CN112580008A - Equipment monitoring method, device, equipment and storage medium - Google Patents

Equipment monitoring method, device, equipment and storage medium Download PDF

Info

Publication number
CN112580008A
CN112580008A CN202011522529.1A CN202011522529A CN112580008A CN 112580008 A CN112580008 A CN 112580008A CN 202011522529 A CN202011522529 A CN 202011522529A CN 112580008 A CN112580008 A CN 112580008A
Authority
CN
China
Prior art keywords
equipment
instruction
power
state switching
monitored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011522529.1A
Other languages
Chinese (zh)
Inventor
郑金山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Optical Technology Co Ltd
Original Assignee
Goertek Optical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Optical Technology Co Ltd filed Critical Goertek Optical Technology Co Ltd
Priority to CN202011522529.1A priority Critical patent/CN112580008A/en
Publication of CN112580008A publication Critical patent/CN112580008A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Abstract

The application discloses a method, a device, equipment and a storage medium for monitoring equipment. Belonging to the field of mobile terminals. The method comprises the following steps: receiving a state switching instruction; controlling the monitored equipment to acquire a front image; detecting whether the front image is matched with a pre-stored image; if the state switching instruction is not matched with the target operation, executing the target operation matched with the state switching instruction; wherein, under the condition that the state switching instruction is an instruction for switching from shutdown to startup, the target operation comprises the following steps: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed. The method can improve the safety of the mobile terminal.

Description

Equipment monitoring method, device, equipment and storage medium
Technical Field
The present application relates to the field of mobile terminals, and more particularly, to a device monitoring method, a device monitoring apparatus, a monitored device, and a computer-readable storage medium.
Background
With the development of technology and the improvement of living standard, various mobile terminals are more and more widely used.
Currently, some mobile terminals have payments, such as child-resistant watches, smartphones, etc. Users may be illegally acquired by illegal users during the use of these mobile terminals. If the mobile terminal of the user is obtained and used by an illegal user, the possibility that the electronic payment account is stolen exists. This greatly reduces the security of the mobile terminal.
Disclosure of Invention
It is an object of the present application to provide a new solution for monitoring of a device.
According to a first aspect of the present application, there is provided a method of monitoring a device, the method comprising:
receiving a state switching instruction;
controlling the monitored equipment to acquire a front image;
detecting whether the front image is matched with a pre-stored image;
if the state switching instruction does not match with the target operation, executing the target operation matched with the state switching instruction;
wherein, in the case that the state switching instruction is an instruction for switching from shutdown to startup, the target operation includes: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed.
Optionally, in a case that the state switching instruction is an instruction to switch from power on to power off, the target operation includes: displaying a shutdown picture, and controlling the screen of the monitored equipment to be in a screen-off state.
Optionally, the method further includes:
and sending any one of an alarm identifier matched with the state switching instruction, the current position of the monitored equipment, the track information of the monitored equipment and the current environment audio/video where the monitored equipment is located to the monitoring equipment.
Optionally, the method further includes:
and sending an instruction for indicating the monitoring equipment to output alarm prompt information to the monitoring equipment, wherein the alarm prompt information comprises at least one of sound prompt, light prompt and vibration prompt.
Optionally, the method further includes:
the method further comprises the following steps:
receiving a position prompt instruction sent by monitoring equipment;
and controlling the monitoring equipment to output position prompt information, wherein the position prompt information comprises at least one of sound prompt, light prompt and vibration prompt.
Optionally, the method further includes:
the method further comprises the following steps:
under the condition that the front image is matched with the prestored image and the state switching instruction is an instruction for switching from power-off to power-on, executing the operation of setting the authority of the target application as a default authority;
or executing shutdown operation under the condition that the front image is matched with the pre-stored image and the state switching instruction is an instruction for switching from startup to shutdown.
Optionally, the method further includes:
the method further comprises the following steps:
receiving a pressing operation of a power key of the monitored equipment;
when the operation duration of the pressing operation is longer than a set duration and the monitored equipment is in a power-off state, identifying the pressing operation as a state switching instruction for switching from power-off to power-on;
and when the operation duration of the pressing operation is longer than the set duration and the monitored equipment is in the power-on state, identifying the pressing operation as a state switching instruction for switching the power-on state to the power-off state.
According to a second aspect of the application, there is provided a monitoring device for an apparatus, comprising
The receiving module is used for receiving a state switching instruction;
the acquisition module is used for controlling the monitored equipment to acquire a front image;
the detection module is used for detecting whether the front image is matched with a pre-stored image;
the execution module is used for executing the target operation matched with the state switching instruction under the condition of no match;
wherein, in the case that the state switching instruction is an instruction for switching from shutdown to startup, the target operation includes: and setting at least one of that the target application in the monitored equipment cannot be started, does not display content after being started and can only be viewed.
According to a third aspect of the present application, there is provided a monitored device comprising the apparatus of the second aspect; alternatively, the first and second electrodes may be,
the system comprises a front camera, a memory and a processor, wherein the front camera is used for collecting front images, the memory is used for storing computer instructions, and the processor is used for calling the computer instructions from the memory so as to execute the method according to any one of the first aspect.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, realizes the method according to any one of the first aspects.
In the embodiment of the application, after the state switching instruction is received, the monitored equipment is controlled to collect the front image, and whether the front image is matched with the pre-stored image or not is detected. And under the condition of no match, the monitored equipment is shown to be owned by an illegal user, and the monitored equipment executes the target operation matched with the state switching instruction. Specifically, in a case where the state switching instruction is an instruction to switch from power off to power on, it indicates that an illegal user has a possibility of using the monitored device, and in this case, the target operation includes: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed. Thus, the target application can not be used, viewed or operated by illegal users. This greatly improves the security of the monitored equipment. Meanwhile, an illegal user can be prevented from being aware that the monitored equipment is in a monitoring state, so that sufficient time is provided for a legal user to protect the privacy and/or property of the legal user.
Further features of the present application and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which is to be read in connection with the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a block diagram of a hardware configuration of a monitored device for implementing a monitoring method of the device according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a monitoring method for a device according to an embodiment of the present disclosure;
FIG. 3 is a schematic structural diagram of a monitoring device of an apparatus according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a monitored device according to an embodiment of the present application.
Detailed Description
Various exemplary embodiments of the present application will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the application, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< hardware configuration embodiment >
Fig. 1 is a block diagram of a hardware configuration of a monitored device that implements a monitoring method of the monitored device according to an embodiment of the present application.
The monitored device 1000 may typically be a smartphone, a tablet, a smart watch, or the like.
The monitored device 1000 may include a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600, a speaker 1700, a microphone 1800, a front-facing camera 1900, and so forth.
The processor 1100 may be a central processing unit CPU, a microprocessor MCU, or the like. The memory 1200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, a USB interface, a headphone interface, and the like. Communication device 1400 is capable of wired or wireless communication, for example. The display device 1500 is, for example, a liquid crystal display panel, a touch panel, or the like. The input device 1600 may include, for example, a touch screen, a keyboard, and the like. A user can input/output voice information through the speaker 1700 and the microphone 1800.
Although a plurality of devices are shown in fig. 1 for each monitored apparatus 1000, the present application may only refer to some of the devices, for example, the monitored apparatus 1000 only refers to the front camera 1900, the memory 1200 and the processor 1100.
In an embodiment of the present application, the memory 1200 of the monitored device 1000 is used for storing instructions for controlling the processor 1100 to execute the monitoring method of the device provided in the embodiment of the present application.
In the above description, the skilled person can design the instructions according to the solution disclosed in the present application. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
< method examples >
The embodiment of the application provides a monitoring method of equipment, and an execution subject of the method can be the monitored equipment shown in fig. 1.
As shown in fig. 2, the monitoring method of the device provided in the embodiment of the present application includes the following steps S2100 to S2400:
and S2100, receiving a state switching instruction.
In the embodiment of the present application, the state switching includes: switching from power-on to power-off, and switching from power-off to power-on. Correspondingly, the state switching instruction comprises the following steps: the state switching instruction is switched from power-on to power-off, and the state switching instruction is switched from power-off to power-on.
In one embodiment of the present application, the monitored device may implement the identification of the received command to determine whether the status switching command is received according to the following S2110-S2112:
and S2110, receiving a pressing operation of a power key of the monitored equipment.
S2111, when the operation duration of the pressing operation is longer than the set duration and the monitored equipment is in the power-off state, the pressing operation is identified as a state switching instruction for switching from power-off to power-on.
S2112, when the operation duration of the pressing operation is longer than the set duration and the monitored equipment is in the power-on state, the pressing operation is recognized as a state switching instruction for switching the power-on state to the power-off state.
In this embodiment of the application, the preset time length is a minimum time length for pressing the power key when indicating the state switching of the monitored device.
In another embodiment of the present application, the monitored device may also implement recognition of the received command by software to determine whether the status switching command is received.
It should be noted that after the monitored device is illegally obtained by the illegal user, the illegal user generally controls the monitored device to perform the operation of switching the states, that is, when the monitored device is powered off, the monitored device is controlled to perform the power-on operation, or when the monitored device is powered on, the monitored device is controlled to perform the power-off operation.
And S2200, controlling the monitored equipment to acquire a front image.
In this embodiment of the present application, when the monitored device receives the state switching instruction, the monitored device first executes the above S2200. The specific implementation of S2200 may be: the monitored equipment starts a front camera of the monitored equipment, and a front image is collected by the front camera. It can be understood that the front image collected by the front camera of the monitored device includes the head portrait of the legal user or the illegal user who inputs the state switching instruction.
And S2300, detecting whether the front image is matched with a pre-stored image.
In the embodiment of the present application, the pre-stored image refers to the head portrait of a legal user who can use the monitored device. The pre-stored head portrait is at least one and is stored in the monitored equipment in advance. On the basis, the front image acquired by the front camera of the monitored equipment is matched with each pre-stored image, and if the pre-stored image does not have an image matched with the front image, the front image acquired by the front camera of the monitored equipment is determined not to be matched with the pre-stored image. Correspondingly, if the pre-stored image has an image matched with the front image collected by the front camera of the monitored equipment, determining that the front image collected by the front camera of the monitored equipment is matched with the pre-stored image.
And S2400, under the condition of no match, executing the target operation matched with the state switching instruction.
In the embodiment of the application, under the condition that the front image is not matched with the pre-stored image, it is determined that an illegal user inputs a state switching instruction, that is, the possibility that the illegal user uses the monitored equipment exists, at this time, it is determined that the monitored equipment enters a monitoring mode, and the monitored equipment executes different target operations according to different state switching instructions. Specifically, the method comprises the following steps:
under the condition that the state switching instruction is switched from shutdown to startup, the target operation comprises the following steps: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed.
The target application is an application specified in advance by a legal user of the monitored device, and is generally an application related to privacy and property of the legal user of the monitored device. Illustratively, the setting application may be an application for payment, a gallery, a memo, or the like. It should be noted that, a legitimate user of the monitored device can customize applications in the monitored device to customize which applications should be target applications, and which target application corresponding to the target operation is one of the target applications that cannot be started, that does not display content after being started, and that can only be viewed.
In the embodiment of the present application, when the state switching instruction is an instruction to switch from power-off to power-on, it indicates that an illegal user has a possibility of using the monitored device. At this time, the target application set by the monitored device cannot be started, does not display content after being started, can only be viewed, and the like. Thus, the target application can not be used, viewed or operated by illegal users. This greatly improves the security of the monitored equipment. Meanwhile, the situation that an illegal user perceives that the monitored equipment is in a monitoring state can be avoided, so that the illegal user is enabled to loose vigilance, and the legal user is given sufficient time to protect own privacy and/or property, for example, the legal user can freeze own payment account through other equipment in time.
In the embodiment of the application, after the state switching instruction is received, the monitored equipment is controlled to collect the front image, and whether the front image is matched with the pre-stored image or not is detected. And under the condition of no match, the monitored equipment is shown to be owned by an illegal user, and the monitored equipment executes the target operation matched with the state switching instruction. Specifically, in a case where the state switching instruction is an instruction to switch from power off to power on, it indicates that an illegal user has a possibility of using the monitored device, and in this case, the target operation includes: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed. Thus, the target application can not be used, viewed or operated by illegal users. This greatly improves the security of the monitored equipment. Meanwhile, an illegal user can be prevented from being aware that the monitored equipment is in a monitoring state, so that sufficient time is provided for a legal user to protect the privacy and/or property of the legal user.
In an embodiment of the present application, in a case that the state switching instruction is an instruction to switch from power on to power off, the target operation includes: displaying a shutdown picture, and controlling the screen of the monitored equipment to be in a screen-off state.
In this embodiment, it can be understood that, in the case that the state switching instruction is an instruction to switch from power on to power off, the monitored device executes a false power off operation, that is, seemingly, the monitored device is powered off, but actually, the monitored device is in a standby state, and still has a communication function, which provides a basis for controlling the monitored device through other devices to search for the monitored device.
In an embodiment of the present application, the monitoring method of the monitoring device provided in the embodiment of the present application further includes the following step S2500:
and S2500, sending any one of an alarm identifier matched with the state switching instruction, the current position of the monitored equipment, the track information of the monitored equipment and the current environment audio/video where the monitored equipment is located to the monitoring equipment.
In the embodiment of the application, the monitoring device is an electronic device which is bound with the monitored device in advance and can be communicated with the monitored device. In one example, the monitoring device may be a smart watch or smart phone, or the like.
In the embodiment of the application, a legal user can know whether a state switching instruction executed by the illegal user on the monitored equipment is switched from power-off to power-on or from power-on to power-off by receiving the alarm identifier sent by the monitored equipment through the monitoring equipment.
And the legal user can know the current position of the monitored device by receiving the current position sent by the monitored device through the monitoring device, so that the legal user can be helped to quickly find the monitored device. The monitored equipment can start the positioning function of the monitored equipment to acquire the current position and send the current position to the monitoring equipment.
And the legal user can know the track of the monitored equipment by receiving the track information sent by the monitored equipment through the monitoring equipment, so that the legal user can be further helped to quickly find the monitored equipment. The monitored equipment can start a track recording function of the monitored equipment to acquire track information and send the track information to the monitoring equipment.
And a legal user can know the video and the sound of the current environment of the monitored device by receiving the audio and video of the current environment sent by the monitored device through the monitoring device, so that the legal user can be further helped to quickly find the monitored device. The monitored equipment can turn on a front camera and/or a rear camera of the monitored equipment to acquire the video of the current environment, and can turn on a microphone of the monitored equipment to acquire the audio of the current environment.
The transmission in S2500 may be: the transmission is periodically active after determining that the front image does not match the pre-stored image, or passive upon receiving an indication from the monitoring device.
On the basis of the embodiment shown in S2500, the monitoring method of the monitoring device provided in the embodiment of the present application further includes the following S2600:
s2600, sending an instruction for instructing the monitoring equipment to output alarm prompt information to the monitoring equipment, wherein the alarm prompt information comprises at least one of a sound prompt, a light prompt and a vibration prompt.
In this embodiment of the present application, after the foregoing S2500 is executed, an instruction instructing the monitoring device to output an alarm prompt message is sent to the monitoring device. And under the condition that the monitoring equipment receives the instruction, the monitoring equipment can output at least one of a sound prompt, a light prompt and a vibration prompt. Therefore, the legal user can timely know that the monitored equipment is obtained by the illegal user.
It should be noted that the monitoring device specifically outputs one of a voice prompt, a light prompt and a vibration prompt, and the monitoring device can be customized by a legal user in advance. In addition, the voice prompt of "the monitored equipment is lost" can be output through the loudspeaker of the monitoring equipment to realize the sound prompt, the flash lamp of the monitored equipment can flash to realize the light prompt, and the motor of the monitored equipment can vibrate to realize the vibration prompt.
On the basis of the embodiment shown in S2400, the monitoring method of the monitoring device provided in the embodiment of the present application further includes the following steps S2710 and S2711:
s2710, receiving a position prompt instruction sent by the monitoring equipment.
S2711, controlling the monitoring equipment to output position prompt information, wherein the position prompt information comprises at least one of sound prompt, light prompt and vibration prompt.
In an embodiment of the application, a legal user searches for a monitored device, and in the searching process, the legal user can send a position prompting instruction to the monitored device through the monitoring device to indicate the monitored device to prompt the position of the monitored device. At the moment, the monitored equipment outputs position prompt information, wherein the position prompt information comprises any one of sound prompt, light prompt and vibration prompt. Thus, the monitored device can be found by a legal user even if the monitored device is in a hidden place.
It should be noted that the position prompt information is specifically one of an output sound prompt, a light prompt and a vibration prompt, and can be defined by a legal user in advance. In addition, the voice such as "i am here" may be output through the speaker of the monitored device to realize the above-mentioned sound prompt, the flash lamp of the monitored device may flash to realize the above-mentioned light prompt, and the motor of the monitored device may vibrate to realize the above-mentioned vibration prompt.
In an embodiment of the present application, corresponding to the foregoing S2400, the method for monitoring a device according to the embodiment of the present application further includes the following S2800:
s2800, when the front image is matched with the pre-stored image and the state switching instruction is switched from power-off to power-on, executing the operation of setting the authority of the target application as the default authority; or, under the condition that the front image is matched with the pre-stored image and the state switching instruction is an instruction for switching from power-on to power-off, the power-off operation is executed.
In the embodiment of the present application, in the case that the front image matches the predicted image, it is determined that the state switching instruction is input by a legitimate user of the monitored device, that is, the monitored device is owned by the legitimate user. On the basis, under the condition that the state switching instruction is an instruction for switching from power-on to power-off, the monitored equipment executes power-off operation. Correspondingly, under the condition that the state switching instruction is switched from shutdown to startup, the operation that the authority of the target application of the device is the default authority is executed, so that the target application can be freely used by a legal user. The default permission is a normal permission of the target application, and the default permission can be opened, and after the default permission is opened, the content of the corresponding application can be displayed, the operation can be executed on the application, and the like.
In the embodiment of the application, when the monitored equipment is owned by a legal user, the user can freely use the monitored equipment.
< apparatus embodiment >
The embodiment of the present application provides a monitoring apparatus 300 for a device, as shown in fig. 3, the apparatus 300 includes: a receiving module 310, a control module 320, a detection module 330, and an execution module 340.
Wherein:
the receiving module 310 is configured to receive a state switching instruction.
The control module 320 is used for controlling the monitored equipment to acquire the front image.
The detection module 330 is configured to detect whether the front image matches a pre-stored image.
The execution module 340 is configured to execute the target operation matched with the state switching instruction if the target operation is not matched with the state switching instruction.
Wherein, in the case that the state switching instruction is an instruction for switching from shutdown to startup, the target operation includes: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed.
In one embodiment, in the case that the state switching instruction is an instruction to switch from power on to power off, the target operation includes: displaying a shutdown picture, and controlling the screen of the monitored equipment to be in a screen-off state.
In one embodiment, the monitoring apparatus 300 of the device further comprises a transmitting module. The sending module is used for sending any one of an alarm identifier matched with the state switching instruction, the current position of the monitored equipment, the track information of the monitored equipment and the current environment audio/video where the monitored equipment is located to the monitoring equipment.
In one embodiment, the sending module is further configured to send, to the monitoring device, an instruction instructing the monitoring device to output an alarm prompt message, where the alarm prompt message includes at least one of a sound prompt, a light prompt, and a vibration prompt.
In one embodiment, the receiving module 310 is further configured to receive a location prompt instruction sent by the monitoring device.
The control module 320 is further configured to control the monitoring device to output location prompt information, where the location prompt information includes at least one of a sound prompt, a light prompt, and a vibration prompt.
In an embodiment of the application, the executing module 340 is further configured to execute an operation of setting the authority of the target application as a default authority when the front image is matched with the pre-stored image and the state switching instruction is an instruction to switch from power-off to power-on; or executing shutdown operation under the condition that the front image is matched with the pre-stored image and the state switching instruction is an instruction for switching from startup to shutdown.
In one embodiment of the present application, the receiving module 310 includes a receiving unit and a determining unit. The receiving unit is used for receiving the pressing operation of the power key of the monitored equipment.
The determining unit is used for identifying the pressing operation as a state switching instruction for switching from power-off to power-on under the condition that the operation duration of the pressing operation is greater than a set duration and the monitored equipment is in a power-off state; and when the operation duration of the pressing operation is longer than the set duration and the monitored equipment is in the power-on state, identifying the pressing operation as a state switching instruction for switching the power-on state to the power-off state.
< apparatus embodiment >
The embodiment of the present application provides a monitored device 1000, and the monitored device 400 includes the monitoring apparatus 300 of any one of the apparatuses provided in the above apparatus embodiments.
Alternatively, the system comprises a front camera 1900 for capturing front images, a memory 1200 for storing computer instructions, and a processor 1100 for calling the computer instructions from the memory 1200 to execute any one of the methods provided by the above method embodiments.
< storage Medium embodiment >
Embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the method according to any one of the method embodiments provided above.
The present application may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present application.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present application may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry can execute computer-readable program instructions to implement aspects of the present application by utilizing state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present application, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terms used herein were chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the techniques in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the application is defined by the appended claims.

Claims (10)

1. A monitoring method of equipment, which is applied to monitored equipment and comprises the following steps:
receiving a state switching instruction;
controlling the monitored equipment to acquire a front image;
detecting whether the front image is matched with a pre-stored image;
if the state switching instruction does not match with the target operation, executing the target operation matched with the state switching instruction;
wherein, in the case that the state switching instruction is an instruction for switching from shutdown to startup, the target operation includes: and setting any one of the target application in the monitored equipment which cannot be started, does not display content after being started and can be only viewed.
2. The method according to claim 1, wherein in the case that the state switching instruction is an instruction to switch from power-on to power-off, the target operation comprises: displaying a shutdown picture, and controlling the screen of the monitored equipment to be in a screen-off state.
3. The method of claim 1, further comprising:
and sending any one of an alarm identifier matched with the state switching instruction, the current position of the monitored equipment, the track information of the monitored equipment and the current environment audio/video where the monitored equipment is located to the monitoring equipment.
4. The method of claim 3, further comprising:
and sending an instruction for indicating the monitoring equipment to output alarm prompt information to the monitoring equipment, wherein the alarm prompt information comprises at least one of sound prompt, light prompt and vibration prompt.
5. The method of claim 1, further comprising:
receiving a position prompt instruction sent by monitoring equipment;
and controlling the monitoring equipment to output position prompt information, wherein the position prompt information comprises at least one of sound prompt, light prompt and vibration prompt.
6. The method of claim 1, further comprising:
under the condition that the front image is matched with the prestored image and the state switching instruction is an instruction for switching from power-off to power-on, executing the operation of setting the authority of the target application as a default authority;
or executing shutdown operation under the condition that the front image is matched with the pre-stored image and the state switching instruction is an instruction for switching from startup to shutdown.
7. The method of claim 1, further comprising:
receiving a pressing operation of a power key of the monitored equipment;
when the operation duration of the pressing operation is longer than a set duration and the monitored equipment is in a power-off state, identifying the pressing operation as a state switching instruction for switching from power-off to power-on;
and when the operation duration of the pressing operation is longer than the set duration and the monitored equipment is in the power-on state, identifying the pressing operation as a state switching instruction for switching the power-on state to the power-off state.
8. A monitoring device for equipment is characterized by comprising
The receiving module is used for receiving a state switching instruction;
the acquisition module is used for controlling the monitored equipment to acquire a front image;
the detection module is used for detecting whether the front image is matched with a pre-stored image;
the execution module is used for executing the target operation matched with the state switching instruction under the condition of no match;
wherein, in the case that the state switching instruction is an instruction for switching from shutdown to startup, the target operation includes: and setting at least one of that the target application in the monitored equipment cannot be started, does not display content after being started and can only be viewed.
9. A monitored device, comprising the apparatus of claim 8; alternatively, the first and second electrodes may be,
comprising a front camera for acquiring a front image, a memory for storing computer instructions, and a processor for invoking the computer instructions from the memory to perform the method of any one of claims 1-7.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202011522529.1A 2020-12-21 2020-12-21 Equipment monitoring method, device, equipment and storage medium Pending CN112580008A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011522529.1A CN112580008A (en) 2020-12-21 2020-12-21 Equipment monitoring method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011522529.1A CN112580008A (en) 2020-12-21 2020-12-21 Equipment monitoring method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112580008A true CN112580008A (en) 2021-03-30

Family

ID=75136507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011522529.1A Pending CN112580008A (en) 2020-12-21 2020-12-21 Equipment monitoring method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112580008A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015228219A (en) * 2014-05-30 2015-12-17 神盾股▲ふん▼有限公司 Electronic apparatus and fingerprint recognition method
CN106485121A (en) * 2016-09-29 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application management
CN207489014U (en) * 2017-11-30 2018-06-12 郑志刚 A kind of computer security encryption system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015228219A (en) * 2014-05-30 2015-12-17 神盾股▲ふん▼有限公司 Electronic apparatus and fingerprint recognition method
CN106485121A (en) * 2016-09-29 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application management
CN207489014U (en) * 2017-11-30 2018-06-12 郑志刚 A kind of computer security encryption system

Similar Documents

Publication Publication Date Title
US10885218B2 (en) Privacy protection method and terminal device
EP3242195B1 (en) Control implementation method and apparatus for intelligent hardware device
RU2669682C2 (en) Method and device for determination of the control authorities of the user device
EP3246886A1 (en) Alarm method and device, control device and sensing device
US20160269527A1 (en) Methods and apparatuses for binding with device
EP3151117B1 (en) Method and device for delaying information broadcasting
US10610152B2 (en) Sleep state detection method, apparatus and system
KR102515769B1 (en) Method and apparatus for identifying type of electronic device on smart socket
US20170126826A1 (en) Method and device for presenting push notifications
US10174965B2 (en) Methods and apparatuses for switching state
CN106664301B (en) Mobile device and control method thereof
EP3076745B1 (en) Methods and apparatuses for controlling wireless access point
CN105160239A (en) Application program access restriction method and apparatus
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
CN105607834A (en) Screen control method and apparatus as well as terminal
EP3435349A1 (en) Method and apparatus for processing network failure
TWI761843B (en) Access control method and device, electronic device and storage medium
CN104580730A (en) Alarm clock prompting method and device
CN104717622A (en) Information forwarding method and device, terminal and server
CN105487857A (en) Method and apparatus for prompting image shooting part to be started
EP3226128B1 (en) Method and device for online payment
CN106790018B (en) Resource sharing playing method and device
US9721454B2 (en) Method for protecting terminal devices and the terminal device thereof
CN105430639A (en) Information processing method and device
CN105303120A (en) Short message reading method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210330