CN115052065B - Watch anti-drop method and device, anti-drop watch and storage medium - Google Patents

Watch anti-drop method and device, anti-drop watch and storage medium Download PDF

Info

Publication number
CN115052065B
CN115052065B CN202210925446.XA CN202210925446A CN115052065B CN 115052065 B CN115052065 B CN 115052065B CN 202210925446 A CN202210925446 A CN 202210925446A CN 115052065 B CN115052065 B CN 115052065B
Authority
CN
China
Prior art keywords
watch
environment
authentication
information
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210925446.XA
Other languages
Chinese (zh)
Other versions
CN115052065A (en
Inventor
周凌云
程黎辉
关亚东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang Longqi Information Technology Co ltd
Original Assignee
Nanchang Longqi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang Longqi Information Technology Co ltd filed Critical Nanchang Longqi Information Technology Co ltd
Priority to CN202210925446.XA priority Critical patent/CN115052065B/en
Publication of CN115052065A publication Critical patent/CN115052065A/en
Application granted granted Critical
Publication of CN115052065B publication Critical patent/CN115052065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/724094Interfacing with a device worn on the user's body to provide access to telephonic functionalities, e.g. accepting a call, reading or composing a message
    • H04M1/724095Worn on the wrist, hand or arm
    • GPHYSICS
    • G04HOROLOGY
    • G04GELECTRONIC TIME-PIECES
    • G04G21/00Input or output devices integrated in time-pieces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application provides a watch anti-drop method, device, anti-drop watch and storage medium, and relates to the technical field of intelligent watches. The method comprises the following steps: acquiring action information of the watch detached; under the condition that the environment type of the watch is an unsafe environment, authenticating the action information through a pre-configured authentication mechanism to obtain an authentication result; triggering an anti-detaching mechanism under the condition that the authentication result is illegal authentication; wherein, the anti-detaching mechanism comprises: the method comprises the steps of obtaining environment monitoring information of a watch, carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information, receiving a control instruction sent by a manager through the terminal under the condition of environment abnormality, controlling the watch to enter a virtual shutdown state based on the control instruction, and controlling a lock catch on a watch band of the watch to be in a locking state. The watch can be effectively prevented from being illegally detached by the mode, and the safety of the watch is improved.

Description

Watch anti-drop method and device, anti-drop watch and storage medium
Technical Field
The application relates to the technical field of intelligent watches, in particular to a watch anti-falling method, a watch anti-falling device, an anti-falling watch and a storage medium.
Background
After the intelligent wearable equipment enters the field of view of the public, the demands of users on the electronic products are more and more diversified and personalized. As a common smart wearable device, a smart watch can detect physiological features and motion features of a wearer, so that related products thereof have become more and more popular in all user groups. The primary function of a child watch is to prevent it from getting lost for a particular user group, such as a child, but the child watch has the possibility of being detached by the child itself or of being forcibly detached by another person, so that the child's anti-lost function cannot be truly achieved. For example, the old people, the main function of the watch is to monitor the physiological characteristics of the old people, but part of the old people have cerebral diseases and weak autonomous capacity, and the old people can take the action of unconsciously detaching the device, so the watch has the defect of incapability of real-time monitoring.
In order to prevent the smart watch from being detached by the wearer at will, an anti-slip watch has been developed. The anti-drop function of the anti-drop watch in the current market is realized by the mechanical structure of the watchband or a simple authentication mode.
Whether mechanical or simple authentication, multiple attempts by an illegal user can easily result in easy hacking, for example: under the condition that the authentication mode is password authentication, because the combination quantity of the passwords is limited, an illegal user can attempt to unlock the lock catch through inputting different passwords for a plurality of times, and further illegal detachment of the watch is easy to achieve, so that the prior art has the defect that the watch cannot be completely prevented from being illegally detached.
Disclosure of Invention
The application provides an anti-falling method and device for a watch, an anti-falling watch and a storage medium, and aims to solve the problem that the watch is easy to illegally disassemble.
According to a first aspect of the present application, there is provided a watch anti-disengaging method, including:
acquiring action information of the watch detached;
under the condition that the environment type of the watch is an unsafe environment, authenticating the action information through a pre-configured authentication mechanism to obtain an authentication result;
triggering an anti-detaching mechanism under the condition that the authentication result is illegal authentication;
wherein, the anti-detaching mechanism comprises: the method comprises the steps of obtaining environment monitoring information of a watch, carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information, receiving a control instruction sent by a manager through the terminal under the condition of environment abnormality, controlling the watch to enter a virtual shutdown state based on the control instruction, and controlling a lock catch on a watch band of the watch to be in a locking state.
According to a second aspect of the present application, there is provided a wristwatch anti-drop device comprising:
the acquisition module is used for acquiring action information of the detached watch;
the authentication module is used for authenticating the action information through a pre-configured authentication mechanism under the condition that the environment type of the watch is an unsafe environment, so as to obtain an authentication result;
The triggering module is used for triggering an anti-detaching mechanism under the condition that the authentication result is illegal authentication;
wherein, the anti-detaching mechanism comprises: the method comprises the steps of obtaining environment monitoring information of a watch, carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information, receiving a control instruction sent by a manager through the terminal under the condition of environment abnormality, controlling the watch to enter a virtual shutdown state based on the control instruction, and controlling a lock catch on a watch band of the watch to be in a locking state.
According to a third aspect of the present application, there is provided an anti-drop watch comprising: a watch body and a watch band, said watch band incorporating at least one processor and memory; the memory stores computer-executable instructions; the at least one processor executes computer-executable instructions stored by the memory, causing the at least one processor to perform the watch anti-slip method as described in the first aspect above.
According to a fourth aspect of the present application, there is provided a computer readable storage medium having stored therein computer executable instructions for implementing the watch anti-slip method according to the first aspect above when executed by a processor.
According to the watch anti-drop method, the watch anti-drop device, the anti-drop watch and the storage medium, on one hand, the authentication mechanism in the watch is preset and configured, so that the authentication mode selected for use is effective and is not easy to determine for an illegal user; in the second aspect, the anti-disengagement mechanism is specifically configured as follows: the environment monitoring information is communicated with the manager/guardian, so that the manager/guardian can judge whether the environment of the watch wearer is abnormal, and under the condition that the environment is abnormal, the watch is controlled to enter a virtual power-off state. The environment abnormality indicates that the watch is illegally detached, so that when the watch is illegally detached, a protection function can be provided for a watch wearer by controlling the watch to enter a virtual power-off state.
It should be understood that the description of this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of an application scenario according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a watch anti-disengaging method according to an embodiment of the present application;
fig. 3 is a schematic flow chart of another watch anti-disengaging method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a watch anti-disengaging device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an anti-disengaging watch according to an embodiment of the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application.
For easy understanding, first, an application scenario of the embodiment of the present application will be described.
Fig. 1 is a schematic diagram of an application scenario according to an embodiment of the present application. As shown in fig. 1, the application scenario of the present embodiment relates to a specific application scenario of the anti-drop watch, including but not limited to: the scene that children wear this anticreep wrist-watch at home, the scene that children wear this anticreep wrist-watch in the open air etc..
However, the same anti-disengaging method is designed under different application scenes in the prior art, and is realized through the mechanical structure of the watchband or a simple authentication mode, so that the disadvantage that the watch cannot be completely prevented from being illegally disengaged exists.
In order to solve at least one of the above technical problems, an embodiment of the present application provides a watch anti-disengaging method, an apparatus, an anti-disengaging watch and a storage medium, which are applied to the field of smart watches and used for solving the technical problem that the watch is easy to be illegally disengaged.
The overall inventive concept of the present application is as follows: according to the watch anti-falling method, the device, the anti-falling watch and the storage medium, the anti-falling method under the scene that the environment type of the watch is the unsafe environment is limited, and the anti-falling method is not suitable for the scene of the safe environment. In the non-safety environment, on one hand, the authentication mechanism in the application is preset and configured, so that the selected authentication mode is effective and is not easy to determine for illegal users; in the second aspect, the anti-disengagement mechanism is specifically configured as follows: the environment monitoring information is communicated with the manager/guardian, so that the manager/guardian can judge whether the environment of the watch wearer is abnormal, and under the condition that the environment is abnormal, the watch is controlled to enter a virtual power-off state. The environment abnormality indicates that the watch is illegally detached, so that when the watch is illegally detached, a protection function can be provided for a watch wearer by controlling the watch to enter a virtual power-off state.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following specific embodiments may be combined with each other and may not be described in detail in some embodiments for the same or similar concepts or processes. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a schematic flow chart of a watch anti-disengaging method according to an embodiment of the present application. As shown in fig. 2, the method of the present embodiment is applied to a processor with a built-in watchband, and includes:
s201: and acquiring action information of the watch detached.
The above processor may be understood as a boot management chip. The watch band has a built-in processor and a memory or other device. The watch comprises means for at least one of: WIFI device, recording device, video recording device, positioner, power storage device, display device, voice interaction module, fingerprint identification ware, microphone (MIC) and speaker, and this application embodiment is all not specifically limited to the device type that this wrist-watch carried, the device position. The video recording device can refer to a camera with a rotation function, the positioning device can refer to a GPS (global positioning system) positioner, the watch can be provided with a SIM (Subscriber Identity Module, user identity) card, and the watch can be in communication interaction with a terminal authorized to manage the watch in a network connection mode. The above-mentioned display means can be understood as a screen for displaying a detachable watch menu, alternatively called a detachable function menu, from which a pre-configuration of the authentication mechanism can be made. The action information may refer to action information of a user pressing a key (or called a release button), which indicates that an action of releasing the wristwatch occurs. Further, the present application may provide a detachable location on the wristband and position the key on the wristband. Since the watch is to be detached by the key to identify the detaching action, the current detaching action can be determined by the action information of the key, and whether the detaching action is legal or not can be judged by combining the action of judging whether the watch is authenticated or not before detaching.
S202: and under the condition that the environment type of the watch is an unsafe environment, authenticating the action information through a pre-configured authentication mechanism to obtain an authentication result.
It should be understood that the type of environment in which the watch is located includes non-secure environments and secure environments. The embodiment of the present application may determine the environment type of the watch through the network connection information of the watch and the network in the preset security area, and the specific operation is as follows S204, which is not described herein. In addition, the embodiment of the application can also judge the environment type of the watch by judging whether the wearer exceeds the monitoring range of the guardian, namely, the environment type of the watch is judged to be an unsafe environment if the wearer exceeds the monitoring range of the guardian. Under the condition that the environment type of the watch is an unsafe environment, an authentication process is started, wherein the authentication process is as follows: and authenticating the action information through a pre-configured authentication mechanism to obtain an authentication result. The authentication mechanism includes an authentication scheme of at least one of: password authentication, fingerprint authentication, voice authentication, network video authentication, and multi-person network authorization authentication. The selection operation of the above-mentioned various authentication methods is as follows S205 to S206. The authentication mechanism is set in advance by the manager/guardian/contact person, and the number of the manager/guardian/contact person can be multiple. The embodiment of the application can set different authorities for a plurality of guardianship, for example: guardianship A has the authority of selecting watch authentication mode, guardianship B has the authority of controlling the hasp unblock.
Before the watch is detached, the authentication process is required to be executed, in the process of executing the authentication process, the detaching mode is required to be selected from the watch detaching menu of the watch, then authentication is carried out according to a pre-configured authentication mechanism, in the case that the authentication result is legal authentication, the detaching process is started, and finally the lock catch is unlocked, so that the watch is in a detachable state. Since an illegal user cannot determine which authentication method is a pre-configured authentication mechanism, the situation of an authentication method error occurs with a high probability, or even if the illegal user selects the pre-configured authentication mechanism, the situation of an authentication content error occurs, and therefore, in either case, the authentication result is judged to be illegal authentication. Therefore, the embodiment of the application increases the difficulty of unlawfully unlocking the lock catch by an unlawful user.
S203: triggering an anti-detaching mechanism under the condition that the authentication result is illegal authentication; wherein, the anti-detaching mechanism comprises: the method comprises the steps of obtaining environment monitoring information of a watch, carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information, receiving a control instruction sent by a manager through the terminal under the condition of environment abnormality, controlling the watch to enter a virtual shutdown state based on the control instruction, and controlling a lock catch on a watch band of the watch to be in a locking state.
In this embodiment of the present application, besides the anti-detachment mechanism, an allowable detachment mechanism is further provided, specifically, the anti-detachment mechanism is triggered when the authentication result is illegal authentication, and in other cases, the allowable detachment mechanism may be triggered, and a specific scenario of triggering the allowable detachment mechanism and a specific operation under the mechanism are described in S303 in the following embodiments, which are not described herein. The embodiment of the application can set a plurality of different mechanisms according to actual requirements. A terminal authorized to manage the watch may refer to a contact's mobile phone. The environment monitoring information can effectively send the information acquired at the first time to a mobile phone of a preset contact person in time, and prompt the contact person to process immediately. The environmental anomaly may refer to: the environment record collected by the recording device has crying and help seeking sounds of the wearer and the like.
The virtual off state is similar to the lock screen state, and is a form of watch. The watch in the virtual power-off state can display the prompt information of 'electric quantity shortage', 'power-off state', and enter a black screen state after displaying for a period of time, even if a user performs any operation on a power key of the watch, the black screen state cannot be released, however, devices such as a recording device, a video recording device and a positioning device of the watch in the virtual power-off state still operate in the background, so that environment monitoring information can still be timely sent to a contact person, and the contact person can acquire the environment monitoring information around the watch in real time. The manager can remotely control the watch to start the virtual power-off function, so that the watch enters a virtual power-off state, and in the state, an illegal person can mistakenly power off the watch, and the watch is in an unusable state. The lock catch in the virtual shutdown state is in the locking state, so that the watch is in the anti-disassembling locking state, and the watch can be ensured not to be forcibly disassembled by an illegal user.
According to the watch anti-drop method provided by the embodiment of the application, on one hand, the authentication mechanism in the application is preset and configured, so that the authentication mode which is selected to be effective is not easy to determine for an illegal user; in the second aspect, the anti-disengagement mechanism is specifically configured as follows: the environment monitoring information is communicated with the manager/guardian, so that the manager/guardian can judge whether the environment of the watch wearer is abnormal, and under the condition that the environment is abnormal, the watch is controlled to enter a virtual power-off state. The environment abnormality indicates that the watch is illegally detached, so that when the watch is illegally detached, a protection function can be provided for a watch wearer by controlling the watch to enter a virtual power-off state.
In a possible implementation manner, before the step S202 of authenticating the action information by using a pre-configured authentication mechanism, the method further includes:
S204: and acquiring network connection information of the watch and a network in a preset safety area, and determining the environment type of the watch according to the network connection information.
The embodiment of the application can set one or more preset safety areas for the same wearer. The preset safety area may be set according to actual situations, for example: the area corresponding to the home address of the wearer, the class address of the wearer, the frequent activity area of the wearer, etc. The network connection information includes: connection information of whether to connect to a network within a preset security area. For example: when the wearer is at home, the wearer can be connected to the home network, so that the environment type of the watch can be determined to be a safe environment; when the wearer is not at home, the wearer cannot connect to the home network, and thus can determine that the type of environment in which the wristwatch is located is an unsafe environment. In an unsafe environment, the method for positioning by the GPS positioning device and the method for connecting and scanning by the WIFI module determine the environment type of the watch, and perform different processing on scenes under different environment types.
The connection distance of the mobile hotspot WIFI is currently approximately 10-20 meters, and if the wearer has left home and is very close to home, this situation can be determined to be at home, that is, even if the home network can be connected. In another possible implementation manner, the above situation may also be determined to be not in the home, and the specific implementation manner is as follows: the network connection information further includes: signal strength information for connecting to a network within a preset security area. And judging that the watch is at home when the watch is connected with WIFI in home and the WIFI signal intensity is more than 2 grids (or more than 40%).
In a possible implementation manner, the obtaining environmental monitoring information of the watch includes:
the monitoring device of the watch is controlled to monitor the environment to obtain environment monitoring information, wherein the environment monitoring information comprises at least one of environment recording, environment video or positioning information.
When the environment type of the watch is an unsafe environment, the watch is detached, whether an authentication result is illegal authentication is judged, and an anti-detaching mechanism is triggered under the condition that the authentication result is illegal authentication, specifically, an environment monitoring flow is started for acquiring environment monitoring information, namely, a microphone is started for recording environment sound to obtain environment record; starting a camera to monitor the environment to obtain an environment video; and starting the positioning device to position the watch to obtain positioning information. And uploading the environment monitoring information to a server for storage, and processing through preset contacts. Under the condition of abnormal environment, the contact person can remotely control the watch to enter a virtual power-off state through the terminal authorized to manage the watch, and the lock catch on the watch band is controlled to be in a locking state. Even if the person is intentionally and illegally detached, the watch can be ensured to be successfully detached without being illegally detached, and further the safety of the watch is ensured.
In a possible implementation manner, the anti-detachment mechanism further includes:
and displaying preset prompt information through a display device of the watch in the process of controlling the watch to enter a virtual power-off state based on the control instruction.
It should be appreciated that, in addition to being able to control the watch to enter a virtual off state, the contact may also control the watch to perform any personalized operation by means of control instructions, such as: the prompt messages of 'electric quantity shortage' and 'shutdown in process' are displayed, so that illegal users can misunderstand that the watch is shut down, and finally the screen is black, and the watch of the wearer is not forced to be separated. It should be noted that, the environmental monitoring process of the watch in the virtual power-off state is still in the execution process, so that even if the watch enters the virtual power-off state, the environmental monitoring information around the watch can still be timely sent to the contact, so that the contact can clearly determine the environmental monitoring information around the watch.
In a possible implementation manner, the anti-detachment mechanism further includes: and under the condition that the environment is normal, receiving a marking instruction sent by the manager through the terminal, and marking the action information as misoperation information based on the marking instruction.
It should be understood that the embodiment of the application can be combined with the environmental monitoring information to perform judgment, so as to obtain a result of normal environment or abnormal environment. For example: the environment type of the watch of the wearer can be judged to be a safe environment through the positioning information, and whether a familiar person exists around the wearer can be identified through the recording device and the video device, and the sound color and the face image of the familiar person are stored in the watch in advance. The contact in the embodiment of the application can also determine the environmental condition of the watch through a telephone chat mode. In the case where the environment is normal, the determination is an erroneous operation. Therefore, the embodiment of the application corresponds to different anti-disengagement mechanisms under different scenes such as abnormal environment, normal environment and the like in the unsafe environment.
In a possible implementation manner, the watch anti-disengaging method further includes:
s205: providing an authentication mode for a user through a detachable watch menu on a display device of the watch, wherein the authentication mode comprises at least one of the following steps: password authentication, fingerprint authentication, voice authentication, network video authentication and multi-user network authorization authentication;
s206: and determining at least one of password authentication, fingerprint authentication, voice authentication, network video authentication and multi-user network authorization authentication as a pre-configured authentication mechanism according to the selection instruction input by the user.
According to the embodiment of the application, when the watch is used for the first time, a preset authentication mode needs to be authenticated, and a pre-configured authentication mechanism is further determined. The embodiment of the application specifically introduces the various authentication modes: (1) password authentication: the password authentication function can support two password authentication unlocking modes, wherein the watch is in a detachable state after the password 1 is correctly input. After the password 2 is input correctly, the watch prompts the low-power shutdown, simultaneously starts the environment monitoring flow and immediately informs the contact person. Namely, the password 2 has an alarm function, the watch is in a fake shutdown state, and the background of the watch monitors the current environment in real time and uploads the current environment to the server. If the password is input incorrectly, continuing to execute the environment monitoring flow and informing the contact person in time; (2) fingerprint authentication: placing a finger on the fingerprint identifier, and after the authentication is passed, informing the watch to unlock the watchband lock catch so as to enable the watch to be in a detachable state; (3) voice authentication: the unlocker sounds the watch: the watch is allowed to be detached, the watch uses the currently acquired information as recorded sound to be matched with preset sound through a voice interaction module, and the watch is in a detachable state after the matching is successful; (4) network video authentication: the watch directly dials the video telephone of the contact person, the contact person can be authenticated remotely, and the watch is in a detachable state after authentication is successful; (5) The network of many people authorizes authentication, and the wrist-watch sends authentication information to preset contact person (can be one or more, at most five people) simultaneously, and after all agrees, the wrist-watch is in detachable state.
Besides the five authentication modes, the embodiment of the application can also provide a plurality of authentication modes such as face image authentication, two-dimension code scanning authentication, graphic authentication, facial expression authentication and the like. In addition, the embodiment of the application can effectively combine different authentication modes, and the authentication result is determined to be legal authentication under the condition that the combined multiple authentication modes pass.
In a specific embodiment, the wearer clicks the option of the detachment authentication in the detachment watch menu of the watch, and selects the multi-person network authorization authentication in the detachment authentication, at this time, the watch sends an authentication request to the preset contacts, and simultaneously displays the authentication state of each contact in real time at the watch end, after the contacts receive the authentication request, the environment state of the wearer can be confirmed by remotely opening the watch microphone and the camera of the wearer, and simultaneously, telephone communication can be performed with the wearer, and when the detachment behavior is confirmed to be normal, the contacts initiate notification of authentication passing to the server, and when all the contacts pass authentication, the watch can enter the detachable state.
In the technical scheme, the setting of multiple authentication modes can meet the personalized authentication requirements of different users and the customer requirements of effectively legal detachment.
Based on the above embodiments, the technical solutions of the present application will be described in more detail below in conjunction with specific embodiments.
Fig. 3 is a flow chart of another watch anti-disengaging method according to an embodiment of the present application. The scenario of fig. 3 differs from the scenario in fig. 2, fig. 2 being a specific operation in an unsecure environment, and fig. 3 being a specific operation in a secure environment. As shown in fig. 3, the method of the present embodiment includes:
s301: acquiring action information of the watch detached;
it should be understood that the specific implementation of S301 is similar to S201 in fig. 2, and will not be described here.
S302: acquiring network connection information of a watch and a network in a preset safety area, and determining the environment type of the watch according to the network connection information;
it should be understood that the specific implementation of S302 is similar to S204, and will not be described here.
S303: and under the condition that the environment type of the watch is a safe environment, triggering an allowable detaching mechanism under the condition that the residual electric quantity of the watch is smaller than or equal to a preset threshold value, wherein the allowable detaching mechanism is used for controlling a lock catch on a watch band to be in an unlocking state based on the action information so that the watch is in a detachable state.
Specific values of the preset threshold value are not particularly limited, and may be 10%,20%, or the like. In a secure environment, the wearer is able to connect to a network within a preset secure area. Under the condition of insufficient electric quantity, by executing the operation of S303, the embodiment of the application can omit an unnecessary authentication process in a safety environment, and can be convenient for a wearer to detach under the condition of insufficient electric quantity of the watch so as to charge the watch.
In case of an emergency scenario, an allow detachment mechanism may also be triggered. The emergency scene conditions include at least one of the following: in a scene of serious heating of the watch, the watch acquires the temperature of the watch in real time through the heat sensor, and when the temperature reaches a preset threshold value, the watch sends out overheat information of the watch to the lock catch management chip, and triggers an allowable detaching mechanism so that the lock catch management chip unlocks the lock catch and a wearer can detach the watch normally; the watch is in a dead halt scene, the adopted principle is that a lock catch management chip is arranged in a watchband, a watch main body needs to communicate with the lock catch management chip of the watchband once every 1 second, and when the lock catch management chip fails to receive a communication request of the watch for 5 seconds continuously, the watch is indicated to have abnormal conditions such as dead halt, and then a detachment permission mechanism is triggered.
Further, under the condition that the environment type of the watch is a safe environment, and the residual electric quantity of the watch is larger than a preset threshold value, authenticating the action information through a pre-configured authentication mechanism to obtain an authentication result;
and triggering an allowable detaching mechanism under the condition that the authentication result is legal authentication.
According to the embodiment of the application, the anti-detachment mechanism is triggered in the non-safety environment, the detachment allowing mechanism is triggered in the safety environment, different anti-detachment mechanisms are triggered in different scenes in the non-safety environment, and the detachment allowing mechanism in different modes is triggered according to the electric quantity information in the safety environment, so that different requirements of users in various scenes can be met.
To sum up, the application sets up a plurality of scenes to set up suitable anticreep flow to each scene, concrete analysis is as follows: scenario 1, in an environment where the environment type of the watch is of the non-secure type, for example: the wearer independently goes out to play and leaves the guardian's guardian range, if the person is forced to detach, then open the environment monitoring flow, after opening this flow, can acquire environmental record, environmental video and location information in real time, upload these environmental monitoring information to the server and store, and under the circumstances that the environment is unusual, inform preset contact person to carry out the processing that control wrist-watch got into virtual shutdown state, in the course that control wrist-watch got into virtual shutdown state, can be through the information of screen suggestion "electric quantity is insufficient and shutdown", but the cell-phone under the virtual shutdown state still actually continues to operate and upload environmental record, environmental video and location information in real time in the backstage. Scene 2, marking as misoperation information under the environment that the environment type of the watch is of an unsafe type and the environment is normal. Scenario 3, in the case of a safe environment, and the watch has insufficient power (e.g., less than 10%), the user may be directly detached. If the watch is sufficiently charged (for example, higher than 10%), authentication needs to be started, and the watch can be detached after passing the authentication. And under the emergency scene, the watch-off permission mechanism is automatically triggered, so that the requirement of being convenient for detaching the watch can be met. The watch anti-falling method in the embodiment of the application provides various anti-falling functions. The anti-drop function is realized through the watch supporting the drop authentication function of various scenes and the watchband with the controllable drop, so that the anti-drop method provided by the embodiment of the application can meet the anti-drop requirements of the various scenes.
Fig. 4 is a schematic structural diagram of a watch anti-disengaging device according to an embodiment of the present application. The apparatus of this embodiment may be in the form of software and/or hardware. As shown in fig. 4, the watch anti-disengaging device provided in this embodiment includes: an acquisition module 41, an authentication module 42 and a trigger module 43. Wherein, the liquid crystal display device comprises a liquid crystal display device,
an acquisition module 41 for acquiring action information of the wristwatch being detached;
the authentication module 42 is configured to authenticate the action information through a pre-configured authentication mechanism to obtain an authentication result when the environment type of the watch is a non-secure environment;
a triggering module 43, configured to trigger an anti-detachment mechanism when the authentication result is illegal authentication;
wherein, the anti-detaching mechanism comprises: the communication unit is used for acquiring environment monitoring information of the watch and carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information; the receiving control unit is used for receiving a control instruction sent by a manager through the terminal under the condition of abnormal environment, controlling the watch to enter a virtual power-off state based on the control instruction, and controlling the lock catch on the watch band to be in a locking state.
In a possible implementation manner, the watch anti-disengaging device further includes:
the acquisition determining module is used for: and acquiring network connection information of the watch and a network in a preset safety area, and determining the environment type of the watch according to the network connection information.
In a possible implementation manner, the triggering module 43 is further configured to: and under the condition that the environment type of the watch is a safe environment, triggering an allowable detaching mechanism under the condition that the residual electric quantity of the watch is smaller than or equal to a preset threshold value, wherein the allowable detaching mechanism is used for controlling a lock catch on a watch band to be in an unlocking state based on the action information so that the watch is in a detachable state.
In a possible implementation manner, the acquiring communication unit is further configured to: the monitoring device of the watch is controlled to monitor the environment to obtain environment monitoring information, wherein the environment monitoring information comprises at least one of environment recording, environment video or positioning information.
In a possible implementation manner, the anti-detachment mechanism further includes:
and the control display unit is used for displaying preset prompt information through a display device of the watch in the process of controlling the watch to enter a virtual power-off state based on the control instruction.
In a possible implementation manner, the anti-detachment mechanism further includes:
and the receiving marking unit is used for receiving a marking instruction sent by the manager through the terminal under the condition of normal environment and marking the action information as misoperation information based on the marking instruction.
In a possible implementation manner, the watch anti-disengaging device further includes:
the authentication setting module is used for providing authentication modes for users through a detachable watch menu on a display device of the watch, and the authentication modes comprise at least one of the following steps: password authentication, fingerprint authentication, voice authentication, network video authentication and multi-user network authorization authentication;
and the determining module is used for determining at least one of password authentication, fingerprint authentication, voice authentication, network video authentication and multi-user network authorization authentication as a pre-configured authentication mechanism according to the selection instruction input by the user.
The watch anti-disengaging device provided by the embodiment can be used for executing the watch anti-disengaging method provided by any method embodiment, and the implementation principle and the technical effect are similar, and are not repeated here.
In the technical scheme of the application, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the personal information of the user accord with the regulations of related laws and regulations, and the public order colloquial is not violated.
According to embodiments of the present application, there is also provided an anti-drop watch and a computer-readable storage medium.
Fig. 5 is a schematic structural diagram of an anti-disengaging watch according to an embodiment of the present application. The anti-slip watch comprises a watch main body 50 and a watch band 51, wherein the watch band 51 is internally provided with at least one processor 511 and a memory 512, and the anti-slip watch formed by the above components is used for implementing the above specific embodiments of the present application, and is not repeated herein.
The embodiments of the present application further provide a computer readable storage medium, where computer instructions are stored, and when the processor executes the computer instructions, each step in the method in the above embodiments is implemented.
Embodiments of the present application also provide a computer program product comprising computer instructions which, when executed by a processor, implement the steps of the method in the above embodiments.
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present application may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or electronic device.
In the context of this application, a computer-readable storage medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may be a machine readable signal medium or a machine readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data electronic device), or that includes a middleware component (e.g., an application electronic device), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and an electronic device. The client and the electronic device are generally remote from each other and typically interact through a communication network. The relationship of client and electronic devices arises by virtue of computer programs running on the respective computers and having a client-electronic device relationship to each other. The electronic equipment can be cloud electronic equipment, also called cloud computing electronic equipment or cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service (Virtual Private Server or VPS for short) are overcome. The electronic device may also be an electronic device of a distributed system or an electronic device that incorporates a blockchain. It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present application may be performed in parallel, sequentially, or in a different order, provided that the desired results of the technical solutions disclosed in the present application can be achieved, and are not limited herein.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A watch anti-slip method, comprising:
acquiring action information of the watch detached;
under the condition that the environment type of the watch is an unsafe environment, authenticating the action information through a pre-configured authentication mechanism to obtain an authentication result; the environment types comprise the unsafe environment and the safe environment, the environment type of the watch is the safe environment when the watch is connected to the network in the preset safe area, and the environment type of the watch is the unsafe environment when the watch cannot be connected to the network in the preset safe area;
triggering an anti-detaching mechanism under the condition that the authentication result is illegal authentication;
wherein, the anti-detaching mechanism comprises: acquiring environment monitoring information of a watch, carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information, receiving a control instruction sent by a manager through the terminal under the condition of abnormal environment, controlling the watch to enter a virtual power-off state based on the control instruction, and controlling a lock catch on a watch band of the watch to be in a locking state so that the watch cannot authenticate the action information through a pre-configured authentication mechanism under the virtual power-off state; the environmental monitoring information includes at least one of environmental recordings, environmental videos, or positioning information.
2. The method of claim 1, further comprising, prior to said authenticating said action information by a pre-configured authentication mechanism to obtain an authentication result:
and acquiring network connection information of the watch and a network in a preset safety area, and determining the environment type of the watch according to the network connection information.
3. The method according to claim 1 or 2, wherein in case the type of environment in which the watch is located is a secure environment, the method further comprises:
and triggering an allowable detaching mechanism under the condition that the residual electric quantity of the watch is smaller than or equal to a preset threshold value, wherein the allowable detaching mechanism is used for controlling a lock catch on a watch band to be in an unlocking state based on the action information so that the watch is in a detachable state.
4. The method of claim 1, wherein the obtaining environmental monitoring information of the watch comprises:
the monitoring device of the watch is controlled to monitor the environment to obtain environment monitoring information, wherein the environment monitoring information comprises at least one of environment recording, environment video or positioning information.
5. The method of claim 1, wherein the anti-disassociation mechanism further comprises:
And displaying preset prompt information through a display device of the watch in the process of controlling the watch to enter a virtual power-off state based on the control instruction.
6. The method of claim 1, wherein the anti-disassociation mechanism further comprises: and under the condition that the environment is normal, receiving a marking instruction sent by the manager through the terminal, and marking the action information as misoperation information based on the marking instruction.
7. The method as recited in claim 1, further comprising:
providing an authentication mode for a user through a detachable watch menu on a display device of the watch, wherein the authentication mode comprises at least one of the following steps: password authentication, fingerprint authentication, voice authentication, network video authentication and multi-user network authorization authentication;
and determining at least one of password authentication, fingerprint authentication, voice authentication, network video authentication and multi-user network authorization authentication as a pre-configured authentication mechanism according to the selection instruction input by the user.
8. A wristwatch anti-drop device, comprising:
the acquisition module is used for acquiring action information of the detached watch;
the authentication module is used for authenticating the action information through a pre-configured authentication mechanism under the condition that the environment type of the watch is an unsafe environment, so as to obtain an authentication result; the environment types comprise the unsafe environment and the safe environment, the environment type of the watch is the safe environment when the watch is connected to the network in the preset safe area, and the environment type of the watch is the unsafe environment when the watch cannot be connected to the network in the preset safe area;
The triggering module is used for triggering an anti-detaching mechanism under the condition that the authentication result is illegal authentication;
wherein, the anti-detaching mechanism comprises: acquiring environment monitoring information of a watch, carrying out communication interaction with a terminal authorized to manage the watch based on the environment monitoring information, receiving a control instruction sent by a manager through the terminal under the condition of abnormal environment, controlling the watch to enter a virtual power-off state based on the control instruction, and controlling a lock catch on a watch band of the watch to be in a locking state so that the watch cannot authenticate the action information through a pre-configured authentication mechanism under the virtual power-off state; the environmental monitoring information includes at least one of environmental recordings, environmental videos, or positioning information.
9. An anti-slip watch, comprising: a watch body and a watch band, said watch band incorporating at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing computer-executable instructions stored in the memory causes the at least one processor to perform the watch anti-slip method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing the watch anti-slip method according to any one of claims 1 to 7.
CN202210925446.XA 2022-08-03 2022-08-03 Watch anti-drop method and device, anti-drop watch and storage medium Active CN115052065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210925446.XA CN115052065B (en) 2022-08-03 2022-08-03 Watch anti-drop method and device, anti-drop watch and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210925446.XA CN115052065B (en) 2022-08-03 2022-08-03 Watch anti-drop method and device, anti-drop watch and storage medium

Publications (2)

Publication Number Publication Date
CN115052065A CN115052065A (en) 2022-09-13
CN115052065B true CN115052065B (en) 2023-06-13

Family

ID=83167901

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210925446.XA Active CN115052065B (en) 2022-08-03 2022-08-03 Watch anti-drop method and device, anti-drop watch and storage medium

Country Status (1)

Country Link
CN (1) CN115052065B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391367A (en) * 2013-07-19 2013-11-13 蓝盾信息安全技术股份有限公司 Data anti-theft method in case of mobile phone loss
CN105224847A (en) * 2015-09-23 2016-01-06 广东小天才科技有限公司 A kind of method of intelligent watch safe early warning and device
CN105577213A (en) * 2015-12-18 2016-05-11 小米科技有限责任公司 Method and device for starting emergency processing strategy of intelligent bracelet or watch
CN105827817A (en) * 2015-11-30 2016-08-03 维沃移动通信有限公司 Alarm method and mobile terminal
CN106302957A (en) * 2015-05-25 2017-01-04 酷派软件技术(深圳)有限公司 Control method, device and the relevant device of the anti-lost contact of a kind of terminal
CN106452485A (en) * 2016-07-13 2017-02-22 杭州致峰网络科技有限公司 Control system of intelligent wearable device
CN110558954A (en) * 2019-09-10 2019-12-13 哈尔滨亿尚医疗科技有限公司 Monitoring method, monitoring device and computer storage medium
CN111581619A (en) * 2020-04-29 2020-08-25 歌尔科技有限公司 Intelligent protection method, device and equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10021094B2 (en) * 2016-04-07 2018-07-10 At&T Mobility Ii Llc System and method for providing wearable authentication and management

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391367A (en) * 2013-07-19 2013-11-13 蓝盾信息安全技术股份有限公司 Data anti-theft method in case of mobile phone loss
CN106302957A (en) * 2015-05-25 2017-01-04 酷派软件技术(深圳)有限公司 Control method, device and the relevant device of the anti-lost contact of a kind of terminal
CN105224847A (en) * 2015-09-23 2016-01-06 广东小天才科技有限公司 A kind of method of intelligent watch safe early warning and device
CN105827817A (en) * 2015-11-30 2016-08-03 维沃移动通信有限公司 Alarm method and mobile terminal
CN105577213A (en) * 2015-12-18 2016-05-11 小米科技有限责任公司 Method and device for starting emergency processing strategy of intelligent bracelet or watch
CN106452485A (en) * 2016-07-13 2017-02-22 杭州致峰网络科技有限公司 Control system of intelligent wearable device
CN110558954A (en) * 2019-09-10 2019-12-13 哈尔滨亿尚医疗科技有限公司 Monitoring method, monitoring device and computer storage medium
CN111581619A (en) * 2020-04-29 2020-08-25 歌尔科技有限公司 Intelligent protection method, device and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
儿童智能电话手表的设计;门瑞;;科技风(第01期);全文 *

Also Published As

Publication number Publication date
CN115052065A (en) 2022-09-13

Similar Documents

Publication Publication Date Title
EP2857947B1 (en) Terminal device and unlocking method thereof
WO2018072215A1 (en) Security verification method and apparatus
US10515203B2 (en) Method and system for improving security of a mobile terminal
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
CN105530356B (en) Communication terminal and its data guard method and device
CN109600519B (en) Mobile phone control method and system
WO2016015551A1 (en) Method and system for improving safety of mobile terminal
WO2018054387A1 (en) Method and device for managing permission of terminal
CN105893823A (en) Security protection method and device, and intelligent terminal
CN112991592A (en) Alarm control method and device of intelligent door lock and intelligent door lock
WO2016072833A1 (en) System and method to disable factory reset
KR101087698B1 (en) Method for authenticating security of smart-phone
CN105516500B (en) A kind of method and system selecting equipment mode
CN112887922B (en) Message sending method and electronic equipment
CN115052065B (en) Watch anti-drop method and device, anti-drop watch and storage medium
CN108629876A (en) Alarm method, equipment and the computer readable storage medium of lockset
CN110032898B (en) Data clearing method and device, electronic equipment and storage medium
CN107992733B (en) Intelligent terminal and safety unlocking method thereof
CN107197075B (en) Clean boot means of defence, device and computer readable storage medium
CN106778173A (en) The method and device that a kind of application lock based on intelligent operating system is set
TW201833759A (en) Contact information display method and device, and information display method and device
CN108509783B (en) Intelligent terminal application program management system
CN111316269A (en) Terminal security protection method and device
CN106559390B (en) Method and apparatus for enhancing device security
WO2018006341A1 (en) Optical communications-based authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant