CN111261827A - Battery anti-theft method and device - Google Patents

Battery anti-theft method and device Download PDF

Info

Publication number
CN111261827A
CN111261827A CN202010054690.4A CN202010054690A CN111261827A CN 111261827 A CN111261827 A CN 111261827A CN 202010054690 A CN202010054690 A CN 202010054690A CN 111261827 A CN111261827 A CN 111261827A
Authority
CN
China
Prior art keywords
battery
current
host
signal
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010054690.4A
Other languages
Chinese (zh)
Inventor
范迎春
刘兴民
陈楷生
李永俊
郭辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DLight Technology Shenzhen Co ltd
Original Assignee
DLight Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DLight Technology Shenzhen Co ltd filed Critical DLight Technology Shenzhen Co ltd
Priority to CN202010054690.4A priority Critical patent/CN111261827A/en
Publication of CN111261827A publication Critical patent/CN111261827A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M50/00Constructional details or processes of manufacture of the non-active parts of electrochemical cells other than fuel cells, e.g. hybrid cells
    • H01M50/50Current conducting connections for cells or batteries
    • H01M50/572Means for preventing undesired use or discharge
    • H01M50/574Devices or arrangements for the interruption of current
    • H01M50/576Devices or arrangements for the interruption of current in response to theft
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M10/00Secondary cells; Manufacture thereof
    • H01M10/42Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
    • H01M10/425Structural combination with electronic components, e.g. electronic circuits integrated to the outside of the casing
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M10/00Secondary cells; Manufacture thereof
    • H01M10/42Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
    • H01M10/425Structural combination with electronic components, e.g. electronic circuits integrated to the outside of the casing
    • H01M2010/4278Systems for data transfer from batteries, e.g. transfer of battery parameters to a controller, data transferred between battery controller and main controller
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/10Energy storage using batteries

Landscapes

  • Chemical & Material Sciences (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Electrochemistry (AREA)
  • General Chemical & Material Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Manufacturing & Machinery (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

The application is suitable for the technical field of batteries, and provides a battery anti-theft method and a device, which comprise the following steps: acquiring the current of the battery, wherein the current of the battery comprises an output current and/or an input current; if the current of the battery is larger than a preset threshold value, receiving a signal sent by a host and analyzing the signal; and if the obtained analysis result indicates that the host is an illegal host, limiting the current of the battery. The embodiment of the application can effectively avoid the battery from being stolen.

Description

Battery anti-theft method and device
Technical Field
The application belongs to the technical field of batteries, and particularly relates to a battery anti-theft method and device.
Background
With the advancement of technology, more and more devices utilize batteries as an energy source to obtain stable power supply for a long time. In addition, the battery has the characteristics of simple structure, convenience in carrying, simplicity and convenience in charging and discharging operation, no influence of outside weather and temperature, and stable and reliable performance, so that the battery can play a great role in various aspects of modern social life.
As the application of batteries is more and more extensive, the anti-theft problem of batteries is also drawing more and more attention, and in the existing battery anti-theft, a mechanical structure is usually adopted to fix the battery or monitor the position of the battery in real time to avoid the battery being stolen. But because the mechanical structure is adopted to fix the battery for theft prevention, an illegal person can still remove and steal the battery through violence; and the position of the battery is monitored in real time to determine whether the battery is stolen, so that whether the battery is stolen can be monitored only, and the battery cannot be effectively prevented from being stolen.
Disclosure of Invention
The embodiment of the application provides a battery anti-theft method and device, and can solve the problem that a battery cannot be effectively prevented from being stolen in the prior art.
A first aspect of an embodiment of the present application provides a method for preventing battery theft, including:
acquiring the current of the battery; the current of the battery comprises an output current and/or an input current;
if the current of the battery is larger than a preset threshold value, receiving a signal sent by a host and analyzing the signal;
and if the obtained analysis result indicates that the host is an illegal host, limiting the current of the battery.
A second aspect of an embodiment of the present application provides a battery antitheft device, including:
a current acquisition unit: the current of the battery is obtained; the current of the battery comprises an output current and/or an input current;
a signal receiving unit: the device comprises a power supply, a power supply and a control circuit, wherein the power supply is used for supplying power to the power supply;
a current control unit: and limiting the current of the battery if the obtained analysis result indicates that the host is an illegal host.
A third aspect of the embodiments of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program, so that the terminal device implements the steps of the battery anti-theft method.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, causes a terminal device to implement the steps of the battery theft prevention method as described.
In a fifth aspect, an embodiment of the present application provides a computer program product, which, when run on a terminal device, causes the terminal device to execute the battery theft prevention method according to any one of the above first aspects.
Compared with the prior art, the embodiment of the application has the advantages that: the method comprises the steps of monitoring the state of a battery in real time by acquiring the current of the battery, wherein the current of the battery comprises output current and/or input current, receiving a signal sent by a host and analyzing the signal when the current of the battery is larger than a preset threshold value, and limiting the current of the battery if the obtained analysis result indicates that the host is an illegal host, so that when the battery is stolen and an illegal person wants to place the battery on an unknown host for use, the battery cannot be normally charged and discharged due to the fact that the signal of the unknown host cannot be analyzed, the illegal person cannot use the battery even if the battery is stolen, the stolen battery has no use for the illegal person, the illegal person cannot steal the battery again, and the battery is prevented from being stolen for a long time; and through changing the battery protection board of realizing above-mentioned battery anti-theft method, can also make the battery that does not possess the theftproof effect originally possess the theftproof effect, need not purchase the change battery again, only need change the battery protection board can, practice thrift the cost.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an implementation of a first battery anti-theft method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation of a second battery anti-theft method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a battery anti-theft device provided in an embodiment of the present application;
fig. 4 is a schematic diagram of a terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In addition, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not intended to indicate or imply relative importance.
The first embodiment is as follows:
fig. 1 shows a schematic flow chart of a first battery anti-theft method provided in an embodiment of the present application, where an execution subject of the method is a battery protection plate, and the battery anti-theft method shown in fig. 1 may include:
in S101, acquiring a current of the battery; the current of the battery comprises an output current and/or an input current.
The battery protection board is provided with a current protection monitoring circuit, the current of the battery is monitored in real time through the current protection monitoring circuit, and the output current and/or the input current of the battery are/is obtained.
In S102, if the current of the battery is greater than a preset threshold, a signal sent by a host is received and analyzed.
The current of the battery is monitored in real time through the battery protection monitoring circuit, when the monitored current of the battery is larger than a preset threshold value, the battery protection board is in communication connection with the host, and signals sent by the host are received and analyzed. Signals sent by the host computer can be superposed on a power line connected with the battery so as to reduce wiring; in addition, a signal line may be additionally provided to receive a signal sent by the host, information sent by the host may also be received through wireless transmission, and a communication connection may also be established with the host through interfaces such as RS485, CAN, network, and a common serial port to receive a signal sent by the host. The preset threshold may be 1C/101C/20, or 100ma, 500ma, etc., and may be set according to practical situations, and is not limited herein.
Optionally, if the current of the battery is greater than a preset threshold, receiving a signal sent by a host and analyzing the signal, specifically including:
a1, if the current of the battery is larger than a preset threshold value, starting a timer and starting timing;
the battery protection board further comprises a timer, when the battery protection monitoring circuit detects that the current of the battery is larger than a preset threshold value, the timer is started to start timing, the timer is preset with overtime, the overtime can be set to be 1 minute or 5 minutes and the like, the overtime can be set according to actual needs, and limitation is not made herein.
A2, if a signal sent by a host is received before the timer is not overtime, analyzing the signal;
a3, if the signal sent by the host is not received after the timer is overtime, performing overtime attempt with the host for a preset number of times, if the overtime attempt is successful, analyzing the signal, and if the overtime attempt is failed, limiting the current of the battery.
After the timer starts to time, the battery protection board is communicated with the host to receive signals sent by the host, if the timer does not time out, the battery protection board is successfully communicated with the host and receives the signals sent by the host, the signals are analyzed, if the timer does not receive the signals sent by the host after time out, the situation that the battery protection board fails to be communicated with the host or the battery protection board is successfully communicated with the host but fails to receive the signals sent by the host is indicated, and at this time, an overtime attempt is carried out. The timeout attempt means to re-establish communication with the host and receive a signal transmitted from the host. The number of timeout attempts may be preset, and the timeout attempts may be set 1 time, 2 times, or 3 times, and the like, and are set by themselves according to actual needs, which is not limited herein. If the overtime attempt is successful, receiving a signal sent by the host and analyzing the signal, and if the overtime attempt is failed, indicating that the host and the battery protection board cannot successfully establish communication, limiting the current of the battery and enabling the battery not to be normally used.
Optionally, the receiving a signal sent by a host and analyzing the signal includes: and receiving a handshake signal sent by the host, and analyzing the handshake signal.
After the battery protection board is communicated with the host, handshake authentication is carried out, the battery protection board receives handshake signals sent by the host, the handshake signals can be sent in a plaintext mode, encryption algorithms such as Hash, AES or DES can also be adopted for encryption, the legality of the host is judged by analyzing information in the handshake signals, and an analysis result indicating whether the host is legal is obtained.
In S103, if the obtained analysis result indicates that the host is an illegal host, the current of the battery is limited.
After the signal sent by the host is analyzed, an analysis result for indicating whether the host is legal or not is obtained, when the analysis result indicates that the host is an illegal host, the current of the battery is limited by the battery protection board when the current battery is stolen, and the battery cannot normally run when being installed on the illegal host. When the battery stolen illegally is known to be unusable, the illegally stolen cannot obtain benefits from the stolen battery and cannot use the battery, and the battery is effectively prevented from being stolen in a long time.
Optionally, the limiting the current of the battery comprises: controlling the battery to output current in any one of the following modes: the method comprises the following steps of forbidding output, partial output, intermittent output and/or controlling the battery to input current in any one of the following modes: input disabled, partial input, intermittent input.
Specifically, when the output current is greater than a preset threshold value, the received signal sent by the host is analyzed, and the result obtained by analyzing the signal indicates that the host is an illegal host, the battery is controlled to output the current in any one of the following manners: inhibit output, partial output, intermittent output; when the input current is larger than a preset threshold value, receiving a signal sent by a host and analyzing the signal to obtain a result indicating that the host is an illegal host, controlling the battery to input the current in any one of the following modes: input disabled, partial input, intermittent input.
When the battery outputs current in a mode of prohibiting output, the battery can not be discharged completely, and the battery can not be used; when the battery outputs current in a partial output mode, the output current of the battery is controlled to be 1/N, N >1 of the output current in a full-load output mode, so that the host machine cannot normally operate due to too small current even if the battery outputs current. The current output in the intermittent output mode means that the output current of the battery is controlled to alternately perform full-load output and output prohibition, and at the moment, the host cannot stably operate, so that the host cannot normally operate.
When the battery inputs current in a mode of prohibiting input, the battery cannot be charged at all and cannot be used; when the battery inputs current in a partial input mode, the input current of the battery is controlled to be 1/N of the input current when a full-load input mode is adopted, and N is greater than 1, so that even if the battery inputs current, the host cannot normally operate because the input current is too small and the host cannot normally charge. The current input in the intermittent input mode means that the input current of the battery is controlled to alternately perform full-load input and input prohibition, and at the moment, the host cannot be charged stably, so that the host cannot operate normally.
Alternatively, when the battery is depleted or low, no input current is drawn from the battery.
Optionally, step S103 further includes:
and if the obtained analysis result indicates that the host is a legal host, controlling the battery to output current in a full-load output mode and/or input current in a full-load input mode.
When the output current is larger than a preset threshold value, receiving a signal sent by a host, and analyzing the signal to obtain a result indicating that the host is a legal host, controlling the battery to output the current in a full-load output mode; and when the input current is larger than a preset threshold value, receiving a signal sent by the host and analyzing the signal to obtain a result indicating that the host is a legal host, controlling the battery to input the current in a full-load input mode.
After the signal sent by the host is analyzed, the analysis result indicates that the host is a legal host, and at the moment, the battery protection board controls the output current of the battery to be fully output and/or controls the input current of the battery to be fully input, so that the battery can be normally charged and discharged when being installed on the legal host, and a user can normally use the battery.
In some embodiments, after step S103, further comprising: and alarming in a preset mode.
Specifically, the alarm may be performed by sound and light alarm or by playing preset voice information.
In some embodiments, the battery protection plate may be provided with an identification code for uniquely corresponding to the battery protection plate, and the identification code of the battery protection plate may be a product serial number of the battery protection plate or other characters set by a user for uniquely identifying the battery protection plate. If the battery protection board with the anti-theft function is installed before the battery leaves a factory, placing the identification code of the battery protection board on the outer surface of the battery; or place the identification code of battery protection shield in battery protection shield surface, can directly burn the identification code of battery protection shield at battery surface or the surface of battery protection shield, also can set up the two-dimensional code that contains the identification code of battery protection shield at battery surface or the surface of battery protection shield, and the user can directly acquire the identification code of battery protection shield or acquire the identification code of battery protection shield through scanning this two-dimensional code.
The user can make original battery that does not possess the theftproof effect also possess the theftproof effect through changing the battery protection shield. After acquiring the identification code, the user sends a binding instruction to the server, wherein the binding instruction comprises the identification code of the battery protection board, user identity information and an MAC address of the user terminal, and the user identity information comprises information used for representing the user identity, such as a mobile phone number of the user, a name of the user and the like. The server stores identification codes corresponding to the battery protection boards and identity information of users, after a binding instruction sent by the user is received, the identity of the user is verified, after the identity of the user is verified to be legal, the MAC address of the user terminal is bound with the identification codes of the battery protection boards, one piece of user identity information can be bound with the MAC addresses of a plurality of user terminals, and the MAC address of each user terminal can be bound with the identification codes of the plurality of battery protection boards.
Optionally, after limiting the current of the battery, the battery protection board sends an alarm message to a server, and the server sends the alarm message to a user terminal bound to the battery protection board. The alarm information contains current position information, preset text information and/or voice information, the voice information can be the current position information broadcasted through voice, and the preset text information can be an identification code of the battery protection board and information indicating that the current battery is probably stolen. The current position information can be GPS positioning information, a radio frequency tag can be arranged on or in the battery protection board, the reader is connected with the server, the position of the radio frequency tag can be obtained through the reader, the position of the battery protection board can be further determined, the current position information can also be the position information determined through the radio frequency tag, and the radio frequency tag contains an identification code of the battery protection board. After the battery protection boards are bound, the user may further set characters for identifying and distinguishing the plurality of battery protection boards, for example, distinguish the batteries through the placement positions of the batteries, specifically, the batteries in a living room or the batteries in a bedroom, and the like, which is not limited herein. Therefore, the preset text information can be characters set by a user for distinguishing the battery protection board, information of the current position of the battery protection board corresponding to the characters, and state information.
In the embodiment of the application, the battery state is monitored in real time by acquiring the current of the battery, the current of the battery comprises output current and/or input current, when the current of the battery is larger than a preset threshold value, a signal sent by a host is received and analyzed, if the obtained analysis result indicates that the host is an illegal host, the current of the battery is limited, so that when the battery is stolen and an illegal person wants to place the battery on an unknown host for use, the battery cannot be normally charged and discharged due to the failure of analyzing the signal of the unknown host, the illegal person cannot use the battery even if the battery is stolen, the stolen battery has no use for the illegal person, the illegal person cannot steal the battery again for a long time, the battery can be effectively prevented from being stolen, the battery protecting board which does not have the anti-theft function originally can be enabled to have the anti-theft function by replacing the battery of the anti-theft method, the battery does not need to be bought and replaced again, and only the battery protection board needs to be replaced, so that the cost is saved.
Example two:
fig. 2 is a schematic flow chart of a second battery anti-theft method provided in an embodiment of the present application, where an execution subject of the method is a battery protection plate, and the battery anti-theft method shown in fig. 2 may include:
in S201, acquiring a current of the battery; the current of the battery comprises an output current and/or an input current.
The battery protection board is provided with a current protection monitoring circuit, the current of the battery is monitored in real time through the current protection monitoring circuit, and the output current and/or the input current of the battery are/is obtained.
Optionally, before step S201, the method further includes: a host list containing host identification codes is pre-stored.
In S202, if the current of the battery is greater than a preset threshold, a signal sent by the host is received and analyzed.
The current of the battery is monitored in real time through the battery protection monitoring circuit, when the monitored current of the battery is larger than a preset threshold value, the battery protection board is in communication connection with the host, and signals sent by the host are received and analyzed. Signals sent by the host computer can be superposed on a power line connected with the battery so as to reduce wiring; in addition, a signal line may be additionally provided to receive a signal sent by the host, information sent by the host may also be received through wireless transmission, and a communication connection may also be established with the host through interfaces such as RS485, CAN, network, and a common serial port to receive a signal sent by the host. The preset threshold may be 1C/101C/20, or 100ma, 500ma, etc., and may be set according to practical situations, and is not limited herein.
Optionally, if the current of the battery is greater than a preset threshold, receiving a signal sent by a host and analyzing the signal, specifically including:
b1, if the current of the battery is larger than a preset threshold value, starting a timer and starting timing;
b2, if the signal sent by the host is received before the timer is not overtime, analyzing the signal;
b3, if the signal sent by the host is not received after the timer is overtime, performing overtime attempt with the host for a preset number of times, if the overtime attempt is successful, analyzing the signal, and if the overtime attempt is failed, limiting the current of the battery.
The implementation processes of steps B1, B2, and B3 are the same as the implementation processes of steps a1, a2, and A3 in the first embodiment, and refer to the description related to steps a1, a2, and A3 in the first embodiment, which is not described herein again.
Optionally, the receiving a signal sent by the host and analyzing the signal further includes:
c1, receiving the signal sent by the host and analyzing the information contained in the signal;
c2, acquiring the host identification code contained in the information;
c3, inquiring whether the host identification code is in the list according to a pre-stored host list;
c4, if the host identification code is in the list, obtaining an analysis result indicating that the host is a legal host; and if the host identification code is not in the list, obtaining an analysis result indicating that the host is an illegal host.
The method comprises the steps that a host list containing legal host identification codes is stored in a battery protection board in advance, after the battery protection board is communicated with a host, an instruction requesting the host identification codes is sent to the host, the host responds to the instruction and sends signals to the battery protection board, the battery protection board analyzes the signals according to a preset algorithm after receiving the signals sent by the host, information including the host identification codes in the signals is obtained, then whether the host identification codes are in the list or not is inquired according to the host list, and then the legality of the host is judged, the signals can be sent in a plaintext mode, and can be encrypted by adopting encryption algorithms such as Hash, AES or DES.
In S203, if the obtained analysis result indicates that the host is an illegal host, the current of the battery is limited.
The implementation process of step S203 is the same as the implementation process of step S103 in the first embodiment, and please refer to the related description of step S103 in the first embodiment, which is not described herein again.
Optionally, step S203 further includes:
and if the obtained analysis result indicates that the host is a legal host, controlling the battery to output current in a full-load output mode and/or input current in a full-load input mode.
When the output current is larger than a preset threshold value, receiving a signal sent by a host, and analyzing the signal to obtain a result indicating that the host is a legal host, controlling the battery to output the current in a full-load output mode; and when the input current is larger than a preset threshold value, receiving a signal sent by the host, and analyzing the signal to obtain a result indicating that the host is a legal host, controlling the battery to input the current in a full-load input mode.
After the signal sent by the host is analyzed, the analysis result indicates that the host is a legal host, and at the moment, the battery protection board controls the output current of the battery to be fully output and/or controls the input current of the battery to be fully input, so that the battery can be normally charged and discharged when being installed on the legal host, and a user can normally use the battery.
In some embodiments, after step S203, further comprising: and alarming in a preset mode.
Specifically, the alarm may be performed by sound and light alarm or by playing preset voice information.
In some embodiments, the battery protection plate may be provided with an identification code for uniquely corresponding to the battery protection plate, and the identification code of the battery protection plate may be a product serial number of the battery protection plate or other characters set by a user for uniquely identifying the battery protection plate. If the battery protection board with the anti-theft function is installed before the battery leaves a factory, placing the identification code of the battery protection board on the outer surface of the battery; or place the identification code of battery protection shield in battery protection shield surface, can directly burn the identification code of battery protection shield at battery surface or the surface of battery protection shield, also can set up the two-dimensional code that contains the identification code of battery protection shield at battery surface or the surface of battery protection shield, and the user can directly acquire the identification code of battery protection shield or acquire the identification code of battery protection shield through scanning this two-dimensional code.
The user can make original battery that does not possess the theftproof effect also possess the theftproof effect through changing the battery protection shield. After acquiring the identification code, the user sends a binding instruction to the server, wherein the binding instruction comprises the identification code of the battery protection board, user identity information and an MAC address of the user terminal, and the user identity information comprises information used for representing the user identity, such as a mobile phone number of the user, a name of the user and the like. The server stores identification codes corresponding to the battery protection boards and identity information of users, after a binding instruction sent by the user is received, the identity of the user is verified, after the identity of the user is verified to be legal, the MAC address of the user terminal is bound with the identification codes of the battery protection boards, one piece of user identity information can be bound with the MAC addresses of a plurality of user terminals, and the MAC address of each user terminal can be bound with the identification codes of the plurality of battery protection boards.
Optionally, after limiting the current of the battery, the battery protection board sends an alarm message to a server, and the server sends the alarm message to a user terminal bound to the battery protection board. The alarm information contains current position information, preset text information and/or voice information, the voice information can be the current position information broadcasted through voice, and the preset text information can be an identification code of the battery protection board and information indicating that the current battery is probably stolen. The current position information can be GPS positioning information, a radio frequency tag can be arranged on or in the battery protection board, the reader is connected with the server, the position of the radio frequency tag can be obtained through the reader, the position of the battery protection board can be further determined, the current position information can also be the position information determined through the radio frequency tag, and the radio frequency tag contains an identification code of the battery protection board. After the battery protection boards are bound, the user may further set characters for identifying and distinguishing the plurality of battery protection boards, for example, distinguish the batteries through the placement positions of the batteries, specifically, the batteries in a living room or the batteries in a bedroom, and the like, which is not limited herein. Therefore, the preset text information can be characters set by a user for distinguishing the battery protection board, information of the current position of the battery protection board corresponding to the characters, and state information.
In the embodiment of the application, the battery state is monitored in real time by acquiring the current of the battery, the current of the battery comprises output current and/or input current, when the current of the battery is greater than a preset threshold value, a signal sent by a host is received and analyzed, if the obtained analysis result indicates that the host is an illegal host, the output current of the battery is limited, so that when the battery is stolen and an illegal person wants to place the battery on an unknown host for use, the battery cannot be normally charged and discharged due to the failure of analyzing the signal of the unknown host, the illegal person cannot use the battery even if the battery is stolen, the stolen battery has no use for the illegal person, the illegal person cannot steal the battery again, the battery can be effectively prevented from being stolen for a long time, and the battery protection board for realizing the battery anti-theft method is replaced, the battery which does not have the anti-theft function originally can have the anti-theft function without being purchased againThe battery is replaced only by replacing the battery protection plate, so that the cost is saved.Example three:
fig. 3 shows a schematic structural diagram of a battery anti-theft device provided in an embodiment of the present application, and for convenience of description, only parts related to the embodiment of the present application are shown:
this battery anti-theft device includes: a current acquisition unit 31, a signal receiving unit 32, and a current control unit 33.
The current acquisition unit 31: the current of the battery is obtained; the current of the battery comprises an output current and/or an input current;
signal receiving section 32: the device comprises a power supply, a power supply and a control circuit, wherein the power supply is used for supplying power to the power supply;
the current control unit 33: and limiting the current of the battery if the obtained analysis result indicates that the host is an illegal host.
Optionally, the battery control unit 33 is further configured to control the output current of the battery in a full-load output manner and/or the input current in a full-load input manner if the obtained analysis result indicates that the host is a legal host.
Optionally, the signal receiving unit 32 includes:
a timer starting unit: the timer is started and timing is started if the current of the battery is larger than a preset threshold value;
a signal analysis unit: the timer is used for analyzing the signal sent by the host if the signal is received before the timer is not overtime or if the overtime attempt is successful;
a timeout attempting unit: and if the signal sent by the host is not received after the timer is overtime, performing the overtime attempt with the host for the preset times.
The current control unit 33 is further configured to limit the current of the battery if the signal sent by the host is not received after the timer expires and the timeout attempt fails.
Optionally, the battery anti-theft device further includes:
the alarm unit is used for alarming in a preset mode;
and the storage unit is used for pre-storing a host list containing the host identification codes.
Optionally, the signal analyzing unit includes:
a signal reception analysis unit: the device comprises a host, a handshake signal acquisition module, a handshake signal processing module and a communication module, wherein the handshake signal acquisition module is used for receiving the handshake signal sent by the host, analyzing the handshake signal or receiving the signal sent by the host and analyzing information contained in the signal to acquire a host identification code contained in the information;
a query unit: the host identification code is inquired whether the host identification code is in the list or not according to a pre-stored host list;
a judging unit: the host computer identification code is used for obtaining an analysis result indicating that the host computer is a legal host computer if the host computer identification code is in the list; and if the host identification code is not in the list, obtaining an analysis result indicating that the host is an illegal host.
Optionally, the alarm unit is specifically configured to: and alarming by adopting sound and light alarm and playing preset voice information or sending alarm information to a server.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiment of the application, the battery state is monitored in real time by acquiring the current of the battery, the current of the battery comprises output current and/or input current, when the current of the battery is larger than a preset threshold value, a signal sent by a host is received and analyzed, if the obtained analysis result indicates that the host is an illegal host, the current of the battery is limited, so that when the battery is stolen and an illegal person wants to place the battery on an unknown host for use, the battery cannot be normally charged and discharged due to the failure of analyzing the signal of the unknown host, the illegal person cannot use the battery even if the battery is stolen, the stolen battery has no use for the illegal person, the illegal person cannot steal the battery again for a long time, the battery can be effectively prevented from being stolen, the battery protecting board which does not have the anti-theft function originally can be enabled to have the anti-theft function by replacing the battery of the anti-theft method, the battery does not need to be bought and replaced again, and only the battery protection board needs to be replaced, so that the cost is saved.
Example four:
fig. 4 is a schematic diagram of a terminal device according to an embodiment of the present application. As shown in fig. 4, the terminal device 4 of this embodiment includes: a processor 40, a memory 41 and a computer program 42, such as a battery anti-theft program, stored in said memory 41 and executable on said processor 40. The processor 40, when executing the computer program 42, implements the steps in each of the above-described embodiments of the battery anti-theft method, such as the steps S101 to S103 shown in fig. 1. Alternatively, the processor 40, when executing the computer program 42, implements the functions of the modules/units in the above-mentioned device embodiments, such as the functions of the units 31 to 33 shown in fig. 3.
Illustratively, the computer program 42 may be partitioned into one or more modules/units that are stored in the memory 41 and executed by the processor 40 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 42 in the terminal device 4. For example, the computer program 42 may be divided into a current acquisition unit, a signal receiving unit, and a current control unit, and each unit functions specifically as follows:
a current acquisition unit: the current of the battery is obtained; the current of the battery comprises an output current and/or an input current;
a signal receiving unit: the device comprises a power supply, a power supply and a control circuit, wherein the power supply is used for supplying power to the power supply;
a current control unit: and limiting the current of the battery if the obtained analysis result indicates that the host is an illegal host.
The terminal device 4 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 40, a memory 41. Those skilled in the art will appreciate that fig. 4 is merely an example of a terminal device 4 and does not constitute a limitation of terminal device 4 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 40 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 41 may be an internal storage unit of the terminal device 4, such as a hard disk or a memory of the terminal device 4. The memory 41 may also be an external storage device of the terminal device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 4. Further, the memory 41 may also include both an internal storage unit and an external storage device of the terminal device 4. The memory 41 is used for storing the computer program and other programs and data required by the terminal device. The memory 41 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A battery theft prevention method, characterized by comprising:
acquiring the current of the battery; the current of the battery comprises an output current and/or an input current;
if the current of the battery is larger than a preset threshold value, receiving a signal sent by a host and analyzing the signal;
and if the obtained analysis result indicates that the host is an illegal host, limiting the current of the battery.
2. The battery theft prevention method according to claim 1, wherein if the obtained analysis result indicates that the host is a legal host, the battery is controlled to output current in a full-load output manner and/or input current in a full-load input manner.
3. The battery anti-theft method according to claim 2, wherein if the current of the battery is greater than a preset threshold, receiving a signal sent by a host and analyzing the signal, specifically comprising:
if the current of the battery is larger than a preset threshold value, starting a timer and starting timing;
if a signal sent by a host is received before the timer is not overtime, analyzing the signal;
if the signal sent by the host is not received after the timer is overtime, performing overtime attempt with the host for a preset number of times, if the overtime attempt is successful, analyzing the signal, and if the overtime attempt is failed, limiting the current of the battery.
4. The battery theft prevention method according to claim 3, wherein after said controlling the output current full-load output and/or the input current full-load input of said battery, further comprising: and resetting the timer in a zero clearing mode, and restarting timing.
5. The battery theft protection method according to any one of claims 1-3, wherein said limiting the current of said battery comprises: controlling the battery to output current in any one of the following modes: the method comprises the following steps of forbidding output, partial output, intermittent output and/or controlling the battery to input current in any one of the following modes: input disabled, partial input, intermittent input.
6. The battery theft prevention method as set forth in claim 1, wherein said limiting the current of said battery further comprises: and alarming in a preset mode.
7. The battery theft prevention method according to claim 1, wherein said receiving a signal transmitted by a host and analyzing said signal comprises: and receiving a handshake signal sent by the host, and analyzing the handshake signal.
8. A battery theft prevention device, comprising:
a current acquisition unit: the current of the battery is obtained; the current of the battery comprises an output current and/or an input current;
a signal receiving unit: the device comprises a power supply, a power supply and a control circuit, wherein the power supply is used for supplying power to the power supply;
a current control unit: and limiting the current of the battery if the obtained analysis result indicates that the host is an illegal host.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202010054690.4A 2020-01-17 2020-01-17 Battery anti-theft method and device Pending CN111261827A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010054690.4A CN111261827A (en) 2020-01-17 2020-01-17 Battery anti-theft method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010054690.4A CN111261827A (en) 2020-01-17 2020-01-17 Battery anti-theft method and device

Publications (1)

Publication Number Publication Date
CN111261827A true CN111261827A (en) 2020-06-09

Family

ID=70947120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010054690.4A Pending CN111261827A (en) 2020-01-17 2020-01-17 Battery anti-theft method and device

Country Status (1)

Country Link
CN (1) CN111261827A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3993472A1 (en) * 2020-11-02 2022-05-04 Einhell Germany AG Use limitation of an electrical device
CN115458822A (en) * 2022-10-09 2022-12-09 四川长虹网络科技有限责任公司 Battery control system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040003954A (en) * 2002-07-05 2004-01-13 엘지전자 주식회사 Battery steal prevent apparatus and method for mobile communication terminal
US20110254654A1 (en) * 2008-07-23 2011-10-20 Lo Chung-Ho Battery Car Anti-Theft Device
CN107834657A (en) * 2017-11-30 2018-03-23 维沃移动通信有限公司 A kind of charging method, terminal device and power supply adaptor
CN109661022A (en) * 2018-12-19 2019-04-19 惠州Tcl移动通信有限公司 Network control method, system, storage medium and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040003954A (en) * 2002-07-05 2004-01-13 엘지전자 주식회사 Battery steal prevent apparatus and method for mobile communication terminal
US20110254654A1 (en) * 2008-07-23 2011-10-20 Lo Chung-Ho Battery Car Anti-Theft Device
CN107834657A (en) * 2017-11-30 2018-03-23 维沃移动通信有限公司 A kind of charging method, terminal device and power supply adaptor
CN109661022A (en) * 2018-12-19 2019-04-19 惠州Tcl移动通信有限公司 Network control method, system, storage medium and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3993472A1 (en) * 2020-11-02 2022-05-04 Einhell Germany AG Use limitation of an electrical device
CN115458822A (en) * 2022-10-09 2022-12-09 四川长虹网络科技有限责任公司 Battery control system and method

Similar Documents

Publication Publication Date Title
EP2549678B1 (en) Method and apparatus for protecting software of mobile terminal
US11036840B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
US7770791B2 (en) Security device
EP1958427B1 (en) Method and apparatus for authenticating a mobile phone accessory
US20080024268A1 (en) Component authentication for computer systems
CN107729836B (en) Face recognition method and related product
CN109564598B (en) Terminal detection method and terminal
US8892904B2 (en) Hardware enforced security governing access to an operating system
CN102104679A (en) Method and device for preventing mobile terminal from being used by invalid user
CN111712820B (en) Method and apparatus for securing a mobile device
CN111261827A (en) Battery anti-theft method and device
US7606643B2 (en) Technique for providing management of a motor vehicle information system
CN106934277A (en) Application program detection method and device and terminal
CN101888627A (en) Mobile terminal and system data protection method thereof
CN111159685A (en) User account management method and device, intelligent device and storage medium
CN113442870B (en) Method and device for deactivating vehicle-mounted unit, storage medium and terminal
US20130102285A1 (en) Mobile communication terminal, startup method thereof, and network communication system
EP3839783A1 (en) Electronic device for providing service by using secure element, and operating method thereof
CN111316269A (en) Terminal security protection method and device
US8533776B2 (en) Method and system for binding a device to a planar
EP2365459A2 (en) Data storage apparatus
CN107295177B (en) Application disabling method and device and terminal equipment
WO2017111962A1 (en) System and method for securing electronic device during low power and following hardware change
CN113525151A (en) Electric vehicle charging method and related equipment
US20190364147A1 (en) Certificate loading method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609

RJ01 Rejection of invention patent application after publication