CN110392157B - Information processing method and device and electronic equipment - Google Patents

Information processing method and device and electronic equipment Download PDF

Info

Publication number
CN110392157B
CN110392157B CN201810353777.4A CN201810353777A CN110392157B CN 110392157 B CN110392157 B CN 110392157B CN 201810353777 A CN201810353777 A CN 201810353777A CN 110392157 B CN110392157 B CN 110392157B
Authority
CN
China
Prior art keywords
module
verification
electronic equipment
communication module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810353777.4A
Other languages
Chinese (zh)
Other versions
CN110392157A (en
Inventor
唐红君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201810353777.4A priority Critical patent/CN110392157B/en
Publication of CN110392157A publication Critical patent/CN110392157A/en
Application granted granted Critical
Publication of CN110392157B publication Critical patent/CN110392157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Abstract

The embodiment of the application discloses an information processing method, an information processing device and electronic equipment, wherein when a control instruction for closing a communication module or a positioning module is obtained, whether the communication module or the positioning module is manually opened or not is judged, if the communication module or the positioning module is not manually opened, a user is verified, the communication module or the positioning module is closed only when the verification is passed, and if the verification is not passed, the communication module or the positioning module is kept opened, so that an illegal user is prevented from closing the communication module and the positioning module, conditions are provided for carrying out mobile phone retrieval operation, and the probability of mobile phone retrieval is improved; moreover, if the communication module or the positioning module is manually opened, the communication module or the positioning module is directly closed when a control instruction is received, so that excessive operation of a user is avoided, and the aim of improving the recovery probability of the mobile phone under the condition that the complexity of user operation is as low as possible is fulfilled.

Description

Information processing method and device and electronic equipment
Technical Field
The present application relates to the field of information technologies, and in particular, to an information processing method and apparatus, and an electronic device.
Background
At present, an important measure for dealing with mobile phone loss is recovery after the mobile phone is lost, and the mobile phone recovery function is mainly used for positioning the lost mobile phone through APP, cloud service and the like, but the lost mobile phone is required to be in a networking state in the technologies, and if an illegal user closes a network after taking the mobile phone, the mobile phone cannot be positioned, so that the probability of recovery of the mobile phone is low.
Disclosure of Invention
The present application is directed to an information processing method, an information processing apparatus, and an electronic device, so as to at least partially overcome technical problems in the prior art.
In order to achieve the purpose, the application provides the following technical scheme:
an information processing method applied to an electronic device includes:
when a first control instruction for closing a preset function module of the electronic equipment is acquired, judging whether the preset function module is opened in a manual opening mode; the preset function module is a communication module or a positioning module;
if the judgment result is negative, receiving input first verification information;
performing first verification on the first verification information;
if the first check is passed, closing the preset function module, otherwise, forbidding to close the preset function module;
if the judgment result is yes, the preset function module is closed.
The above method, preferably, further comprises:
when it is monitored that the electronic equipment is connected with an external power supply through a data transmission interface, receiving input second verification information;
performing second verification on the second verification information;
and if the second check is passed, charging the electronic equipment, otherwise, prohibiting charging the electronic equipment.
The above method, preferably, further comprises:
when a second control instruction for entering a data transmission mode is received, receiving input third verification information;
performing a third check on the third verification information;
and if the third check is passed, entering a data transmission mode, otherwise, forbidding entering the data transmission mode.
The above method, preferably, further comprises:
receiving input fourth verification information when a third control instruction for restoring the electronic equipment to factory settings is received;
performing a fourth check on the fourth verification information;
and if the fourth verification is passed, restoring the factory setting of the electronic equipment, otherwise, forbidding restoring the factory setting of the electronic equipment.
The above method, preferably, further comprises:
under the condition of receiving input second verification information and performing second verification on the second verification information, if the second verification fails, counting a second time that the second verification fails within a first preset time, and when the second time reaches a second preset threshold, starting a communication module and a positioning module of the electronic equipment;
under the condition of receiving input third verification information and carrying out third verification on the third verification information, if the third verification fails, counting a third time that the third verification fails within a first preset time, and when the third time reaches a third preset threshold, starting a communication module and a positioning module of the electronic equipment;
under the condition of receiving input fourth verification information and carrying out fourth verification on the fourth verification information, if the fourth verification fails, counting fourth times that the fourth verification fails within a first preset time length, and when the fourth times reaches a fourth preset threshold, starting a communication module and a positioning module of the electronic equipment.
An information processing apparatus applied to an electronic device, comprising:
the first judgment module is used for judging whether the preset function module is started in a manual starting mode or not when a first control instruction for closing the preset function module of the electronic equipment is acquired; the preset function module is a communication module or a positioning module;
the first receiving module is used for receiving input first verification information if the judgment result of the first judging module is negative;
the first verification module is used for performing first verification on the first verification information;
the first control module is used for closing the preset function module if the judgment result of the first judgment module is yes or the first check is passed; and if the first check is not passed, the preset function module is forbidden to be closed.
The above apparatus, preferably, further comprises:
the second receiving module is used for receiving input second verification information when the data transmission interface of the electronic equipment is connected with an external power supply;
the second verification module is used for performing second verification on the second verification information;
and the second control module is used for charging the electronic equipment if the second check is passed, and forbidding charging the electronic equipment if the second check is not passed.
The above apparatus, preferably, further comprises:
the third receiving module is used for receiving input third verification information when receiving a second control instruction for entering a data transmission mode;
the third verification module is used for performing third verification on the third verification information;
and the third control module is used for entering a data transmission mode if the third check is passed, and forbidding to enter the data transmission mode if the third check is not passed.
The above apparatus, preferably, further comprises:
the fourth receiving module is used for receiving input fourth verification information when receiving a third control instruction for restoring the electronic equipment to factory settings;
the fourth verification module is used for performing fourth verification on the fourth verification information;
and the fourth control module is used for restoring the electronic equipment to the factory setting if the fourth verification is passed, and forbidding restoring the electronic equipment to the factory setting if the fourth verification is not passed.
The above apparatus, preferably, further comprises:
the fifth control module is used for counting a second time that the second verification fails within a first preset time length if the second verification fails under the condition of receiving input second verification information and performing second verification on the second verification information, and starting the communication module and the positioning module of the electronic equipment when the second time reaches a second preset threshold; under the condition of receiving input third verification information and carrying out third verification on the third verification information, if the third verification fails, counting a third time that the third verification fails within a first preset time, and when the third time reaches a third preset threshold, starting a communication module and a positioning module of the electronic equipment; under the condition of receiving input fourth verification information and carrying out fourth verification on the fourth verification information, if the fourth verification fails, counting fourth times that the fourth verification fails within a first preset time length, and when the fourth times reaches a fourth preset threshold, starting a communication module and a positioning module of the electronic equipment.
An electronic device comprising a processor and a memory, wherein the memory is used for storing a program, and the processor is used for operating the program to make the electronic device execute the information processing method.
According to the scheme, when a control instruction for closing the communication module or the positioning module is obtained, whether the communication module or the positioning module is opened manually or not is judged, if the communication module or the positioning module is not opened manually, the user is verified, the communication module or the positioning module is closed only when the verification is passed, and if the verification is not passed, the communication module or the positioning module is kept opened, so that an illegal user is prevented from closing the communication module and the positioning module, conditions are provided for the mobile phone retrieving operation, and the probability of the mobile phone retrieving is improved; moreover, if the communication module or the positioning module is opened manually, the communication module or the positioning module is directly closed when a control instruction is received, so that excessive operation of a user is avoided, and the aim of improving the recovery probability of the mobile phone under the condition that the complexity of operation of the user is as low as possible is fulfilled.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an implementation of an information processing method according to an embodiment of the present application;
fig. 2 is a flowchart of another implementation of an information processing method according to an embodiment of the present application;
fig. 3 is a flowchart of another implementation of an information processing method according to an embodiment of the present application;
fig. 4 is a flowchart of another implementation of an information processing method according to an embodiment of the present application;
FIG. 5 is a flowchart of another implementation of an information processing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be practiced otherwise than as specifically illustrated.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
The information processing method and device provided by the embodiment of the application are applied to portable electronic equipment, and the electronic equipment has a positioning function and a communication function, and for example, the electronic equipment can be a mobile phone, a tablet computer and the like.
An implementation flowchart of the information processing method provided in the embodiment of the present application is shown in fig. 1, and may include:
step S11: the method comprises the steps of obtaining a first control instruction, wherein the first control instruction is used for closing a preset function module of the electronic equipment, and the preset function module can be a communication module or a positioning module. That is, the first control command is either a control command to turn off the communication module or a control command to turn off the positioning module.
The communication module can be a mobile data network module, a WIFI module or a Bluetooth module.
The positioning module may be a GPS positioning module, or a positioning module based on a base station, or may be a positioning module based on WIFI, or may be a positioning module based on bluetooth.
Step S12: judging whether the preset function module is started in a manual starting mode, if so, executing the step S15; otherwise, step S13 is executed.
In this embodiment of the application, in the process of opening the preset function module, the opening mode of the preset function module is recorded, and the opening mode of the preset function module includes: automatic opening and manual opening. If the preset function module is detected to be started in response to a starting instruction triggered by the operation body, the preset function module is determined to be manually started, and otherwise, the preset function module is determined to be automatically started. When judging whether the preset function module is opened in a manual opening mode, the recorded opening mode of the preset function module can be read from the preset storage area for judgment.
The opening instruction triggered by the operation body may be an opening instruction triggered by a part of the body of the user, or an opening instruction triggered by voice of the user, or the like.
Wherein, automatically turning on includes at least two conditions: one is that the electronic device is automatically turned on when the electronic device is turned on, for example, a mobile data network module or a WIFI module of a mobile phone is usually automatically turned on when the electronic device is turned on; another situation is automatic turn-on when the electronic device is abnormally operated, as shown in subsequent embodiments of the present application.
Different from the prior art in which the preset function module is directly turned off after the first control instruction is obtained, in the embodiment of the present application, after the first control instruction is obtained, the preset function module is not directly turned off, but whether the preset function module is manually turned on is determined.
Step S13: input first authentication information is received.
When the preset function module is not manually opened, that is, automatically opened, the verification information is collected so as to verify the user, and the verification information can be collected in the following way:
and displaying prompt information to prompt the user to input the verification information. For convenience of description, this is referred to as the first authentication information. The display of the prompt may take a variety of forms, for example, a keyboard may be displayed to prompt the user to enter a password; or displaying a pattern drawing interface so as to prompt the user to draw the pattern; or displaying the preset question and an input box, thereby prompting a user to input an answer corresponding to the preset question in the input box; alternatively, text information is displayed to prompt the user to perform a preset operation, such as inputting a fingerprint, or capturing a facial image, etc.
And the user inputs the first verification information in the electronic equipment according to the prompt message.
Step S14: performing a first check on the first verification information, and if the first check passes, executing step S15; otherwise, the step S15 is prohibited, that is, the on state of the preset function module is maintained.
Step S15: and closing the preset function module.
According to the information processing method provided by the embodiment of the application, when the control instruction for closing the communication module or the positioning module is obtained, whether the communication module or the positioning module is manually opened or not is judged, if the communication module or the positioning module is not manually opened, the user is verified, the communication module or the positioning module is closed only when the verification is passed, and if the verification is not passed, the communication module or the positioning module is kept opened, so that the condition that an illegal user closes the communication module or the positioning module is avoided, a condition is provided for carrying out mobile phone retrieving operation, and the probability of mobile phone retrieving is improved; moreover, if the communication module or the positioning module is manually opened, when a control instruction is received, the communication module or the positioning module is directly closed without verification, so that excessive operation of a user (who is a legal user) is avoided, and the aim of improving the recovery probability of the mobile phone under the condition that the complexity of user operation is lower as much as possible is fulfilled.
In an optional embodiment, the user may select whether to turn on the function of user authentication when the preset function module is turned off, as required. After the first control instruction is obtained, before it is determined whether the preset function module is manually opened, it may be determined whether a user has opened a function of user authentication when the preset function module is closed, if so, it is determined whether the preset function module is manually opened, and if not, the preset function module is closed.
In an optional embodiment, when the first verification fails, the number of times of the first verification failing within a first preset time period (e.g., 5 minutes) may also be counted, which is denoted as the first time for convenience of description, and when the first time reaches a first preset threshold N1 (e.g., three times), the state of the electronic device is locked, that is, the user is prohibited from continuing to operate the electronic device within a second preset time period (the second preset time period may be customized by the user, for example, 1 hour), that is, when the user operates the electronic device within the second preset time period, the user does not respond to the user operation. Thereby further improving the security of the electronic device and creating conditions for electronic device recovery.
In an optional embodiment, as shown in fig. 2, another implementation flowchart of the information processing method provided in the embodiment of the present application may include:
step S21: and monitoring whether the electronic equipment is connected with the external power supply through the data transmission interface, and if so, executing the step S22.
The data transmission interface may be a USB interface.
The peripheral power supply may be a mains power supply, or may be other electronic equipment, such as a notebook computer, or a desktop computer.
Step S22: and receiving the input second verification information.
In the embodiment of the application, when the connection between the data transmission interface of the electronic device and the external power supply is monitored, the verification information is collected so as to verify a user, and the verification information can be collected in the following way:
and displaying prompt information to prompt the user to input the verification information. For convenience of description, this is referred to as the second authentication information. The form of the prompt message can be referred to the previous embodiment, and is not described in detail here.
And the user inputs second verification information in the electronic equipment according to the prompt information.
Step S23: and performing second verification on the second verification information. If the second check is passed, the step S24 is executed, otherwise, the step S24 is prohibited.
Step S24: the electronic device is charged.
In the embodiment of the application, when the connection between the data transmission interface of the electronic device and the peripheral power supply is monitored, a user is firstly verified, when the verification is passed, the electronic device is charged, otherwise, the electronic device is not charged. After the electronic equipment is powered off, an illegal user cannot operate the electronic equipment, the safety of information stored in the electronic equipment is improved, and the condition that the illegal user inputs a command to control the electronic equipment in a charging mode can be prevented.
In an optional embodiment, if the second verification fails, the number of times that the second verification fails within a first preset time period (e.g., 5 minutes) may also be counted, which is denoted as the second number for convenience of description, and when the second number reaches a second preset threshold N2 (e.g., three times), the communication module and the positioning module of the electronic device are turned on.
The communication module may be at least one communication module in the electronic device, and the positioning module may also be at least one positioning module in the electronic device.
For example, the communication module may be at least one of the following: the mobile data network module, the WIFI module and the Bluetooth module.
The positioning module may also be at least one of the following positioning modules: GPS orientation module, location module based on basic station, location module based on WIFI, location module based on bluetooth.
The WIFI module and the Bluetooth module are in short-distance communication, the WIFI module and the Bluetooth module are started under the condition that GPS signals cannot be searched indoors, the position of the electronic equipment can be calculated through indoor WIFI hotspots and Bluetooth nodes, and more accurate positioning is facilitated.
If none of the N2 second checks passes, the user may be an illegal user. In this embodiment, after the user inputs the wrong charging verification information for many times, the communication module and the positioning module of the electronic device are automatically started, so that the electronic device is conveniently positioned.
In addition, when the second number reaches a second preset threshold, the method may further include: the state of the electronic device is locked, that is, the user is prohibited from continuing to operate the electronic device for a second preset time period (the second preset time period may be customized by the user, for example, 1 hour), that is, the user does not respond to the user operation when operating the electronic device for the second preset time period. The safety of the electronic equipment is further improved, and the condition is created for the electronic equipment.
After the electronic device is turned off, the communication module and the positioning module of the electronic device are correspondingly turned off, so that the electronic device cannot be positioned. Based on this, the user can decide whether to verify the user when charging according to own needs. For example, the user may not start the function of user authentication during charging, that is, the electronic device is allowed to be charged under any circumstances, so that the probability of the electronic device being turned on is higher, and the probability of retrieving the mobile phone is also improved. If the user starts the function of user verification during charging, the user verification is performed during charging, so that the mobile phone can be retrieved within the time period when the electronic equipment is powered on, and the safety of information stored in the electronic equipment can be improved to a certain extent.
In an optional embodiment, after it is monitored that the electronic device is connected to the external power supply through the data transmission interface, before the input second verification information is received, whether a function of verifying the user during charging is started or not can be judged, if the judgment result is yes, the input second verification information is received, and otherwise, the electronic device is charged.
In an optional embodiment, as shown in fig. 3, a flowchart of another implementation of the information processing method provided in the embodiment of the present application may include:
step S31: whether a second control command for entering the data transmission mode is received is monitored, and if the second control command is received, step S32 is executed.
Step S32: and receiving the input third verification information.
Step S33: and performing third verification on the third verification information. If the third check is passed, execute step S34, otherwise, prohibit execution of step S34.
Step S34: a data transmission mode is entered.
After the electronic device is connected to the peripheral power supply through the data transmission interface, if the peripheral power supply is another electronic device, the user may sometimes access the memory of the electronic device through the data transmission interface (for example, use the electronic device as a usb disk), that is, enter the data transmission mode. In the embodiment of the application, when the second control instruction for entering the data transmission mode is received, the user is firstly verified, and the data transmission mode is entered only when the verification is passed, otherwise, the data transmission mode is forbidden, that is, the user is not allowed to access the electronic equipment through the data transmission interface. By the embodiment of the application, the condition that an illegal user enters the storage space of the electronic equipment in the data transmission mode to copy the owner information can be prevented. The data security is improved.
In an optional embodiment, the user may determine whether to start the function of user authentication when entering the data transmission mode according to the user's needs. After receiving the second control instruction, before receiving the input third verification information, the method may further include: and judging whether a function of user authentication is started when the data transmission mode is entered, if the function of user authentication is started when the data transmission mode is entered, receiving input third authentication information, and if the function of user authentication is not started when the data transmission mode is entered, entering the data transmission mode.
In an optional embodiment, if the third verification fails, the number of times that the third verification fails within a first preset time period (e.g., 5 minutes) may also be counted, which is denoted as a third time for convenience of description, and when the third time reaches a third preset threshold N3 (e.g., three times), the communication module and the positioning module of the electronic device are turned on.
The communication module may be at least one communication module in the electronic device, and the positioning module may also be at least one positioning module in the electronic device.
For example, the communication module may be at least one of the following: the mobile data network module, the WIFI module and the Bluetooth module.
The positioning module may also be at least one of the following positioning modules: GPS orientation module, location module based on basic station, location module based on WIFI, location module based on bluetooth.
If none of the N3 third checks passes, the user may be an illegal user. In this embodiment, after the user inputs the wrong mode switching verification information for many times, the communication module and the positioning module of the electronic device are automatically started, so that the electronic device is conveniently positioned.
In addition, when the third number reaches a third preset threshold, the method may further include: the state of the electronic device is locked, that is, the user is prohibited from continuing to operate the electronic device for a second preset time period (the second preset time period may be customized by the user, for example, 1 hour), that is, the user does not respond to the user operation when operating the electronic device for the second preset time period. The safety of the electronic equipment is further improved, and the condition is created for the electronic equipment.
In an optional embodiment, as shown in fig. 4, a flowchart of another implementation of the information processing method provided in the embodiment of the present application may include:
step S41: and monitoring whether a third control instruction for restoring the electronic equipment to factory settings is received, and if the third control instruction is received, entering step S42.
Step S42: receiving the input fourth authentication information.
Step S43: and performing fourth verification on the fourth verification information, and if the fourth verification passes, executing the step S44, otherwise, prohibiting executing the step S44.
Step S44: and restoring the electronic equipment to factory settings.
In the prior art, after a third control instruction for restoring the electronic device to the factory setting is received, the electronic device is directly restored to the factory setting. The problems that after an illegal user acquires the mobile phone, the electronic equipment is directly restored to factory settings, the owner data is lost, and the electronic equipment cannot be positioned are solved.
In an optional embodiment, if the fourth check fails, the number of times that the fourth check fails within a first preset time period (e.g., 5 minutes) may also be counted, which is denoted as a fourth time for convenience of description, and when the fourth time reaches a fourth preset threshold N4 (e.g., three times), the communication module and the positioning module of the electronic device are turned on.
The communication module may be at least one communication module in the electronic device, and the positioning module may also be at least one positioning module in the electronic device.
For example, the communication module may be at least one of the following: the mobile data network module, the WIFI module and the Bluetooth module.
The positioning module may also be at least one of the following positioning modules: GPS orientation module, location module based on basic station, location module based on WIFI, location module based on bluetooth.
If none of the N4 fourth checks passes, the user may be an illegal user. In this embodiment, after the user inputs the wrong factory-reset verification information many times, the communication module and the positioning module of the electronic device are automatically turned on, so that the electronic device is conveniently positioned.
In addition, when the fourth number reaches a fourth preset threshold, the method may further include: the state of the electronic device is locked, that is, the user is prohibited from continuing to operate the electronic device for a second preset time period (the second preset time period may be customized by the user, for example, 1 hour), that is, the user does not respond to the user operation when operating the electronic device for the second preset time period. The safety of the electronic equipment is further improved, and the condition is created for the electronic equipment.
In an optional embodiment, the user may determine whether to start the function of user authentication when the electronic device is restored to the factory setting according to the need of the user. After receiving the third control instruction, before receiving the input fourth verification information, the method may further include: and judging whether a function of user verification when the electronic equipment is restored to the factory setting is started, receiving the input fourth verification information if the function of user verification when the electronic equipment is restored to the factory setting is started, and restoring the electronic equipment to the factory setting if the function of user verification when the electronic equipment is restored to the factory setting is not started.
In an optional embodiment, as shown in fig. 5, a flowchart of another implementation of the information processing method provided in the embodiment of the present application may include:
step S51: monitoring whether a shutdown instruction is received, and executing the step S52 when the shutdown instruction is received;
step S52: receiving the input fifth authentication information.
Step S53: and performing fifth verification on the fifth verification information, and if the fifth verification passes, executing the step S54, otherwise, prohibiting executing the step S54.
Step S54: and powering off the electronic equipment.
Different from the prior art that the shutdown is directly performed when a shutdown instruction is received, in the embodiment of the application, when the shutdown instruction is received, the user is verified, and the shutdown is performed only when the verification is passed, otherwise, the shutdown is prohibited. The situation that an illegal user cannot locate the electronic equipment because the electronic equipment is directly turned off is avoided, and therefore conditions are created for retrieving the mobile phone.
In an optional embodiment, if the fifth verification fails, the number of times that the fifth verification fails within a first preset time period (e.g., 5 minutes) may also be counted, which is denoted as a fifth time for convenience of description, and when the fifth time reaches a fifth preset threshold N5 (e.g., three times), the communication module and the positioning module of the electronic device are turned on.
The communication module may be at least one communication module in the electronic device, and the positioning module may also be at least one positioning module in the electronic device.
For example, the communication module may be at least one of the following: the mobile data network module, the WIFI module and the Bluetooth module.
The positioning module may also be at least one of the following positioning modules: GPS orientation module, location module based on basic station, location module based on WIFI, location module based on bluetooth.
If none of the N5 fifth checks passes, the user may be an illegal user. In this embodiment, after the user inputs the wrong shutdown verification information for many times, the communication module and the positioning module of the electronic device are automatically started, so that the electronic device is conveniently positioned.
In addition, when the fifth number reaches a fifth preset threshold, the method may further include: the state of the electronic device is locked, that is, the user is prohibited from continuing to operate the electronic device for a second preset time period (the second preset time period may be customized by the user, for example, 1 hour), that is, the user does not respond to the user operation when operating the electronic device for the second preset time period. The safety of the electronic equipment is further improved, and the condition is created for the electronic equipment.
In an optional embodiment, the user may determine whether to start the user authentication function when the power is off according to the user's needs. After receiving the shutdown instruction, before receiving the input fifth verification information, the method may further include: and judging whether the function of user authentication is started when the electronic equipment is powered off, if the function of user authentication is started when the electronic equipment is powered off, receiving the input fifth verification information, and if the function of user authentication is not started when the electronic equipment is powered off, powering off the electronic equipment.
In the above embodiment, the first preset threshold, the second preset threshold, the third preset threshold, the fourth preset threshold and the fifth preset threshold may be the same or different, and the specific value may be user-defined.
The embodiment of the application provides a real-time mode for checking electronic equipment during various user operations, and it can be understood that a user can set to check one of the user operations according to own requirements, and also can set to check two or more user operations. By setting the verification when two or more kinds of user operations are performed, on one hand, the safety of the electronic equipment is improved, and on the other hand, a creating condition is found for the electronic equipment.
For example, the user may perform user authentication only when the communication module is turned off, or perform user authentication only when the positioning module is turned off, or perform user authentication only when charging is set, or perform user authentication only when the data transmission mode is set, or perform user authentication only when the electronic device is reset to factory settings, or perform user authentication only when the electronic device is turned off.
The user may also set that user authentication is required when at least two of the following operations are performed. For example, the user may set:
user authentication is required when both the communication module and the positioning module are closed. Alternatively, the first and second electrodes may be,
when the communication module and the positioning module are set to be closed, user authentication is needed, and when the mobile terminal is powered off, user authentication is needed. Alternatively, the first and second electrodes may be,
when the communication module and the positioning module are set to be closed, user verification is needed, the user verification is needed when the communication module and the positioning module are shut down, and the user verification is needed when the communication module and the positioning module are charged. Alternatively, the first and second electrodes may be,
when the communication module and the positioning module are set to be closed, user authentication is needed, and when the communication module and the positioning module are shut down, the user authentication is needed, and when the communication module and the positioning module enter a data transmission mode, the user authentication is needed. Alternatively, the first and second electrodes may be,
when the communication module and the positioning module are set to be closed, user verification is needed, when the communication module and the positioning module are shut down, the user verification is needed, when the communication module is charged, and when the communication module and the positioning module enter a data transmission mode, the user verification is needed. Alternatively, the first and second electrodes may be,
user authentication is needed when the communication module and the positioning module are set to be closed, user authentication is needed when the communication module and the positioning module are powered off, user authentication is needed when the communication module is charged, user authentication is needed when the communication module enters a data transmission mode, and user authentication is needed when factory settings are restored.
Corresponding to the method embodiment, the application also provides an information processing device. A schematic structural diagram of an information processing apparatus provided by the present application is shown in fig. 6, and may include:
a first judging module 61, a first receiving module 62, a first verifying module 63 and a first control module 64; wherein the content of the first and second substances,
the first judging module 61 is used for judging whether the preset function module is opened in a manual opening mode when a first control instruction for closing the preset function module of the electronic equipment is acquired; the preset function module is a communication module or a positioning module.
The first receiving module 62 is configured to receive the input first verification information if the determination result of the first determining module 61 is negative.
The first verification module 63 is configured to perform a first verification on the first verification information.
The first control module 64 is configured to close the preset function module if the determination result of the first determining module 61 is yes or the first check passes; and if the first check is not passed, the preset function module is forbidden to be closed.
According to the information processing device, when a control instruction for closing the communication module or the positioning module is obtained, whether the communication module or the positioning module is manually opened or not is judged, if the communication module or the positioning module is not manually opened, the user is verified, the communication module or the positioning module is closed only when the verification is passed, and if the verification is not passed, the communication module or the positioning module is kept opened, so that an illegal user is prevented from closing the communication module or the positioning module, conditions are provided for carrying out mobile phone retrieving operation, and the probability of mobile phone retrieving is improved; moreover, if the communication module or the positioning module is manually opened, when a control instruction is received, the communication module or the positioning module is directly closed without verification, so that excessive operation of a user (who is a legal user) is avoided, and the aim of improving the recovery probability of the mobile phone under the condition that the complexity of user operation is lower as much as possible is fulfilled.
On the basis of the embodiment shown in fig. 6, another schematic structural diagram of the information processing apparatus provided by the present application is shown in fig. 7, and may further include:
the second receiving module 71 is configured to receive the input second verification information when the data transmission interface of the electronic device is connected to the external power supply.
The second verification module 72 is configured to perform a second verification on the second verification information.
The second control module 73 is configured to charge the electronic device if the second check is passed, and otherwise, prohibit charging the electronic device.
On the basis of the embodiment shown in fig. 6, another schematic structural diagram of the information processing apparatus provided by the present application is shown in fig. 8, and may further include:
the third receiving module 81 is configured to receive the input third verification information when receiving the second control instruction for entering the data transmission mode.
The third verification module 82 is configured to perform a third verification on the third verification information.
The third control module 83 is configured to enter the data transmission mode if the third check passes, and otherwise, prohibit entering the data transmission mode.
It should be noted that the third receiving module 81, the third verifying module 82 and the third controlling module 83 can also be applied to the embodiment shown in fig. 7.
On the basis of the embodiment shown in fig. 6, a schematic diagram of another structure of the information processing apparatus provided by the present application is shown in fig. 9, and may further include:
the fourth receiving module 91 is configured to receive input fourth verification information when receiving a third control instruction for restoring the electronic device to the factory setting.
The fourth verification module 92 is configured to perform a fourth verification on the fourth verification information.
The fourth control module 93 is configured to restore the factory setting of the electronic device if the fourth check is passed, and otherwise, prohibit restoring the factory setting of the electronic device.
It should be noted that the fourth receiving module 91, the fourth verifying module 92 and the fourth controlling module 93 may also be applied to the embodiments shown in fig. 7 or fig. 8.
On the basis of the embodiment shown in any one of fig. 7 to 9, the information processing apparatus provided by the present application may further include:
the fifth control module is used for counting a second time that the second verification fails within a first preset time length if the second verification fails under the condition of receiving input second verification information and performing second verification on the second verification information, and starting the communication module and the positioning module of the electronic equipment when the second time reaches a second preset threshold; under the condition of receiving input third verification information and carrying out third verification on the third verification information, if the third verification fails, counting a third time that the third verification fails within a first preset time, and when the third time reaches a third preset threshold, starting a communication module and a positioning module of the electronic equipment; under the condition of receiving input fourth verification information and carrying out fourth verification on the fourth verification information, if the fourth verification fails, counting fourth times that the fourth verification fails within a first preset time length, and when the fourth times reaches a fourth preset threshold, starting a communication module and a positioning module of the electronic equipment.
The present application further provides an electronic device, a schematic structural diagram of which is shown in fig. 10, including a processor 101 and a memory 102; wherein the content of the first and second substances,
the memory 102 is used to store programs.
The processor 101 is configured to run the program stored in the memory 102, so as to enable the electronic device to execute the information processing method provided by the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
It should be understood that the technical problems can be solved by combining and combining the features of the embodiments from the claims.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (15)

1. An information processing method applied to an electronic device, the method comprising:
when a first control instruction for closing a preset function module of the electronic equipment is acquired, judging whether the preset function module is opened in a manual opening mode; the preset function module is a communication module or a positioning module;
if the judgment result is negative, receiving input first verification information;
performing first verification on the first verification information;
if the first check is passed, closing the preset function module, otherwise, forbidding to close the preset function module;
if the judgment result is yes, the preset function module is closed.
2. The method of claim 1, further comprising:
when it is monitored that the electronic equipment is connected with an external power supply through a data transmission interface, receiving input second verification information;
performing second verification on the second verification information;
and if the second check is passed, charging the electronic equipment, otherwise, prohibiting charging the electronic equipment.
3. The method of claim 1, further comprising:
when a second control instruction for entering a data transmission mode is received, receiving input third verification information;
performing a third check on the third verification information;
and if the third check is passed, entering a data transmission mode, otherwise, forbidding entering the data transmission mode.
4. The method of claim 1, further comprising:
receiving input fourth verification information when a third control instruction for restoring the electronic equipment to factory settings is received;
performing a fourth check on the fourth verification information;
and if the fourth verification is passed, restoring the factory setting of the electronic equipment, otherwise, forbidding restoring the factory setting of the electronic equipment.
5. The method of claim 2, further comprising:
and if the second verification fails, counting a second time that the second verification fails within a first preset time, and when the second time reaches a second preset threshold, starting a communication module and a positioning module of the electronic equipment.
6. The method of claim 3, further comprising:
and if the third verification fails, counting a third time that the third verification fails within a first preset time, and when the third time reaches a third preset threshold, starting a communication module and a positioning module of the electronic equipment.
7. The method of claim 4, further comprising:
and if the fourth verification fails, counting fourth times that the fourth verification fails within a first preset time, and when the fourth times reaches a fourth preset threshold, starting a communication module and a positioning module of the electronic equipment.
8. An information processing apparatus applied to an electronic device, comprising:
the first judgment module is used for judging whether the preset function module is started in a manual starting mode or not when a first control instruction for closing the preset function module of the electronic equipment is acquired; the preset function module is a communication module or a positioning module;
the first receiving module is used for receiving input first verification information if the judgment result of the first judging module is negative;
the first verification module is used for performing first verification on the first verification information;
the first control module is used for closing the preset function module if the judgment result of the first judgment module is yes or the first check is passed; and if the first check is not passed, the preset function module is forbidden to be closed.
9. The apparatus of claim 8, further comprising:
the second receiving module is used for receiving input second verification information when the data transmission interface of the electronic equipment is connected with an external power supply;
the second verification module is used for performing second verification on the second verification information;
and the second control module is used for charging the electronic equipment if the second check is passed, and forbidding charging the electronic equipment if the second check is not passed.
10. The apparatus of claim 8, further comprising:
the third receiving module is used for receiving input third verification information when receiving a second control instruction for entering a data transmission mode;
the third verification module is used for performing third verification on the third verification information;
and the third control module is used for entering a data transmission mode if the third check is passed, and forbidding to enter the data transmission mode if the third check is not passed.
11. The apparatus of claim 8, further comprising:
the fourth receiving module is used for receiving input fourth verification information when receiving a third control instruction for restoring the electronic equipment to factory settings;
the fourth verification module is used for performing fourth verification on the fourth verification information;
and the fourth control module is used for restoring the electronic equipment to the factory setting if the fourth verification is passed, and forbidding restoring the electronic equipment to the factory setting if the fourth verification is not passed.
12. The apparatus of claim 9, further comprising:
and the fifth control module is used for counting a second time that the second verification fails within a first preset time period if the second verification fails, and starting the communication module and the positioning module of the electronic equipment when the second time reaches a second preset threshold value.
13. The apparatus of claim 10, further comprising:
and the fifth control module is used for counting a third time that the third verification fails within a first preset time period if the third verification fails, and starting the communication module and the positioning module of the electronic equipment when the third time reaches a third preset threshold value.
14. The apparatus of claim 11, further comprising:
and the fifth control module is used for counting a fourth time that the fourth verification fails within a first preset time period if the fourth verification fails, and starting the communication module and the positioning module of the electronic equipment when the fourth time reaches a fourth preset threshold value.
15. An electronic device, comprising a processor and a memory, wherein the memory is used for storing a program, and the processor is used for operating the program, so that the electronic device executes the information processing method according to any one of claims 1 to 7.
CN201810353777.4A 2018-04-19 2018-04-19 Information processing method and device and electronic equipment Active CN110392157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810353777.4A CN110392157B (en) 2018-04-19 2018-04-19 Information processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810353777.4A CN110392157B (en) 2018-04-19 2018-04-19 Information processing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110392157A CN110392157A (en) 2019-10-29
CN110392157B true CN110392157B (en) 2020-07-31

Family

ID=68284032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810353777.4A Active CN110392157B (en) 2018-04-19 2018-04-19 Information processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110392157B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205734A (en) * 2020-09-01 2022-03-18 成都鼎桥通信技术有限公司 Control method, device and equipment of positioning function and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080026469A (en) * 2006-09-20 2008-03-25 삼성전자주식회사 A method and system for tracking a mobile communication device using mms
CN201616839U (en) * 2009-11-16 2010-10-27 华为终端有限公司 Anti-theft device on mobile communication terminal
CN103762692A (en) * 2013-02-05 2014-04-30 李明 Mobile power source for achieving anti-lost function of mobile equipment based on environment recognition
JP2014149729A (en) * 2013-02-01 2014-08-21 Mitsubishi Heavy Ind Ltd Theft self detection system, user terminal, theft self detection method, and program
CN105306697A (en) * 2015-09-30 2016-02-03 联想(北京)有限公司 Information processing method and electronic device
CN107094204A (en) * 2017-05-05 2017-08-25 广东小天才科技有限公司 The mode switching method and its system of a kind of intelligent terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516926B (en) * 2016-01-13 2018-03-27 广东欧珀移动通信有限公司 A kind of network locating method, device and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080026469A (en) * 2006-09-20 2008-03-25 삼성전자주식회사 A method and system for tracking a mobile communication device using mms
CN201616839U (en) * 2009-11-16 2010-10-27 华为终端有限公司 Anti-theft device on mobile communication terminal
JP2014149729A (en) * 2013-02-01 2014-08-21 Mitsubishi Heavy Ind Ltd Theft self detection system, user terminal, theft self detection method, and program
CN103762692A (en) * 2013-02-05 2014-04-30 李明 Mobile power source for achieving anti-lost function of mobile equipment based on environment recognition
CN105306697A (en) * 2015-09-30 2016-02-03 联想(北京)有限公司 Information processing method and electronic device
CN107094204A (en) * 2017-05-05 2017-08-25 广东小天才科技有限公司 The mode switching method and its system of a kind of intelligent terminal

Also Published As

Publication number Publication date
CN110392157A (en) 2019-10-29

Similar Documents

Publication Publication Date Title
CN109636966B (en) Door lock control method, system, device, electronic equipment and storage medium
CN105139470B (en) Work attendance method, apparatus and system based on recognition of face
EP3147768A1 (en) Screen interface unlocking method and screen interface unlocking device
WO2016015551A1 (en) Method and system for improving safety of mobile terminal
CN104780279A (en) Mobile phone and method used for supporting stolen tracking and locating
CN104809773A (en) Entrance guard control method, entrance guard control apparatus, and entrance guard system
CA2691072A1 (en) Methods and systems for providing a wireless security service and/or a wireless technical support service for personal computers
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
CN105391865A (en) Method and system for starting anti-theft function of mobile terminal via shutdown mode
CN104299303A (en) Intelligent access control system and implementation method of intelligent access control system
WO2016192499A1 (en) Terminal management method and terminal
CN103955968A (en) Compound security attendance device and system based on android platform
CN104778587A (en) Safety payment method and device
CN103607253A (en) Method and system for controlling mobile terminals
US20120093374A1 (en) Electronic device and method for identifying use by unauthorized users
CN107451445A (en) A kind of method of unlocking screen, terminal and storage medium
WO2016131362A1 (en) Voiceprint-recognition-based security protection method and device
CN102356396B (en) Arithmetic processing device, data erasing method, program, storage medium, and remote operation system
CN110392157B (en) Information processing method and device and electronic equipment
WO2016180165A1 (en) Mobile phone tracking method, apparatus and terminal
CN109754345B (en) System and method for conducting secure computer-based test taker assessment
WO2016202083A1 (en) Method and apparatus for controlling monitoring device
CN105306691A (en) Personal information protection method and terminal
CN104363352A (en) System determining method, system determining device and terminal
US20170311117A1 (en) Remotely accessible personal digital drive and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant