CN109379487A - Electronic equipment and its control method - Google Patents

Electronic equipment and its control method Download PDF

Info

Publication number
CN109379487A
CN109379487A CN201811128693.7A CN201811128693A CN109379487A CN 109379487 A CN109379487 A CN 109379487A CN 201811128693 A CN201811128693 A CN 201811128693A CN 109379487 A CN109379487 A CN 109379487A
Authority
CN
China
Prior art keywords
terminal
information
electronic device
electronic equipment
microcontroller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811128693.7A
Other languages
Chinese (zh)
Inventor
张小伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Yep Telecommunication Technology Co Ltd
Original Assignee
Xian Yep Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Yep Telecommunication Technology Co Ltd filed Critical Xian Yep Telecommunication Technology Co Ltd
Priority to CN201811128693.7A priority Critical patent/CN109379487A/en
Publication of CN109379487A publication Critical patent/CN109379487A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/60Substation equipment, e.g. for use by subscribers including speech amplifiers
    • H04M1/6033Substation equipment, e.g. for use by subscribers including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
    • H04M1/6041Portable telephones adapted for handsfree use
    • H04M1/6058Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone
    • H04M1/6066Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone including a wireless connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/02Details of telephonic subscriber devices including a Bluetooth interface

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present embodiments relate to field of computer technology, disclose a kind of electronic equipment and its control method.Electronic equipment, comprising: at least one microcontroller;And the memory being connect at least one micro-controller communications;Wherein, memory is stored with the instruction that can be executed by least one microcontroller, and instruction is executed by least one microcontroller, so that at least one microcontroller is able to carry out above-mentioned control method;Memory is also used to store the owner information of electronic equipment;Owner information includes at least terminal authorization information.In the present invention, so that unwarranted terminal is not available electronic equipment.

Description

Electronic device and control method thereof
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to electronic equipment and a control method thereof.
Background
Along with the development of short distance wireless communication technology, the wearing equipment that the user used also tends to wireless gradually, for example, bluetooth headset, intelligent bracelet, intelligent wrist-watch etc. the user can directly establish communication connection with the cell-phone through wireless and wearing equipment, and it is more convenient to use.
The inventor finds that at least the following problems exist in the prior art: at present, wireless wearable equipment is comparatively portable, also easily loses, and wireless wearable equipment is after being picked up, and the pick-up person can be connected to own cell-phone normal use directly, consequently, the pick-up person generally can not return to the economic loss who has caused the owner.
Disclosure of Invention
An object of embodiments of the present invention is to provide a control method, which makes an unauthorized terminal unable to use an electronic device.
In order to solve the above technical problem, an embodiment of the present invention provides a control method, which is applied to an electronic device, where owner information of the electronic device is stored in the electronic device; the owner information at least comprises terminal authority information; the method comprises the following steps: when the electronic equipment establishes communication connection with a terminal, acquiring terminal identity information of the terminal; judging whether the terminal identity information is matched with the terminal authority information; and when the terminal identity information is judged not to be matched with the terminal authority information, the control electronic equipment is controlled to forbid responding to the control instruction of the terminal.
An embodiment of the present invention also provides an electronic device, including: at least one microcontroller; and a memory communicatively coupled to the at least one microcontroller; the memory stores instructions which can be executed by the at least one microcontroller, and the instructions are executed by the at least one microcontroller so as to enable the at least one microcontroller to execute the control method; the memory is also used for storing owner information of the electronic equipment; the owner information includes at least terminal right information.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and is characterized in that the computer program is executed by a microcontroller to realize the control method.
Compared with the prior art, the electronic equipment stores owner information of the electronic equipment, the owner information at least comprises terminal authority information representing the terminal identity with the use authority of the electronic equipment, when the electronic equipment is in communication connection with the terminal, the terminal identity information of the terminal is obtained, whether the terminal identity information is matched with the terminal authority information representing the terminal identity or not is judged, when the terminal identity information is not matched with the terminal authority information representing the terminal identity, the terminal does not have the use authority of the electronic equipment, the electronic equipment is controlled to prohibit response to a control instruction of the terminal, and therefore the unauthorized terminal cannot use the electronic equipment.
In addition, the owner information also comprises user authority information; the method further comprises the following steps: before the control electronic device forbids the control instruction of the response terminal, the method further comprises the following steps: sending first prompt information representing that the terminals are unmatched through the terminals, and receiving user identity information through the terminals; when the received user identity information is judged to be not matched with the user authority information, the step of controlling the electronic equipment to forbid the response of the electronic equipment to the control instruction of the terminal is carried out; and when the received user identity information is judged to be matched with the user authority information, controlling the electronic equipment to normally work. In this embodiment, the owner information of the electronic device further includes user right information representing the identity of the user, before the control instruction for controlling the electronic device to prohibit the response terminal, the terminal sends first prompt information representing that the terminal is unmatched, and the terminal receives the user identity information, and when it is determined that the received user identity information is unmatched with the user right information, the control instruction for controlling the electronic device to prohibit the response terminal is controlled, so that the user with the use right of the electronic device cannot continue to use the electronic device after replacing the terminal.
In addition, after the received user identity information is judged to be matched with the user authority information, the method further comprises the following steps: and adding the terminal identity information of the terminal into the terminal authority information. In the embodiment, after the received user identity information is judged to be matched with the user permission information, the terminal identity information of the terminal is added into the terminal permission information, so that when the terminal is connected with the electronic equipment again, the electronic equipment can be normally used through terminal identity verification directly without verifying the user identity information again.
In addition, after determining that the received user identity information is matched with the user authority information and before adding the terminal identity information of the terminal into the terminal authority information, the method further includes: judging whether the number of times of establishing communication connection between the terminal and the electronic equipment reaches a preset number of times or not; and if the times of establishing communication connection between the terminal and the electronic equipment reach the preset times, entering a step of adding the terminal identity information of the terminal into the terminal authority information. In this embodiment, when the number of times of establishing communication connection between the terminal and the electronic device reaches the preset number, the terminal identity information of the terminal is added to the terminal permission information, so that the user with the use permission of the electronic device is prevented from adding the identity information of the other terminal to the terminal permission information when trying on the other terminal.
In addition, after the control electronic device prohibits the control instruction of the response terminal, the method further comprises the following steps: and sending a preset second prompt message. In this embodiment, after the control electronic device prohibits the response of the control command of the terminal, the second prompt information indicating that the user is illegal is sent.
In addition, the owner information also includes lost recovery information; the method further comprises the following steps: sending a preset second prompt message, specifically: and sending out second prompt information according to the lost retrieval information. In this embodiment, the user with the use permission of the electronic device may pre-store the lost retrieving information in the electronic device, and after controlling the electronic device to prohibit the response terminal from responding to the control instruction, send the second prompt information according to the lost retrieving information to prompt the current user to retrieve the electronic device according to the lost retrieving information, thereby reducing the loss of the owner of the electronic device.
In addition, after sending out the second prompt message according to the lost recovery message, the method further comprises the following steps: sending a communication permission request to a terminal; and when the information of the terminal indicating that the communication permission request is agreed is received, sending third prompt information to the other preset terminal through the terminal. In this embodiment, it is convenient for the current user to directly communicate with the owner of the electronic device.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a detailed flowchart of a control method according to a first embodiment of the present invention;
fig. 2 is a detailed flowchart of a control method according to a second embodiment of the invention;
fig. 3 is a detailed flowchart of a control method according to a third embodiment of the invention;
fig. 4 is a detailed flowchart of a control method according to a fourth embodiment of the invention;
fig. 5 is a detailed flowchart of a control method in a fifth embodiment according to the present invention;
fig. 6 is a block schematic diagram of an electronic device in a sixth embodiment according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
The first embodiment of the present invention relates to a control method, which is applied to an electronic device, where the electronic device may be a portable electronic device, such as a bluetooth headset, an intelligent bracelet, an intelligent headband, and the like, the electronic device may be connected to a terminal, and the terminal may be a mobile phone, a tablet, a computer, and the like, the electronic device may be connected to the terminal in a wired or wireless manner, and when the electronic device is connected to the terminal in a wireless manner, the electronic device and the terminal both have corresponding wireless communication modules, such as a bluetooth module, an NFC module, and the like. It should be noted that, in the embodiment and the following embodiments, the electronic device is a bluetooth headset, and the terminal is a mobile phone, which is not limited in this embodiment.
Fig. 1 shows a specific flow of the control method according to the present embodiment.
Step 101, judging whether the electronic equipment establishes communication connection with the terminal. If yes, go to step 102; otherwise, the process is ended directly.
Specifically, the microcontroller in the electronic device can determine whether the electronic device establishes a communication connection with the terminal, and when the microcontroller determines that the electronic device establishes a communication connection with the terminal, the step 102 is performed; otherwise, the electronic equipment is not connected to any terminal, and the process is ended directly.
Step 102, terminal identity information of a terminal is obtained.
Specifically, the microcontroller acquires terminal identity information representing a terminal identity from a terminal in communication connection with the electronic device, where the terminal identity information is information uniquely identifying the terminal, for example, when the terminal is a mobile phone, the terminal may be an IMEI code of the mobile phone, but not limited thereto, and may also be information written in the terminal by an owner of the electronic device in advance.
Step 103, judging whether the terminal identity information is matched with the terminal authority information; if yes, directly ending; if not, go to step 104.
Specifically, owner information of the electronic device is stored in the electronic device, the owner information at least includes terminal authority information representing a terminal identity having a use authority of the electronic device, when the microcontroller judges whether the acquired terminal identity information of the terminal which is in communication connection with the electronic device at present is matched with the terminal authority information stored in the electronic device, which is equivalent to performing identity authentication on the terminal, when the terminal identity information is not matched with the terminal authority information, it is indicated that the terminal is not authorized by an owner of the electronic device, and the step 104 is performed; otherwise, the terminal is authorized by the owner of the electronic device, and the terminal can normally use the electronic device. The owner information may be information input by the owner of the electronic device through the terminal when the electronic device is connected to the terminal for the first time, and after receiving the owner information, the electronic device stores the owner information in a memory of the electronic device, and the terminal authority information may include identity information of one or more terminals.
And 104, controlling the electronic equipment to forbid the control instruction of the response terminal.
Specifically, when the microcontroller determines that the terminal identity information is not matched with the terminal permission information, which indicates that the electronic device may be in an unsafe state at this time, the electronic device is controlled to prohibit a response to a control instruction of the terminal, and the terminal cannot normally use the electronic device at this time, for example, if the electronic device is a bluetooth headset, the bluetooth headset does not respond to functions of the terminal, such as music playing, voice call, and the like, and the functions of the electronic device, such as heart rate detection, positioning, and the like, are turned off.
Compared with the prior art, the electronic equipment stores owner information of the electronic equipment, the owner information at least comprises terminal authority information representing a terminal identity with the use authority of the electronic equipment, when the electronic equipment is in communication connection with the terminal, the terminal identity information of the terminal is obtained, whether the terminal identity information is matched with the terminal authority information representing the terminal identity or not is judged, when the terminal identity information is not matched with the terminal authority information representing the terminal identity, the terminal does not have the use authority of the electronic equipment, the electronic equipment is controlled to prohibit response to a control instruction of the terminal, and therefore the unauthorized terminal cannot use the electronic equipment.
A second embodiment of the present invention relates to a control method, and is an improvement of the first embodiment, and is mainly characterized in that: and when the terminal identity information is not matched with the terminal authority information, judging whether the user authority information is matched with the user identity information.
A specific flow of the control method of the present embodiment is shown in fig. 2.
Step 201 to step 203 are substantially the same as step 101 to step 103, and step 206 is substantially the same as step 104, which are not described herein again, but the main difference is that step 204 and step 205 are added, which are specifically as follows:
and step 204, sending first prompt information for representing that the terminals are not matched through the terminals, and receiving user identity information through the terminals.
Specifically, when the terminal identity information is not matched with the terminal authority information, the microcontroller sends first prompt information for representing that the terminal is not matched through the terminal, specifically, the microcontroller feeds back unauthorized information for representing that the terminal is not matched to the terminal, and after receiving the information, the terminal provides an information input interface, so that a current user of the electronic equipment can input user identity information through the information input interface of the terminal. It should be noted that, in this embodiment, the example that a user of the electronic device inputs user identity information through the terminal in real time is taken as an example for explanation, but not limited to this, the user identity information may also be pre-stored in the terminal, and after receiving the first prompt information fed back by the microcontroller of the electronic device and indicating that the terminal is not matched, the pre-stored user identity information is sent to the microcontroller.
Step 205, determining whether the received user identity information matches the user permission information. If yes, directly ending; if not, go to step 206.
Specifically, the owner information stored in the memory of the electronic device further includes user right information; when the microcontroller receives the user identity information, the microcontroller verifies the user identity of the current user of the electronic equipment, and judges whether the user identity information is matched with the user authority information, namely whether the current user of the electronic equipment is a user authorized by the owner of the electronic equipment or not, if the user identity information is matched with the user authority information, the current user of the electronic equipment is a user authorized by the owner of the electronic equipment, and the current user has the quota using authority of the electronic equipment and is allowed to normally use the electronic equipment; otherwise, it indicates that the current user of the current electronic device is not authorized by the owner of the electronic device, and the electronic device may be lost or stolen, and step 206 is entered to control the electronic device to prohibit the response to the control command of the terminal.
The user permission information may be information such as a password, a fingerprint, a face, and a voice set by an owner of the electronic device, and the user permission information may further include identity information of a plurality of other users permitted by the owner of the electronic device.
Compared with the first embodiment, the owner information of the electronic device further includes user right information representing the identity of the user, before the control instruction for controlling the electronic device to forbid responding to the terminal is sent, the first prompt information representing that the terminal is not matched is sent by the terminal, the user identity information is received by the terminal, and when the fact that the received user identity information is not matched with the user right information is judged, the control instruction for controlling the electronic device to forbid responding to the terminal is controlled, so that the situation that the user with the use right of the electronic device cannot continue to use the electronic device after the terminal is replaced is avoided.
A third embodiment of the present invention relates to a control method, which is an improvement over the second embodiment, and is mainly improved in that: and adding the terminal identity information of the terminal into the terminal authority information.
A specific flow of the control method of the present embodiment is shown in fig. 3.
Step 301 to step 305 are substantially the same as step 201 to step 205, and step 308 is substantially the same as step 206, which are not described herein again, but the main difference is that step 306 and step 307 are added, which are specifically as follows:
step 306, judging whether the number of times of establishing the communication connection between the terminal and the electronic device reaches a preset number of times. If yes, go to step 307; if not, the process is ended directly.
Specifically, when the microcontroller of the electronic device determines that the terminal identity information is not matched with the terminal permission information and the received user identity information is matched with the user permission information, the number of times of establishing communication connection between the electronic device and the terminal is recorded, where the number of times of establishing communication connection between the terminal and the electronic device is corresponding to the terminal identity information of the terminal, and when the recorded number of times of establishing communication connection between the terminal and the electronic device reaches a preset number, the process proceeds to step 307; and when the recorded times of establishing the communication connection between the terminal and the electronic equipment do not reach the preset times, the current user is still allowed to normally use the electronic equipment.
And 307, adding the terminal identity information of the terminal into the terminal authority information.
Specifically, when the recorded times of establishing communication connection between the terminal and the electronic device reaches the preset times, it is indicated that the user of the terminal is a frequently-used user of the electronic device, and the terminal identity information of the current terminal is added to the terminal authority, so that the electronic device can be normally used by directly verifying the terminal identity without verifying the user identity information again when the terminal is connected with the electronic device again later.
It should be noted that, in this embodiment, when it is determined that the number of times of establishing the communication connection between the terminal and the electronic device reaches the preset number, step 307 is executed to add the terminal identity information of the terminal into the terminal permission information, but not limited to this, and when it is determined that the terminal identity information is not matched with the terminal permission information and it is received that the user identity information is matched with the user permission information, step 307 is immediately executed to add the terminal identity information of the terminal into the terminal permission information.
Compared with the first embodiment, when the number of times of establishing communication connection between the terminal and the electronic equipment reaches the preset number, the terminal identity information of the terminal is added into the terminal permission information, so that the situation that the identity information of other terminal is added into the terminal permission information when a user with the use permission of the electronic equipment tries on other terminal is avoided; meanwhile, when the terminal is connected with the electronic equipment again later, the electronic equipment can be normally used through terminal identity verification directly, and user identity information does not need to be verified again.
A fourth embodiment of the present invention relates to a control method, which is an improvement of the first embodiment, and is mainly improved in that: and sending preset second prompt information after the control electronic equipment prohibits responding to the control instruction of the terminal.
Fig. 4 shows a specific flow of the control method according to the present embodiment.
The steps 401 to 404 are substantially the same as the steps 101 to 104, and are not described herein again, but the main difference is that the step 405 is added as follows:
step 405, sending a preset second prompt message.
Specifically, a microcontroller of the electronic device controls to send out preset second prompt information, the second prompt information is illegal prompt information representing a current user of the electronic device, the second prompt information can be sent out by the electronic device, for example, when the electronic device is a bluetooth headset, a voice prompt is directly played, and when the electronic device is provided with a display screen, a text prompt can be sent out through the display screen; or, the electronic device may also send the second prompt message through the terminal.
Preferably, when the owner information includes the lost recovery information, the microcontroller of the electronic device controls to send out the second prompt information according to the lost recovery information, wherein the lost recovery information can be voice information and text information which are recorded by the owner of the electronic device, and can include a contact telephone, a mailbox, a contact address, a loss return reward promise and the like of the owner of the electronic device. So that the current user of the electronic device contacts the owner of the electronic device to return the electronic device.
Compared with the first embodiment, the embodiment sends out the second prompt information representing that the user is illegal after the control electronic equipment prohibits the response of the control instruction of the terminal; meanwhile, second prompt information is sent according to the lost retrieving information to prompt a current user to return the electronic equipment according to the lost retrieving information, and loss of an owner of the electronic equipment is reduced. The present embodiment can be modified from any of the second and third embodiments, and can achieve the same technical effects.
A fifth embodiment of the present invention relates to a control method, which is an improvement of the first embodiment, and is mainly improved in that: and after the control electronic equipment prohibits responding to the control instruction of the terminal, when receiving the information of the terminal representing the communication permission approval request, sending third prompt information to another preset terminal through the terminal.
Fig. 5 shows a specific flow of the control method according to the present embodiment.
The steps 501 to 504 are substantially the same as the steps 101 to 104, and are not described herein again, but the main difference is that the steps 505 to 507 are added as follows:
step 505, a communication permission request is sent to the terminal.
Specifically, the microcontroller sends a communication permission request to the terminal after the control electronic device prohibits the response to the control command of the terminal.
Step 506, judging whether the information of the communication permission request which is represented by the terminal and agreed is received. If yes, go to step 507; if not, the process is ended directly.
Specifically, when the terminal receives the communication permission request, the current user of the terminal can choose to approve or disapprove the communication permission request, and when the microcontroller of the electronic device receives the information indicating that the terminal approves the communication permission request, the process proceeds to step 507. Otherwise, the current user of the terminal does not agree with the communication permission request, and the process is finished directly.
And step 507, sending a third prompt message to another preset terminal through the terminal.
Specifically, when the microcontroller of the electronic device receives information representing that the terminal agrees with the communication permission request, the electronic device obtains the permission to communicate through the terminal, and sends third prompt information to another preset terminal through the terminal, the communication information of the other terminal is prestored in the electronic device by an owner of the electronic device, the communication information may be a mailbox, a telephone, a WeChat and the like, the third prompt information may be current positioning information of the electronic device, and if the electronic device has a positioning function, the positioning information may be obtained by the electronic device itself, but not limited thereto, the electronic device may also obtain the positioning information through the terminal.
This embodiment is advantageous over the first embodiment in that the current user can communicate directly with the owner of the electronic device. The present embodiment can be modified from any of the second to fourth embodiments, and can achieve the same technical effects.
A sixth embodiment of the present invention relates to an electronic device, as shown in fig. 6, which includes at least one microcontroller 1; and a memory 2 in communicative connection with the at least one microcontroller 1; wherein the memory 2 stores instructions executable by the at least one microcontroller 1, the instructions being executed by the at least one microcontroller 1 to enable the at least one microcontroller 1 to perform the control method as in any one of the first to fifth embodiments; the memory 2 is also used for storing owner information of the electronic equipment; the owner information includes at least terminal right information.
In one example, the electronic device further comprises a wireless communication module 3; the microcontroller 1 is also used to establish a communication connection with the terminal 4 via the wireless communication module 3.
The memory 2 and the microcontroller 1 are connected by a bus, which may include any number of interconnected buses and bridges, which connect one or more of the various circuits of the microcontroller 1 and the memory 2. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the microcontroller 1 are transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the microcontroller 1.
The microcontroller 1 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interface, voltage regulation, power management and other control functions. While the memory 2 may be used to store data used by the microcontroller 1 in performing operations.
A seventh embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program, when executed by the microcontroller, implements the above-described method embodiments.
That is, as can be understood by those skilled in the art, all or part of the steps in the method of the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a microcontroller (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. The control method is applied to electronic equipment, and owner information of the electronic equipment is stored in the electronic equipment; the owner information at least comprises terminal authority information; the method comprises the following steps:
when the electronic equipment establishes communication connection with a terminal, acquiring terminal identity information of the terminal;
judging whether the terminal identity information is matched with the terminal authority information;
and when the terminal identity information is judged not to be matched with the terminal authority information, controlling the electronic equipment to forbid responding to a control instruction of the terminal.
2. The control method according to claim 1, wherein the owner information further includes user right information; the method further comprises the following steps:
before the controlling the electronic device forbids responding to the control instruction of the terminal, the method further comprises the following steps:
sending first prompt information representing that the terminals are unmatched through the terminals, and receiving user identity information through the terminals;
when the received user identity information is judged to be not matched with the user authority information, the step of controlling the electronic equipment to forbid responding to the control instruction of the terminal is carried out; and when the received user identity information is judged to be matched with the user authority information, controlling the electronic equipment to normally work.
3. The control method according to claim 2, further comprising, after determining that the received user identity information matches the user authority information:
and adding the terminal identity information of the terminal into the terminal authority information.
4. The control method according to claim 3, wherein after determining that the received user identity information matches the user permission information and before adding the terminal identity information of the terminal to the terminal permission information, the method further comprises:
judging whether the number of times of establishing communication connection between the terminal and the electronic equipment reaches a preset number of times or not;
and if the times of establishing communication connection between the terminal and the electronic equipment reach preset times, entering the step of adding the terminal identity information of the terminal into the terminal authority information.
5. The control method according to any one of claims 1 to 4, further comprising, after the controlling the electronic device to prohibit a response to the control instruction of the terminal:
and sending a preset second prompt message.
6. The control method according to claim 5, wherein the owner information further includes lost recovery information; the method further comprises the following steps:
the sending of the preset second prompt message specifically includes:
and sending the second prompt message according to the lost recovery message.
7. The control method according to claim 1, further comprising, after controlling the electronic device to inhibit responding to the control instruction of the terminal:
sending a communication permission request to the terminal;
and when receiving the information of the terminal indicating that the communication permission request is agreed, sending third prompt information to another preset terminal through the terminal.
8. An electronic device, comprising:
at least one microcontroller; and the number of the first and second groups,
a memory communicatively coupled to the at least one microcontroller; wherein,
the memory stores instructions executable by the at least one microcontroller to enable the at least one microcontroller to perform the control method of any one of claims 1 to 7; the memory is further used for storing owner information of the electronic equipment; the owner information includes at least terminal right information.
9. The electronic device of claim 8, further comprising a wireless communication module; the microcontroller is also used for establishing communication connection with the terminal through the wireless communication module.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a microcontroller, carries out the control method according to any one of claims 1 to 7.
CN201811128693.7A 2018-09-27 2018-09-27 Electronic equipment and its control method Pending CN109379487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811128693.7A CN109379487A (en) 2018-09-27 2018-09-27 Electronic equipment and its control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811128693.7A CN109379487A (en) 2018-09-27 2018-09-27 Electronic equipment and its control method

Publications (1)

Publication Number Publication Date
CN109379487A true CN109379487A (en) 2019-02-22

Family

ID=65402782

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811128693.7A Pending CN109379487A (en) 2018-09-27 2018-09-27 Electronic equipment and its control method

Country Status (1)

Country Link
CN (1) CN109379487A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147256A (en) * 2019-12-26 2020-05-12 华为技术有限公司 Authentication method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003153345A (en) * 2001-11-02 2003-05-23 Agere Systems Inc Wireless unit temporary repossessing mode service and function
CN102547502A (en) * 2010-12-17 2012-07-04 索尼爱立信移动通讯有限公司 Headset, headset use control method and terminal
CN103974218A (en) * 2014-04-28 2014-08-06 法视网络传媒技术(北京)有限公司 Wearable device, mobile terminal, intelligent risk reporting system and intelligent risk reporting method
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof
CN105162889A (en) * 2015-09-30 2015-12-16 小米科技有限责任公司 Device finding method and apparatus
CN105163266A (en) * 2015-09-16 2015-12-16 小米科技有限责任公司 Method and device for locating wearable device
CN105278686A (en) * 2015-09-30 2016-01-27 宇龙计算机通信科技(深圳)有限公司 Safety prompt method and device for smart wearable device
CN105307287A (en) * 2015-10-19 2016-02-03 宇龙计算机通信科技(深圳)有限公司 Connection method and wearable equipment
CN105335677A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Anti-theft method and device of mobile terminal
CN107277657A (en) * 2017-05-18 2017-10-20 深圳市冠旭电子股份有限公司 A kind of earphone method for retrieving, device and earphone

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003153345A (en) * 2001-11-02 2003-05-23 Agere Systems Inc Wireless unit temporary repossessing mode service and function
CN102547502A (en) * 2010-12-17 2012-07-04 索尼爱立信移动通讯有限公司 Headset, headset use control method and terminal
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof
CN103974218A (en) * 2014-04-28 2014-08-06 法视网络传媒技术(北京)有限公司 Wearable device, mobile terminal, intelligent risk reporting system and intelligent risk reporting method
CN105335677A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Anti-theft method and device of mobile terminal
CN105163266A (en) * 2015-09-16 2015-12-16 小米科技有限责任公司 Method and device for locating wearable device
CN105162889A (en) * 2015-09-30 2015-12-16 小米科技有限责任公司 Device finding method and apparatus
CN105278686A (en) * 2015-09-30 2016-01-27 宇龙计算机通信科技(深圳)有限公司 Safety prompt method and device for smart wearable device
CN105307287A (en) * 2015-10-19 2016-02-03 宇龙计算机通信科技(深圳)有限公司 Connection method and wearable equipment
CN107277657A (en) * 2017-05-18 2017-10-20 深圳市冠旭电子股份有限公司 A kind of earphone method for retrieving, device and earphone

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147256A (en) * 2019-12-26 2020-05-12 华为技术有限公司 Authentication method and device
CN111147256B (en) * 2019-12-26 2021-07-09 荣耀终端有限公司 Authentication method and device

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
US11216549B2 (en) Security verification method and device
US10447839B2 (en) Device locator disable authentication
CN106330958B (en) Secure access method and device
AU2013245980B2 (en) Location-based access control for portable electronic device
US8463234B2 (en) Method for providing security services by using mobile terminal password and mobile terminal thereof
US7275695B2 (en) Portable terminal and function limiting method
US9264888B2 (en) Control of a mobile device
CN104169932A (en) Methods and devices for distributing content to an electronic device
US9088896B2 (en) Mobile device password reset
US8706158B2 (en) Mobile phone for authenticating SIM card and method thereof
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
CN103607253A (en) Method and system for controlling mobile terminals
CN104700270A (en) Payment request processing method, payment request processing device and terminal
EP2840818A1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN113709737B (en) Voice communication method and device based on TWS Bluetooth headset
CN105227749B (en) Unlocking screen method and system
CN109379487A (en) Electronic equipment and its control method
WO2019090702A1 (en) Terminal security protection method and device
WO2016187966A1 (en) Terminal and method for protecting data security of terminal
CN105577949B (en) Communication method and communication equipment
CN108021967B (en) Method and device for copying intelligent card and computer readable storage medium
KR20080048834A (en) Method for computer preservation using mobile and device thereof
CN105978899A (en) SIM card binding method for preventing malicious mobile phone flash
WO2022068526A1 (en) Bluetooth system, bluetooth headset, and password authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222

RJ01 Rejection of invention patent application after publication