CN109379487A - Electronic equipment and its control method - Google Patents
Electronic equipment and its control method Download PDFInfo
- Publication number
- CN109379487A CN109379487A CN201811128693.7A CN201811128693A CN109379487A CN 109379487 A CN109379487 A CN 109379487A CN 201811128693 A CN201811128693 A CN 201811128693A CN 109379487 A CN109379487 A CN 109379487A
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- electronic device
- electronic equipment
- microcontroller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000004891 communication Methods 0.000 claims abstract description 47
- 230000004044 response Effects 0.000 claims description 15
- 238000011084 recovery Methods 0.000 claims description 7
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 2
- 238000013475 authorization Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 230000006872 improvement Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/60—Substation equipment, e.g. for use by subscribers including speech amplifiers
- H04M1/6033—Substation equipment, e.g. for use by subscribers including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
- H04M1/6041—Portable telephones adapted for handsfree use
- H04M1/6058—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone
- H04M1/6066—Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone including a wireless connection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present embodiments relate to field of computer technology, disclose a kind of electronic equipment and its control method.Electronic equipment, comprising: at least one microcontroller;And the memory being connect at least one micro-controller communications;Wherein, memory is stored with the instruction that can be executed by least one microcontroller, and instruction is executed by least one microcontroller, so that at least one microcontroller is able to carry out above-mentioned control method;Memory is also used to store the owner information of electronic equipment;Owner information includes at least terminal authorization information.In the present invention, so that unwarranted terminal is not available electronic equipment.
Description
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to electronic equipment and a control method thereof.
Background
Along with the development of short distance wireless communication technology, the wearing equipment that the user used also tends to wireless gradually, for example, bluetooth headset, intelligent bracelet, intelligent wrist-watch etc. the user can directly establish communication connection with the cell-phone through wireless and wearing equipment, and it is more convenient to use.
The inventor finds that at least the following problems exist in the prior art: at present, wireless wearable equipment is comparatively portable, also easily loses, and wireless wearable equipment is after being picked up, and the pick-up person can be connected to own cell-phone normal use directly, consequently, the pick-up person generally can not return to the economic loss who has caused the owner.
Disclosure of Invention
An object of embodiments of the present invention is to provide a control method, which makes an unauthorized terminal unable to use an electronic device.
In order to solve the above technical problem, an embodiment of the present invention provides a control method, which is applied to an electronic device, where owner information of the electronic device is stored in the electronic device; the owner information at least comprises terminal authority information; the method comprises the following steps: when the electronic equipment establishes communication connection with a terminal, acquiring terminal identity information of the terminal; judging whether the terminal identity information is matched with the terminal authority information; and when the terminal identity information is judged not to be matched with the terminal authority information, the control electronic equipment is controlled to forbid responding to the control instruction of the terminal.
An embodiment of the present invention also provides an electronic device, including: at least one microcontroller; and a memory communicatively coupled to the at least one microcontroller; the memory stores instructions which can be executed by the at least one microcontroller, and the instructions are executed by the at least one microcontroller so as to enable the at least one microcontroller to execute the control method; the memory is also used for storing owner information of the electronic equipment; the owner information includes at least terminal right information.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and is characterized in that the computer program is executed by a microcontroller to realize the control method.
Compared with the prior art, the electronic equipment stores owner information of the electronic equipment, the owner information at least comprises terminal authority information representing the terminal identity with the use authority of the electronic equipment, when the electronic equipment is in communication connection with the terminal, the terminal identity information of the terminal is obtained, whether the terminal identity information is matched with the terminal authority information representing the terminal identity or not is judged, when the terminal identity information is not matched with the terminal authority information representing the terminal identity, the terminal does not have the use authority of the electronic equipment, the electronic equipment is controlled to prohibit response to a control instruction of the terminal, and therefore the unauthorized terminal cannot use the electronic equipment.
In addition, the owner information also comprises user authority information; the method further comprises the following steps: before the control electronic device forbids the control instruction of the response terminal, the method further comprises the following steps: sending first prompt information representing that the terminals are unmatched through the terminals, and receiving user identity information through the terminals; when the received user identity information is judged to be not matched with the user authority information, the step of controlling the electronic equipment to forbid the response of the electronic equipment to the control instruction of the terminal is carried out; and when the received user identity information is judged to be matched with the user authority information, controlling the electronic equipment to normally work. In this embodiment, the owner information of the electronic device further includes user right information representing the identity of the user, before the control instruction for controlling the electronic device to prohibit the response terminal, the terminal sends first prompt information representing that the terminal is unmatched, and the terminal receives the user identity information, and when it is determined that the received user identity information is unmatched with the user right information, the control instruction for controlling the electronic device to prohibit the response terminal is controlled, so that the user with the use right of the electronic device cannot continue to use the electronic device after replacing the terminal.
In addition, after the received user identity information is judged to be matched with the user authority information, the method further comprises the following steps: and adding the terminal identity information of the terminal into the terminal authority information. In the embodiment, after the received user identity information is judged to be matched with the user permission information, the terminal identity information of the terminal is added into the terminal permission information, so that when the terminal is connected with the electronic equipment again, the electronic equipment can be normally used through terminal identity verification directly without verifying the user identity information again.
In addition, after determining that the received user identity information is matched with the user authority information and before adding the terminal identity information of the terminal into the terminal authority information, the method further includes: judging whether the number of times of establishing communication connection between the terminal and the electronic equipment reaches a preset number of times or not; and if the times of establishing communication connection between the terminal and the electronic equipment reach the preset times, entering a step of adding the terminal identity information of the terminal into the terminal authority information. In this embodiment, when the number of times of establishing communication connection between the terminal and the electronic device reaches the preset number, the terminal identity information of the terminal is added to the terminal permission information, so that the user with the use permission of the electronic device is prevented from adding the identity information of the other terminal to the terminal permission information when trying on the other terminal.
In addition, after the control electronic device prohibits the control instruction of the response terminal, the method further comprises the following steps: and sending a preset second prompt message. In this embodiment, after the control electronic device prohibits the response of the control command of the terminal, the second prompt information indicating that the user is illegal is sent.
In addition, the owner information also includes lost recovery information; the method further comprises the following steps: sending a preset second prompt message, specifically: and sending out second prompt information according to the lost retrieval information. In this embodiment, the user with the use permission of the electronic device may pre-store the lost retrieving information in the electronic device, and after controlling the electronic device to prohibit the response terminal from responding to the control instruction, send the second prompt information according to the lost retrieving information to prompt the current user to retrieve the electronic device according to the lost retrieving information, thereby reducing the loss of the owner of the electronic device.
In addition, after sending out the second prompt message according to the lost recovery message, the method further comprises the following steps: sending a communication permission request to a terminal; and when the information of the terminal indicating that the communication permission request is agreed is received, sending third prompt information to the other preset terminal through the terminal. In this embodiment, it is convenient for the current user to directly communicate with the owner of the electronic device.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a detailed flowchart of a control method according to a first embodiment of the present invention;
fig. 2 is a detailed flowchart of a control method according to a second embodiment of the invention;
fig. 3 is a detailed flowchart of a control method according to a third embodiment of the invention;
fig. 4 is a detailed flowchart of a control method according to a fourth embodiment of the invention;
fig. 5 is a detailed flowchart of a control method in a fifth embodiment according to the present invention;
fig. 6 is a block schematic diagram of an electronic device in a sixth embodiment according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
The first embodiment of the present invention relates to a control method, which is applied to an electronic device, where the electronic device may be a portable electronic device, such as a bluetooth headset, an intelligent bracelet, an intelligent headband, and the like, the electronic device may be connected to a terminal, and the terminal may be a mobile phone, a tablet, a computer, and the like, the electronic device may be connected to the terminal in a wired or wireless manner, and when the electronic device is connected to the terminal in a wireless manner, the electronic device and the terminal both have corresponding wireless communication modules, such as a bluetooth module, an NFC module, and the like. It should be noted that, in the embodiment and the following embodiments, the electronic device is a bluetooth headset, and the terminal is a mobile phone, which is not limited in this embodiment.
Fig. 1 shows a specific flow of the control method according to the present embodiment.
Step 101, judging whether the electronic equipment establishes communication connection with the terminal. If yes, go to step 102; otherwise, the process is ended directly.
Specifically, the microcontroller in the electronic device can determine whether the electronic device establishes a communication connection with the terminal, and when the microcontroller determines that the electronic device establishes a communication connection with the terminal, the step 102 is performed; otherwise, the electronic equipment is not connected to any terminal, and the process is ended directly.
Step 102, terminal identity information of a terminal is obtained.
Specifically, the microcontroller acquires terminal identity information representing a terminal identity from a terminal in communication connection with the electronic device, where the terminal identity information is information uniquely identifying the terminal, for example, when the terminal is a mobile phone, the terminal may be an IMEI code of the mobile phone, but not limited thereto, and may also be information written in the terminal by an owner of the electronic device in advance.
Step 103, judging whether the terminal identity information is matched with the terminal authority information; if yes, directly ending; if not, go to step 104.
Specifically, owner information of the electronic device is stored in the electronic device, the owner information at least includes terminal authority information representing a terminal identity having a use authority of the electronic device, when the microcontroller judges whether the acquired terminal identity information of the terminal which is in communication connection with the electronic device at present is matched with the terminal authority information stored in the electronic device, which is equivalent to performing identity authentication on the terminal, when the terminal identity information is not matched with the terminal authority information, it is indicated that the terminal is not authorized by an owner of the electronic device, and the step 104 is performed; otherwise, the terminal is authorized by the owner of the electronic device, and the terminal can normally use the electronic device. The owner information may be information input by the owner of the electronic device through the terminal when the electronic device is connected to the terminal for the first time, and after receiving the owner information, the electronic device stores the owner information in a memory of the electronic device, and the terminal authority information may include identity information of one or more terminals.
And 104, controlling the electronic equipment to forbid the control instruction of the response terminal.
Specifically, when the microcontroller determines that the terminal identity information is not matched with the terminal permission information, which indicates that the electronic device may be in an unsafe state at this time, the electronic device is controlled to prohibit a response to a control instruction of the terminal, and the terminal cannot normally use the electronic device at this time, for example, if the electronic device is a bluetooth headset, the bluetooth headset does not respond to functions of the terminal, such as music playing, voice call, and the like, and the functions of the electronic device, such as heart rate detection, positioning, and the like, are turned off.
Compared with the prior art, the electronic equipment stores owner information of the electronic equipment, the owner information at least comprises terminal authority information representing a terminal identity with the use authority of the electronic equipment, when the electronic equipment is in communication connection with the terminal, the terminal identity information of the terminal is obtained, whether the terminal identity information is matched with the terminal authority information representing the terminal identity or not is judged, when the terminal identity information is not matched with the terminal authority information representing the terminal identity, the terminal does not have the use authority of the electronic equipment, the electronic equipment is controlled to prohibit response to a control instruction of the terminal, and therefore the unauthorized terminal cannot use the electronic equipment.
A second embodiment of the present invention relates to a control method, and is an improvement of the first embodiment, and is mainly characterized in that: and when the terminal identity information is not matched with the terminal authority information, judging whether the user authority information is matched with the user identity information.
A specific flow of the control method of the present embodiment is shown in fig. 2.
Step 201 to step 203 are substantially the same as step 101 to step 103, and step 206 is substantially the same as step 104, which are not described herein again, but the main difference is that step 204 and step 205 are added, which are specifically as follows:
and step 204, sending first prompt information for representing that the terminals are not matched through the terminals, and receiving user identity information through the terminals.
Specifically, when the terminal identity information is not matched with the terminal authority information, the microcontroller sends first prompt information for representing that the terminal is not matched through the terminal, specifically, the microcontroller feeds back unauthorized information for representing that the terminal is not matched to the terminal, and after receiving the information, the terminal provides an information input interface, so that a current user of the electronic equipment can input user identity information through the information input interface of the terminal. It should be noted that, in this embodiment, the example that a user of the electronic device inputs user identity information through the terminal in real time is taken as an example for explanation, but not limited to this, the user identity information may also be pre-stored in the terminal, and after receiving the first prompt information fed back by the microcontroller of the electronic device and indicating that the terminal is not matched, the pre-stored user identity information is sent to the microcontroller.
Step 205, determining whether the received user identity information matches the user permission information. If yes, directly ending; if not, go to step 206.
Specifically, the owner information stored in the memory of the electronic device further includes user right information; when the microcontroller receives the user identity information, the microcontroller verifies the user identity of the current user of the electronic equipment, and judges whether the user identity information is matched with the user authority information, namely whether the current user of the electronic equipment is a user authorized by the owner of the electronic equipment or not, if the user identity information is matched with the user authority information, the current user of the electronic equipment is a user authorized by the owner of the electronic equipment, and the current user has the quota using authority of the electronic equipment and is allowed to normally use the electronic equipment; otherwise, it indicates that the current user of the current electronic device is not authorized by the owner of the electronic device, and the electronic device may be lost or stolen, and step 206 is entered to control the electronic device to prohibit the response to the control command of the terminal.
The user permission information may be information such as a password, a fingerprint, a face, and a voice set by an owner of the electronic device, and the user permission information may further include identity information of a plurality of other users permitted by the owner of the electronic device.
Compared with the first embodiment, the owner information of the electronic device further includes user right information representing the identity of the user, before the control instruction for controlling the electronic device to forbid responding to the terminal is sent, the first prompt information representing that the terminal is not matched is sent by the terminal, the user identity information is received by the terminal, and when the fact that the received user identity information is not matched with the user right information is judged, the control instruction for controlling the electronic device to forbid responding to the terminal is controlled, so that the situation that the user with the use right of the electronic device cannot continue to use the electronic device after the terminal is replaced is avoided.
A third embodiment of the present invention relates to a control method, which is an improvement over the second embodiment, and is mainly improved in that: and adding the terminal identity information of the terminal into the terminal authority information.
A specific flow of the control method of the present embodiment is shown in fig. 3.
Step 301 to step 305 are substantially the same as step 201 to step 205, and step 308 is substantially the same as step 206, which are not described herein again, but the main difference is that step 306 and step 307 are added, which are specifically as follows:
step 306, judging whether the number of times of establishing the communication connection between the terminal and the electronic device reaches a preset number of times. If yes, go to step 307; if not, the process is ended directly.
Specifically, when the microcontroller of the electronic device determines that the terminal identity information is not matched with the terminal permission information and the received user identity information is matched with the user permission information, the number of times of establishing communication connection between the electronic device and the terminal is recorded, where the number of times of establishing communication connection between the terminal and the electronic device is corresponding to the terminal identity information of the terminal, and when the recorded number of times of establishing communication connection between the terminal and the electronic device reaches a preset number, the process proceeds to step 307; and when the recorded times of establishing the communication connection between the terminal and the electronic equipment do not reach the preset times, the current user is still allowed to normally use the electronic equipment.
And 307, adding the terminal identity information of the terminal into the terminal authority information.
Specifically, when the recorded times of establishing communication connection between the terminal and the electronic device reaches the preset times, it is indicated that the user of the terminal is a frequently-used user of the electronic device, and the terminal identity information of the current terminal is added to the terminal authority, so that the electronic device can be normally used by directly verifying the terminal identity without verifying the user identity information again when the terminal is connected with the electronic device again later.
It should be noted that, in this embodiment, when it is determined that the number of times of establishing the communication connection between the terminal and the electronic device reaches the preset number, step 307 is executed to add the terminal identity information of the terminal into the terminal permission information, but not limited to this, and when it is determined that the terminal identity information is not matched with the terminal permission information and it is received that the user identity information is matched with the user permission information, step 307 is immediately executed to add the terminal identity information of the terminal into the terminal permission information.
Compared with the first embodiment, when the number of times of establishing communication connection between the terminal and the electronic equipment reaches the preset number, the terminal identity information of the terminal is added into the terminal permission information, so that the situation that the identity information of other terminal is added into the terminal permission information when a user with the use permission of the electronic equipment tries on other terminal is avoided; meanwhile, when the terminal is connected with the electronic equipment again later, the electronic equipment can be normally used through terminal identity verification directly, and user identity information does not need to be verified again.
A fourth embodiment of the present invention relates to a control method, which is an improvement of the first embodiment, and is mainly improved in that: and sending preset second prompt information after the control electronic equipment prohibits responding to the control instruction of the terminal.
Fig. 4 shows a specific flow of the control method according to the present embodiment.
The steps 401 to 404 are substantially the same as the steps 101 to 104, and are not described herein again, but the main difference is that the step 405 is added as follows:
step 405, sending a preset second prompt message.
Specifically, a microcontroller of the electronic device controls to send out preset second prompt information, the second prompt information is illegal prompt information representing a current user of the electronic device, the second prompt information can be sent out by the electronic device, for example, when the electronic device is a bluetooth headset, a voice prompt is directly played, and when the electronic device is provided with a display screen, a text prompt can be sent out through the display screen; or, the electronic device may also send the second prompt message through the terminal.
Preferably, when the owner information includes the lost recovery information, the microcontroller of the electronic device controls to send out the second prompt information according to the lost recovery information, wherein the lost recovery information can be voice information and text information which are recorded by the owner of the electronic device, and can include a contact telephone, a mailbox, a contact address, a loss return reward promise and the like of the owner of the electronic device. So that the current user of the electronic device contacts the owner of the electronic device to return the electronic device.
Compared with the first embodiment, the embodiment sends out the second prompt information representing that the user is illegal after the control electronic equipment prohibits the response of the control instruction of the terminal; meanwhile, second prompt information is sent according to the lost retrieving information to prompt a current user to return the electronic equipment according to the lost retrieving information, and loss of an owner of the electronic equipment is reduced. The present embodiment can be modified from any of the second and third embodiments, and can achieve the same technical effects.
A fifth embodiment of the present invention relates to a control method, which is an improvement of the first embodiment, and is mainly improved in that: and after the control electronic equipment prohibits responding to the control instruction of the terminal, when receiving the information of the terminal representing the communication permission approval request, sending third prompt information to another preset terminal through the terminal.
Fig. 5 shows a specific flow of the control method according to the present embodiment.
The steps 501 to 504 are substantially the same as the steps 101 to 104, and are not described herein again, but the main difference is that the steps 505 to 507 are added as follows:
step 505, a communication permission request is sent to the terminal.
Specifically, the microcontroller sends a communication permission request to the terminal after the control electronic device prohibits the response to the control command of the terminal.
Step 506, judging whether the information of the communication permission request which is represented by the terminal and agreed is received. If yes, go to step 507; if not, the process is ended directly.
Specifically, when the terminal receives the communication permission request, the current user of the terminal can choose to approve or disapprove the communication permission request, and when the microcontroller of the electronic device receives the information indicating that the terminal approves the communication permission request, the process proceeds to step 507. Otherwise, the current user of the terminal does not agree with the communication permission request, and the process is finished directly.
And step 507, sending a third prompt message to another preset terminal through the terminal.
Specifically, when the microcontroller of the electronic device receives information representing that the terminal agrees with the communication permission request, the electronic device obtains the permission to communicate through the terminal, and sends third prompt information to another preset terminal through the terminal, the communication information of the other terminal is prestored in the electronic device by an owner of the electronic device, the communication information may be a mailbox, a telephone, a WeChat and the like, the third prompt information may be current positioning information of the electronic device, and if the electronic device has a positioning function, the positioning information may be obtained by the electronic device itself, but not limited thereto, the electronic device may also obtain the positioning information through the terminal.
This embodiment is advantageous over the first embodiment in that the current user can communicate directly with the owner of the electronic device. The present embodiment can be modified from any of the second to fourth embodiments, and can achieve the same technical effects.
A sixth embodiment of the present invention relates to an electronic device, as shown in fig. 6, which includes at least one microcontroller 1; and a memory 2 in communicative connection with the at least one microcontroller 1; wherein the memory 2 stores instructions executable by the at least one microcontroller 1, the instructions being executed by the at least one microcontroller 1 to enable the at least one microcontroller 1 to perform the control method as in any one of the first to fifth embodiments; the memory 2 is also used for storing owner information of the electronic equipment; the owner information includes at least terminal right information.
In one example, the electronic device further comprises a wireless communication module 3; the microcontroller 1 is also used to establish a communication connection with the terminal 4 via the wireless communication module 3.
The memory 2 and the microcontroller 1 are connected by a bus, which may include any number of interconnected buses and bridges, which connect one or more of the various circuits of the microcontroller 1 and the memory 2. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the microcontroller 1 are transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the microcontroller 1.
The microcontroller 1 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interface, voltage regulation, power management and other control functions. While the memory 2 may be used to store data used by the microcontroller 1 in performing operations.
A seventh embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program, when executed by the microcontroller, implements the above-described method embodiments.
That is, as can be understood by those skilled in the art, all or part of the steps in the method of the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a microcontroller (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.
Claims (10)
1. The control method is applied to electronic equipment, and owner information of the electronic equipment is stored in the electronic equipment; the owner information at least comprises terminal authority information; the method comprises the following steps:
when the electronic equipment establishes communication connection with a terminal, acquiring terminal identity information of the terminal;
judging whether the terminal identity information is matched with the terminal authority information;
and when the terminal identity information is judged not to be matched with the terminal authority information, controlling the electronic equipment to forbid responding to a control instruction of the terminal.
2. The control method according to claim 1, wherein the owner information further includes user right information; the method further comprises the following steps:
before the controlling the electronic device forbids responding to the control instruction of the terminal, the method further comprises the following steps:
sending first prompt information representing that the terminals are unmatched through the terminals, and receiving user identity information through the terminals;
when the received user identity information is judged to be not matched with the user authority information, the step of controlling the electronic equipment to forbid responding to the control instruction of the terminal is carried out; and when the received user identity information is judged to be matched with the user authority information, controlling the electronic equipment to normally work.
3. The control method according to claim 2, further comprising, after determining that the received user identity information matches the user authority information:
and adding the terminal identity information of the terminal into the terminal authority information.
4. The control method according to claim 3, wherein after determining that the received user identity information matches the user permission information and before adding the terminal identity information of the terminal to the terminal permission information, the method further comprises:
judging whether the number of times of establishing communication connection between the terminal and the electronic equipment reaches a preset number of times or not;
and if the times of establishing communication connection between the terminal and the electronic equipment reach preset times, entering the step of adding the terminal identity information of the terminal into the terminal authority information.
5. The control method according to any one of claims 1 to 4, further comprising, after the controlling the electronic device to prohibit a response to the control instruction of the terminal:
and sending a preset second prompt message.
6. The control method according to claim 5, wherein the owner information further includes lost recovery information; the method further comprises the following steps:
the sending of the preset second prompt message specifically includes:
and sending the second prompt message according to the lost recovery message.
7. The control method according to claim 1, further comprising, after controlling the electronic device to inhibit responding to the control instruction of the terminal:
sending a communication permission request to the terminal;
and when receiving the information of the terminal indicating that the communication permission request is agreed, sending third prompt information to another preset terminal through the terminal.
8. An electronic device, comprising:
at least one microcontroller; and the number of the first and second groups,
a memory communicatively coupled to the at least one microcontroller; wherein,
the memory stores instructions executable by the at least one microcontroller to enable the at least one microcontroller to perform the control method of any one of claims 1 to 7; the memory is further used for storing owner information of the electronic equipment; the owner information includes at least terminal right information.
9. The electronic device of claim 8, further comprising a wireless communication module; the microcontroller is also used for establishing communication connection with the terminal through the wireless communication module.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a microcontroller, carries out the control method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811128693.7A CN109379487A (en) | 2018-09-27 | 2018-09-27 | Electronic equipment and its control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811128693.7A CN109379487A (en) | 2018-09-27 | 2018-09-27 | Electronic equipment and its control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109379487A true CN109379487A (en) | 2019-02-22 |
Family
ID=65402782
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811128693.7A Pending CN109379487A (en) | 2018-09-27 | 2018-09-27 | Electronic equipment and its control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109379487A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147256A (en) * | 2019-12-26 | 2020-05-12 | 华为技术有限公司 | Authentication method and device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003153345A (en) * | 2001-11-02 | 2003-05-23 | Agere Systems Inc | Wireless unit temporary repossessing mode service and function |
CN102547502A (en) * | 2010-12-17 | 2012-07-04 | 索尼爱立信移动通讯有限公司 | Headset, headset use control method and terminal |
CN103974218A (en) * | 2014-04-28 | 2014-08-06 | 法视网络传媒技术(北京)有限公司 | Wearable device, mobile terminal, intelligent risk reporting system and intelligent risk reporting method |
CN104346548A (en) * | 2013-08-01 | 2015-02-11 | 华为技术有限公司 | Wearable equipment and authentication method thereof |
CN105162889A (en) * | 2015-09-30 | 2015-12-16 | 小米科技有限责任公司 | Device finding method and apparatus |
CN105163266A (en) * | 2015-09-16 | 2015-12-16 | 小米科技有限责任公司 | Method and device for locating wearable device |
CN105278686A (en) * | 2015-09-30 | 2016-01-27 | 宇龙计算机通信科技(深圳)有限公司 | Safety prompt method and device for smart wearable device |
CN105307287A (en) * | 2015-10-19 | 2016-02-03 | 宇龙计算机通信科技(深圳)有限公司 | Connection method and wearable equipment |
CN105335677A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Anti-theft method and device of mobile terminal |
CN107277657A (en) * | 2017-05-18 | 2017-10-20 | 深圳市冠旭电子股份有限公司 | A kind of earphone method for retrieving, device and earphone |
-
2018
- 2018-09-27 CN CN201811128693.7A patent/CN109379487A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003153345A (en) * | 2001-11-02 | 2003-05-23 | Agere Systems Inc | Wireless unit temporary repossessing mode service and function |
CN102547502A (en) * | 2010-12-17 | 2012-07-04 | 索尼爱立信移动通讯有限公司 | Headset, headset use control method and terminal |
CN104346548A (en) * | 2013-08-01 | 2015-02-11 | 华为技术有限公司 | Wearable equipment and authentication method thereof |
CN103974218A (en) * | 2014-04-28 | 2014-08-06 | 法视网络传媒技术(北京)有限公司 | Wearable device, mobile terminal, intelligent risk reporting system and intelligent risk reporting method |
CN105335677A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Anti-theft method and device of mobile terminal |
CN105163266A (en) * | 2015-09-16 | 2015-12-16 | 小米科技有限责任公司 | Method and device for locating wearable device |
CN105162889A (en) * | 2015-09-30 | 2015-12-16 | 小米科技有限责任公司 | Device finding method and apparatus |
CN105278686A (en) * | 2015-09-30 | 2016-01-27 | 宇龙计算机通信科技(深圳)有限公司 | Safety prompt method and device for smart wearable device |
CN105307287A (en) * | 2015-10-19 | 2016-02-03 | 宇龙计算机通信科技(深圳)有限公司 | Connection method and wearable equipment |
CN107277657A (en) * | 2017-05-18 | 2017-10-20 | 深圳市冠旭电子股份有限公司 | A kind of earphone method for retrieving, device and earphone |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147256A (en) * | 2019-12-26 | 2020-05-12 | 华为技术有限公司 | Authentication method and device |
CN111147256B (en) * | 2019-12-26 | 2021-07-09 | 荣耀终端有限公司 | Authentication method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112771826B (en) | Application program login method, application program login device and mobile terminal | |
US11216549B2 (en) | Security verification method and device | |
US10447839B2 (en) | Device locator disable authentication | |
CN106330958B (en) | Secure access method and device | |
AU2013245980B2 (en) | Location-based access control for portable electronic device | |
US8463234B2 (en) | Method for providing security services by using mobile terminal password and mobile terminal thereof | |
US7275695B2 (en) | Portable terminal and function limiting method | |
US9264888B2 (en) | Control of a mobile device | |
CN104169932A (en) | Methods and devices for distributing content to an electronic device | |
US9088896B2 (en) | Mobile device password reset | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
Young et al. | BadVoice: Soundless voice-control replay attack on modern smartphones | |
CN103607253A (en) | Method and system for controlling mobile terminals | |
CN104700270A (en) | Payment request processing method, payment request processing device and terminal | |
EP2840818A1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN113709737B (en) | Voice communication method and device based on TWS Bluetooth headset | |
CN105227749B (en) | Unlocking screen method and system | |
CN109379487A (en) | Electronic equipment and its control method | |
WO2019090702A1 (en) | Terminal security protection method and device | |
WO2016187966A1 (en) | Terminal and method for protecting data security of terminal | |
CN105577949B (en) | Communication method and communication equipment | |
CN108021967B (en) | Method and device for copying intelligent card and computer readable storage medium | |
KR20080048834A (en) | Method for computer preservation using mobile and device thereof | |
CN105978899A (en) | SIM card binding method for preventing malicious mobile phone flash | |
WO2022068526A1 (en) | Bluetooth system, bluetooth headset, and password authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190222 |
|
RJ01 | Rejection of invention patent application after publication |