CN108305438B - Anti-lost early warning method and device, storage medium and intelligent baby crib - Google Patents

Anti-lost early warning method and device, storage medium and intelligent baby crib Download PDF

Info

Publication number
CN108305438B
CN108305438B CN201810164766.1A CN201810164766A CN108305438B CN 108305438 B CN108305438 B CN 108305438B CN 201810164766 A CN201810164766 A CN 201810164766A CN 108305438 B CN108305438 B CN 108305438B
Authority
CN
China
Prior art keywords
terminal
target terminal
party
unauthorized
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810164766.1A
Other languages
Chinese (zh)
Other versions
CN108305438A (en
Inventor
傅强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201810164766.1A priority Critical patent/CN108305438B/en
Publication of CN108305438A publication Critical patent/CN108305438A/en
Application granted granted Critical
Publication of CN108305438B publication Critical patent/CN108305438B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0222Message structure or message content, e.g. message protocol
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0233System arrangements with pre-alarms, e.g. when a first distance is exceeded
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Emergency Alarm Devices (AREA)
  • Alarm Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure relates to an anti-lost early warning method and device, a storage medium and an intelligent crib. The method comprises the following steps: determining whether a target terminal is in a monitoring range of electronic equipment, wherein the target terminal is a terminal held by a monitoring object, and the electronic equipment is a placing carrier of the monitoring object; determining whether unauthorized third party terminals exist around the target terminal; and when the target terminal is not in the monitoring range and the unauthorized third-party terminal exists, performing alarm processing. Therefore, the alarm can be given in time under the condition that the monitoring object or the target terminal is at risk of losing, the monitoring object or the target terminal is prevented from losing, in addition, the alarm accuracy can be improved, and false alarm generated when an owner or a person familiar with guardians takes the monitoring object or the target terminal is avoided.

Description

Anti-lost early warning method and device, storage medium and intelligent baby crib
Technical Field
The disclosure relates to the field of communication, in particular to an anti-lost early warning method and device, a storage medium and an intelligent crib.
Background
In daily life, articles which are small enough to be carried about and infants who need to be cared for are all exposed to the risk of losing or being stolen. At present, an anti-lost device with an alarm function can be used, and is placed to a corresponding position of an article or a person to be monitored and is bound with a corresponding terminal (for example, a smart phone) so as to alarm in time when the article (for example, a wallet or a key) or the person (for example, a baby) to be monitored is in a loss risk (for example, too far away from the smart phone), and thus property loss or personal safety problems are avoided. However, the existing anti-lost device is too single in judgment mode, for example, only the judgment is carried out according to the distance, for example, when the distance between the key and the smart phone exceeds the range, an alarm is given, and accordingly, the situation that the key owner borrows the key out and the like can also be directly given, so that false alarm is caused.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides an anti-lost early warning method, an anti-lost early warning device, a storage medium, and an intelligent crib.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for anti-lost early warning, the method including: determining whether a target terminal is in a monitoring range of electronic equipment, wherein the target terminal is a terminal held by a monitoring object, and the electronic equipment is a placing carrier of the monitoring object; determining whether unauthorized third party terminals exist around the target terminal; when the target terminal is not in the monitoring range and the unauthorized third-party terminal exists, alarming;
the determining whether an unauthorized third party terminal exists around the target terminal includes:
acquiring identification information of third party terminals around the target terminal;
sending the acquired identification information to a verification terminal so that the verification terminal outputs the identification information, and receiving a verification result generated by user operation and used for indicating whether the user authorizes the third-party terminal or not after the verification terminal outputs the identification information;
and receiving the verification result sent by the verification terminal, and determining whether unauthorized third party terminals exist around the target terminal according to the verification result.
Optionally, the identification information of the third party terminal is a bluetooth MAC address of the third party terminal.
Optionally, the performing the alarm processing includes: and recording the Bluetooth MAC address of the unauthorized third-party terminal, and sending the recorded Bluetooth MAC address to a specified electronic device.
Optionally, the electronic device is an intelligent crib, and the target terminal is an intelligent wearable device worn by a baby in the intelligent crib.
According to a second aspect of the embodiments of the present disclosure, there is provided an anti-lost early warning device, the device including: the system comprises a first determination module, a second determination module and a third determination module, wherein the first determination module is configured to determine whether a target terminal is in a monitoring range of electronic equipment, the target terminal is a terminal held by a monitoring object, and the electronic equipment is a placement carrier of the monitoring object; the second determination module is configured to determine whether unauthorized third party terminals exist around the target terminal; and the alarm processing module is configured to perform alarm processing when the target terminal is not in the monitoring range and the unauthorized third-party terminal exists.
Optionally, the second determining module includes: the acquisition submodule is configured to acquire identification information of a third party terminal around the target terminal; the first determining submodule is configured to determine that the third-party terminal corresponding to the identification information is an authorized terminal when the identification information exists in a preset authorized terminal identification list; a second determining submodule configured to determine that the third party terminal corresponding to the identification information is an unauthorized terminal when the identification information does not exist in the preset authorized terminal identification list.
Optionally, the second determining module includes: the acquisition submodule is configured to acquire identification information of a third party terminal around the target terminal; the sending submodule is configured to send the acquired identification information to a verification terminal so that the verification terminal verifies whether the third-party terminal corresponding to the identification information is an authorized terminal according to the identification information; and the receiving submodule is configured to receive a verification result sent by the verification terminal and determine whether an unauthorized third party terminal exists around the target terminal according to the verification result.
Optionally, the identification information of the third party terminal is a bluetooth MAC address of the third party terminal.
Optionally, the alarm processing module is configured to record the bluetooth MAC address of the unauthorized third party terminal and send the recorded bluetooth MAC address to a specified electronic device.
Optionally, the electronic device is an intelligent crib, and the target terminal is an intelligent wearable device worn by a baby in the intelligent crib.
According to a third aspect of the embodiments of the present disclosure, there is provided an anti-lost early warning device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to execute the instructions in the memory to implement the steps of the anti-lost warning method provided by the first aspect of the present disclosure.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium on which computer program instructions are stored, which program instructions, when executed by a processor, implement the steps of the anti-lost warning method provided by the first aspect of the present disclosure.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an intelligent crib, including: a bed body; the communication module is used for communicating the intelligent baby crib with external equipment; a processor; a memory for storing processor executable instructions which, when executed by the processor, implement the steps of the anti-theft warning method provided by the first aspect of the present disclosure.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: and judging that the monitoring object or the target terminal has the risk of being stolen by a stranger when the target terminal is far away from the safety range and unauthorized terminals exist around the target terminal according to the position of the target terminal and whether terminals around the target terminal are authorized, and performing alarm processing at the moment. Therefore, the alarm can be given in time under the condition that the monitoring object or the target terminal is lost, the monitoring object or the target terminal is prevented from being lost, in addition, the alarm accuracy can be improved, and the false alarm generated when the monitoring object or the target terminal is taken by an owner or a person familiar to a guardian is avoided.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flow chart illustrating a method of anti-lost warning according to an exemplary embodiment.
Fig. 2 is a schematic diagram of an implementation environment of a loss prevention warning method according to an exemplary embodiment.
Fig. 3 is a scene schematic diagram of the anti-lost early warning method provided by the present disclosure in implementation.
Fig. 4 is a flowchart of an exemplary embodiment of a step of determining whether an unauthorized third party terminal exists around a target terminal in a loss prevention warning method provided according to the present disclosure.
Fig. 5 is a flowchart of another exemplary embodiment of a step of determining whether an unauthorized third party terminal exists around a target terminal in a loss prevention warning method provided according to the present disclosure.
Fig. 6 is a block diagram illustrating an anti-lost warning device according to an exemplary embodiment.
Fig. 7A is a block diagram illustrating an anti-theft warning device according to another exemplary embodiment.
Fig. 7B is a block diagram illustrating an anti-theft warning device according to another exemplary embodiment.
Fig. 8 is a block diagram illustrating an anti-lost warning device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flow chart illustrating a method of anti-lost warning according to an exemplary embodiment. The anti-lost early warning method can be applied to electronic equipment or a target terminal. The target terminal can be a terminal held by the monitoring object, can reflect the position of the monitoring object in real time, and can be a smart phone, a tablet personal computer, an intelligent wearable device (e.g., a smart band, smart glasses, a smart necklace), and the like. The electronic device may be a placement carrier of the monitoring object, for example, if the monitoring object is an infant, the electronic device may be a crib where the infant is located, and the target terminal may be an intelligent wearable device worn by the infant. An implementation environment of an exemplary embodiment of the present disclosure may be as shown in fig. 2, where an example is taken where the electronic device 21 is a crib, the monitoring object 22 is a baby in the crib, and the target terminal 23 is a smart necklace worn by the baby. As shown in fig. 1, the anti-lost warning method may include the following steps.
In step 101, it is determined whether the target terminal is within a monitoring range of the electronic device.
As shown in fig. 3, the area S is a monitoring range of the electronic device a1, and if the target terminal is at the position a2, it may be determined that the target terminal is within the monitoring range of the electronic device a 1; if the target terminal is at location A3, it may be determined that the target terminal is not within the monitoring range of electronic device A1.
In one embodiment, determining whether the target terminal is within the monitoring range of the electronic device may be accomplished through bluetooth technology. For example, the target terminal and the electronic device may perform operations such as pairing, binding, and the like in advance, so as to establish a bluetooth connection, and the strength of the bluetooth signal between the target terminal and the electronic device may reflect a relative distance between the target terminal and the electronic device. According to the set monitoring range in the electronic equipment and the relative distance between the target terminal and the electronic equipment, whether the target terminal is in the monitoring range of the electronic equipment can be determined.
In another embodiment, determining whether the target terminal is within the monitoring range of the electronic device may be implemented by a Global Positioning System (GPS). The real-time positions of the target terminal and the electronic equipment can be determined through the GPS, and whether the target terminal is in the monitoring range of the electronic equipment can be further determined according to the positioning information of the target terminal and the electronic equipment.
From the above, the anti-lost early warning method provided by the present disclosure may be applied to an electronic device or a target terminal. In one case, the anti-lost warning method may be applied to the side of the electronic device. The monitoring range can be preset by the electronic device by the user, for example, the farthest distance from the target terminal to the electronic device is allowed to be set to 5m, and then the circular area with the radius of 5m and the electronic device as the center is the monitoring range of the electronic device. For example, the electronic device may obtain the position of the target terminal in real time, and further determine the distance between the target terminal and the electronic device, and if the distance between the target terminal and the electronic device is less than or equal to the maximum allowable distance corresponding to the monitoring range of the electronic device, it may be determined that the target terminal is within the monitoring range of the electronic device; if the distance between the target terminal and the electronic device is greater than the maximum allowable distance corresponding to the monitoring range of the electronic device, it can be determined that the target terminal is not located in the monitoring range of the electronic device.
In another case, the anti-lost warning method may be applied to the side of the target terminal. For example, the target terminal may send request information to the electronic device to obtain a determination result of whether the target terminal determined by the electronic device is within the monitoring range thereof. Optionally, the request information may include location information of the target terminal. For another example, the target terminal may store a maximum allowable distance (corresponding to a monitoring range of the electronic device) between the target terminal and the electronic device, and the target terminal may obtain the position of the electronic device in real time through, for example, bluetooth, GPS, and the like, to further determine a relationship between the distance between the target terminal and the maximum allowable distance, and if the distance between the target terminal and the electronic device is greater than the maximum allowable distance, it may be determined that the target terminal is not within the monitoring range of the electronic device; if the distance between the two is smaller than or equal to the maximum allowable distance, it can be determined that the target terminal is within the monitoring range of the electronic device.
In step 102, it is determined whether an unauthorized third party terminal exists around the target terminal.
In one embodiment, as shown in FIG. 4, step 102 may include the steps of:
in step 401, acquiring identification information of a third party terminal around a target terminal;
in step 402, when the identification information exists in a preset authorized terminal identification list, determining that a third party terminal corresponding to the identification information is an authorized terminal;
in step 403, when the identification information does not exist in the preset authorized terminal identification list, it is determined that the third party terminal corresponding to the identification information is an unauthorized terminal.
The third party terminal may be another terminal distinct from the target terminal and the electronic device. Optionally, the identification information of the third party terminal may be a bluetooth MAC address of the third party terminal, and one bluetooth MAC address may uniquely correspond to one terminal and have uniqueness.
The preset authorized terminal identification list may be generated by the owner or the guardian authorizing the corresponding terminal in advance. The owner or guardian can authorize the terminal to be authorized through the user terminal, and correspondingly, the identification information of all authorized terminals can be added into the authorized terminal identification list. Alternatively, the preset authorized terminal identification list may be a bluetooth MAC address list of the authorized terminal. For example, social software (e.g., WeChat, microblog) of a user terminal may automatically obtain a bluetooth MAC address of a terminal where a friend logs in, and after the user authorizes a terminal of a certain friend, the bluetooth MAC address corresponding to the terminal is added to a bluetooth MAC address list of an authorized terminal. Alternatively, the authorized terminal identification list may be, for example, a friend list in a social application, a communication list in the social application, a contact list in a mobile phone address book, or the like. For example, if the authorized terminal identifier list is a contact list of a mobile phone address book, after a user authorizes a certain contact in the contact list, a terminal corresponding to the contact is an authorized terminal, or after the user authorizes a plurality of contacts in the contact list, a plurality of terminals corresponding to the plurality of contacts are authorized terminals.
In one case, when the method is applied to one side of the target terminal, the target terminal may acquire identification information of a third party terminal existing within a peripheral preset range. For example, the target terminal may have a bluetooth module built therein to receive bluetooth broadcasts of peripheral third party terminals, thereby obtaining bluetooth MAC addresses of the respective terminals. The target terminal may store a preset authorized terminal identification list, or the target terminal may acquire the authorized terminal identification list from, for example, an electronic device, or the target terminal may acquire the authorized terminal identification list through communication with a corresponding server. Based on the list of authorized terminal identifications and the identification information of the third party terminal, it can be determined whether the third party terminal is an authorized terminal through steps 402 and 403. When all the third-party terminals around the target terminal are determined to be authorized terminals, it can be determined that unauthorized third-party terminals do not exist around the target terminal; when it is determined that at least one third-party terminal around the target terminal is an unauthorized terminal, it may be determined that an unauthorized third-party terminal exists around the target terminal.
In another case, the method may be applied to the side of the electronic device. For example, the electronic device may determine the third party terminals around the target terminal according to the position of the target terminal, for example, the electronic device may obtain each terminal and the position of each terminal from the corresponding server, and after determining the position of the target terminal, may directly determine the third party terminals around the target terminal, and further obtain the identification information corresponding to each third party terminal. For another example, the electronic device may obtain, from the target terminal, identification information of a third party terminal around the target terminal. The electronic device may store a preset authorized terminal identification list, or the electronic device may acquire the authorized terminal identification list from, for example, a target terminal, or the electronic device may acquire the authorized terminal identification list through communication with a corresponding server. Based on the list of authorized terminal identifications and the identification information of the third party terminal, it can be determined whether the third party terminal is an authorized terminal through steps 402 and 403. When all the third-party terminals around the target terminal are determined to be authorized terminals, it can be determined that unauthorized third-party terminals do not exist around the target terminal; when it is determined that at least one third-party terminal around the target terminal is an unauthorized terminal, it may be determined that an unauthorized third-party terminal exists around the target terminal.
The above description is an implementation manner in which after the identification information of the third-party terminal around the target terminal is acquired, the target terminal or the electronic device itself determines whether the third-party terminal is an authorized terminal. In another embodiment of the present disclosure, it may also be determined whether the third party terminal is an authorized terminal by the verification terminal. Fig. 5 is a flowchart of another exemplary embodiment of a step of determining whether an unauthorized third party terminal exists around a target terminal in a loss prevention warning method provided according to the present disclosure. As shown in fig. 5, step 102 may include the steps of:
in step 401, acquiring identification information of a third party terminal around a target terminal;
in step 502, the acquired identification information is sent to a verification terminal;
in step 503, the verification result sent by the verification terminal is received, and whether an unauthorized third party terminal exists around the target terminal is determined according to the verification result.
The specific implementation of obtaining the identification information of the third party terminal around the target terminal in step 401 is described above, and includes two cases of being applied to the electronic device and being applied to the target terminal, and the description is not repeated here.
The verification terminal can verify whether the terminal corresponding to the identification information is an authorized terminal according to the identification information. For example, the verification terminal may establish a connection with the target terminal and/or the electronic device in advance, respectively, to receive the identification information and verify a terminal corresponding to the identification information. For example, if the monitoring object is a baby, the electronic device is a crib, and the target terminal is an intelligent wearable device worn by the baby, the verification terminal may be a terminal held by a baby guardian. As shown in fig. 2, taking the smart phone with the verification terminal 24 as a guardian as an example, the verification terminal 24 can be connected to the target terminal 23 (a smart necklace worn by a baby) and the electronic device 21 (a baby crib), respectively. For example, the verification terminal may store a preset authorized terminal identifier list, and according to the received identifier information and the preset authorized terminal identifier list, it may be determined whether the third party terminal is an authorized terminal. For another example, the verification terminal may send the identification information to the corresponding server after receiving the identification information, so that the server determines whether the third-party terminal is an authorized terminal according to the identification information, and the verification terminal may receive a verification result of the server, where the verification result may be used to indicate whether the third-party terminal is an authorized terminal. For another example, the verification terminal may verify in real time whether the terminal corresponding to the identification information is an authorized terminal. After receiving the identification information, the verification terminal may output the identification information to the user, for example, by displaying, playing in voice, or by outputting information that is convenient for the user to identify to the user through a built-in rule of the verification terminal, for example, whether the user is a friend relationship, and the user may operate through the verification terminal to determine whether the terminal corresponding to the identification information is authorized. The verification terminal can feed back the verification result. The real-time verification mode of the verification terminal can not only facilitate user authorization, but also play a role in reminding the user, and when the information output by the verification terminal is strange information, the user can timely know and timely take precautions against the strange information.
As described above, the method may be applied to an electronic device, and may also be applied to a target terminal. When the method is applied to the electronic equipment, the electronic equipment can send the acquired identification information to the verification terminal, receive the verification result sent by the verification terminal and determine whether unauthorized third party terminals exist around the target terminal according to the verification result. For example, when the verification result indicates that the third party terminals around the target terminal are all authorized terminals, it may be determined that there is no unauthorized third party terminal around the target terminal.
When the method is applied to the target terminal, the target terminal can send the acquired identification information to the verification terminal, receive the verification result sent by the verification terminal and determine whether unauthorized third party terminals exist around the target terminal according to the verification result. For example, when the verification result indicates that at least one third party terminal around the target terminal is an unauthorized terminal, it may be determined that the unauthorized third party terminal exists around the target terminal.
Returning to fig. 1, in step 103, when the target terminal is not in the monitoring range and there is an unauthorized third party terminal, an alarm process is performed.
When the target terminal is not in the monitoring range and an unauthorized third party terminal exists, it is indicated that the target terminal is far away from the electronic device, and an unauthorized terminal exists around the target terminal, that is, a stranger exists near the target terminal, and at this time, the monitoring object or the target terminal has a risk of being lost or stolen. Therefore, an alarm process can be performed.
In one embodiment, the alarm may be given directly to attract the attention of the guardian or surrounding person.
In one case, the method may be applied to an electronic device, which may perform alarm processing, wherein the alarm execution subject may include, but is not limited to, any one or any several of the following: electronic equipment, target terminal, preset alarm equipment (e.g., user terminal held by owner or guardian). Illustratively, the electronic device may alert directly. For another example, the electronic device may send an alarm instruction to a preset alarm device to trigger the alarm device to alarm. For another example, the electronic device may send an alarm instruction to the target terminal to trigger the target terminal to alarm, so that on one hand, the electronic device may play a certain role in frightening strangers, and on the other hand, the electronic device may attract the attention of people around. Illustratively, the alert means may include, but is not limited to, one or more of the following: outputting prompt information, voice broadcasting, buzzer buzzing and light flashing.
In another case, the method may be applied to a target terminal, and the target terminal may perform alarm processing, wherein the alarm execution subject may include, but is not limited to, any one or any several of the following: electronic equipment, target terminal, preset alarm equipment (e.g., user terminal held by owner or guardian). In an example, the target terminal can directly give an alarm, so that the target terminal can play a role in frightening strangers and can attract the attention of surrounding people. For another example, the target terminal may send an alarm instruction to the electronic device to trigger the electronic device to alarm. For another example, the target terminal may send an alarm instruction to a preset alarm device to trigger the alarm device to alarm. Illustratively, the alert means may include, but is not limited to, one or more of the following: outputting prompt information, voice broadcasting, buzzer buzzing and light flashing.
In another embodiment, the alarming process of step 103 may include the steps of: and recording the Bluetooth MAC address of the unauthorized third-party terminal, and sending the recorded Bluetooth MAC address to the specified electronic equipment.
In one case, the method may be applied to an electronic device, and when it is determined that an unauthorized third party terminal exists around a target terminal, the electronic device may record a bluetooth MAC address of the unauthorized third party terminal and transmit the bluetooth MAC address of the unauthorized third party terminal to a designated electronic device. The designated electronic device may be a terminal of an owner or a guardian, or the designated electronic device may be a corresponding server. For example, the electronic device may send the recorded bluetooth MAC address of the unauthorized third party terminal to the owner's or guardian's terminal. Therefore, after the owner or the guardian terminal receives the Bluetooth MAC address of the unauthorized third-party terminal, the unauthorized third-party terminal can be determined according to the Bluetooth MAC address, and a thief can be positioned, so that subsequent searching, alarming and the like are facilitated. For another example, the electronic device may send the recorded bluetooth MAC address of the unauthorized third-party terminal to a corresponding server, so that the server performs corresponding processing.
In another case, the method may be applied to a target terminal, and when it is determined that an unauthorized third party terminal exists around the target terminal, the target terminal may record a bluetooth MAC address of the unauthorized third party terminal and transmit the address to a designated electronic device. The designated electronic device may be a terminal of an owner or a guardian, or the designated electronic device may be a corresponding server. For example, the target terminal may send the recorded bluetooth MAC address of the unauthorized third-party terminal to the owner or guardian terminal, so that after the owner or guardian terminal receives the bluetooth MAC address of the unauthorized third-party terminal, the unauthorized third-party terminal may be determined according to the bluetooth MAC address, and a thief may be located, thereby facilitating subsequent searching, alarming, and the like. For another example, the target terminal may send the recorded bluetooth MAC address of the unauthorized third-party terminal to a corresponding server, so that the server performs corresponding processing.
In another embodiment, the alarm processing may be performed in combination with the above two embodiments, and may include alarm processing applied to an electronic device, or may include alarm processing applied to a target terminal. The details have been described above, and a description thereof will not be repeated.
By the scheme, the position of the target terminal and whether terminals around the target terminal are authorized are taken as the basis, when the target terminal is far away from a safety range and unauthorized terminals exist around the target terminal, the risk that a monitored object or the target terminal is stolen by a stranger is judged, and at the moment, alarm processing is carried out. Therefore, the alarm can be given in time under the condition that the monitoring object or the target terminal is lost, the monitoring object or the target terminal is prevented from being lost, in addition, the alarm accuracy can be improved, and the false alarm generated when the monitoring object or the target terminal is taken by an owner or a person familiar to a guardian is avoided.
Fig. 6 is a block diagram illustrating an anti-lost warning device according to an exemplary embodiment. As shown in fig. 6, the apparatus 600 includes: a first determining module 601, configured to determine whether a target terminal is within a monitoring range of an electronic device, where the target terminal is a terminal held by a monitoring object, and the electronic device is a placement carrier of the monitoring object; a second determining module 602, configured to determine whether there is an unauthorized third party terminal around the target terminal; and an alarm processing module 603 configured to perform alarm processing when the target terminal is not within the monitoring range and the unauthorized third party terminal exists.
Fig. 7A is a block diagram illustrating an anti-theft warning device according to another exemplary embodiment. As shown in fig. 7A, the second determining module 602 includes: an obtaining submodule 701 configured to obtain identification information of a third party terminal around the target terminal; a first determining sub-module 702, configured to determine that the third party terminal corresponding to the identification information is an authorized terminal when the identification information exists in a preset authorized terminal identification list; a second determining sub-module 703 configured to determine that the third party terminal corresponding to the identification information is an unauthorized terminal when the identification information does not exist in the preset authorized terminal identification list.
Fig. 7B is a block diagram illustrating an anti-theft warning device according to another exemplary embodiment. As shown in fig. 7B, the second determining module 602 includes: an obtaining submodule 701 configured to obtain identification information of a third party terminal around the target terminal; the sending sub-module 704 is configured to send the acquired identification information to a verification terminal, so that the verification terminal verifies whether the third-party terminal corresponding to the identification information is an authorized terminal according to the identification information; the receiving submodule 705 is configured to receive a verification result sent by the verification terminal, and determine whether an unauthorized third party terminal exists around the target terminal according to the verification result.
Optionally, the identification information of the third party terminal is a bluetooth MAC address of the third party terminal.
Optionally, the alarm processing module 603 is configured to record the bluetooth MAC address of the unauthorized third party terminal and send the recorded bluetooth MAC address to a specified electronic device.
Optionally, the electronic device is an intelligent crib, and the target terminal is an intelligent wearable device worn by a baby in the intelligent crib.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present disclosure also provides a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the anti-lost warning method provided by the present disclosure.
Fig. 8 is a block diagram illustrating an anti-lost warning device 800 according to an exemplary embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 8, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the anti-lost warning method described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 806 provides power to the various components of device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components for performing the above-described anti-theft warning method.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described anti-lost warning method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present disclosure also provides an intelligent crib, including: a bed body; the communication module is used for communicating the intelligent baby crib with external equipment; a processor; a memory for storing processor-executable instructions that, when executed by the processor, implement the anti-theft warning method provided by any embodiment of the present disclosure.
The communication module may implement wired or wireless communication between the intelligent crib and the external device, for example, the communication between the intelligent crib and the external device may include, but is not limited to, any one or a combination of any of the following: WiFi, 2G network, 3G network, 4G network, Bluetooth. Illustratively, the external device may be, for example, a server, a smart terminal, an electronic device, or the like. As mentioned in the previous embodiments, the external device may be a target terminal, an alarm device, a server, etc.
The processor may control the overall operation of the intelligent crib, such as operations associated with detecting baby status, sleeping, displaying, telephone calls, data communications, camera operations, and recording operations, to perform all or part of the steps of the anti-loss warning method described above. Further, the processor may include one or more modules that facilitate internal interaction of the intelligent crib.
The memory may be configured to store various types of data to support operation at the intelligent crib. Examples of such data include instructions for any application or method operating on the intelligent crib, contact data, phone book data, messages, pictures, videos, and the like. The memory may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (7)

1. An anti-lost early warning method is characterized by comprising the following steps:
determining whether a target terminal is in a monitoring range of electronic equipment, wherein the target terminal is a terminal held by a monitoring object, and the electronic equipment is a placing carrier of the monitoring object;
determining whether unauthorized third party terminals exist around the target terminal;
when the target terminal is not in the monitoring range and the unauthorized third-party terminal exists, alarming;
the determining whether an unauthorized third party terminal exists around the target terminal includes:
acquiring identification information of third party terminals around the target terminal;
sending the acquired identification information to a verification terminal so that the verification terminal outputs the identification information, receiving a verification result generated by user operation and used for indicating whether the user authorizes the third-party terminal or not after the verification terminal outputs the identification information, and outputting the identification information by outputting information used for representing whether the user is in a friend relationship with the verification terminal;
and receiving the verification result sent by the verification terminal, and determining whether unauthorized third party terminals exist around the target terminal according to the verification result.
2. The method of claim 1, wherein the identification information of the third party terminal is a bluetooth MAC address of the third party terminal.
3. The method of claim 2, wherein said performing an alarm process comprises:
and recording the Bluetooth MAC address of the unauthorized third-party terminal, and sending the recorded Bluetooth MAC address to a specified electronic device.
4. The method according to any one of claims 1-3, wherein the electronic device is an intelligent crib, and the target terminal is an intelligent wearable device worn by an infant in the intelligent crib.
5. The utility model provides an anti-lost early warning device which characterized in that includes:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to execute the instructions in the memory to implement the steps of the method of any one of claims 1 to 4.
6. A computer-readable storage medium, on which computer program instructions are stored, which program instructions, when executed by a processor, carry out the steps of the method according to any one of claims 1 to 4.
7. An intelligent crib, comprising:
a bed body;
the communication module is used for communicating the intelligent baby crib with external equipment;
a processor;
memory for storing processor-executable instructions which, when executed by a processor, implement the steps of the method of any one of claims 1 to 4.
CN201810164766.1A 2018-02-27 2018-02-27 Anti-lost early warning method and device, storage medium and intelligent baby crib Active CN108305438B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810164766.1A CN108305438B (en) 2018-02-27 2018-02-27 Anti-lost early warning method and device, storage medium and intelligent baby crib

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810164766.1A CN108305438B (en) 2018-02-27 2018-02-27 Anti-lost early warning method and device, storage medium and intelligent baby crib

Publications (2)

Publication Number Publication Date
CN108305438A CN108305438A (en) 2018-07-20
CN108305438B true CN108305438B (en) 2020-11-27

Family

ID=62848999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810164766.1A Active CN108305438B (en) 2018-02-27 2018-02-27 Anti-lost early warning method and device, storage medium and intelligent baby crib

Country Status (1)

Country Link
CN (1) CN108305438B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023062082A1 (en) * 2021-10-13 2023-04-20 Wonderland Switzerland Ag Leaving prevention method and device, server, system and storage medium, and system on chip

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6223102B1 (en) * 1996-03-27 2001-04-24 Pruftechnik Dieter Busch Ag Method and device for aligning the shaft of a rotating machine
CN101188044A (en) * 2007-12-18 2008-05-28 杨尧任 Simple method and device for uniform control of theft-prevention alarming system and Bluetooth terminal device
JP2008140312A (en) * 2006-12-05 2008-06-19 Hitachi Ltd Information processing system
CN105261091A (en) * 2015-09-23 2016-01-20 奇瑞汽车股份有限公司 Method and device used for vehicle one-key start
CN105308534A (en) * 2013-06-11 2016-02-03 Invue安全产品公司 Anti-theft device for portable electronic device
CN206043703U (en) * 2016-09-23 2017-03-29 南昌欧菲光科技有限公司 Intelligent wallet

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8248237B2 (en) * 2008-04-02 2012-08-21 Yougetitback Limited System for mitigating the unauthorized use of a device
CN105691353A (en) * 2014-11-27 2016-06-22 陈飞 Vehicle-mounted monitoring device for vehicle antitheft
CN204791361U (en) * 2015-07-08 2015-11-18 湖北天地春现代农业发展有限公司 Intelligence anti -theft device based on photovoltaic power generation technique
US10264112B2 (en) * 2015-10-16 2019-04-16 Muchi Corporation Voice communication and location tracking system
CN205318531U (en) * 2016-01-22 2016-06-15 上海云充新能源科技有限公司 Electric automobile fills automatic perception of electric pile user and confirms system
CN105915714A (en) * 2016-05-24 2016-08-31 北京小米移动软件有限公司 Method and device for prompting terminal loss

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6223102B1 (en) * 1996-03-27 2001-04-24 Pruftechnik Dieter Busch Ag Method and device for aligning the shaft of a rotating machine
JP2008140312A (en) * 2006-12-05 2008-06-19 Hitachi Ltd Information processing system
CN101188044A (en) * 2007-12-18 2008-05-28 杨尧任 Simple method and device for uniform control of theft-prevention alarming system and Bluetooth terminal device
CN105308534A (en) * 2013-06-11 2016-02-03 Invue安全产品公司 Anti-theft device for portable electronic device
CN105261091A (en) * 2015-09-23 2016-01-20 奇瑞汽车股份有限公司 Method and device used for vehicle one-key start
CN206043703U (en) * 2016-09-23 2017-03-29 南昌欧菲光科技有限公司 Intelligent wallet

Also Published As

Publication number Publication date
CN108305438A (en) 2018-07-20

Similar Documents

Publication Publication Date Title
CN108809968B (en) Equipment sharing method, device and storage medium
EP3113466B1 (en) Method and device for warning
US11069219B2 (en) Multi-modal tracking locator alarm system
RU2617679C2 (en) Method and device for a terminal equipment protection and the terminal equipment
JP6466958B2 (en) Terminal abnormality processing method, terminal abnormality processing apparatus, electronic device, program, and recording medium
RU2635237C2 (en) Method and device for deleting intelligent script
KR101813414B1 (en) Method, apparatus, program and computer-readable recording medium of providing object retrieve information
CN105205955B (en) A kind of method and apparatus sending out standby signal
US20170078837A1 (en) Methods and devices for locating wearable device
CN104539776A (en) Alarm prompting method and device
WO2016206294A1 (en) Balanced car management method and device
CN104484799B (en) Method of payment and device
CN110233934B (en) Electronic equipment control method and device and computer readable storage medium
US20170223493A1 (en) Method, apparatus, and storage medium for acquiring terminal information
CN104332012A (en) Anti-theft method and device of terminal device
CN104332037B (en) method and device for alarm detection
CN106293458A (en) Alarm method based on touch screen and mobile terminal
CN105128814B (en) A kind of method and apparatus for sending warning message
CN103871208A (en) Gas warning method and device
CN106251682A (en) Parking stall identifies the method and device of vehicle
CN105869345A (en) Alarm method, device and equipment based on wearable equipment
CN106303961A (en) Automatic alarm method and equipment
CN105430185A (en) Method, apparatus and device for information reminding
CN105491518A (en) Method and device for social reminding based on wearable devices
CN108305438B (en) Anti-lost early warning method and device, storage medium and intelligent baby crib

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant