CN107818652A - Information processing method and equipment - Google Patents
Information processing method and equipment Download PDFInfo
- Publication number
- CN107818652A CN107818652A CN201710995167.XA CN201710995167A CN107818652A CN 107818652 A CN107818652 A CN 107818652A CN 201710995167 A CN201710995167 A CN 201710995167A CN 107818652 A CN107818652 A CN 107818652A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- device identification
- monitoring
- alarm
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
Abstract
The disclosure, which provides information processing method and equipment, information processing method, to be included:Monitor the terminal device wirelessly connected;Obtain the device identification of the terminal device;When it is determined that not including the device identification in default device identification white list, alarm operation is triggered.The technical scheme is applied to message processing device, the message processing device possesses wireless connecting function, message processing device is monitored to connected terminal device, get the device identification of connected terminal device, think there is the access of illegal terminal equipment if the device identification obtained is not included in white list, now trigger alarm operation, so as to by it is a kind of it is more concealed in a manner of realize monitoring to illegal terminal equipment, if intruder, which carries illegal terminal equipment, enters monitoring range, it can be found in time, so as to improve the reliability of surveillance and control measure.
Description
Technical field
This disclosure relates to areas of information technology, more particularly to information processing method and equipment.
Background technology
Camera is anti-thefting monitoring equipment common in life, to obtain bigger coverage or apparent shooting
Effect, usual camera are arranged on obvious position, and when someone breaks in private manor, camera is easy to be sent out by intruder
It is existing, therefore intruder can avoid the monitoring range of camera so that surveillance and control measure fails.
The content of the invention
The embodiment of the present disclosure provides information processing method and equipment, technical scheme are as follows:
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of information processing method, including:
Monitor the terminal device wirelessly connected;
Obtain the device identification of the terminal device;
When it is determined that not including the device identification in default device identification white list, alarm operation is triggered.
The technical scheme that the disclosure provides, applied to message processing device, the message processing device possesses wireless connection work(
Can, message processing device is monitored to connected terminal device, gets the equipment mark of connected terminal device
Know, think there is the access of illegal terminal equipment if the device identification obtained is not included in white list, now triggering alarm behaviour
Make, so as to by it is a kind of it is more concealed in a manner of realize monitoring to illegal terminal equipment, if intruder's carrying illegal terminal is set
It is standby to enter monitoring range, it can be found in time, so as to improve the reliability of surveillance and control measure.
In one embodiment, the terminal device that the monitoring wirelessly connects, including:
When it is determined that do not include the device identification in default device identification white list, and between the terminal device
When distance is no more than predetermined threshold value, alarm operation is triggered.
In one embodiment, the terminal device that the monitoring wirelessly connects, including:
The terminal device that monitoring passes through bluetooth connection;
Or the terminal device that monitoring passes through WIFI connections.
In one embodiment, the device identification for obtaining the terminal device, including:
When exchanging handshaking information with the terminal device, the device identification of the terminal device is obtained.
In one embodiment, the triggering alarm operation, including:
Outputting alarm information;
Or sent a warning message to target device;
Or target device performs default alarm operation.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of message processing device, including:
Monitoring modular, for monitoring the terminal device wirelessly connected;
Link block, for obtaining the device identification of the terminal device;
Alarm module, for when it is determined that not including the device identification in default device identification white list, triggering to be accused
Alert operation.
In one embodiment, the alarm module includes distance alarm submodule, for when the default equipment mark of determination
Knowing in white list does not include the device identification, and when being no more than predetermined threshold value with the distance between the terminal device, triggers
Alarm operation.
In one embodiment, the monitoring modular includes bluetooth monitoring submodule, for monitoring by bluetooth connection
Terminal device;
Or the monitoring modular includes Wireless Fidelity monitoring submodule, is set for monitoring by the terminal of WIFI connections
It is standby.
In one embodiment, the link block includes equipment identification submodule, for being handed over the terminal device
When changing handshaking information, the device identification of the terminal device is obtained.
In one embodiment, the alarm module includes output sub-module, for outputting alarm information;
Or the alarm module includes sending submodule, for being sent a warning message to target device;
Or the alarm module includes instruction submodule, default alarm operation is performed for target device.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of message processing device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Monitor the terminal device wirelessly connected;
Obtain the device identification of the terminal device;
When it is determined that not including the device identification in default device identification white list, alarm operation is triggered.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of computer-readable recording medium, be stored thereon with calculating
Machine instructs, and the instruction realizes the step of first aspect provides method when being executed by processor.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is the flow chart of the information processing method according to an exemplary embodiment.
Fig. 2 is the flow chart of the information processing method according to an exemplary embodiment.
Fig. 3 is the block diagram of the electronic equipment according to an exemplary embodiment.
Fig. 4 is the block diagram of the electronic equipment according to an exemplary embodiment.
Fig. 5 is the block diagram of the electronic equipment according to an exemplary embodiment.
Fig. 6 is the block diagram of the electronic equipment according to an exemplary embodiment.
Fig. 7 is the block diagram of the electronic equipment according to an exemplary embodiment.
Fig. 8 is the block diagram of the electronic equipment according to an exemplary embodiment.
Fig. 9 is the block diagram of the electronic equipment according to an exemplary embodiment.
Figure 10 is the block diagram of the electronic equipment according to an exemplary embodiment.
Figure 11 is the block diagram of the electronic equipment according to an exemplary embodiment.
Figure 12 is the block diagram of the terminal device according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Most common monitoring means are monitored using camera in life, and cracker can avoid camera as far as possible
Monitoring range surveillance and control measure is failed.The purpose of the disclosure is to provide a kind of more concealed monitoring scheme, to improve
The reliability of surveillance and control measure.
The disclosure provides a kind of information processing method, and applied to message processing device, the message processing device can be used as one
The single product of part comes into operation, or with other products are integrated uses, such as with Baffle Box of Bluetooth, wireless router, television set
Or the product such as other household electrical appliance integrates, to play a part of secret monitoring.Fig. 1 is shown according to an exemplary embodiment
A kind of flow chart of information processing method, the method comprising the steps of 101-103:
In a step 101, the terminal device wirelessly connected is monitored.
The message processing device possesses wireless connecting function, to adapt to different application environment, can wirelessly be connected using different
Connect mode.
Such as in common domestic environment, wireless connecting function can be realized by bluetooth.Message processing device can be with indigo plant
Tooth audio amplifier integrates, and is placed in domestic environment.Assuming that message processing device can connect the end in the range of 10 meters around by bluetooth
End equipment, then message processing device can monitor whether there is bluetooth equipment access in the range of this.
In large range of monitors environment, such as in the application scenarios to being monitored around a warehouse, information
Processing equipment can pass through Wireless Fidelity (English full name:Wireless Fidelity, English abbreviation:WIFI wireless connection) is realized
Function, to monitor bigger scope.
The terminal device that message processing device wirelessly connects, pass through when there is terminal device with message processing device
When wireless mode connects, triggering following step.
It is emphasized that the terminal device that wirelessly connects of monitoring, both included monitoring wirelessly with
Premises equipment requests establish the situation of connection, also include monitoring and the feelings being connected wirelessly are had built up with terminal device
Shape.
In a step 102, the device identification of terminal device is obtained.
Device identification includes the hardware address of terminal device, device name etc..
In one embodiment, during message processing device and terminal device establish connection, terminal device is by hardware
Address is sent to message processing device, equipment mark of the message processing device using the hardware address of terminal device as terminal device
Know.
In another embodiment, equipment mark of the message processing device using the device name of terminal device as terminal device
Know.By taking the situation of bluetooth connection as an example, for intruder's carrying mobile phone close to message processing device, the Bluetooth function of the mobile phone is unlatching
The mobile phone of state, message processing device and intruder establish bluetooth connection.The bluetooth device name of the mobile phone is the " hand of Zhang San
Machine ", then message processing device can the device identification of " mobile phone of Zhang San " as the mobile phone.
In step 103, when it is determined that not including device identification in default device identification white list, triggering alarm behaviour
Make.
Message processing device preserves a device identification white list, for preserving the equipment mark for the terminal device for allowing connection
Know, device identification white list can be sky.
User can add new device identification thereto at any time, or delete wherein existing device identification.For example, letter
Breath processing equipment is integrated with Baffle Box of Bluetooth, and user is applied by mobile phone and is connected with message processing device, and to the white name of device identification
Single progress is self-defined.
When a premises equipment requests and message processing device establish wireless connection, or built with message processing device
During vertical wireless connection, message processing device obtains the device identification of the terminal device, if device identification white list includes this
Device identification, then alarm operation need not be triggered, if not including the device identification in device identification white list, triggering alarm behaviour
Make.
In one embodiment, message processing device integrates with Baffle Box of Bluetooth, and alarm operation can be defeated by Baffle Box of Bluetooth
Go out warning information, warning information can be one section of voice prestored.
In another embodiment, Baffle Box of Bluetooth can access family lan, alarm operation can be from Baffle Box of Bluetooth to
Target device sends a warning message, and the target device can be the mobile phone of user, and warning information can similar " have stranger to rush
Enter " as text information.Further, user can be applied to Baffle Box of Bluetooth by mobile phone after warning information is received and be sent out
One section of voice is sent, this section of voice is exported by Baffle Box of Bluetooth, to draw back intruder with fear.
Certainly, a variety of alarm operations can be performed both by, and the disclosure is to the concrete form of alarm operation and alarm operation
Quantity does not limit.
The information processing method that the embodiment of the present disclosure provides, applied to message processing device, the message processing device possesses
Wireless connecting function, message processing device are monitored to connected terminal device, are got connected terminal and are set
Standby device identification, think there is the access of illegal terminal equipment if the device identification obtained is not included in white list, now
Trigger alarm operation, so as to by it is a kind of it is more concealed in a manner of realize monitoring to illegal terminal equipment, if intruder's carrying
Illegal terminal equipment enters monitoring range, can be found in time, so as to improve the reliability of surveillance and control measure.
The information processing method provided based on embodiment corresponding to above-mentioned Fig. 1, Fig. 2 is shown according to an exemplary embodiment
A kind of information processing method flow chart, the information processing method that embodiment corresponding to Fig. 2 is provided the disclosure done one
Step supplement and explanation.The step in content embodiment corresponding with Fig. 1 in which part step is same or like, below only
Difference in step is elaborated.Shown in reference picture 2, the information processing method that the present embodiment provides includes step 201-
203:
In step 201, the terminal device wirelessly connected is monitored.
In step 202, when exchanging handshaking information with terminal device, the device identification of terminal device is obtained.
Terminal device needs to exchange handshaking information during establishing wireless connection with message processing device, terminal device to
Equipment mark can be used as by generally including hardware address, device name of terminal device etc. in the handshaking information that message processing device is sent
The information of knowledge.
In step 203, when it is determined that do not include device identification in default device identification white list, and with terminal device it
Between distance when being no more than predetermined threshold value, trigger alarm operation.
Under conditions of message processing device and terminal device can establish wireless connection, by message processing device and terminal
The distance between equipment is referred to as connecting distance.Assuming that message processing device can connect the terminal in the range of 10 meters around by bluetooth
Equipment, the value of predetermined threshold value can be set to be less than or equal to 10 meters.
Message processing device can determine connection distance according to the intensity of Bluetooth signal between terminal device.Such as protect in advance
Deposit the table of comparisons of the signal intensity with being connected distance, the table of comparisons save each self-corresponding connection of unlike signal intensity away from
From.Whether message processing device can determine connection distance according to the change of signal intensity, and further determine that connection distance pre-
If within threshold value.
When it is determined that do not include the device identification of terminal device in default device identification white list, and connect distance and be no more than
During predetermined threshold value, alarm operation is triggered, causes owner to pay attention to or draw back with fear intruder.
In one embodiment, message processing device can be used as a individually product to be inserted in power outlet, and access
Family lan.Or message processing device can be with the integration of equipments such as wireless router, television set.
Alarm operation may include to send a warning message to the mobile phone of user, and it is default can also to include target device execution
Alarm operation.Target device can be opened for the various equipment of access family lan, such as television set, intelligent curtain, electric light
Close, image first-class equipment.It can be instruction television set, intelligent curtain, electric light that target device, which performs default alarm operation,
Opening is either closed or repeatedly opened and closed, and instruction camera rotational angle carries out pan-shot etc..
The information processing method that the embodiment of the present disclosure provides, applied to message processing device, the message processing device possesses
Wireless connecting function, message processing device are monitored to connected terminal device, are got connected terminal and are set
Standby device identification, think there is the access of illegal terminal equipment if the device identification obtained is not included in white list, now
Trigger alarm operation, so as to by it is a kind of it is more concealed in a manner of realize monitoring to illegal terminal equipment, if intruder's carrying
Illegal terminal equipment enters monitoring range, can be found in time, so as to improve the reliability of surveillance and control measure.
Following is disclosure apparatus embodiments, can be used for performing embodiments of the present disclosure.
Fig. 3 is the block diagram of a kind of electronic equipment according to an exemplary embodiment, and the equipment can be by software, hard
Part or both is implemented in combination with its some or all of function, for performing described in embodiment corresponding to Fig. 1-Fig. 2
Information processing method.As shown in figure 3, electronic equipment includes:
Monitoring modular 301, for monitoring the terminal device wirelessly connected.
Link block 302, for obtaining the device identification of terminal device.
Alarm module 303, for when it is determined that not including device identification in default device identification white list, triggering to alert
Operation.
As shown in figure 4, in one embodiment, alarm module 303 includes distance alarm submodule 3031, for when true
Do not include device identification in fixed default device identification white list, and be no more than predetermined threshold value with the distance between terminal device
When, trigger alarm operation.
As shown in figure 5, in one embodiment, monitoring modular 301 includes bluetooth monitoring submodule 3011, for monitoring
Pass through the terminal device of bluetooth connection.
As shown in fig. 6, in one embodiment, monitoring modular 301 includes Wireless Fidelity monitoring submodule 3012, for supervising
Survey the terminal device by WIFI connections.
As shown in fig. 7, in one embodiment, link block 302 includes equipment identification submodule 3021, for
When terminal device exchanges handshaking information, the device identification of terminal device is obtained.
As shown in figure 8, in one embodiment, alarm module 303 includes output sub-module 3032, believe for outputting alarm
Breath.
As shown in figure 9, in one embodiment, alarm module 303 includes sending submodule 3033, for target device
Send a warning message.
As shown in Figure 10, in one embodiment, alarm module 303 includes instruction submodule 3034, for indicating target
Equipment performs default alarm operation.
The electronic equipment that the embodiment of the present disclosure provides, the message processing device possess wireless connecting function, and information processing is set
It is standby that connected terminal device is monitored, the device identification of connected terminal device is got, if obtain
Device identification, which is not included in white list, then thinks there is the access of illegal terminal equipment, alarm operation is now triggered, so as to one kind
More concealed mode realizes the monitoring to illegal terminal equipment, if intruder carries illegal terminal equipment and enters monitoring model
Enclose, can be found in time, so as to improve the reliability of surveillance and control measure.
Figure 11 is the block diagram of a kind of electronic equipment according to an exemplary embodiment, the equipment can by software,
Hardware or both is implemented in combination with as some or all of of electronic equipment, and the electronic equipment is used to perform above-mentioned Fig. 1-figure
Information processing method described in embodiment corresponding to 2.As shown in figure 11, electronic equipment 110 includes:
Processor 1101.
For storing the memory 1102 of the executable instruction of processor 1101.
Wherein, processor 1101 is configured as:
Monitor the terminal device wirelessly connected.
Obtain the device identification of terminal device.
When it is determined that not including device identification in default device identification white list, alarm operation is triggered.
In one embodiment, above-mentioned processor 1101 is also configured to:
Do not surpass when it is determined that do not include device identification in default device identification white list, and with the distance between terminal device
When crossing predetermined threshold value, alarm operation is triggered.
In one embodiment, above-mentioned processor 1101 is also configured to:
The terminal device that monitoring passes through bluetooth connection.
In one embodiment, above-mentioned processor 1101 is also configured to:
The terminal device that monitoring passes through WIFI connections.
In one embodiment, above-mentioned processor 1101 is also configured to:
When exchanging handshaking information with terminal device, the device identification of terminal device is obtained.
In one embodiment, above-mentioned processor 1101 is also configured to:
Outputting alarm information.
In one embodiment, above-mentioned processor 1101 is also configured to:
Sent a warning message to target device.
In one embodiment, above-mentioned processor 1101 is also configured to:
Target device performs default alarm operation.
The electronic equipment that the embodiment of the present disclosure provides, the message processing device possess wireless connecting function, and information processing is set
It is standby that connected terminal device is monitored, the device identification of connected terminal device is got, if obtain
Device identification, which is not included in white list, then thinks there is the access of illegal terminal equipment, alarm operation is now triggered, so as to one kind
More concealed mode realizes the monitoring to illegal terminal equipment, if intruder carries illegal terminal equipment and enters monitoring model
Enclose, can be found in time, so as to improve the reliability of surveillance and control measure.
The electronic equipment that the embodiment of the present disclosure provides can be a terminal device as shown in figure 12, and Figure 12 is according to one
A kind of block diagram of terminal device shown in exemplary embodiment, the terminal device 120 can be smart mobile phone, tablet personal computer etc.,
The terminal device 120 is used to perform the information processing method described in embodiment corresponding to above-mentioned Fig. 1-Fig. 2.
Terminal device 120 can include following one or more assemblies:Processing component 1201, memory 1202, power supply group
Part 1203, multimedia groupware 1204, audio-frequency assembly 1205, the interface 1206 of input/output (I/O), sensor cluster 1207,
And communication component 1208.
Processing component 1201 generally controls the integrated operation of terminal device 120, such as leads to display, call, data
The operation that letter, camera operation and record operation are associated.Processing component 1201 can include one or more processors 12011
Carry out execute instruction, to complete all or part of step of above-mentioned method.In addition, processing component 1201 can include one or more
Individual module, the interaction being easy between processing component 1201 and other assemblies.For example, processing component 1201 can include multimedia mould
Block, to facilitate the interaction between multimedia groupware 1204 and processing component 1201.
Memory 1202 is configured as storing various types of data to support the operation in terminal device 120.These numbers
According to example include being used for the instruction of any application program or method operated on terminal device 120, contact data, phone
Book data, message, picture, video etc..Memory 1202 can by any kind of volatibility or non-volatile memory device or
Person's combinations thereof is realized, such as static RAM (English full name:Static Random Access Memory, English
Literary abbreviation:SRAM), Electrically Erasable Read Only Memory (English full name:Electrically Erasable
Programmable Read Only Memory, English abbreviation:EEPROM), (English is complete for Erasable Programmable Read Only Memory EPROM
Claim:Erasable Programmable Read Only Memory, English abbreviation:EPROM), programmable read only memory (English
Literary full name:Programmable Read Only Memory, English abbreviation:PROM), read-only storage (English full name:Read
Only Memory, English abbreviation:ROM), magnetic memory, flash memory, disk or CD.
Power supply module 1203 provides electric power for the various assemblies of terminal device 120.Power supply module 1203 can include power supply
Management system, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal device 120.
Multimedia groupware 1204 is included in the screen of one output interface of offer between terminal device 120 and user.
In some embodiments, screen can include liquid crystal display (English full name:Liquid Crystal Display, English abbreviation:
) and touch panel (English full name LCD:Touch Panel, English abbreviation:TP).If screen includes touch panel, screen can
To be implemented as touch-screen, to receive the input signal from user.Touch panel include one or more touch sensors with
Gesture on sensing touch, slip and touch panel.Touch sensor can the not only border of sensing touch or sliding action, and
And also detection and the duration and pressure touched or slide is related.In certain embodiments, multimedia groupware 1204 wraps
Include a front camera and/or rear camera.When terminal device 120 is in operator scheme, such as screening-mode or video screen module
During formula, front camera and/or rear camera can receive outside multi-medium data.Each front camera and rearmounted take the photograph
As head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 1205 is configured as output and/or input audio signal.For example, audio-frequency assembly 1205 includes one
Microphone (English full name:Microphone, English abbreviation:MIC), when terminal device 120 is in operator scheme, mould is such as called
When formula, logging mode and speech recognition mode, microphone is configured as receiving external audio signal.The audio signal received can
To be further stored in memory 1202 or be sent via communication component 1208.In certain embodiments, audio-frequency assembly 1205
Also include a loudspeaker, for exports audio signal.
I/O interfaces 1206 provide interface, above-mentioned peripheral interface module between processing component 1201 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 1207 includes one or more sensors, for providing the shape of various aspects for terminal device 120
State is assessed.For example, sensor cluster 1207 can detect opening/closed mode of terminal device 120, component it is relatively fixed
Position, such as the display and keypad that component is terminal device 120, sensor cluster 1207 can be with detection terminal equipment 120
Or the position of 120 1 components of terminal device changes, the existence or non-existence that user contacts with terminal device 120, terminal device
The temperature change of 120 orientation or acceleration/deceleration and terminal device 120.Sensor cluster 1207 can include proximity transducer,
It is configured to detect the presence of object nearby in no any physical contact.Sensor cluster 1207 can also include light
Sensor, such as complementary metal oxide semiconductor (English full name:Complementary Metal Oxide
Semiconductor, English abbreviation:) or charge coupled cell (English full name CMOS:Charge Coupled Device, English
Literary abbreviation:CCD) imaging sensor, for being used in imaging applications.In certain embodiments, the sensor cluster 1207 is gone back
Acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor can be included.
Communication component 1208 is configured to facilitate the logical of wired or wireless way between terminal device 120 and other equipment
Letter.Terminal device 120 can access the wireless network based on communication standard, such as Wireless Fidelity (English full name:Wireless-
Fidelity, English abbreviation:WiFi), 2G or 3G, or combinations thereof.In one exemplary embodiment, communication component 1208
Broadcast singal or broadcast related information from external broadcasting management system are received via broadcast channel.In an exemplary implementation
In example, communication component 1208 also includes near-field communication (English full name:Near Field Communication, English abbreviation:
NFC) module, to promote junction service.For example, radio frequency identification (English full name can be based in NFC module:Radio Frequency
Identification, English abbreviation:RFID) technology, Infrared Data Association's (English full name:Infrared Data
Association, English abbreviation:IrDA) technology, ultra wide band (English full name:Ultra Wideband, English abbreviation:UWB)
Technology, bluetooth (English full name:Bluetooth, English abbreviation:BT) technology and other technologies are realized.
In the exemplary embodiment, terminal device 120 can (English be complete by one or more application specific integrated circuits
Claim:Application Specific Integrated Circuit, English abbreviation:ASIC), digital signal processor (English
Full name:Digital Signal Processing, English abbreviation:DSP), digital signal processing appts (English full name:
Digital Signal Processing Device, English abbreviation:DSPD), PLD (English full name:
Programmable Logic Device, English abbreviation:PLD), field programmable gate array (English full name:Field
Programmable Gate Array, English abbreviation:FPGA), controller, microcontroller, microprocessor or other electronic components
Realize, for performing the information processing method described in embodiment corresponding to above-mentioned Fig. 1-Fig. 2.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 1202 of instruction, above-mentioned instruction can be performed by the processing component 1201 of terminal device 120 to complete above-mentioned side
Method.For example, non-transitorycomputer readable storage medium can be ROM, random access memory (English full name:Random
Access Memory, English abbreviation:RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..When in storage medium
When instruction is performed by the processing component 1201 of terminal device 120 so that it is corresponding that terminal device 120 is able to carry out above-mentioned Fig. 1-Fig. 2
Embodiment described in information processing method, this method includes:
Monitor the terminal device wirelessly connected.
Obtain the device identification of terminal device.
When it is determined that not including device identification in default device identification white list, alarm operation is triggered.
In one embodiment, this method includes:
Do not surpass when it is determined that do not include device identification in default device identification white list, and with the distance between terminal device
When crossing predetermined threshold value, alarm operation is triggered.
In one embodiment, this method includes:
The terminal device that monitoring passes through bluetooth connection.
In one embodiment, this method includes:
The terminal device that monitoring passes through WIFI connections.
In one embodiment, this method includes:
When exchanging handshaking information with terminal device, the device identification of terminal device is obtained.
In one embodiment, this method includes:
Outputting alarm information.
In one embodiment, this method includes:
Sent a warning message to target device.
In one embodiment, this method includes:
Target device performs default alarm operation.
The terminal device and storage medium, the message processing device that the embodiment of the present disclosure provides possess wireless connection work(
Can, message processing device is monitored to connected terminal device, gets the equipment mark of connected terminal device
Know, think there is the access of illegal terminal equipment if the device identification obtained is not included in white list, now triggering alarm behaviour
Make, so as to by it is a kind of it is more concealed in a manner of realize monitoring to illegal terminal equipment, if intruder's carrying illegal terminal is set
It is standby to enter monitoring range, it can be found in time, so as to improve the reliability of surveillance and control measure.
Those skilled in the art will readily occur to the disclosure its after considering specification and putting into practice disclosure disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledges in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (12)
- A kind of 1. information processing method, it is characterised in that including:Monitor the terminal device wirelessly connected;Obtain the device identification of the terminal device;When it is determined that not including the device identification in default device identification white list, alarm operation is triggered.
- 2. according to the method for claim 1, it is characterised in that described not wrapped when in the default device identification white list of determination When including the device identification, alarm operation is triggered, including:The distance between when it is determined that do not include the device identification in default device identification white list, and with the terminal device During no more than predetermined threshold value, alarm operation is triggered.
- 3. method according to claim 1 or 2, it is characterised in that the terminal wirelessly connected that monitors is set It is standby, including:The terminal device that monitoring passes through bluetooth connection;Or the terminal device that monitoring passes through WIFI connections.
- 4. according to the method for claim 1, it is characterised in that the device identification for obtaining the terminal device, including:When exchanging handshaking information with the terminal device, the device identification of the terminal device is obtained.
- 5. according to the method for claim 1, it is characterised in that the triggering alarm operation, including:Outputting alarm information;Or sent a warning message to target device;Or target device performs default alarm operation.
- A kind of 6. message processing device, it is characterised in that including:Monitoring modular, for monitoring the terminal device wirelessly connected;Link block, for obtaining the device identification of the terminal device;Alarm module, for when it is determined that not including the device identification in default device identification white list, triggering alarm to be grasped Make.
- 7. equipment according to claim 6, it is characterised in thatThe alarm module includes distance alarm submodule, for described when not including in the default device identification white list of determination Device identification, and when being no more than predetermined threshold value with the distance between the terminal device, trigger alarm operation.
- 8. the equipment according to claim 6 or 7, it is characterised in thatThe monitoring modular includes bluetooth monitoring submodule, for monitoring the terminal device by bluetooth connection;Or the monitoring modular includes Wireless Fidelity monitoring submodule, for monitoring the terminal device by WIFI connections.
- 9. equipment according to claim 6, it is characterised in thatThe link block includes equipment identification submodule, for when exchanging handshaking information with the terminal device, obtaining institute State the device identification of terminal device.
- 10. equipment according to claim 6, it is characterised in thatThe alarm module includes output sub-module 3032, for outputting alarm information;Or the alarm module includes sending submodule 3033, for being sent a warning message to target device;Or the alarm module includes instruction submodule 3034, default alarm operation is performed for target device.
- A kind of 11. message processing device, it is characterised in that including:Processor;For storing the memory of processor-executable instruction;Wherein, the processor is configured as:Monitor the terminal device wirelessly connected;Obtain the device identification of the terminal device;When it is determined that not including the device identification in default device identification white list, alarm operation is triggered.
- 12. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor The step of any one of claim 1-5 methods described is realized during execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710995167.XA CN107818652A (en) | 2017-10-23 | 2017-10-23 | Information processing method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710995167.XA CN107818652A (en) | 2017-10-23 | 2017-10-23 | Information processing method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107818652A true CN107818652A (en) | 2018-03-20 |
Family
ID=61607477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710995167.XA Pending CN107818652A (en) | 2017-10-23 | 2017-10-23 | Information processing method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107818652A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110276923A (en) * | 2019-07-16 | 2019-09-24 | 维沃移动通信有限公司 | A kind of control method and security system of security system |
CN111354147A (en) * | 2018-12-21 | 2020-06-30 | 西安佰才邦网络技术有限公司 | Early warning method and device |
CN112351029A (en) * | 2020-11-04 | 2021-02-09 | 内蒙古电力(集团)有限责任公司内蒙古电力科学研究院分公司 | Integrated system based on detection equipment |
CN114077201A (en) * | 2020-08-20 | 2022-02-22 | 欧悦设计股份有限公司 | Non-invasive thing networking control equipment and system thereof |
CN114120600A (en) * | 2020-08-31 | 2022-03-01 | 南京蓝思信息科技有限公司 | Method and device for preventing false alarm of intelligent wearable equipment and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318689A (en) * | 2014-11-11 | 2015-01-28 | 希姆通信息技术(上海)有限公司 | Anti-theft system and method |
JP2016014966A (en) * | 2014-07-01 | 2016-01-28 | 冨士雄 羽土 | Search supporting system and search supporting program |
CN106204984A (en) * | 2016-06-27 | 2016-12-07 | 上海斐讯数据通信技术有限公司 | A kind of burglary-resisting installation based on wireless signal and method |
CN107067619A (en) * | 2017-03-21 | 2017-08-18 | 上海斐讯数据通信技术有限公司 | A kind of network theft preventing method and system |
-
2017
- 2017-10-23 CN CN201710995167.XA patent/CN107818652A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016014966A (en) * | 2014-07-01 | 2016-01-28 | 冨士雄 羽土 | Search supporting system and search supporting program |
CN104318689A (en) * | 2014-11-11 | 2015-01-28 | 希姆通信息技术(上海)有限公司 | Anti-theft system and method |
CN106204984A (en) * | 2016-06-27 | 2016-12-07 | 上海斐讯数据通信技术有限公司 | A kind of burglary-resisting installation based on wireless signal and method |
CN107067619A (en) * | 2017-03-21 | 2017-08-18 | 上海斐讯数据通信技术有限公司 | A kind of network theft preventing method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111354147A (en) * | 2018-12-21 | 2020-06-30 | 西安佰才邦网络技术有限公司 | Early warning method and device |
CN110276923A (en) * | 2019-07-16 | 2019-09-24 | 维沃移动通信有限公司 | A kind of control method and security system of security system |
CN114077201A (en) * | 2020-08-20 | 2022-02-22 | 欧悦设计股份有限公司 | Non-invasive thing networking control equipment and system thereof |
CN114120600A (en) * | 2020-08-31 | 2022-03-01 | 南京蓝思信息科技有限公司 | Method and device for preventing false alarm of intelligent wearable equipment and electronic equipment |
CN114120600B (en) * | 2020-08-31 | 2023-10-24 | 南京蓝思信息科技有限公司 | Method and device for preventing false alarm of intelligent wearable equipment and electronic equipment |
CN112351029A (en) * | 2020-11-04 | 2021-02-09 | 内蒙古电力(集团)有限责任公司内蒙古电力科学研究院分公司 | Integrated system based on detection equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107818652A (en) | Information processing method and equipment | |
CN105607834B (en) | Screen control method, device and terminal | |
CN104184944B (en) | Obtain method and the device of multimedia data stream | |
CN104503688A (en) | Intelligent hardware device control achieving method and device | |
CN104714414A (en) | Smart home equipment control method and device and electronic equipment | |
CN104898505A (en) | Smart scene configuration method and device | |
CN105246138A (en) | Control method and device of Internet-of-things device | |
CN105472303A (en) | Privacy protection method and apparatus for video chatting | |
CN105491289A (en) | Method and device for preventing photographing occlusion | |
CN105095717B (en) | The processing method and processing device of anomalous event, electronic equipment | |
CN105491236A (en) | Terminal unlocking method and device | |
CN105072079A (en) | Account logon method, account logon device and terminal device | |
CN104580730A (en) | Alarm clock prompting method and device | |
CN105550568A (en) | Mobile terminal data protection method and apparatus | |
CN103916975A (en) | Network connection management method and device | |
CN105487857A (en) | Method and apparatus for prompting image shooting part to be started | |
CN105678133A (en) | Terminal unlocking method and device | |
CN105120505A (en) | Method, apparatus and system for making intelligent equipment accessed to router | |
CN105786507A (en) | Display interface switching method and device | |
CN103905653A (en) | Mobile equipment data service control method and device | |
CN104243829A (en) | Self-shooting method and self-shooting device | |
CN105868709A (en) | Method and apparatus for closing fingerprint identifying function | |
CN106487996A (en) | The emergency communication method of intelligent terminal and device | |
CN104952228A (en) | Antitheft protection opening method, and apparatus and system thereof | |
CN104378596A (en) | Method and device for conducting remote conversation with camera |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180320 |
|
RJ01 | Rejection of invention patent application after publication |