locking the second electronic device (or the setting application in the second electronic device) is executed, so that the operation efficiency is improved.
For another example, when it is determined to alarm, the first electronic device may display a prompt message, such as: and triggering a second operation entry for releasing the association relationship of the user account, where the user account is a user account associated with the first electronic device and the second electronic device together, and then the user performs an operation according to the prompt information, for example, if the user selects the second operation entry, the first electronic device may be triggered to execute an operation corresponding to the second operation entry, that is, if the first electronic device detects that the user triggers the second operation entry, the step of releasing the association relationship of the user account is executed, so as to improve the operation efficiency.
And when the first electronic equipment detects that the first electronic equipment is connected with the second electronic equipment again, stopping sending the alarm signal and re-associating the account.
Reestablishing the connection here means that the first electronic device detects that the strength of the signal connection with the second electronic device reaches a preset signal threshold.
For example, assuming that the originally established association relationship is still the electronic coupon account, after detecting that the first electronic device is re-connected with the second electronic device, the first electronic device stops sending the alarm signal, and the electronic coupon account associated with the second electronic device also recovers the association relationship, that is, the second electronic device can use the electronic coupon account again.
The above embodiments are further described in detail below using a specific application scenario. Take the first electronic device as a smart watch and the second electronic device as a mobile phone as an example.
For example, the smart watch and the mobile phone establish signal connection through bluetooth, when the smart watch detects that the strength of the signal connection is lower than a preset signal threshold (-100dbm) and the duration reaches a preset duration threshold (15 minutes), user sign parameter measurement is started, if the heart rate and the body temperature of the user are detected to be out of a normal range, the smart watch triggers an alarm signal, optionally, the smart watch generates an unlocking password, sends the decryption password to a QQ mailbox, and locks the smart watch; if the smart watch of the user is not lost, the user can log in a QQ mailbox to obtain a password, the smart watch releases the locking state after receiving an unlocking password input by the user, in addition, after an alarm signal is triggered, the smart watch requests a network platform corresponding to the WeChat to release the WeChat service commonly associated with the mobile phone on the assumption that the smart watch determines that a user account number commonly associated with the mobile phone is WeChat, and therefore, in case that the mobile phone is lost, service information related to the WeChat cannot be leaked through the mobile phone.
The above embodiments are further described in detail with a specific application scenario. Take the first electronic device as a mobile phone and the second electronic device as a smart watch as an example.
For example, the mobile phone and the smart watch are in signal connection through Bluetooth, when the mobile phone detects that the strength of the signal connection is lower than a preset signal threshold (-100dbm) and the duration reaches a preset duration threshold (15 minutes), user sign parameter measurement is started, if the heart rate and the body temperature of the user are detected to be out of normal ranges, the mobile phone triggers an alarm signal, optionally, the mobile phone generates an unlocking password, sends the decryption password to a mobile phone short message and locks the mobile phone short message; if the mobile phone of the user is not lost, the user can obtain the password through the short message, the locking state is released after the mobile phone receives the unlocking password input by the user, in addition, after the alarm signal is triggered, the mobile phone determines that the user account number commonly associated with the intelligent watch is the third-party remittance service, then the mobile phone requests a network platform corresponding to the third-party remittance service to release the third-party remittance service commonly associated with the intelligent mobile phone, and therefore, in case that the intelligent watch is lost, the third-party remittance service cannot be carried out through the intelligent watch.
Based on the above embodiments, referring to fig. 2, in an embodiment of the present invention, an apparatus for protecting electronic equipment includes: a communication unit 20 and a processing unit 21, wherein,
the communication unit 20 is used for establishing signal connection with another electronic device in a preset mode;
and the processing unit 21 is configured to trigger an alarm signal when it is detected that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
Preferably, when the electronic device is connected to another electronic device in a predetermined manner, the communication unit 20 is configured to:
the connection is made by any of the communication connections.
Preferably, the communication connection mode at least comprises Bluetooth connection, WIFI connection, wireless network card connection and non-contact radio frequency identification connection.
Preferably, after detecting that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, before triggering the alarm signal, the processing unit 21 is further configured to:
executing user sign parameter measurement to obtain a measurement result;
and when the measurement result is determined to exceed the range of the second set threshold value, determining to alarm.
Preferably, the processing unit 21 is further configured to:
and in a set time range, if no reconnection with another electronic device is detected, generating an unlocking password, wherein the unlocking password is used for locking the electronic device or locking the installed set application.
Preferably, the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlock password is a randomly generated password, the processing unit 21 is further configured to: and sending the unlocking password to the other electronic equipment or the designated third equipment.
Preferably, the processing unit 21 is further configured to:
after receiving an unlocking password input by a user, unlocking the locking state; or,
and after detecting that the electronic equipment is connected with another electronic equipment again, releasing the locking state.
Preferably, when sending the alarm signal, the processing unit 21 is configured to:
and sending alarm signals periodically according to a preset time length.
Preferably, after detecting that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, the processing unit 21 is further configured to:
determining a user account locally and commonly associated with another electronic device;
requesting to a network service platform corresponding to the user account to remove the association relation between the other electronic equipment and the user account; or, an indication is sent to the other electronic device, and the indication is used for releasing the association relationship between the other electronic device and the user account.
Preferably, the communication unit 20 is further configured to:
and after the connection with the other electronic equipment is detected to be reestablished, establishing the association relationship between the other electronic equipment and the user account.
Preferably, the alarm signal comprises:
and prompt information displayed on the electronic equipment.
Preferably, the prompt message includes:
a first operation entrance for triggering locking of the other device or the setting application in the other device; and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is a user account commonly associated with another electronic device.
Preferably, the electronic device is: intelligent wearing equipment or intelligent terminal.
In summary, in the embodiments of the present invention, the first electronic device establishes a signal connection with the second electronic device through a preset method, and when the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches the preset duration threshold, the first electronic device triggers an alarm signal. Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and can avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's that management that can be better has improved factor of safety moreover.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments of the present invention without departing from the spirit or scope of the embodiments of the invention. Thus, if such modifications and variations of the embodiments of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to encompass such modifications and variations.