WO2014000605A1 - 触摸屏终端的报警方法及触摸屏终端 - Google Patents
触摸屏终端的报警方法及触摸屏终端 Download PDFInfo
- Publication number
- WO2014000605A1 WO2014000605A1 PCT/CN2013/077695 CN2013077695W WO2014000605A1 WO 2014000605 A1 WO2014000605 A1 WO 2014000605A1 CN 2013077695 W CN2013077695 W CN 2013077695W WO 2014000605 A1 WO2014000605 A1 WO 2014000605A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- alarm
- terminal
- touch screen
- mode
- theft
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/325—Power saving in peripheral device
- G06F1/3262—Power saving in digitizer or tablet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/041—Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2491—Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/149—Mechanical actuation by lifting or attempted removal of hand-portable articles with electric, magnetic, capacitive switch actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/001—Alarm cancelling procedures or alarm forwarding decisions, e.g. based on absence of alarm confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/22—Details of telephonic subscriber devices including a touch pad, a touch sensor or a touch detector
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to the field of communications, and in particular to an alarm method for a touch screen terminal and a touch screen terminal.
- an alarm method for a touch screen terminal including: the terminal detecting whether the touch screen receives a touch event; if yes, the terminal issues an alarm.
- the method before the terminal detects whether the touch screen receives the touch event, the method further includes: the terminal enters a sleep mode; and the terminal causes the touch screen to be in a state capable of receiving a touch event in the sleep mode.
- the method further includes: after the terminal starts the alarm mode, if the terminal does not receive the alarm password or the received alarm password is incorrect, the alarm mode is still turned on when the terminal is turned on again. The alarm mode is alarmed by executing the alarm method.
- the detecting, by the terminal, whether the touch screen receives a touch event comprises: the terminal turning on an alarm mode; after the predetermined delay time, the terminal starts detecting whether the touch screen receives a touch event.
- the method further includes: determining whether the received decryption password matches the preset alarm code in the terminal; if yes, stopping the alarm.
- the manner of alarming includes at least one of the following: an audible alarm, a vibration alarm, a display alarm, and an alarm, wherein the sending alarm is to make a call to a preset telephone number and/or send a short message.
- a touch screen terminal including: a detecting module, configured to detect whether the touch screen receives a touch event; and an alarm module, configured to issue an alarm when detecting that a touch event is received.
- the terminal further includes: a hibernation module, configured to enter the sleep mode; and a state enabling module, configured to enable the touch screen to be in a state capable of receiving a touch event in the sleep mode.
- the terminal further includes: an execution module, configured to: after the terminal starts the alarm mode, if the terminal does not receive the alarm password or the received alarm password is incorrect, when the terminal is turned on again The alarm mode is turned on, wherein the alarm mode is alarmed by executing the alarm method.
- the detecting module includes: an opening unit, configured to enable the terminal to open an alarm mode; and a detecting unit, configured to detect, after the predetermined delay time, that the terminal receives the touch event.
- the present invention adopts the following method:
- the alarm is judged by detecting whether the touch screen accepts a touch event, and the touch screen is used as a monitoring device to monitor the touch event in real time.
- the size of the touch screen is relatively large and sensitive. Therefore, it is easier to monitor the occurrence of anti-theft events by using the touch screen as a monitoring device.
- the application of the anti-theft alarm method is poor, and the alarm cannot be truly played, and ultimately The problem that causes the terminal to be stolen, and thus provides a more reliable anti-theft method, which is highly practical, improves the performance of the system, and improves the user experience.
- FIG. 1 is a flow chart of an alarm method of a touch screen terminal according to an embodiment of the present invention
- 2 is a schematic diagram of a system architecture of a touch screen terminal according to a preferred embodiment of the present invention
- FIG. 3 is a flowchart showing the operation of the antitheft method according to a preferred embodiment of the present invention
- FIG. 4 is an antitheft mode setting according to a preferred embodiment 2 of the present invention.
- Figure 5 is a flow chart showing the implementation of the activation alarm according to the preferred embodiment 3 of the present invention
- Figure 6 is a flow chart showing the implementation of the alarm and de-alarm according to the preferred embodiment 4 of the present invention
- Figure 7 is a flowchart according to an embodiment of the present invention.
- FIG. 1 is a flow chart of an alarm method of a touch screen terminal according to an embodiment of the present invention
- 2 is a schematic diagram of a system architecture of a touch screen terminal according to a preferred embodiment of the present invention
- FIG. 3 is a flowchart showing
- FIG. 8 is a structural block diagram 2 of a touch screen terminal according to an embodiment of the present invention
- FIG. 9 is a structural block diagram 3 of a touch screen terminal according to an embodiment of the present invention.
- the first type of method after the terminal device is stolen, measures to prevent user information from leaking, reducing losses, and providing the user with search information and the like.
- This type of method mainly uses user information (SIM information, mobile phone number and password) and the carrier network to obtain some information after the mobile phone is stolen, and performs related operations through the anti-theft software inside the mobile phone to complete remedial measures, such as: Enter the anti-theft password, notify the pre-set number, lock the SIM card, stop providing wireless communication service, etc.
- this type of method is to perform remedial measures after the terminal device has been stolen, and the loss has been formed for the user, but the method adopted to prevent the loss from expanding can only serve as a remedy, although The method provides a basis for the device to search through some information after the device is lost, due to various reasons, the reality The achievability of finding stolen mobile phones is extremely poor. From the current actual situation, such methods do not really play a role in preventing theft, and they cannot play much practical role.
- the second type of method when the terminal device encounters theft, promptly sends an alarm signal to prompt the user to avoid theft. The following is a brief introduction to several implementations of this type of approach.
- the alarm circuit will send an alarm to alert the user.
- This method requires the user to purchase additional products, and its main disadvantage is that the mobile phone must be placed in a specific mobile phone case, and the mobile phone case is not easily taken away, and in actual use, the mobile phone is generally placed in a bag carried by the user or In the pocket of the clothes, the phone case does not work.
- the detection alarm circuit is installed in the mobile phone, and is matched with another receiving device by means of wireless transmission or magnetic induction. After the mobile phone and the receiving device leave a certain distance, the mobile phone itself will sound an alarm to achieve the purpose of the alarm.
- This method is theoretically feasible, but requires the addition of a dedicated transmitting circuit and receiving device, which is complicated to implement and costly. Moreover, the user needs to bring another receiving device, which brings great inconvenience to the user; the corresponding detecting circuit is added in the device, such as: infrared sensor sensing, when the human body approaches the mobile phone, the infrared electromagnetic wave released by the human body is received by the infrared sensor. To, an alarm signal is generated.
- infrared sensor sensing when the human body approaches the mobile phone, the infrared electromagnetic wave released by the human body is received by the infrared sensor. To, an alarm signal is generated.
- the main disadvantage of this method is that it is easy to generate false alarms, because there are many sources of infrared radiation, which makes the infrared detection of mobile phones susceptible to false alarms.
- the outer casing is covered with a special metal wire mesh for generating an induced current, and an induced current is generated when an external object contacts, and an alarm is issued.
- This method is practically poor, and adding a metal wire mesh to the outer casing has a great influence on the radio frequency performance.
- Touch detection is performed using a dedicated touch IC or an electrode sheet mounted on the side of the fuselage. This method has limited effect because the effective area of the electrode sheet is limited. If the touch position is not in the working area of the electrode sheet, the trigger cannot be triggered.
- this kind of method is to give the user an alarm in time when the equipment is about to be stolen, prevent the user from being damaged, and truly play the role of theft prevention.
- it is necessary to add additional accessory products or devices and circuits that specifically increase the sensing inductance, which adds additional cost and increases costs.
- the published methods the actual effect is difficult to achieve the ideal state, and the feasibility is extremely low.
- the currently disclosed anti-theft methods are all aimed at mobile phone products.
- tablet PCs are also at risk of being stolen.
- the present invention provides an alarm method for a touch screen terminal, which is suitable not only for a mobile phone but also for a tablet computer, and any terminal device with a touch screen, based on the above-mentioned alarm mode that is not strong and has a weak anti-theft effect.
- the hardware of the terminal product can be easily and effectively realized without adding any hardware circuits and devices.
- an alarm prompt is issued to prevent the device from being stolen and the loss is avoided.
- the flow of the alarm method of the touch screen terminal of the embodiment is as shown in FIG. 1 , and includes steps S102 to S104 : Step S102 : The terminal detects whether the touch screen receives the touch event. Step S104 , if yes, the terminal issues an alarm.
- the embodiment of the invention adopts the following method:
- the alarm is judged by detecting whether the touch screen accepts a touch event, and the touch screen is used as a monitoring device to monitor the touch event in real time.
- the size of the touch screen is relatively large, and the sensing is sensitive. Therefore, it is easier to monitor the occurrence of the anti-theft event by using the touch screen as a monitoring device.
- the application of the anti-theft alarm method is poor, and the alarm cannot be truly played. In the end, the problem of theft of the terminal is caused, which provides a more reliable anti-theft method, which is highly practical, improves the performance of the system, and improves the user experience.
- the terminal to which the method is applied is usually a mobile terminal, but the method is also applicable to a device with a touch screen in the factory.
- the device uses the method embodiment, it can prevent non-workers from operating.
- the station causes a loss, so it can be alarmed, etc., and the alarm mode can be differently set according to different occasions.
- the portable terminal is preferably described below.
- the terminal can be in the working state all the time, but the long-term opening of the state wastes the battery power of the terminal and the battery life. Based on this, the embodiment can also make the terminal enter the sleep mode.
- the touch screen When the terminal is in the sleep mode, the touch screen is in a state capable of receiving a touch event, and as long as the touch screen of the monitoring device is in a state capable of receiving an external trigger event, the terminal can be monitored in real time, thereby preventing theft and saving power. .
- the terminal Once the terminal has turned on the alarm mode, it starts to detect whether there is a trigger event. If the user touches the touch screen, the alarm may also be generated. Based on this, before the terminal detects whether the touch screen receives the touch event, a delay can be set. Time, this delay time is used for the user to place the terminal. After the terminal has passed the predetermined delay time, it starts to detect whether the touch screen receives the touch event.
- the terminal issues an alarm, wherein the alarm mode can be various, for example, an audible alarm, a vibration alarm, an alarm display, an alarm, etc., wherein the audible alarm is The sounder emits a warning sound, and the vibration alarm causes the terminal to vibrate to remind the user that theft occurs.
- the alarm is displayed, an icon such as anti-theft or prompt is displayed on the display screen, and an alarm can be sent, that is, to the preset call.
- the number dials the phone and/or sends a text message.
- the above alarm methods can be used in any combination to make the warning of the alarm stronger and remind the user of the attention of the terminal.
- the terminal receives the alarm code from the outside world, and determines whether the received alarm code matches the preset alarm code in the terminal; if it matches, the alarm is stopped. If it does not match, continue to alarm. This process ensures the safety of the alarm process. In the case of mismatching continued alarm, even if the power is turned on or off again, the terminal cannot clear the memory of entering the alarm mode. Therefore, after the terminal turns on the alarm mode, the terminal does not receive the alarm password or the received alarm password.
- the alarm mode is still turned on when the terminal is turned on again, wherein the alarm mode is alarmed by executing the alarm method.
- the memory process has outstanding advantages, and even if the terminal is stolen, it can make the thief unable to use it in vain.
- the embodiment of the invention overcomes the deficiencies of the prior art, and based on the hardware resources of the terminal device, realizes a simple, effective and practical anti-theft method for the terminal product without increasing any hardware cost, and improves the mobile terminal. The performance, while effectively avoiding theft incident.
- Preferred Embodiment 1 This preferred embodiment provides a simple and practical anti-theft solution with a touch screen terminal.
- the touch screen When the user turns on the anti-theft function, the touch screen is used as a detection device for anti-theft monitoring. When someone picks up the device by hand, it touches the touch screen, the touch screen detects the touch action, reports to the main controller, and the main controller turns on the alarm device to prompt the user.
- the preferred embodiment does not make hardware changes to the existing terminal, and does not need to increase the cost.
- the terminal may be an existing terminal with a touch screen, for example, a terminal including the architecture shown in FIG. 2, the terminal includes: a touch screen module The group is configured to detect a touch action, and then notify the main controller through an interrupt control circuit, and the main controller simultaneously drives the video display circuit, the audio drive circuit, the motor drive circuit, and the radio frequency circuit.
- FIG. 3 is a diagram showing the workflow of the anti-theft method of the preferred embodiment, the process including steps S302 to S322o
- the machine is in the normal use mode, just turned on or the user is using.
- Step S304 the user does not input at a certain time or the user performs certain operations to put the machine into the sleep mode.
- Step S306, determining whether the user enables the anti-theft mode. If enabled, step S310 is performed, otherwise step S308 is performed.
- step S308 the touch screen is closed, and the touch event cannot be received.
- step S310 the touch screen is not turned off during sleep, and is always in a normal working state. When this step is performed, other devices such as the LCD are turned off and the system is hibernated to save power. At this point, the system enters the anti-theft mode, and the touch screen acts as an anti-theft monitoring device.
- step S312 it is detected whether there is a trigger event. If yes, step S314 is performed, otherwise step S312 is performed. When this step is executed, as long as a suspicious person wants to pick up or touch or take out the device from the user's bag, the touch screen is inevitably touched, and a finger touches the touch screen.
- step S314 the main controller wakes up the system and exits the sleep mode to enter a normal working state.
- step S316 the main controller controls the alarm subsystem to perform an alarm.
- the alarm can be a user-set ringtone, vibration, phone call, texting, etc.
- step S318, the terminal determines whether a correct alarm password is received. If yes, step S320 is performed, otherwise step S322 is performed. In step S320, the alarm mode is released. In step S322, the alarm is continued. After receiving the alarm, the user judges whether the theft of the device has occurred according to the situation. If theft does not occur, the alarm can be cancelled; if not, the theft can be found.
- FIG. 4 is a flow chart of the anti-theft mode setting in the anti-theft method of the preferred embodiment, the process including steps S402 to S414.
- step S402 the anti-theft function is detected, and the CPU executes the anti-theft setting program.
- First read the setting value originally saved by the user interface, read the delay time parameter N of the anti-theft enabled by the user, and enter the entire system into the anti-theft mode.
- This time N is a time interval between when the device sleeps and when the system enters the anti-theft mode. This time is the time for the user to place the terminal device to avoid false alarms.
- This time parameter N can be set according to user requirements. Generally, it is recommended to be less than 30S.
- the terminal device In the anti-theft mode, in order to save power, the terminal device has to enter the sleep mode. Step S404, placing the touch screen in a normal working state. Step S406, enabling the touch event reception interrupt.
- the touch screen acts as an anti-theft monitoring device to monitor the occurrence of anti-theft behavior at all times. As can be seen from FIG. 2, the touch screen notifies the main controller of the occurrence of theft by the interrupt control circuit, and enables the touch event reception interruption, that is, the detection.
- Step S408 When the master enters sleep mode, it can be woken up by an interrupt to exit the sleep state. Step S408, turning off other devices such as an LCD to save power consumption. Step S410, setting the current state to an anti-theft state. Turn off all other features of the system except for monitoring, such as RF, Bluetooth, wifi, etc.
- step S412 the status is recorded in the file system. No matter how the terminal device is restarted or turned on, as long as the anti-theft mode or the alarm state does not exit, the anti-theft setting program will read the status from the file system, which also causes the system to enter the anti-theft state. Step S414, after the time N set in the system, the system enters the anti-theft mode.
- Step S502 in the anti-theft mode, when a theft occurs, a touch event is received.
- Step S504 the touch screen module notifies the main controller in an interrupt manner.
- the alarm system circuit includes the display drive circuit of FIG. 2, an audio drive circuit, a motor drive circuit, and a radio frequency circuit.
- Step S510 setting the current state of the terminal device to an alarm state.
- step S512 the status is recorded in the file system.
- the alarm device is turned on to perform an alarm.
- the alarm mode includes at least one of the following: performing a vibration alarm, the motor starts to vibrate; an audible alarm, playing an alarm sound in the horn, the sound type and volume can be set by the user; sending a text message to the previously set phone number, making a call;
- the display shows the alarm interface.
- FIG. 6 shows an implementation flow of an alarm and a release alarm, and the flow includes steps S602 to S610.
- Step S602 the device is in the anti-theft mode or is alarming.
- Step S604 the status is recorded in the file system.
- Step S606. displaying a password input interface for unlocking or unlocking the alarm on the screen.
- step S608 it is determined whether the password is correct. If the password is correct, step S610 is performed, otherwise step S602 is performed.
- step S610 the alarm is released or the anti-theft mode is exited, and the device enters the normal use mode.
- the sound unlocking process provided by the embodiment of the invention is more user-friendly, and the corresponding recording state function double protects the device. When the device does not receive the password normally, the mode is not exited, and the stability of the alarm function of the system is increased.
- the embodiment of the present invention further provides a touch screen terminal.
- the block diagram of the alarm part of the terminal is as shown in FIG. 7 , and includes: a detecting module 10 configured to detect whether a touch screen receives a touch event; and an alarm module 20 coupled to the detecting module 10 , is used to issue an alarm when detecting that a touch event is received.
- the detecting module may include: an opening unit, configured to enable the terminal to open an alarm mode, wherein the alarm mode performs an alarm by executing the above alarm method; and the detecting unit is coupled with the opening unit, and is configured to start detecting after the predetermined delay time of the terminal Whether the touch screen receives a touch event.
- the terminal may be as shown in FIG.
- the terminal may also be as shown in FIG. 9, and further includes: an execution module 50, configured to: after the terminal turns on the alarm mode, the terminal does not receive the alarm password or the received alarm password is incorrect. Next, the alarm mode is still turned on when the terminal is turned on again, wherein the alarm mode is alarmed by executing an alarm method.
- the module may be coupled to the alarm module 20 for the post-alarm recording, or may be coupled to the inspection module 10, and start recording the state when entering the alarm mode.
- the terminal may further include: a judging password and a terminal for determining the received alarm A module that matches the preset pre-alarm password; a module that is used to stop the alarm in case of matching.
- the above terminal in the embodiment of the present invention will be described below in conjunction with the preferred embodiments.
- Preferred Embodiment 5 This preferred embodiment provides a touch screen terminal that can apply the above alarm method.
- the terminal device has an alarm device such as a touch screen, display, main controller, audio output or vibration.
- the terminal realizes the anti-theft alarm without adding any hardware circuits and devices, and utilizes the existing hardware resources to utilize the touch screen as the anti-theft monitoring device. When the user turns on the anti-theft function, the device enters the anti-theft mode.
- the touch screen is used as an anti-theft monitoring device. When someone steals the device, they touch the touch screen and the touch screen detects the touch event. The touch screen reports the touch event to the main controller. The main controller receives the message reported by the touch screen, so that the terminal device immediately enters the emergency alarm state.
- the emergency alarm status includes at least one of the following: Starting the alarm device; an alarm interface appears on the display and waiting for the input to cancel the alarm command.
- the activation alarm device includes an audible alarm, a vibration alarm, and an audible alarm device, which are acted upon by the speaker of the terminal device, and the vibration alarm is performed by the motor of the terminal device. The alarm device promptly reminds the user that the terminal device is being stolen.
- the preferred embodiment does not require any additional hardware devices and circuits, utilizes the existing hardware resources of the terminal device, uses the touch screen as an anti-theft monitoring device, and uses a speaker and a vibration motor as the alarm device. So it will not increase any cost; the hardware is unchanged, only software is needed to implement, simple and easy to implement; use the touch screen as the anti-theft monitoring device, When the theft occurs, no matter the gesture, it will touch the touch screen, be monitored by the touch screen, and the anti-theft effect is reliable.
- the embodiment of the present invention adopts the following method: performing alarm determination by detecting whether the touch screen accepts a touch event, and using the touch screen as a monitoring Device, real-time monitoring of touch events.
- the size of the touch screen is relatively large, and the sensing is sensitive. Therefore, it is easier to monitor the occurrence of the anti-theft event by using the touch screen as a monitoring device.
- the application of the anti-theft alarm method is poor, and the alarm cannot be truly played.
- the problem of theft of the terminal is caused, which provides a more reliable anti-theft method, which is highly practical, improves the performance of the system, and improves the user experience.
- the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices.
- they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Electromagnetism (AREA)
- Telephone Function (AREA)
- Alarm Systems (AREA)
Abstract
本发明公开了一种触摸屏终端的报警方法及触摸屏终端,其中,该方法包括:终端检测触摸屏是否接收到触摸事件;如果是,则终端发出报警。通过运用本发明,解决了防盗报警方法的应用性差,无法使报警真正发挥其作用,最终还是导致终端被盗的问题,进而提供了一种较为可靠的防盗方法,实用性强,提升了系统的性能,提高用户体验。
Description
触摸屏终端的报警方法及触摸屏终端 技术领域 本发明涉及通信领域, 具体而言,涉及一种触摸屏终端的报警方法及触摸屏终端。 背景技术 随着智能手机和平板电脑等终端产品的不断普及, 它们已经成为越来越多人的日 常生活中的必不可少的工具。 但如果遭遇盗窃导致终端产品的丢失, 会给用户带来经 济损失, 而且个人信息资料的损失会给用户造成诸多不便。 为了防止这类终端设备被 盗, 人们想出很多办法, 但是就目前已经公布的防盗方法而言, 都是针对于手机产品 的。 目前应用较为广泛的防盗措施一般都是在终端设备被盗之后开始起作用, 这类方 法的主要目的就是补救。 相关技术中, 还有一类是用于被盗时发生报警, 由于此类方法在相关技术中应用 性差, 无法使报警真正发挥其作用, 最终还是导致终端被盗。 发明内容 本发明提供了一种触摸屏终端的报警方法及触摸屏终端,以至少解决相关技术中, 防盗报警方法的应用性差, 无法使报警真正发挥其作用, 最终还是导致终端被盗的问 题。 根据本发明的一个方面, 提供了一种触摸屏终端的报警方法, 包括: 所述终端检 测所述触摸屏是否接收到触摸事件; 如果是, 则所述终端发出报警。 优选地, 所述终端检测所述触摸屏是否接收到触摸事件之前, 还包括: 所述终端 进入休眠模式; 所述终端在所述休眠模式下使所述触摸屏处于能够接收触摸事件的状 态。 优选地, 所述方法还包括: 在所述终端开启报警模式之后, 在终端未接收到解警 密码或接收到的解警密码错误的情况下,再次开启所述终端时仍然开启所述报警模式, 其中, 所述报警模式通过执行所述报警方法进行报警。
优选地, 所述终端检测所述触摸屏是否接收到触摸事件包括: 所述终端开启报警 模式; 所述终端经过预定延时时间之后, 开始检测所述触摸屏是否接收到触摸事件。 优选地, 所述终端发出报警之后, 还包括: 判断接收到的解警密码与所述终端内 预置的解警密码是否匹配; 如果是, 则停止所述报警。 优选地, 报警的方式至少包括以下之一: 声音报警、 振动报警、 显示报警、 发送 报警, 其中, 所述发送报警是指向预置的电话号码拨打电话和 /或发送短信。 根据本发明的另一方面, 提供了一种触摸屏终端, 包括: 检测模块, 用于检测所 述触摸屏是否接收到触摸事件; 报警模块, 用于在检测接收到触摸事件的情况下, 发 出报警。 优选地, 所述终端还包括: 休眠模块, 用于使所述终端进入休眠模式; 状态使能 模块, 用于在所述休眠模式下, 使所述触摸屏处于能够接收触摸事件的状态。 优选地, 所述终端还包括: 执行模块, 用于在所述终端开启报警模式之后, 在终 端未接收到解警密码或接收到的解警密码错误的情况下, 再次开启所述终端时仍然开 启所述报警模式, 其中, 所述报警模式通过执行所述报警方法进行报警。 优选地, 所述检测模块包括: 开启单元, 用于所述终端开启报警模式; 检测单元, 用于所述终端经过预定延时时间之后, 开始检测所述触摸屏是否接收到触摸事件。 本发明采用了如下方法: 通过检测触摸屏是否接受到触摸事件来进行报警判断, 将触摸屏作为一个监控器件, 对触摸事件进行实时监控。 触摸屏的尺寸相对较大, 且 感应灵敏, 因此, 将触摸屏作为监控器件较容易监控防盗事件的发生, 通过运用本发 明, 解决了防盗报警方法的应用性差, 无法使报警真正发挥其作用, 最终还是导致终 端被盗的问题, 进而提供了一种较为可靠的防盗方法, 实用性强, 提升了系统的性能, 提高用户体验。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图
图 1是根据本发明实施例的触摸屏终端的报警方法的流程图;
图 2是根据本发明优选实施例一的触摸屏终端的系统架构示意图; 图 3是根据本发明优选实施例一的防盗方法的工作流程图; 图 4是根据本发明优选实施例二的防盗模式设置的流程图; 图 5是根据本发明优选实施例三的启动报警实现的流程图; 图 6是根据本发明优选实施例四的报警及解除报警的实现流程图; 图 7是根据本发明实施例的触摸屏终端的结构框图一; 图 8是根据本发明实施例的触摸屏终端的结构框图二; 图 9是根据本发明实施例的触摸屏终端的结构框图三。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 防盗措施在终端设备被盗取之前遭受盗窃的时候就开始起作用, 能够及时的提醒 用户并阻吓盗窃者, 这类方法的目的就是防患于未然。 然而相关的最为先进的终端防 盗技术都不尽人意, 无法起到防盗的作用。 下面介绍一下相关技术的防盗方法。 第一类方法, 当终端设备被盗之后, 为了防止用户信息泄露, 减少损失, 以及给 用户提供搜寻信息等而采取的一些措施。 这类方法, 主要是利用用户信息 (SIM信息、 手机号码和密码) 和运营商网络来 获取手机被盗后的一些信息, 通过手机内部的防盗软件执行相关的操作, 完成补救措 施, 如: 要求输入防盗密码、 给预先设置的号码发出通知、 SIM卡锁死、 停止提供无 线通讯服务等; 也有方法通过在手机 SIM 卡上用特殊的装置锁死, 使得非手机持有 者无法更换 SIM 卡。 这种方法实用性差, 如此微小的开锁装置一旦机主不慎丢失, 则受害者首先是机主自己。 总的来说, 这类方法都是当终端设备已经被盗之后执行补救措施, 对用户来说损 失已经形成, 只是为了防止损失的扩大而采用的方法, 只能起到补救的作用, 虽然有 的方法通过设备丢失后的一些信息为设备的搜寻提供依据, 由于各种原因所限, 现实
中找到被盗手机的可实现性极差, 从目前的实际情况来看, 这类方法并没有真正起到 防止盗窃的作用, 并不能起到多大的实际作用。 第二类方法, 当终端设备遭遇盗窃时, 及时发出报警信号提示用户, 避免被盗。 以下简要介绍这类方法的几种实现方式。 采用特制的手机外套或者是一个与手机相连接的挂链, 包括由开关控制的发生鸣 响电路。 一旦手机不是通过正常方式离开手机外套或者挂链, 报警电路就会发出报警 提示用户。 这种方法需要用户购买额外的产品, 而且其主要缺点是必须将手机放置在 特定的手机套中, 且手机套不易被取走, 而在实际使用过程中手机一般放置在用户携 带的包内或衣服口袋内, 手机套无法发挥作用。 在手机内加装检测报警电路, 用无线发射或者磁感应的方式与另一接收装置相配 合, 手机与接收装置一旦离开一段距离之后, 手机自身就会发出报警鸣响, 达到报警 的目的。 这种方法理论上可行, 但是需要增加专门的发射电路和接受装置, 实现起来 比较复杂, 成本较高。 而且用户要额外的再带一个接收装置, 给用户带来极大不便; 在设备内增加相应的检测电路, 如: 红外感应器感应, 当人体接近手机时人体释 放的红外电磁波被红外感应器接收到, 随即产生报警信号。 这种方法的主要缺点是容 易产生错误报警, 因为红外辐射源很多, 这些使得手机红外探测防盗容易产生虚警。 还有的在外壳覆盖有用于产生感应电流的专用金属导线网, 当有外物接触时会产生感 应电流, 发出报警。 这种方法实际操作性差, 在外壳上增加金属导线网, 会对射频性 能产生很大的影响。 利用专门的触摸式 IC 或装在机身侧面的电极片实现触摸检测, 这种方法效果有 限, 因为电极片有效区域有限, 如果触碰位置不在电极片的工作区域, 则无法触发告
总体来说, 这类方法, 是在设备即将被盗走的时候, 就及时的给用户报警, 防患 于未然, 使得用户免遭损失, 真正起到了防盗的作用。 但在已经公开的这类方法中, 都是要增加额外的附属产品或者专门增加检测感应的器件和电路, 这样都会增加额外 的费用, 带来成本的增加。 而且从已有的技术水平来说, 已公布的方法, 实际效果很 难达到理想状态, 可行性极低。 另一方面, 目前所公开的防盗方法, 都是针对于手机 产品的, 现在随着平板电脑产品的普及, 平板电脑也面临被盗取的风险, 但是, 对于 平板电脑并没有提供有效的防盗方法。
基于上述实施性不强且防盗效果较弱的报警方式, 本发明实施例提供了一种触摸 屏终端的报警方法, 该方法不但适合于手机还适用于平板电脑, 以及任何带有触摸屏 的终端设备, 利用设备现有的硬件资源, 不用增加任何的硬件电路和器件, 简单有效 的实现了终端产品的防盗, 在终端设备被盗窃之前, 发出告警提示, 防止设备被盗窃, 避免了损失。 本实施例的触摸屏终端的报警方法的流程如图 1 所示, 包括步骤 S102 至步骤 S104: 步骤 S102, 终端检测触摸屏是否接收到触摸事件; 步骤 S104, 如果是, 则终端发出报警。 本发明实施例采用了如下方法: 通过检测触摸屏是否接受到触摸事件来进行报警 判断, 将触摸屏作为一个监控器件, 对触摸事件进行实时监控。 触摸屏的尺寸相对较 大, 且感应灵敏, 因此, 将触摸屏作为监控器件较容易监控防盗事件的发生, 通过运 用本发明实施例, 解决了防盗报警方法的应用性差, 无法使报警真正发挥其作用, 最 终还是导致终端被盗的问题, 进而提供了一种较为可靠的防盗方法, 实用性强, 提升 了系统的性能, 提高用户体验。 在实施过程中, 通常情况下, 应用该方法的终端多为移动终端, 但该方法同样适 用于工厂内带有触摸屏的设备, 在设备运用该方法实施例时, 可以是防止非工作人员 操作工作台造成损失, 因此对其进行报警等, 还可以根据不同场合对报警方式进行不 同的设置, 下面优选对便携式终端进行说明。 在该检测报警方法实施的过程中, 终端可以一直处于工作状态, 但该状态的长期 开启会浪费终端的电池电量和电池使用寿命, 基于此, 本实施例还可以使终端进入休 眠模式。 在终端处于休眠模式下, 使触摸屏处于能够接收触摸事件的状态, 只要作为 监控器件的触摸屏处于能够接收外部触发事件的状态, 就可以对终端进行实时监控, 起到防盗作用的同时还节省了电量。 一旦终端开启了报警模式, 即开始检测是否有触发事件时, 则如果用户自身碰到 触摸屏幕, 也可能会产生报警, 基于此, 在终端检测触摸屏是否接收到触摸事件之前, 可以设置一个延时时间, 该延时时间用于用户放置终端。终端经过预定延时时间之后, 开始检测触摸屏是否接收到触摸事件。这样, 在刚开启报警模式时, 不会产生误报警, 避免了不必要的解警操作, 提高了用户体验。 在检测到有触发事件触发触摸屏时, 终端发出报警, 其中, 报警的模式可以为多 种, 例如, 声音报警、 振动报警、 显示报警、 发送报警等, 其中, 声音报警就是用扬
声器发出警示声音, 振动报警是使终端发生振动动作, 以提醒用户有盗窃行为发生, 显示报警时在显示屏幕上显示防盗窃或提示等图标, 还可以用发送报警, 即向预置的 电话号码拨打电话和 /或发送短信。 在具体实施的时候, 可以将上述报警方式任意组合 使用, 使报警的警告性更强, 提醒用户对终端的注意。 在发出告警之后, 需要输入相应的解警密码对其进行解警报。 终端接收来自外界 的解警密码, 判断接收到的解警密码与终端内预置的解警密码是否匹配; 如果匹配, 则停止报警。 如果不匹配, 则继续报警。 该过程确保了报警过程的安全性。 在不匹配继续报警的情况下, 即使再次开机或关机, 都无法使终端清除进入报警 模式的记忆, 因此, 在终端开启报警模式之后, 在终端未接收到解警密码或接收到的 解警密码错误的情况下, 再次开启终端时仍然开启报警模式, 其中, 报警模式通过执 行报警方法进行报警。 记忆过程优点突出, 即使终端被盗, 也可以让盗窃者无法使用 而徒劳无功。 本发明实施例克服了已有技术的不足, 基于终端设备自身的硬件资源, 在不增加 任何硬件成本的前提下, 实现了一种简单、 有效、 实用的终端产品的防盗方法, 提升 了移动终端的性能, 同时有效的避免了盗窃事件。 下面结合附图及优选实施例对上述实施方式进行说明。 优选实施例一 本优选实施例提供了一种简单实用的带有触摸屏终端的防盗方案。 当用户打开防 盗功能时, 利用触摸屏作为防盗监控的检测器件。 当有人用手拿此设备时, 就会碰到 触摸屏, 触摸屏就检测到了触摸动作, 报告给主控制器, 主控器开启报警设备提示用 户。 本优选实施例没有对现有终端做硬件改变, 无需增加成本, 在实施时终端可以是 现有的、 带触摸屏的终端, 例如, 包括图 2所示的架构的终端, 该终端包括: 触摸屏 模组, 用于检测到触摸动作, 再通过中断控制电路通知给主控制器, 主控制器同时驱 动视频显示电路、 音频驱动电路、 马达驱动电路、 射频电路。 显示驱动电路将报警画 面显示到显示屏上; 音频驱动电路将声音报警信号输出到喇叭; 马达驱动电路驱动马 达进行震动报警; 通过射频电路给预置的号码打电话、 发短信。 图 3介绍了本优选实施例的防盗方法的工作流程, 该流程包括步骤 S302至步骤 S322o
步骤 S302, 机器处于正常使用模式, 刚开机或者用户正在使用。 步骤 S304, 在一定时间用户没有输入或者用户做了某些操作使机器进入休眠模 式。 步骤 S306, 判断用户是否启用防盗模式。 如果启用的话, 则执行步骤 S310, 否 则执行步骤 S308。 步骤 S308, 触摸屏关闭, 不能接收触摸事件。 步骤 S310, 在休眠的时候不关闭触摸屏, 一直处于正常工作状态。 该步骤执行时, 关闭 LCD等其他器件, 并使系统休眠来节省电源。此时系统就进 入防盗模式, 触摸屏就作为了防盗监控器件。 步骤 S312,检测是否有触发事件。如果是,则执行步骤 S314,否则执行步骤 S312。 该步骤执行时, 只要有可疑人想拿起或者从用户的包里接触或者拿出设备, 就不 可避免的碰到触摸屏, 会有手指触碰到触摸屏。 步骤 S314, 主控制器将系统唤醒, 退出休眠模式进入正常工作状态。 步骤 S316, 主控制器控制报警子系统进行报警。 报警可以是用户设置的铃声, 震 动, 打电话, 发短信等各种方式。 步骤 S318, 终端判断是否接收到正确的解警密码。 如果是, 则执行步骤 S320, 否则执行步骤 S322。 步骤 S320, 解除报警模式。 步骤 S322, 继续报警。 用户在收到报警后根据情况判断是否设备被盗窃有盗窃行为发生。 若非发生盗窃 行为, 则可以解除报警; 如果不是, 则可以发现盗窃行为。 由于使用触摸屏来做监控 器件, 特别是电容式触摸屏, 除了人体之外的其他, 比如包里的其他物品, 触摸屏是 不会检测到有触摸动作发生, 所以不会发生误报警。 优选实施例二
图 4是本优选实施例防盗方法中的防盗模式设置流程,该流程包括步骤 S402至步 骤 S414。 步骤 S402, 检测到开启防盗功能, CPU执行防盗设置程序。 先读取用户界面原先保存的设置值,读取用户设置的防盗启用的延时时间参数N, 将整个系统进入防盗模式。这个时间 N是设备休眠到系统进入防盗模式之间的一个时 间间隔, 这段时间是给用户放置终端设备的时间, 避免产生误报警。 这个时间参数 N 可以根据用户需求设置, 一般情况下建议 30S以内。 防盗模式下, 为了节省功耗, 终 端设备要进入休眠模式。 步骤 S404, 将触摸屏置于正常工作状态。 步骤 S406, 使能触摸事件接收中断。 触摸屏作为防盗监控器件, 时刻监控防盗行 为的发生。 由图 2可知, 触摸屏是通过中断控制电路通知主控制器有盗窃行为发生, 使能触摸事件接收中断, 即进行检测。 在主控器进入休眠模式下, 能通过中断将其唤 醒退出休眠状态。 步骤 S408, 关闭 LCD等其他设备, 节省功耗。 步骤 S410, 设置当前状态为防盗状态。 关闭除了监控之外系统的其他所有功能, 如射频、 蓝牙、 wifi等。 步骤 S412, 将该状态记录在文件系统。 无论终端设备如何被重启或者开机后, 只 要防盗模式或者告警状态没有退出, 防盗设置程序都会从文件系统中读取到该状态, 同样使得系统进入防盗状态。 步骤 S414, 经过在中设置的时间 N之后, 系统进入防盗模式。 优选实施例三 图 5是启动报警实现的流程图, 该实施例结合终端内部结构进行说明, 该过程包 括步骤 S502至步骤 S514。 步骤 S502, 在防盗模式下, 当有盗窃行为发生, 就会接收到触摸事件。 步骤 S504, 触摸屏模组以中断方式通知主控制器。 步骤 S506, 唤醒主控制器。
步骤 S508,主控制器被唤醒后,退出休眠状态进入正常工作状态,唤醒报警系统。 使能报警系统电路进入正常工作状态。 报警系统电路包括图 2的显示驱动电路、 音频 驱动电路、 马达驱动电路、 射频电路。 步骤 S510, 设置终端设备当前状态为报警状态。 步骤 S512, 在文件系统里记录该状态。 步骤 S514,打开报警装置进行报警。报警方式包括以下至少之一:进行震动报警, 马达开始震动; 声音报警, 在喇叭中播放报警声音, 声音类型和音量可以由用户来设 置; 给事先设置好的电话号码发短信、 打电话; 打开显示屏, 显示报警界面。 优选实施例四 图 6示出的是报警及解除报警的实现流程, 该流程包括步骤 S602至步骤 S610。 步骤 S602, 设备处于防盗模式或者正在报警。 步骤 S604, 在文件系统中记录该状态。 在实施过程中, 只要能够记录当前状态, 起到记忆功能, 都可以作为文件系统。 步骤 S606., 在屏幕上显示报警解除或者解除防盗的口令输入界面。 步骤 S608, 判断口令是否正确。 如果口令正确, 则执行步骤 S610, 否则执行步 骤 S602。 步骤 S610, 报警解除或者退出防盗模式, 设备进入正常使用模式。 本发明实施例提供的健全的解锁过程较为人性化, 相应的记录状态的功能使设备 双重保护, 在设备未正常接收到密码时, 不会退出该模式, 增加了系统的报警功能的 稳定性。 本发明实施例还提供了一种触摸屏终端,该终端的报警部分结构框图如图 7所示, 包括: 检测模块 10, 用于检测触摸屏是否接收到触摸事件; 报警模块 20, 与检测模块 10耦合, 用于在检测接收到触摸事件的情况下, 发出报警。 优选的, 检测模块可以包括: 开启单元, 用于终端开启报警模式, 其中, 报警模 式通过执行上述报警方法进行报警; 检测单元, 与开启单元耦合, 用于终端经过预定 延时时间之后, 开始检测触摸屏是否接收到触摸事件。
在实施过程中, 终端可以如图 8所示, 还包括: 休眠模块 30, 用于使终端进入休 眠模式; 状态使能模块 40, 与休眠模块 30和检测模块 10耦合, 用于在休眠模式下, 使触摸屏处于能够接收触摸事件的状态。 在一个优选实施例中, 终端还可以如图 9所示, 还包括: 执行模块 50, 用于在终 端开启报警模式之后, 在终端未接收到解警密码或接收到的解警密码错误的情况下, 再次开启终端时仍然开启报警模式, 其中, 报警模式通过执行报警方法进行报警。 该 模块可以与报警模块 20耦合, 用于报警后记录, 也可以与检查模块 10耦合, 在进入 报警模式时就开始记录状态, 上述终端还可以包括: 用于判断接收到的解警密码与终端内预置的解警密码是否 匹配的模块; 用于在匹配的情况下, 停止报警的模块。 下面结合优选实施例对本发明实施例中的上述终端进行说明。 优选实施例五 本优选实施例提供了一种触摸屏终端, 该终端可以应用上述报警方法。 终端设备 带有触摸屏、 显示屏、 主控制器、 音频输出或者震动等报警设备。 该终端实现防盗报 警不会增加任何硬件电路和器件, 利用现有的硬件资源, 利用触摸屏作为防盗监控器 件。 在用户打开防盗功能时, 设备进入防盗模式。 用触摸屏作为防盗监控器件。 当有 人盗窃设备时, 就会碰到触摸屏, 触摸屏检测到了触摸事件。 触摸屏将触摸事件上报 给主控制器。 主控制器收到触摸屏上报的消息, 使终端设备立刻进入紧急告警状态。 紧急告警状态包括以下至少之一: 启动告警装置; 显示屏上出现报警界面并等待 输入解除报警指令。 启动告警装置包括声音告警、 震动告警, 声音告警装置, 由终端设备的扬声器来 充当, 震动告警由终端设备的马达来完成。 通过告警装置及时提醒用户, 终端设备正 在遭受盗窃。 若未解除告警, 只要设备开机, 就进入紧急告警状态。 本优选实施例不需要额外增加任何硬件器件和电路, 利用终端设备已有的硬件资 源, 用触摸屏作为防盗监控器件, 用扬声器和震动马达作为告警装置。 所以不会增加 任何成本; 硬件不变, 只需要软件来实现, 简单易实现; 用触摸屏作为防盗监控器件,
当盗窃行为发生的时候, 无论手势如何, 都会碰到触摸屏, 被触摸屏监控到, 防盗效 果可靠。 从以上的描述中, 可以看出, 本发明实施例中的方案实现了如下技术效果: 本发明实施例采用了如下方法: 通过检测触摸屏是否接受到触摸事件来进行报警 判断, 将触摸屏作为一个监控器件, 对触摸事件进行实时监控。 触摸屏的尺寸相对较 大, 且感应灵敏, 因此, 将触摸屏作为监控器件较容易监控防盗事件的发生, 通过运 用本发明实施例, 解决了防盗报警方法的应用性差, 无法使报警真正发挥其作用, 最 终还是导致终端被盗的问题, 进而提供了一种较为可靠的防盗方法, 实用性强, 提升 了系统的性能, 提高用户体验。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。
Claims
1. 一种触摸屏终端的报警方法, 包括:
所述终端检测所述触摸屏是否接收到触摸事件;
如果是, 则所述终端发出报警。
2. 根据权利要求 1所述的方法, 其中, 所述终端检测所述触摸屏是否接收到触摸 事件之前, 还包括:
所述终端进入休眠模式;
所述终端在所述休眠模式下使所述触摸屏处于能够接收触摸事件的状态。
3. 根据权利要求 1或 2所述的方法, 还包括: 在所述终端开启报警模式之后, 在终端未接收到解警密码或接收到的解警 密码错误的情况下, 再次开启所述终端时仍然开启所述报警模式, 其中, 所述 报警模式通过执行所述报警方法进行报警。
4. 根据权利要求 3所述的方法, 其中, 所述终端检测所述触摸屏是否接收到触摸 事件包括:
所述终端开启报警模式;
所述终端经过预定延时时间之后, 开始检测所述触摸屏是否接收到触摸事 件。
5. 根据权利要求 1所述的方法, 其中, 所述终端发出报警之后, 还包括:
判断接收到的解警密码与所述终端内预置的解警密码是否匹配; 如果是, 则停止所述报警。
6. 根据权利要求 1所述的方法, 其中, 报警的方式至少包括以下之一: 声音报警、 振动报警、 显示报警、 发送报警, 其中, 所述发送报警是指向预置的电话号码 拨打电话和 /或发送短信。
7. 一种触摸屏终端, 包括:
检测模块, 用于检测所述触摸屏是否接收到触摸事件;
报警模块, 用于在检测接收到触摸事件的情况下, 发出报警。
8. 根据权利要求 7所述的终端, 还包括:
休眠模块, 用于使所述终端进入休眠模式;
状态使能模块, 用于在所述休眠模式下, 使所述触摸屏处于能够接收触摸 事件的状态。
9. 根据权利要求 7所述的终端, 还包括: 执行模块, 用于在所述终端开启报警模式之后, 在终端未接收到解警密码 或接收到的解警密码错误的情况下, 再次开启所述终端时仍然开启所述报警模 式, 其中, 所述报警模式通过执行所述报警方法进行报警。
10. 根据权利要求 7至 9中任一项所述的终端, 其中, 所述检测模块包括:
开启单元, 用于所述终端开启报警模式;
检测单元, 用于所述终端经过预定延时时间之后, 开始检测所述触摸屏是 否接收到触摸事件。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/411,517 US9529408B2 (en) | 2012-06-25 | 2013-06-21 | Touch screen terminal and alarm method thereof |
EP13809603.7A EP2866215A4 (en) | 2012-06-25 | 2013-06-21 | TOUCH SCREEN TERMINAL AND ITS ALARM METHOD |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102097924A CN102750796A (zh) | 2012-06-25 | 2012-06-25 | 触摸屏终端的报警方法及触摸屏终端 |
CN201210209792.4 | 2012-06-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014000605A1 true WO2014000605A1 (zh) | 2014-01-03 |
Family
ID=47030942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/077695 WO2014000605A1 (zh) | 2012-06-25 | 2013-06-21 | 触摸屏终端的报警方法及触摸屏终端 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9529408B2 (zh) |
EP (1) | EP2866215A4 (zh) |
CN (1) | CN102750796A (zh) |
WO (1) | WO2014000605A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3229448A4 (en) * | 2014-12-30 | 2017-12-13 | Huawei Technologies Co. Ltd. | Method for preventing loss of terminal, and terminal |
CN109471566A (zh) * | 2017-09-08 | 2019-03-15 | 乐金显示有限公司 | 触摸显示装置、触摸电路和触摸感测方法 |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102750796A (zh) | 2012-06-25 | 2012-10-24 | 中兴通讯股份有限公司 | 触摸屏终端的报警方法及触摸屏终端 |
CN104023118A (zh) * | 2013-03-01 | 2014-09-03 | 中兴通讯股份有限公司 | 一种手机告警方法及装置、手机 |
CN103486069B (zh) * | 2013-09-23 | 2016-06-22 | 苏州经贸职业技术学院 | 基于热释人体红外的风扇智能温控系统及方法 |
CN104023149A (zh) * | 2014-06-19 | 2014-09-03 | 深圳市中兴移动通信有限公司 | 一种移动终端及其共享电源资源状态异常提示方法 |
CN104023139B (zh) * | 2014-06-19 | 2020-05-15 | 陈惠金 | 一种移动终端及其异常处理方法 |
CN104063978A (zh) * | 2014-06-20 | 2014-09-24 | 上海斐讯数据通信技术有限公司 | 移动终端防盗方法及适用的移动终端防盗装置和移动终端 |
CN105162941B (zh) * | 2015-07-23 | 2018-06-22 | 河北智祥农业开发有限公司 | 一种反监听反监控设备 |
CN105335678A (zh) * | 2015-11-17 | 2016-02-17 | 烟台友开通信技术有限公司 | 一种触摸屏手机的实时防盗方法及系统 |
CN105632128B (zh) * | 2016-01-12 | 2017-10-31 | 上海斐讯数据通信技术有限公司 | 一种报警方法及智能终端 |
CN107170168A (zh) * | 2016-03-08 | 2017-09-15 | 中兴通讯股份有限公司 | 一种终端防盗报警方法和装置 |
CN105893888A (zh) * | 2016-03-31 | 2016-08-24 | 广东小天才科技有限公司 | 一种智能终端的防盗防丢方法和防盗防丢系统 |
CN106303038B (zh) * | 2016-08-16 | 2021-01-05 | 努比亚技术有限公司 | 辐射提醒装置和方法 |
CN109976658A (zh) * | 2019-03-29 | 2019-07-05 | 努比亚技术有限公司 | 一种终端防盗方法、终端及计算机可读存储介质 |
CN110086942B (zh) * | 2019-05-13 | 2021-09-10 | 闻泰通讯股份有限公司 | 智能终端的防盗方法、装置、设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101059903A (zh) * | 2007-06-01 | 2007-10-24 | 芜湖欣兰德工业制品有限责任公司 | 基于短信息报警的保险箱防盗装置 |
CN201001137Y (zh) * | 2006-12-19 | 2008-01-02 | 中兴通讯股份有限公司 | 一种智能防盗手机 |
US20090251318A1 (en) * | 2008-04-02 | 2009-10-08 | Inventec Appliances Corp. | Anti-theft system of mobile device |
CN201699791U (zh) * | 2010-06-24 | 2011-01-05 | 四川盟宝实业有限公司 | 一种手机触摸屏挤压报警系统 |
CN102750796A (zh) * | 2012-06-25 | 2012-10-24 | 中兴通讯股份有限公司 | 触摸屏终端的报警方法及触摸屏终端 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6172607B1 (en) * | 1999-04-28 | 2001-01-09 | Mcdonald Charles F. | Portable theft alarm |
US7218226B2 (en) * | 2004-03-01 | 2007-05-15 | Apple Inc. | Acceleration-based theft detection system for portable electronic devices |
CN101330678B (zh) * | 2007-06-21 | 2013-08-07 | 鸿富锦精密工业(深圳)有限公司 | 移动通信装置及其防盗报警方法和系统 |
KR101549556B1 (ko) * | 2009-03-06 | 2015-09-03 | 엘지전자 주식회사 | 휴대 단말기 및 그 제어방법 |
TWI481248B (zh) * | 2009-04-14 | 2015-04-11 | Elan Microelectronics Corp | Mobile phone control method |
KR101679420B1 (ko) * | 2009-08-11 | 2016-12-06 | 엘지전자 주식회사 | 이동 통신 단말기의 제어방법 및 이를 적용한 이동 통신 단말기 |
KR101725388B1 (ko) * | 2010-07-27 | 2017-04-10 | 엘지전자 주식회사 | 이동 단말기 및 그 제어방법 |
-
2012
- 2012-06-25 CN CN2012102097924A patent/CN102750796A/zh active Pending
-
2013
- 2013-06-21 US US14/411,517 patent/US9529408B2/en active Active
- 2013-06-21 EP EP13809603.7A patent/EP2866215A4/en not_active Ceased
- 2013-06-21 WO PCT/CN2013/077695 patent/WO2014000605A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201001137Y (zh) * | 2006-12-19 | 2008-01-02 | 中兴通讯股份有限公司 | 一种智能防盗手机 |
CN101059903A (zh) * | 2007-06-01 | 2007-10-24 | 芜湖欣兰德工业制品有限责任公司 | 基于短信息报警的保险箱防盗装置 |
US20090251318A1 (en) * | 2008-04-02 | 2009-10-08 | Inventec Appliances Corp. | Anti-theft system of mobile device |
CN201699791U (zh) * | 2010-06-24 | 2011-01-05 | 四川盟宝实业有限公司 | 一种手机触摸屏挤压报警系统 |
CN102750796A (zh) * | 2012-06-25 | 2012-10-24 | 中兴通讯股份有限公司 | 触摸屏终端的报警方法及触摸屏终端 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2866215A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3229448A4 (en) * | 2014-12-30 | 2017-12-13 | Huawei Technologies Co. Ltd. | Method for preventing loss of terminal, and terminal |
US10129387B2 (en) | 2014-12-30 | 2018-11-13 | Huawei Technologies Co., Ltd. | Terminal anti-lost method and terminal |
CN109471566A (zh) * | 2017-09-08 | 2019-03-15 | 乐金显示有限公司 | 触摸显示装置、触摸电路和触摸感测方法 |
Also Published As
Publication number | Publication date |
---|---|
US20150160717A1 (en) | 2015-06-11 |
US9529408B2 (en) | 2016-12-27 |
CN102750796A (zh) | 2012-10-24 |
EP2866215A4 (en) | 2015-07-08 |
EP2866215A1 (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014000605A1 (zh) | 触摸屏终端的报警方法及触摸屏终端 | |
CN105900102B (zh) | 基于传感器的近场通信认证 | |
US20130225127A1 (en) | Proximity tag | |
US10237666B2 (en) | Portable electronic device with acoustic and/or proximity sensors and methods therefor | |
WO2015062235A1 (zh) | 电子设备、电池保护方法和装置 | |
CN101931719B (zh) | 一种能与其子机进行双向监控的手机及其监控方法 | |
US7750807B2 (en) | Mobile communication device, anti-theft method and system | |
WO2015154572A1 (zh) | 一种移动终端防盗方法及相应的移动终端 | |
CN104980571B (zh) | 一种移动终端防盗的方法、装置及终端 | |
CN110632982A (zh) | 低功率近场通信认证 | |
CN101083478B (zh) | 一种防盗移动终端及其防盗方法 | |
WO2015014293A1 (en) | Devices and methods for guarding against theft of mobile terminals | |
WO2014187261A1 (zh) | 一种终端、信息处理的方法及装置 | |
CN103442121A (zh) | 一种防盗手机及手机防盗实现方法 | |
WO2019007371A1 (zh) | 一种防止信息被盗的方法、存储设备及移动终端 | |
CN110306878A (zh) | 门锁告警方法、装置、智能门锁及可读取存储介质 | |
RU149834U1 (ru) | Устройство охранной сигнализации с функцией передачи сигнала тревоги на компьютеризированное устройство пользователя | |
WO2018227722A1 (zh) | 防护报警实现方法、装置及防护报警器 | |
JP2013258650A (ja) | 盗難防止対応通信端末およびシステム | |
WO2017172156A1 (en) | Technologies for preventing loss of compute devices in a cluster | |
TW201327487A (zh) | 可防盜的觸摸型可擕式裝置及防盜方法 | |
CN108833674A (zh) | 一种防盗方法及移动终端 | |
CN110049188B (zh) | 一种防盗预警方法、移动终端 | |
CN106652278A (zh) | 报警方法、装置及终端 | |
CN105516459A (zh) | 一种终端防盗方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13809603 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14411517 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013809603 Country of ref document: EP |