CN108305438A - Anti-lost method for early warning, device, storage medium and intelligent baby bed - Google Patents
Anti-lost method for early warning, device, storage medium and intelligent baby bed Download PDFInfo
- Publication number
- CN108305438A CN108305438A CN201810164766.1A CN201810164766A CN108305438A CN 108305438 A CN108305438 A CN 108305438A CN 201810164766 A CN201810164766 A CN 201810164766A CN 108305438 A CN108305438 A CN 108305438A
- Authority
- CN
- China
- Prior art keywords
- terminal
- party
- target terminal
- identification information
- electronic equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0222—Message structure or message content, e.g. message protocol
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0233—System arrangements with pre-alarms, e.g. when a first distance is exceeded
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/24—Reminder alarms, e.g. anti-loss alarms
Abstract
The disclosure is directed to a kind of anti-lost method for early warning, device, storage mediums and intelligent baby bed.The method includes:Determine whether target terminal is in the monitoring range of electronic equipment, the terminal that the target terminal is held by monitoring object, the electronic equipment is the placement carrier of the monitoring object;Determine that the target terminal periphery whether there is third party's terminal of unauthorized;When the target terminal is not in the monitoring range, and there are when third party's terminal of the unauthorized, carry out alert process.In this way, both it can prevent monitored object or target terminal from losing, in addition in monitored object or target terminal there are in the case of risk of missing and alarm, the accuracy that alarm can also be promoted, avoid people known to owner or guardian take monitored object or target terminal when the false alarm that generates.
Description
Technical field
This disclosure relates to the communications field more particularly to a kind of anti-lost method for early warning, device, storage medium and intelligent baby
Bed.
Background technology
In daily life, small arrive can be with belongings, and the big infant looked after to needs can be faced with and lose
The risk lost or be stolen.Currently, the anti-loss device with warning function can be used, it is placed into the article or people for needing to monitor
Corresponding position, and bound with corresponding terminal (for example, smart mobile phone), to the article (for example, wallet, key) monitored in needs
Or people (for example, baby) there are when risk of missing (for example, with smart mobile phone hypertelorism) and alarm avoids that property is caused to damage
Mistake or human safety issues.But existing anti-theft device sentence it is excessively single otherwise, for example, only according to Distance Judgment,
Such as go beyond the scope at a distance from key is between smart mobile phone alarm, accordingly for key owner by feelings such as key public uses
Condition also can directly alarm, and cause false alarm.
Invention content
To overcome the problems in correlation technique, the disclosure provide a kind of anti-lost method for early warning, device, storage medium and
It is intelligent baby bed.
According to the first aspect of the embodiments of the present disclosure, a kind of anti-lost method for early warning is provided, the method includes:Determine target
Whether terminal is in the monitoring range of electronic equipment, the terminal that the target terminal is held by monitoring object, the electronics
Equipment is the placement carrier of the monitoring object;Determine that the target terminal periphery whether there is third party's terminal of unauthorized;
When the target terminal is not in the monitoring range, and there are when third party's terminal of the unauthorized, carry out at alarm
Reason.
Optionally, the determination target terminal periphery whether there is third party's terminal of unauthorized, including:Obtain institute
State the identification information of third party's terminal on target terminal periphery;When the identification information is present in preset authorization terminal identity column
When in table, determine that third party's terminal corresponding to the identification information is authorization terminal;When the identification information is not present in
When in the preset authorization terminal identification list, determine that third party's terminal corresponding to the identification information is that unauthorized is whole
End.
Optionally, the determination target terminal periphery whether there is third party's terminal of unauthorized, including:Obtain institute
State the identification information of third party's terminal on target terminal periphery;The identification information got is sent to verification terminal, with
Verify whether third party's terminal corresponding to the identification information is mandate according to the identification information by the verification terminal
Terminal;The verification result that the verification terminal is sent is received, and determines that the target terminal periphery is according to the verification result
It is no that there are third party's terminals of unauthorized.
Optionally, the identification information of third party's terminal is the Bluetooth MAC address of third party's terminal.
Optionally, the carry out alert process, including:Record the bluetooth MAC of third party's terminal of the unauthorized
Address, and the Bluetooth MAC address recorded is sent to specified electronic equipment.
Optionally, the electronic equipment be it is intelligent baby bed, the target terminal be it is described it is intelligent baby bed in baby
The intelligent wearable device worn.
According to the second aspect of the embodiment of the present disclosure, a kind of anti-lost prior-warning device is provided, described device includes:First determines
Module, is configured to determine that whether target terminal is in the monitoring range of electronic equipment, and the target terminal is monitoring object
The terminal held, the electronic equipment are the placement carrier of the monitoring object;Second determining module is configured to determine that institute
State third party's terminal that target terminal periphery whether there is unauthorized;Alert process module is configured as working as the target terminal
It is not in the monitoring range, and there are when third party's terminal of the unauthorized, carries out alert process.
Optionally, second determining module includes:Acquisition submodule is configured as obtaining the target terminal periphery
The identification information of third party's terminal;First determination sub-module is configured as being present in preset mandate eventually when the identification information
When holding in identification list, determine that third party's terminal corresponding to the identification information is authorization terminal;Second determination sub-module,
It is configured as, when the identification information is not present in the preset authorization terminal identification list, determining the identification information
Corresponding third party's terminal is unauthorized terminal.
Optionally, second determining module includes:Acquisition submodule is configured as obtaining the target terminal periphery
The identification information of third party's terminal;Sending submodule, the identification information for being configured as to get are sent to verification terminal,
To verify whether third party's terminal corresponding to the identification information is to award according to the identification information by the verification terminal
Weigh terminal;Receiving submodule is configured as receiving the verification result that the verification terminal is sent, and true according to the verification result
The fixed target terminal periphery whether there is third party's terminal of unauthorized.
Optionally, the identification information of third party's terminal is the Bluetooth MAC address of third party's terminal.
Optionally, the alert process module is configured as recording the bluetooth of third party's terminal of the unauthorized
MAC Address, and the Bluetooth MAC address recorded is sent to specified electronic equipment.
Optionally, the electronic equipment be it is intelligent baby bed, the target terminal be it is described it is intelligent baby bed in baby
The intelligent wearable device worn.
According to the third aspect of the embodiment of the present disclosure, a kind of anti-lost prior-warning device is provided, including:Processor;For storing
The memory of processor-executable instruction;Wherein, the processor is configured as running the instruction in the memory to realize
The step of anti-lost method for early warning that disclosure first aspect is provided.
According to the fourth aspect of the embodiment of the present disclosure, a kind of computer readable storage medium is provided, is stored thereon with calculating
Machine program instruction realizes the step for the anti-lost method for early warning that disclosure first aspect is provided when the program instruction is executed by processor
Suddenly.
According to a fifth aspect of the embodiments of the present disclosure, it is intelligent baby bed to provide one kind, including:Bed body;Communication module is used for
The intelligent baby bed communication with external equipment;Processor;Memory for storing processor-executable instruction, the instruction
The step of anti-lost method for early warning that disclosure first aspect is provided is realized when being executed by processor.
The technical scheme provided by this disclosed embodiment can include the following benefits:With the location of target terminal
And whether the terminal on target terminal periphery is authorized to be foundation, target terminal far from safe range and around there are unauthorizeds
Terminal when, judge that monitored object or target terminal have the risk stolen by stranger, carry out alert process at this time.In this way,
Both monitored object or target terminal can be prevented in monitored object or target terminal there are in the case of risk of missing and alarm
It loses, furthermore it is also possible to promote the accuracy of alarm, avoids taking monitored object or mesh for people known to owner or guardian
Mark the false alarm generated when terminal.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of anti-lost method for early warning shown according to an exemplary embodiment.
Fig. 2 is a kind of implementation environment schematic diagram of anti-lost method for early warning shown according to an exemplary embodiment.
Fig. 3 is schematic diagram of a scenario of the anti-lost method for early warning of disclosure offer when implementing.
Fig. 4 is to determine target terminal periphery with the presence or absence of unauthorized in the anti-lost method for early warning provided according to the disclosure
A kind of flow chart of illustrative embodiments of the step of third party's terminal.
Fig. 5 is to determine target terminal periphery with the presence or absence of unauthorized in the anti-lost method for early warning provided according to the disclosure
The flow chart of another illustrative embodiments of the step of third party's terminal.
Fig. 6 is a kind of block diagram of anti-lost prior-warning device shown according to an exemplary embodiment.
Fig. 7 A are a kind of block diagrams of the anti-lost prior-warning device shown according to another exemplary embodiment.
Fig. 7 B are a kind of block diagrams of the anti-lost prior-warning device shown according to another exemplary embodiment.
Fig. 8 is a kind of block diagram of anti-lost prior-warning device shown according to an exemplary embodiment.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of anti-lost method for early warning shown according to an exemplary embodiment.The anti-lost method for early warning
It can be applied to electronic equipment or target terminal.Wherein, the terminal that target terminal can be held by monitoring object, it can be real
Position where Shi Fanying monitoring objects, illustratively, target terminal can be smart mobile phone, tablet computer, intelligent wearable device
(for example, Intelligent bracelet, intelligent glasses, intelligent necklace) etc..Electronic equipment can be the placement carrier of monitoring object, illustratively,
If monitoring object is baby, then electronic equipment can be the infanette where baby, target terminal can be worn by baby
Intelligent wearable device.The implementation environment of one exemplary embodiment of the disclosure can be as shown in Figure 2, wherein with electronic equipment 21
It is baby in infanette for infanette, monitoring object 22, for the intelligent necklace that target terminal 23 is baby's wearing.Such as Fig. 1 institutes
Show, which may comprise steps of.
In a step 101, determine whether target terminal is in the monitoring range of electronic equipment.
As shown in figure 3, region S is the monitoring range of electronic equipment A1, if target terminal is at the A2 of position, then can be with
Determine that target terminal is in the monitoring range of electronic equipment A1;If target terminal is at the A3 of position, then mesh can be determined
Mark terminal is not in the monitoring range of electronic equipment A1.
In one embodiment, bluetooth can be passed through by determining whether target terminal is in the monitoring range of electronic equipment
Technology is realized.Illustratively, both target terminal and electronic equipment can carry out the operation such as pairing, binding, Jin Erjian in advance
Vertical bluetooth connection, the power of Bluetooth signal can reflect relative distance between the two between target terminal and electronic equipment.Root
According to the relative distance between the monitoring range and target terminal and electronic equipment being arranged in electronic equipment, then can determine
Whether target terminal is in the monitoring range of electronic equipment.
In another embodiment, determining whether target terminal is in the monitoring range of electronic equipment can pass through
GPS (Global Positioning System, global positioning system) is realized.The real time position of target terminal and electronic equipment
It can be determined by GPS, may further determine that whether target terminal is in the prison of electronic equipment according to the location information of the two
It surveys in range.
From the above mentioned, the anti-lost method for early warning that the disclosure is provided can be applied to electronic equipment or target terminal.One
In kind situation, which can be applied to electronic equipment side.User can be pre-set by electronic equipment
Monitoring range, for example, maximum distance of the target terminal away from electronic equipment can will be allowed to be set as 5m, then being with electronic equipment
Center is the monitoring range of electronic equipment using 5m as the border circular areas of radius.Illustratively, electronic equipment can obtain mesh in real time
The position of terminal is marked, and then determines the distance between target terminal and electronic equipment, if distance between the two is less than or equal to
The corresponding maximum allowable range of electronic equipment monitoring range, it may be determined that target terminal is in the monitoring range of electronic equipment;
If distance between the two is more than the corresponding maximum allowable range of electronic equipment monitoring range, it may be determined that target terminal is not in
In the monitoring range of electronic equipment.
In another scenario, which can be applied to target terminal side.Illustratively, target terminal
Solicited message can be sent to electronic equipment, to obtain the target terminal of electronic equipment determination whether in its monitoring range
Definitive result.Optionally, the location information of target terminal can be included in solicited message.For another example target terminal can store
There is the maximum allowable range monitoring range of electronic equipment (correspond to) between electronic equipment, target terminal can be for example, by
Bluetooth, GPS etc. obtain the position of electronic equipment in real time, and then determine between distance and the maximum allowable range between the two
Relationship, if distance between the two is more than the maximum allowable range, it may be determined that target terminal is not in the monitoring of electronic equipment
In range;If distance between the two is less than or equal to the maximum allowable range, it may be determined that target terminal is in electronic equipment
Monitoring range in.
In a step 102, determine that target terminal periphery whether there is third party's terminal of unauthorized.
In one embodiment, as shown in figure 4, step 102 may comprise steps of:
In step 401, the identification information of third party's terminal on target terminal periphery is obtained;
In step 402, when identification information is present in preset authorization terminal identification list, identification information pair is determined
The third party's terminal answered is authorization terminal;
In step 403, when identification information is not present in preset authorization terminal identification list, identification information is determined
Corresponding third party's terminal is unauthorized terminal.
Third party's terminal can be to be different from the other-end of target terminal and electronic equipment.Optionally, third party's terminal
Identification information can be third party's terminal Bluetooth MAC address, a Bluetooth MAC address can uniquely correspond to an end
End has uniqueness.
Preset authorization terminal identification list can be that owner or guardian in advance authorize corresponding terminal and generate
's.Owner or guardian can authorize the terminal to be authorized by its user terminal, correspondingly, all authorized ends
The identification information at end can be added in authorization terminal identification list.Optionally, preset authorization terminal identification list can be with
For the Bluetooth MAC address list of authorization terminal.Illustratively, the social software (for example, wechat, microblogging) of user terminal can be automatic
The Bluetooth MAC address for obtaining terminal where good friend logs in, after user authorizes the terminal of certain good friend, corresponding to the terminal
Bluetooth MAC address i.e. be added in the Bluetooth MAC address list of authorization terminal.Optionally, authorization terminal identification list can
To be, for example, the contacts list etc. of the buddy list in social networking application, the contacts list in social networking application, cell phone address book.Show
Example ground, if authorization terminal identification list is the contacts list of cell phone address book, then, in user in the contacts list
After some contact person authorizes, the terminal corresponding to the contact person is exactly authorization terminal, alternatively, in user to the contact person
After multiple contact persons in list authorize, multiple terminals corresponding to above-mentioned multiple contact persons are exactly authorization terminal.
In oneainstance, when this method is applied to target terminal side, target terminal can obtain periphery and preset model
Enclose the identification information of interior existing third party's terminal.Illustratively, target terminal can be built-in with bluetooth module to receive periphery
The Bluetooth broadcast of tripartite's terminal, and then obtain the Bluetooth MAC address of corresponding terminal.Target terminal can be stored with preset mandate
Terminal identification list, alternatively, target terminal can obtain authorization terminal identification list from such as electronic equipment, alternatively, target is whole
End can obtain authorization terminal identification list by the communication with respective server.According to the authorization terminal identification list and
The identification information of tripartite's terminal then can determine whether third party's terminal is authorization terminal by step 402 and step 403.When
When determining that all third party's terminals on target terminal periphery are authorization terminal, it may be determined that there is no do not award on target terminal periphery
Third party's terminal of power;When it is unauthorized terminal to determine at least one third party's terminal on target terminal periphery, it may be determined that
There are third party's terminals of unauthorized on target terminal periphery.
In another scenario, this method can be applied to electronic equipment side.Illustratively, electronic equipment can be according to mesh
The third party's terminal for marking the location determination target terminal periphery where terminal, for example, electronic equipment can be obtained from respective server
The position where each terminal and each terminal is taken, after determining target terminal position, can directly determine target terminal week
Third party's terminal on side, and then obtain the corresponding identification information of each third party's terminal.For another example electronic equipment can be from target end
End obtains the identification information of third party's terminal on target terminal periphery.Electronic equipment can be stored with preset authorization terminal mark
List, alternatively, electronic equipment can obtain authorization terminal identification list from such as target terminal, alternatively, electronic equipment can lead to
It crosses the communication with respective server and obtains authorization terminal identification list.According to the authorization terminal identification list and third party's terminal
Identification information, then can determine whether third party's terminal be authorization terminal by step 402 and step 403.When determining target
When all third party's terminals of terminal, peripheral are authorization terminal, it may be determined that the third of unauthorized is not present in target terminal periphery
Square terminal;When it is unauthorized terminal to determine at least one third party's terminal on target terminal periphery, it may be determined that target terminal
There are third party's terminals of unauthorized on periphery.
Be described above after getting the identification information of third party's terminal on target terminal periphery, by target terminal or
Electronic equipment itself judge third party's terminal whether be authorization terminal embodiment.In another embodiment of the disclosure
In, it can also judge whether third party's terminal is authorization terminal by verifying terminal.Fig. 5 is prevented according to what the disclosure provided
It loses in method for early warning, determines the exemplary reality of another kind for the step of target terminal periphery whether there is third party's terminal of unauthorized
Apply the flow chart of mode.As shown in figure 5, step 102 may comprise steps of:
In step 401, the identification information of third party's terminal on target terminal periphery is obtained;
In step 502, the identification information got is sent to verification terminal;
In step 503, the verification result that verification terminal is sent is received, and target terminal periphery is determined according to verification result
With the presence or absence of third party's terminal of unauthorized.
Wherein, the specific implementation mode of the identification information of the third party's terminal for obtaining target terminal periphery in step 401
Hereinbefore has corresponding description, including applied to electronic equipment and two kinds of situations of target terminal are applied to, herein not
Repeated description is carried out again.
Verifying terminal can verify whether terminal corresponding to identification information is authorization terminal according to identification information.Illustratively,
Connection can be established with target terminal and/or electronic equipment respectively in advance by verifying terminal, to receive identification information and believe mark
Corresponding terminal is ceased to be verified.For example, if monitoring object is baby, electronic equipment is infanette, target terminal is baby
The intelligent wearable device that youngster is worn, then the terminal that verification terminal can be held by baby monitor people.As shown in Fig. 2, with
Verify terminal 24 be guardian smart mobile phone for, verification terminal 24 can respectively with target terminal 23 (baby wear intelligence
Energy necklace) and electronic equipment 21 (infanette) connection.Illustratively, verification terminal can be stored with preset authorization terminal identity column
Table, according to the identification information and preset authorization terminal identification list received, it may be determined that whether third party's terminal is to award
Weigh terminal.For another example identification information can be sent to corresponding server by verification terminal after receiving identification information, with
The server is set to determine whether third party's terminal is authorization terminal according to identification information, verification terminal can receive testing for server
Card is as a result, the verification result can serve to indicate that whether third party's terminal is authorization terminal.For another example verification terminal can be real-time
Verify whether terminal corresponding to identification information is authorization terminal.Verification terminal can be by the identification information after receiving identification information
It exports to user, such as by modes such as display, speech plays, or the built-in rule by verifying terminal exports just to user
In the information of user's identification, such as, if preferably friendly relationship, user can be operated by verifying terminal, to determine whether
The authorization terminal corresponding to identification information.Verification terminal can feed back verification result.Verify the side of terminal real-time verification
Formula can not only authorize in order to user, can also play reminding effect to user, when the information of verification terminal output is strange letter
When breath, user can know simultaneously to take precautions against in time in time.
As described above, this method can be applied to electronic equipment, target terminal can also be applied to.When this method is applied to
When electronic equipment, the identification information got can be sent to verification terminal by electronic equipment, and receive what verification terminal was sent
Verification result, and determine that target terminal periphery whether there is third party's terminal of unauthorized according to verification result.Illustratively, when testing
Card is the result shows that third party's terminal on target terminal periphery is authorization terminal, it may be determined that there is no do not award on target terminal periphery
Third party's terminal of power.
And when this method is applied to target terminal, the identification information got can be sent to verification eventually by target terminal
End, and the verification result that verification terminal is sent is received, and determine that target terminal periphery whether there is unauthorized according to verification result
Third party's terminal.Illustratively, when verification result show at least one third party's terminal in target terminal periphery be unauthorized terminal,
It can determine third party terminal of the target terminal periphery there are unauthorized.
Fig. 1 is returned to, in step 103, when target terminal is not in monitoring range, and there are the third party of unauthorized ends
When end, alert process is carried out.
When target terminal is not in monitoring range, and there are when third party's terminal of unauthorized, illustrate target terminal
Through separate electronic equipment, and there are uncommitted terminals around target terminal, that is, nearby there are strange for target terminal
People, at this time there is the risk lost or be stolen in monitored object or target terminal.Therefore, alert process can be carried out.
In one embodiment, it can directly alarm, to cause the attention of guardian or people around.
In oneainstance, this method can be applied to electronic equipment, and electronic equipment can carry out alert process, wherein
Alarm executive agent can include but is not limited to it is following in any one or arbitrary several persons:Electronic equipment, is preset target terminal
Warning device (for example, user terminal that owner or guardian are held).Illustratively, electronic equipment can be reported directly
It is alert.For another example electronic equipment can send alarm command to preset warning device, to trigger warning device alarm.For another example
Electronic equipment can send alarm command to target terminal and on the one hand can be played to stranger with triggering terminating terminal alarms
Certain fright effect, on the other hand can also cause the attention of people around.Illustratively, type of alarm can include but is not limited to
One of below or a few persons:Export prompt message, voice broadcast, buzzer call, light flash.
In another scenario, this method can be applied to target terminal, and target terminal can carry out alert process,
In, alarm executive agent can include but is not limited to it is following in any one or arbitrary several persons:Electronic equipment, target terminal,
Preset warning device (for example, user terminal that owner or guardian are held).Illustratively, target terminal can be carried out directly
Alarm, both can be played the role of fright to stranger, the attention of people around can also be caused with this.For another example target terminal can
To send alarm command to electronic equipment, to trigger electronic equipment alarm.For another example target terminal can be set to preset alarm
Preparation send alarm command, to trigger warning device alarm.Illustratively, type of alarm can include but is not limited to one of following
Or several persons:Export prompt message, voice broadcast, buzzer call, light flash.
In another embodiment, the carry out alert process of step 103 may comprise steps of:Record unauthorized
The Bluetooth MAC address of third party's terminal, and the Bluetooth MAC address of record is sent to specified electronic equipment.
In oneainstance, this method can be applied to electronic equipment, determine that there are unauthorizeds on target terminal periphery
When third party's terminal, electronic equipment can record the Bluetooth MAC address of unauthorized third party's terminal, and by the unauthorized third
The Bluetooth MAC address of square terminal is sent to specified electronic equipment.Wherein, specified electronic equipment can be the end of owner or guardian
End, alternatively, specified electronic equipment can be corresponding server.Illustratively, electronic equipment can be by the unauthorized third of record
The Bluetooth MAC address of square terminal is sent to the terminal of owner or guardian.In this way, owner or guardian's terminal are not awarded receiving
After the Bluetooth MAC address for weighing third party's terminal, third party's terminal of unauthorized can be determined according to the Bluetooth MAC address, and
Thief can be positioned, convenient for subsequent lookup, alarm etc..For another example electronic equipment can be by the unauthorized third party of record
The Bluetooth MAC address of terminal is sent to corresponding server, so that server carries out respective handling, illustratively, server can be with
Confirm corresponding unauthorized third party terminal according to the Bluetooth MAC address of the unauthorized third party's terminal received, and positioning should
Unauthorized third party's terminal searches and alarms convenient for follow-up.
In another scenario, this method can be applied to target terminal, determine that there are unauthorizeds on target terminal periphery
Third party's terminal when, target terminal can record the Bluetooth MAC address of unauthorized third party's terminal, and the address is sent
To specified electronic equipment.Wherein, specified electronic equipment can be the terminal of owner or guardian, alternatively, specified electronic equipment can
To be corresponding server.Illustratively, target terminal can send the Bluetooth MAC address of unauthorized third party's terminal of record
To the terminal of owner or guardian, in this way, owner or guardian's terminal are with receiving the bluetooth MAC of unauthorized third party's terminal
Behind location, third party's terminal of unauthorized can be determined according to the Bluetooth MAC address, and can position thief, convenient for follow-up
Lookup, alarm etc..For another example the Bluetooth MAC address of unauthorized third party's terminal of record can be sent to by target terminal
Corresponding server, so that server carries out respective handling, illustratively, server can be according to the unauthorized third party received
The Bluetooth MAC address of terminal confirms corresponding unauthorized third party terminal, and positions unauthorized third party's terminal, convenient for follow-up
It searches and alarms.
In another embodiment, alert process can be carried out in conjunction with above two embodiment, wherein may include
Applied to the alert process of electronic equipment, alternatively, may include the alert process applied to target terminal.Detailed content is above
In be described, this will not be repeated here.
Through the above scheme, with the terminal on the location of target terminal and target terminal periphery whether be authorized to be according to
According to, target terminal far from safe range and around there are when the terminal of unauthorized, judge that monitored object or target terminal exist
The risk stolen by stranger carries out alert process at this time.Wind is lost in this way, can both exist in monitored object or target terminal
In the case of danger and alarm, prevents monitored object or target terminal from losing, furthermore it is also possible to promote the accuracy of alarm, keep away
Exempt from for people known to owner or guardian take monitored object or target terminal when the false alarm that generates.
Fig. 6 is a kind of block diagram of anti-lost prior-warning device shown according to an exemplary embodiment.As shown in fig. 6, the dress
Setting 600 includes:First determining module 601, is configured to determine that whether target terminal is in the monitoring range of electronic equipment, institute
The terminal that target terminal is held by monitoring object is stated, the electronic equipment is the placement carrier of the monitoring object;Second really
Cover half block 602 is configured to determine that the target terminal periphery whether there is third party's terminal of unauthorized;Alert process module
603, it is configured as being not in the monitoring range when the target terminal, and there are third party's terminals of the unauthorized
When, carry out alert process.
Fig. 7 A are a kind of block diagrams of the anti-lost prior-warning device shown according to another exemplary embodiment.As shown in Figure 7 A, institute
Stating the second determining module 602 includes:Acquisition submodule 701 is configured as obtaining third party's terminal on the target terminal periphery
Identification information;First determination sub-module 702 is configured as being present in preset authorization terminal identity column when the identification information
When in table, determine that third party's terminal corresponding to the identification information is authorization terminal;Second determination sub-module 703, by with
It is set to when the identification information is not present in the preset authorization terminal identification list, determines that the identification information corresponds to
Third party's terminal be unauthorized terminal.
Fig. 7 B are a kind of block diagrams of the anti-lost prior-warning device shown according to another exemplary embodiment.As shown in Figure 7 B, institute
Stating the second determining module 602 includes:Acquisition submodule 701 is configured as obtaining third party's terminal on the target terminal periphery
Identification information;Sending submodule 704, the identification information for being configured as to get is sent to verification terminal, with by institute
It states verification terminal and verifies whether third party's terminal corresponding to the identification information is authorization terminal according to the identification information;
Receiving submodule 705 is configured as receiving the verification result that the verification terminal is sent, and determines institute according to the verification result
State third party's terminal that target terminal periphery whether there is unauthorized.
Optionally, the identification information of third party's terminal is the Bluetooth MAC address of third party's terminal.
Optionally, the alert process module 603 is configured as recording the indigo plant of third party's terminal of the unauthorized
Tooth MAC Address, and the Bluetooth MAC address recorded is sent to specified electronic equipment.
Optionally, the electronic equipment be it is intelligent baby bed, the target terminal be it is described it is intelligent baby bed in baby
The intelligent wearable device worn.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
The disclosure also provides a kind of computer readable storage medium, is stored thereon with computer program instructions, which refers to
The step of enabling the anti-lost method for early warning that disclosure offer is provided when being executed by processor.
Fig. 8 is a kind of block diagram of anti-lost prior-warning device 800 shown according to an exemplary embodiment.For example, device 800 can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for
Body equipment, personal digital assistant etc..
With reference to Fig. 8, device 800 may include following one or more components:Processing component 802, memory 804, electric power
Component 806, multimedia component 808, audio component 810, the interface 812 of input/output (I/O), sensor module 814, and
Communication component 816.
The integrated operation of 802 usual control device 800 of processing component, such as with display, call, data communication, phase
Machine operates and record operates associated operation.Processing component 802 may include that one or more processors 820 refer to execute
It enables, to complete all or part of step of above-mentioned anti-lost method for early warning.In addition, processing component 802 may include one or more
Module, convenient for the interaction between processing component 802 and other assemblies.For example, processing component 802 may include multi-media module,
To facilitate the interaction between multimedia component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 800.These data are shown
Example includes instruction for any application program or method that are operated on device 800, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
It closes and realizes, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile
Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash
Device, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of device 800.Electric power assembly 806 may include power management system
System, one or more power supplys and other generated with for device 800, management and the associated component of distribution electric power.
Multimedia component 808 is included in the screen of one output interface of offer between described device 800 and user.One
In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action
Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers
Body component 808 includes a front camera and/or rear camera.When device 800 is in operation mode, such as screening-mode or
When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike
Wind (MIC), when device 800 is in operation mode, when such as call model, logging mode and speech recognition mode, microphone by with
It is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication set
Part 816 is sent.In some embodiments, audio component 810 further includes a loud speaker, is used for exports audio signal.
I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor module 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented
Estimate.For example, sensor module 814 can detect the state that opens/closes of device 800, and the relative positioning of component, for example, it is described
Component is the display and keypad of device 800, and sensor module 814 can be with 800 1 components of detection device 800 or device
Position change, the existence or non-existence that user contacts with device 800,800 orientation of device or acceleration/deceleration and device 800
Temperature change.Sensor module 814 may include proximity sensor, be configured to detect without any physical contact
Presence of nearby objects.Sensor module 814 can also include optical sensor, such as CMOS or ccd image sensor, at
As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or combination thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 further includes near-field communication (NFC) module, to promote short range communication.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be believed by one or more application application-specific integrated circuit (ASIC), number
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing above-mentioned anti-lost method for early warning.
In the exemplary embodiment, it includes the non-transitorycomputer readable storage medium instructed, example to additionally provide a kind of
Such as include the memory 804 of instruction, above-metioned instruction can be executed by the processor 820 of device 800 to complete the above-mentioned anti-lost pre- police
Method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, magnetic
Band, floppy disk and optical data storage devices etc..
The disclosure also provide it is a kind of intelligent baby bed, including:Bed body;Communication module, for it is described it is intelligent baby bed with it is outer
The communication of portion's equipment;Processor;Memory for storing processor-executable instruction, the instruction are realized when being executed by processor
The anti-lost method for early warning that disclosure any embodiment is provided.
The communication of the intelligent baby bed wired or wireless way between external equipment may be implemented in communication module, illustratively,
The intelligent baby bed communication mode between external equipment can include but is not limited to it is following in any one or it is arbitrary several
The combination of person:WiFi, 2G network, 3G network, 4G networks, bluetooth.Illustratively, external equipment can be such as server, intelligence
Terminal, electronic equipment etc..As each embodiment is previously mentioned above, external equipment can be target terminal, warning device, server
Deng.
Processor can control intelligent baby bed integrated operation, and such as with detection infantile state, roars of laughter sleep, and show, phone
Calling, data communication, camera operation and record operate associated operation, to complete whole or the portion of above-mentioned anti-lost method for early warning
Step by step.In addition, processor may include one or more modules, interacted convenient for intelligent baby bed inside.
Memory can be configured as the various types of data of storage to support in intelligent baby bed operation.These data
Example include instruction for any application program or method in intelligent baby bed upper operation, contact data, telephone directory
Data, message, picture, video etc..Memory can by any kind of volatibility or non-volatile memory device or they
Combination realize, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable
Programmable read only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, quick flashing
Memory, disk or CD.
Those skilled in the art will readily occur to other embodiment party of the disclosure after considering specification and putting into practice the disclosure
Case.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or adaptability
Variation follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure or usual skill
Art means.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following claim
It points out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (9)
1. a kind of anti-lost method for early warning, which is characterized in that the method includes:
Determine whether target terminal is in the monitoring range of electronic equipment, the end that the target terminal is held by monitoring object
End, the electronic equipment are the placement carrier of the monitoring object;
Determine that the target terminal periphery whether there is third party's terminal of unauthorized;
When the target terminal is not in the monitoring range, and there are when third party's terminal of the unauthorized, reported
Alert processing.
2. according to the method described in claim 1, it is characterized in that, the determination target terminal periphery is not with the presence or absence of awarding
Third party's terminal of power, including:
Obtain the identification information of third party's terminal on the target terminal periphery;
When the identification information is present in preset authorization terminal identification list, corresponding described of the identification information is determined
Third party's terminal is authorization terminal;
When the identification information is not present in the preset authorization terminal identification list, determine that the identification information corresponds to
Third party's terminal be unauthorized terminal.
3. according to the method described in claim 1, it is characterized in that, the determination target terminal periphery is not with the presence or absence of awarding
Third party's terminal of power, including:
Obtain the identification information of third party's terminal on the target terminal periphery;
The identification information got is sent to verification terminal, to be verified according to the identification information by the verification terminal
Whether third party's terminal corresponding to the identification information is authorization terminal;
The verification result that the verification terminal is sent is received, and whether the target terminal periphery is determined according to the verification result
There are third party's terminals of unauthorized.
4. according to the method in claim 2 or 3, which is characterized in that the identification information of third party's terminal is described the
The Bluetooth MAC address of tripartite's terminal.
5. according to the method described in claim 4, it is characterized in that, the carry out alert process, including:
The Bluetooth MAC address of third party's terminal of the unauthorized is recorded, and the Bluetooth MAC address recorded is sent to
Specified electronic equipment.
6. method according to any one of claim 1-3, which is characterized in that the electronic equipment be it is intelligent baby bed,
The target terminal by it is described it is intelligent baby bed in the intelligent wearable device worn of baby.
7. a kind of anti-lost prior-warning device, which is characterized in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as running the instruction in the memory to realize any one of claim 1~6 institute
The step of stating method.
8. a kind of computer readable storage medium, is stored thereon with computer program instructions, which is characterized in that the program instruction quilt
The step of any one of claim 1~6 the method is realized when processor executes.
9. a kind of intelligent baby bed, which is characterized in that including:
Bed body;
Communication module, for the intelligent baby bed communication with external equipment;
Processor;
Memory for storing processor-executable instruction is realized in claim 1~6 when the instruction is executed by processor and is appointed
The step of one the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810164766.1A CN108305438B (en) | 2018-02-27 | 2018-02-27 | Anti-lost early warning method and device, storage medium and intelligent baby crib |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810164766.1A CN108305438B (en) | 2018-02-27 | 2018-02-27 | Anti-lost early warning method and device, storage medium and intelligent baby crib |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108305438A true CN108305438A (en) | 2018-07-20 |
CN108305438B CN108305438B (en) | 2020-11-27 |
Family
ID=62848999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810164766.1A Active CN108305438B (en) | 2018-02-27 | 2018-02-27 | Anti-lost early warning method and device, storage medium and intelligent baby crib |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108305438B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6223102B1 (en) * | 1996-03-27 | 2001-04-24 | Pruftechnik Dieter Busch Ag | Method and device for aligning the shaft of a rotating machine |
CN101188044A (en) * | 2007-12-18 | 2008-05-28 | 杨尧任 | Simple method and device for uniform control of theft-prevention alarming system and Bluetooth terminal device |
JP2008140312A (en) * | 2006-12-05 | 2008-06-19 | Hitachi Ltd | Information processing system |
CN102084370A (en) * | 2008-04-02 | 2011-06-01 | 优盖提特拜克有限公司 | System for mitigating the unauthorized use of a device |
CN204791361U (en) * | 2015-07-08 | 2015-11-18 | 湖北天地春现代农业发展有限公司 | Intelligence anti -theft device based on photovoltaic power generation technique |
CN105261091A (en) * | 2015-09-23 | 2016-01-20 | 奇瑞汽车股份有限公司 | Method and device used for vehicle one-key start |
CN105308534A (en) * | 2013-06-11 | 2016-02-03 | Invue安全产品公司 | Anti-theft device for portable electronic device |
CN205318531U (en) * | 2016-01-22 | 2016-06-15 | 上海云充新能源科技有限公司 | Electric automobile fills automatic perception of electric pile user and confirms system |
CN105691353A (en) * | 2014-11-27 | 2016-06-22 | 陈飞 | Vehicle-mounted monitoring device for vehicle antitheft |
CN105915714A (en) * | 2016-05-24 | 2016-08-31 | 北京小米移动软件有限公司 | Method and device for prompting terminal loss |
CN206043703U (en) * | 2016-09-23 | 2017-03-29 | 南昌欧菲光科技有限公司 | Intelligent wallet |
US20170111510A1 (en) * | 2015-10-16 | 2017-04-20 | Muchi Corporation | Voice communication and location tracking system |
-
2018
- 2018-02-27 CN CN201810164766.1A patent/CN108305438B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6223102B1 (en) * | 1996-03-27 | 2001-04-24 | Pruftechnik Dieter Busch Ag | Method and device for aligning the shaft of a rotating machine |
JP2008140312A (en) * | 2006-12-05 | 2008-06-19 | Hitachi Ltd | Information processing system |
CN101188044A (en) * | 2007-12-18 | 2008-05-28 | 杨尧任 | Simple method and device for uniform control of theft-prevention alarming system and Bluetooth terminal device |
CN102084370A (en) * | 2008-04-02 | 2011-06-01 | 优盖提特拜克有限公司 | System for mitigating the unauthorized use of a device |
CN105308534A (en) * | 2013-06-11 | 2016-02-03 | Invue安全产品公司 | Anti-theft device for portable electronic device |
CN105691353A (en) * | 2014-11-27 | 2016-06-22 | 陈飞 | Vehicle-mounted monitoring device for vehicle antitheft |
CN204791361U (en) * | 2015-07-08 | 2015-11-18 | 湖北天地春现代农业发展有限公司 | Intelligence anti -theft device based on photovoltaic power generation technique |
CN105261091A (en) * | 2015-09-23 | 2016-01-20 | 奇瑞汽车股份有限公司 | Method and device used for vehicle one-key start |
US20170111510A1 (en) * | 2015-10-16 | 2017-04-20 | Muchi Corporation | Voice communication and location tracking system |
CN205318531U (en) * | 2016-01-22 | 2016-06-15 | 上海云充新能源科技有限公司 | Electric automobile fills automatic perception of electric pile user and confirms system |
CN105915714A (en) * | 2016-05-24 | 2016-08-31 | 北京小米移动软件有限公司 | Method and device for prompting terminal loss |
CN206043703U (en) * | 2016-09-23 | 2017-03-29 | 南昌欧菲光科技有限公司 | Intelligent wallet |
Non-Patent Citations (1)
Title |
---|
杨哲 等: "《无线网络黑客攻防》", 28 February 2014, 中国铁道出版社 * |
Also Published As
Publication number | Publication date |
---|---|
CN108305438B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9332390B1 (en) | Mobile device utilizing time of flight for personal security and localization | |
US20210287522A1 (en) | Systems and methods for managing an emergency situation | |
US20210056981A1 (en) | Systems and methods for managing an emergency situation | |
US11069219B2 (en) | Multi-modal tracking locator alarm system | |
US9418537B2 (en) | Mobile computing device including personal security system | |
US20120282886A1 (en) | Systems and methods for initiating a distress signal from a mobile device without requiring focused visual attention from a user | |
CN105680892A (en) | Correlation article reminding method and device | |
CN102131143A (en) | Method and mobile terminal for sending distress message | |
CN105701967A (en) | Position prompting method and position prompting device | |
CN105577213B (en) | The emergency processing strategy of Intelligent bracelet or wrist-watch starts method and apparatus | |
US20120282877A1 (en) | Systems and methods for initiating a stand-by signal and a distress signal from a mobile device | |
US20140120860A1 (en) | Systems and methods for user customized security responses | |
US20140120872A1 (en) | Systems and methods for altering the properties of a mobile device in response to a make ready signal | |
US20120282878A1 (en) | Systems and methods for initiating a stand-by signal and a distress signal from a mobile device | |
CN110493474A (en) | A kind of data processing method, device and electronic equipment | |
CN105869345A (en) | Alarm method, device and equipment based on wearable equipment | |
CN106568454A (en) | Information prompting method and device | |
CN104952228A (en) | Antitheft protection opening method, and apparatus and system thereof | |
CN106097650A (en) | The alarm method of terminal, device and terminal | |
CN106293810A (en) | Application processing method based on VR equipment, device and VR equipment | |
US20190114887A1 (en) | Security and Tracking Systems and Associated Methods | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
CN107040547A (en) | Method, device and the terminal device of administrator password | |
CN106303017A (en) | Alarm processing method and device | |
CN108305438A (en) | Anti-lost method for early warning, device, storage medium and intelligent baby bed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |