WO2015123964A1 - 一种保护终端设备的方法、装置及终端设备 - Google Patents

一种保护终端设备的方法、装置及终端设备 Download PDF

Info

Publication number
WO2015123964A1
WO2015123964A1 PCT/CN2014/082914 CN2014082914W WO2015123964A1 WO 2015123964 A1 WO2015123964 A1 WO 2015123964A1 CN 2014082914 W CN2014082914 W CN 2014082914W WO 2015123964 A1 WO2015123964 A1 WO 2015123964A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
alarm
terminal
status information
earphone
Prior art date
Application number
PCT/CN2014/082914
Other languages
English (en)
French (fr)
Inventor
侯柏岑
唐明勇
华承平
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to RU2015139025A priority Critical patent/RU2617679C2/ru
Priority to MX2014011336A priority patent/MX350348B/es
Priority to KR1020147026565A priority patent/KR101648499B1/ko
Priority to JP2016503535A priority patent/JP6461087B2/ja
Priority to US14/533,106 priority patent/US9721454B2/en
Publication of WO2015123964A1 publication Critical patent/WO2015123964A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1445Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R29/00Monitoring arrangements; Testing arrangements

Definitions

  • the present invention is based on a Chinese patent application with the application number of CN2014100569120 and the application date being February 19, 2014, and claims the priority of the Chinese patent application, the Chinese patent application The entire disclosure is hereby incorporated by reference.
  • the present disclosure relates to the field of terminal technologies, and in particular, to a method, device and terminal device for protecting a terminal device. Background technique
  • terminal devices With the continuous development of terminal technologies, the functions of terminal devices are becoming more and more diverse, bringing people a very good experience, and people are increasingly using terminal devices in various occasions. For example, when using public transportation, use the terminal device to surf the Internet, listen to music, watch videos, etc., use the terminal device to listen to music, record running information (running route, running time), etc. while running.
  • terminal equipment As people increasingly use terminal equipment in a variety of situations, especially when using terminal equipment in public, terminal equipment has also become a target for criminals. For example, when a user inserts a headset into a terminal device to listen to music, the terminal device is usually placed in a pocket of a garment or a carry-on bag, which gives the criminals an opportunity to take out the terminal device and quickly pull it out. Escape after the headphones. Therefore, there is a need for a method to protect the terminal device. Summary of the invention
  • the present disclosure provides a method, a device and a terminal device for protecting a terminal device, which can function as an antitheft.
  • a method for protecting a terminal device including: acquiring state information of a terminal device inserted into the earphone;
  • the alarm mode of the terminal device is activated.
  • the status information includes one or more of the following: environment information of the terminal device, motion information of the terminal device, an application program that the terminal device is running, Whether the terminal device is in a screen off state and whether an image captured by a front camera of the terminal device includes a human face.
  • the environment information of the terminal device includes one or more of the following: GPS information of the terminal device and a name of a Wi-Fi network where the terminal device is located.
  • the method further includes: detecting whether the earphone is pulled out; and when detecting that the earphone is pulled out, performing an alarm operation.
  • the alarm operation includes one or more of the following: an audible alarm, a vibration alarm, a flash alarm, and a lock screen operation unlocked by a password.
  • the alarm operation is continued.
  • an apparatus for protecting a terminal device including: an acquiring module, configured to acquire state information of a terminal device that is inserted into the earphone;
  • a determining module configured to determine whether the status information meets a preset condition
  • a startup module configured to start an alarm mode of the terminal device when the status information meets a preset condition.
  • the status information includes one or more of the following: environment information of the terminal device, motion information of the terminal device, an application program that the terminal device is running, Whether the terminal device is in a screen off state and whether an image captured by a front camera of the terminal device includes a human face.
  • the environment information of the terminal device includes one or more of the following: GPS information of the terminal device and a name of a Wi-Fi network where the terminal device is located.
  • the device further includes:
  • a detecting module configured to detect whether the earphone is removed after starting an alarm mode of the terminal device
  • an execution module configured to perform an alarm operation when detecting that the earphone is pulled out.
  • the alarm operation includes one or more of the following: an audible alarm, a vibration alarm, a flash alarm, and a lock screen operation unlocked by a password.
  • the execution module is further configured to: continue to perform an alarm operation when detecting that an earphone is inserted into the terminal device when performing an alarm operation.
  • an apparatus for protecting a terminal device including: a processor;
  • a memory for storing processor-executable instructions; wherein the processor is configured to: obtain state information of a terminal device inserted into the earphone; Determining whether the status information satisfies a preset condition;
  • the alarm mode of the terminal device is activated.
  • the state information of the terminal device is used to determine whether to activate the alarm mode of the terminal device. Therefore, the solution for starting the alarm mode according to the state information of the terminal device itself is realized, and the user does not need to manually start the alarm mode of the terminal device, thereby improving the user experience. Moreover, since the alarm mode can be activated according to the state information of the terminal device in a timely manner, the situation that the user forgets to start the alarm mode is avoided, and the anti-theft property of the terminal device is further improved.
  • FIG. 1 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
  • FIG. 2 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
  • FIG. FIG. 4 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
  • FIG. 5 is a flowchart according to an exemplary embodiment.
  • FIG. 6 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
  • FIG. 7 is a device for protecting a terminal device according to an exemplary embodiment.
  • FIG. 8 is a schematic diagram of an apparatus for protecting a terminal device according to an exemplary embodiment.
  • FIG. 9 is a block diagram of an apparatus according to an exemplary embodiment. detailed description
  • FIG. 1 is a flowchart of a method of protecting a terminal device according to an exemplary embodiment.
  • the method for protecting a terminal device is used in a terminal device, and the method includes the following steps:
  • step S101 status information of a terminal device inserted into the earphone is obtained.
  • the status information includes, but is not limited to, one or more of the following: environment information of the terminal device, motion information of the terminal device, an application program that the terminal device is running, and whether the terminal device is in The screen is off.
  • the environmental information of the terminal device includes, for example, GPS information of the terminal device and a name of the Wi-Fi network where the terminal device is located.
  • the motion information of the terminal device includes, for example but not limited to, one or more of the following: a vibration frequency of the terminal device, a displacement of the terminal device, a speed of the terminal device, and an acceleration of the terminal device.
  • step S102 it is determined whether the status information satisfies a preset condition.
  • step S103 when the status information satisfies a preset condition, the alarm mode of the terminal device is started.
  • the alarm mode of the terminal device means that when the earphone inserted into the terminal device is pulled out, the terminal device will perform an alarm operation to remind the user that the alarm operation may include but is not limited to one or more of the following: audible alarm, vibration alarm, flash Alarm and lock screen operation unlocked by password.
  • the method for protecting a terminal device determines whether to activate an alarm mode of the terminal device by using status information of the terminal device. Therefore, a solution for starting an alarm mode according to status information of the terminal device itself is implemented, and the user does not need to manually start the terminal device.
  • the alarm mode improves the user experience, and since the alarm mode can be activated according to the state information of the terminal device in a timely manner, the situation that the user forgets to start the alarm mode is avoided, and the anti-theft property of the terminal device is further improved.
  • FIG. 2 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 2, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is started.
  • the preset condition of the alarm mode of the terminal device is:
  • the vibration frequency of the terminal device is not zero within a preset duration.
  • the method includes the following steps:
  • step S201 it is determined whether or not a headset is inserted into the terminal device, and if so, step S202 is performed; if not, the process ends.
  • step S202 the vibration frequency of the terminal device inserted into the earphone is acquired.
  • the motion information of the terminal device can be obtained through a vibration sensor, an acceleration sensor, or the like configured in the terminal device.
  • GPS technology can also be utilized to acquire motion information of the terminal device.
  • the movement of the human body may cause a change in the GPS return value, so that the change in the GPS value can be detected to determine whether the terminal device is in a motion state in which the position is constantly changing.
  • the terminal equipment carried by the user will also generate corresponding acceleration, vibration frequency or displacement. Therefore, it can be determined whether the user (and the terminal device) is in a motion state based on the motion information of the terminal device.
  • step S203 it is determined whether the acquired vibration frequency is not zero within the preset duration; if yes, step S204 is performed; if not, then is ended.
  • step S204 the alarm mode of the terminal device is started.
  • step S205 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S206 is performed; if not, the step is repeatedly performed.
  • step S206 an alarm operation is performed.
  • the alarm operation may include, but is not limited to, one or more of the following: an audible alarm, a vibration alarm, a flash alarm, and a lock screen operation unlocked by a password.
  • the alarm operation may include an audible alarm of the maximum value of the system, a light of the strongest light of the LED, a vibration of the strongest vibration frequency of the mobile phone, and an interface for inputting a password on the screen.
  • the user needs to input a preset graphic or number to complete the unlocking; Before the completion, the phone can't execute any command; if the password is entered incorrectly, it will remain locked until the password is entered correctly; after the password is entered correctly, the alarm is released, the sound stops, the LED flash is off, the vibration stops, and the phone returns to normal.
  • the alarm mode of the terminal device is activated, thereby providing protection for the terminal device used by the user in a state of motion such as walking or running.
  • FIG. 3 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 3, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is started.
  • the preset condition of the alarm mode of the terminal device is: The GPS information of the terminal device is outside the preset position.
  • the method includes the following steps:
  • step S301 it is determined whether or not a headset is inserted into the terminal device, and if so, step S302 is performed; if not, the process ends.
  • step S302 GPS information of the terminal device inserted into the earphone is acquired.
  • step S303 it is determined whether the acquired GPS information is outside the preset position; if yes, step S304 is performed; if not, then ending.
  • the preset position includes, for example, the location of the home and the unit, and according to the acquired GPS information, it can be known whether the terminal device is at home or a unit.
  • step S304 the alarm mode of the terminal device is started.
  • step S305 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S306 is performed; if not, the step is repeated.
  • step S306 an alarm operation is performed.
  • the alarm mode of the terminal device is activated, so that the terminal device can be provided with protection of the use environment other than the home and the unit, for example.
  • FIG. 4 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 4, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is started.
  • the preset condition of the alarm mode of the terminal device is:
  • the application that the terminal device is running is the specified application. The method includes the following steps:
  • step S401 it is determined whether or not a headset is inserted into the terminal device, and if so, step S402 is performed; if not, the process ends.
  • step S402 an application that the terminal device inserted into the earphone is running is acquired.
  • step S403 it is determined whether the application that the terminal device is running is the specified application; if yes, step S404 is performed; if not, the process ends.
  • the specified application is an application that plays songs, an application that listens to the broadcast, and an application that answers the call, and the user may put the phone in his pocket when using the application.
  • step S404 the alarm mode of the terminal device is activated.
  • step S405 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S206 is performed; if not, the step is repeatedly performed.
  • step S406 an alarm operation is performed.
  • the alarm mode of the terminal device is started. , which can provide protection for terminal devices that use headphones.
  • FIG. 5 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment.
  • the method for protecting a terminal device is used in a terminal device.
  • the method is started.
  • the preset condition of the alarm mode of the terminal device is:
  • the screen state of the terminal device is off.
  • the party In step S501, it is determined whether or not an earphone is inserted into the terminal device, and if so, step S502 is performed; if not, the process ends.
  • step S502 the screen state of the terminal device inserted into the earphone is acquired.
  • step S503 it is determined whether the screen state of the terminal device is the off state; if yes, step S504 is performed; if not, the process is ended.
  • step S504 the alarm mode of the terminal device is started.
  • step S505 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S506 is performed; if not, the step is repeated.
  • step S506 an alarm operation is performed.
  • the alarm mode of the terminal device is started, thereby avoiding waste of resources when the user uses the earphone to watch the video or play the game, because the user usually watches.
  • the terminal device will not be easily stolen.
  • FIG. 6 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 6, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is obtained. The image captured by the front camera of the terminal device; when the image includes a human face, the alarm mode of the terminal device is not activated. The method includes the following steps:
  • step S601 it is determined whether or not the earphone is inserted into the terminal device, and if so, step S602 is performed; if not, the process ends.
  • step S602 an image captured by a front camera of the terminal device is acquired.
  • step S603 it is determined whether a face is included in the acquired image, and if not, step S504 is performed; if yes, the process ends.
  • it includes a specified face, such as the owner of the terminal device.
  • step S604 the alarm mode of the terminal device is started.
  • step S605 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S506 is performed; if not, the step is repeated.
  • step S606 an alarm operation is performed.
  • the image captured by the front camera includes an alarm mode in which the face does not activate the terminal device, because when the image captured by the front camera usually includes a face, the user is facing the terminal device.
  • the terminal device will not be easily stolen. Therefore, the waste of resources for starting the alarm mode is avoided.
  • two or more of the above embodiments may be combined. For example, it may be determined whether the application that the terminal device is running is a specified application and the screen state of the terminal device is determined. Whether it is combined for the closed state, the alarm operation is performed when the application that the terminal device is running is playing music, and the screen of the terminal device is turned off. Because, when the screen is turned on, it means that the user is using it in the visible range, and it can not alarm.
  • the device may be determined whether the acquired GPS information is outside the preset position and whether the captured image captured by the front camera is included in the image, and when the GPS information of the terminal device is in a preset position, And when the image captured by the front camera of the terminal device does not include a human face, the alarm operation is started, because there is a case where the user is using the terminal face to face even if the GPS information of the terminal device is outside the preset position.
  • the device at this time, can not start the alarm operation, saving resources.
  • the method for protecting a terminal device is mainly for automatically starting an alarm mode for a terminal device when the terminal device meets a preset condition, and on the other hand, reducing the pair as much as possible.
  • the interference of the user's normal operation reduces the time cost of the user's operation habit of manually starting the alarm mode in the scenario where the mobile phone is easily lost.
  • the alarm mode can be automatically activated, the user can be prevented from losing the mobile phone due to forgetting or in the future, and the "earphone pull-out is alarm" function has a better user experience and more. Good running effect.
  • the settings may be made according to the circumstances, and are not limited to the embodiments enumerated in the present disclosure.
  • FIG. 7 is a schematic diagram of an apparatus for protecting a terminal device according to an exemplary embodiment. As shown in FIG. 7, the device includes an obtaining module 701, a determining module 702, and a starting module 703.
  • the obtaining module 701 is configured to acquire state information of the terminal device inserted into the earphone; the determining module 702 is configured to determine whether the state information meets a preset condition; the starting module 703 is configured to: when the state information meets a preset When the condition is met, the alarm mode of the terminal device is activated.
  • the status information includes one or more of the following: the environment information of the terminal device, the motion information of the terminal device, the application program that the terminal device is running, whether the terminal device is in a screen off state. Whether or not a human face is included in an image captured by a front camera of the terminal device.
  • the environment information of the terminal device includes one or more of the following: a GPS information of the terminal device and a name of a Wi-Fi network where the terminal device is located.
  • the apparatus further includes a detection module 704 and an execution module 705.
  • the detecting module 704 is configured to detect whether the earphone is pulled out after the alarm mode of the terminal device is activated;
  • the execution module 705 is configured to perform an alarm operation when it is detected that the earphone is unplugged.
  • the alarm operation includes one or more of the following: audible alarm, vibration alarm, flash alarm and lock screen operation unlocked by password.
  • the execution module 705 is further configured to continue to perform an alarm operation when detecting that an earphone is inserted into the terminal device when performing an alarm operation.
  • FIG. 9 is a block diagram of an apparatus 800 for:
  • device 800 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • device 800 can include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, And a communication component 816.
  • Processing component 802 typically controls the overall operation of device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 802 can include one or more processors 820 to execute instructions to perform all or part of the steps described above.
  • processing component 802 can include one or more modules to facilitate interaction between component 802 and other components.
  • processing component 802 can include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operation at device 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 804 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPR0M), erasable Programmable Read Only Memory (EPR0M), Programmable Read Only Memory (PR0M), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPR0M electrically erasable programmable read only memory
  • EPR0M erasable Programmable Read Only Memory
  • PR0M Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 806 provides power to various components of device 800.
  • Power component 806 can include a power management system, one or more power sources, and others that generate, manage, and distribute power for device 800. Associated components.
  • the multimedia component 808 includes a screen between the device 800 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor can sense not only the boundaries of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) that is configured to receive an external audio signal when device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 804 or transmitted via communication component 816.
  • audio component 810 also includes a speaker for outputting an audio signal.
  • the I/O interface 812 provides an interface between the processing component 802 and the peripheral interface module.
  • the peripheral interface module can be a keyboard, a click wheel, a button, and the like. These buttons can include, but are not limited to: Home button, Volume button, Start button, and Lock button.
  • Sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of device 800.
  • sensor component 814 can detect an open/closed state of device 800, a relative positioning of components, such as the display and keypad of device 800, and sensor component 814 can also detect the location of device 800 or device 800 components. Changes, the presence or absence of user contact with device 800, device 800 orientation or acceleration/deceleration and temperature variation of device 800.
  • Sensor assembly 814 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 814 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communication between device 800 and other devices.
  • the device 800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 816 receives from the outside via a broadcast channel Broadcast the broadcast signal or broadcast related information of the system.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the above method.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 804 comprising instructions executable by processor 820 of apparatus 800 to perform the above method.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • a non-transitory computer readable storage medium when the instructions in the storage medium are executed by a processor of the terminal device, to enable the mobile terminal to perform a method of protecting the terminal device, the method comprising:
  • the alarm mode of the terminal device is activated.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Burglar Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开是关于一种保护终端设备的方法、装置及终端设备,其中,方法包括:获取插入耳机的终端设备的状态信息;判断所述状态信息是否满足预设条件;当所述状态信息满足预设条件时,启动所述终端设备的报警模式。本公开通过终端设备的状态信息来判断是否启动终端设备的报警模式,因此,实现了根据终端设备自身的状态信息来启动报警模式的方案,无需用户手动启动终端设备的报警模式,提高了用户的使用体验,并且,由于可根据终端设备自身的状态信息适时地启动报警模式,避免了用户忘记启动报警模式的情形,进一步提高了终端设备的防盗性。

Description

一种保护终端设备的方法、 装置及终端设备 本申请基于申请号为 CN2014100569120、申请日为 2014年 2月 19日的中 国专利申请提出, 并要求该中国专利申请的优先权, 该中国专利申请的全部内 容在此引入本申请作为参考。
技术领域
本公开涉及终端技术领域, 更具体地, 涉及一种保护终端设备的方法、 装 置及终端设备。 背景技术
随着终端技术的不断发展, 终端设备的功能越来越多样化, 带给了人们很 好的使用体验, 人们也越来越多地在各种各样的场合使用终端设备。 例如, 在 乘坐公共交通工具时使用终端设备上网、 听音乐、 看视频等, 在跑步时使用终 端设备听音乐、 记录跑步信息 (跑步路线、 跑步时长) 等。
随着人们越来越多地在各种场合使用终端设备, 尤其是在公共场合使用终 端设备时, 终端设备也成为不法分子的盗抢目标。 例如, 当用户将耳机插入终 端设备听音乐时, 通常会将终端设备放入衣服口袋或随身携带的包中, 这就给 不法分子带来可乘之机, 他们将终端设备取出后迅速拔出耳机后逃走。 因此, 亟需一种方法能够保护终端设备。 发明内容
为克服相关技术中存在的问题, 本公开提供一种保护终端设备的方法、 装 置及终端设备, 能够起到防盗的作用。
根据本公开实施例的第一方面, 提供一种保护终端设备的方法, 包括: 获取插入耳机的终端设备的状态信息;
判断所述状态信息是否满足预设条件;
当所述状态信息满足预设条件时, 启动所述终端设备的报警模式。
在本公开的一实施例中, 所述状态信息包括以下的一种或多种: 所述终端 设备所处的环境信息、 所述终端设备的运动信息、 所述终端设备正在运行的应 用程序、所述终端设备是否处于屏幕关闭状态和所述终端设备的前置摄像头捕 捉到的图像中是否包含人脸。 在本公开的一实施例中, 所述终端设备所处的环境信息包括以下的一种或 多种: 所述终端设备的 GPS信息和所述终端设备所处的 Wi-Fi网络的名称。
在本公开的一实施例中, 启动所述设备终端的报警模式之后, 所述方法还 包括:检测所述耳机是否被拔出; 当检测到所述耳机被拔出时,执行报警操作。
在本公开的一实施例中,所述报警操作包括以下的一种或多种:声音报警、 振动报警、 闪光报警和通过密码解锁的锁屏操作。
在本公开的一实施例中, 当执行报警操作时检测到有耳机插入所述终端设 备时, 继续执行报警操作。
根据本公开实施例的第二方面, 提供一种保护终端设备的装置, 包括: 获取模块, 用于获取插入耳机的终端设备的状态信息;
判断模块, 用于判断所述状态信息是否满足预设条件;
启动模块, 用于当所述状态信息满足预设条件时, 启动所述终端设备的报 警模式。
在本公开的一实施例中, 所述状态信息包括以下的一种或多种: 所述终端 设备所处的环境信息、 所述终端设备的运动信息、 所述终端设备正在运行的应 用程序、所述终端设备是否处于屏幕关闭状态和所述终端设备的前置摄像头捕 捉到的图像中是否包含人脸。
在本公开的一实施例中, 所述终端设备所处的环境信息包括以下的一种或 多种: 所述终端设备的 GPS信息和所述终端设备所处的 Wi-Fi网络的名称。
在本公开的一实施例中, 所述装置还包括:
检测模块, 用于启动所述终端设备的报警模式后, 检测所述耳机是否被拔 出;
执行模块, 用于当检测到所述耳机被拔出时, 执行报警操作。
在本公开的一实施例中,所述报警操作包括以下的一种或多种:声音报警、 振动报警、 闪光报警和通过密码解锁的锁屏操作。
在本公开的一实施例中, 所述执行模块还用于: 执行报警操作时检测到有 耳机插入所述终端设备时, 继续执行报警操作。
根据本公开实施例的第三方面, 提供一种保护终端设备的装置, 包括: 处理器;
用于存储处理器可执行指令的存储器; 其中, 所述处理器被配置为: 获取插入耳机的终端设备的状态信息; 判断所述状态信息是否满足预设条件;
当所述状态信息满足预设条件时, 启动所述终端设备的报警模式。
本公开的实施例提供的技术方案可以包括以下有益效果:
通过终端设备的状态信息来判断是否启动终端设备的报警模式, 因此, 实 现了根据终端设备自身的状态信息来启动报警模式的方案, 无需用户手动启动 终端设备的报警模式, 提高了用户的使用体验, 并且, 由于可根据终端设备自 身的状态信息适时地启动报警模式, 避免了用户忘记启动报警模式的情形, 进 一步提高了终端设备的防盗性。
应当理解的是, 以上的一般描述和后文的细节描述仅是示例性和解释性 的, 并不能限制本公开。 附图说明
此处的附图被并入说明书中并构成本说明书的一部分, 示出了符合本发明 的实施例, 并与说明书一起用于解释本发明的原理。
图 1是根据一示例性实施例示出的一种保护终端设备的方法的流程图; 图 2是根据一示例性实施例示出的一种保护终端设备的方法的流程图; 图 3是根据一示例性实施例示出的一种保护终端设备的方法的流程图; 图 4是根据一示例性实施例示出的一种保护终端设备的方法的流程图; 图 5是根据一示例性实施例示出的一种保护终端设备的方法的流程图; 图 6是根据一示例性实施例示出的一种保护终端设备的方法的流程图; 图 7是根据一示例性实施例示出的一种保护终端设备的装置的示意图; 图 8是根据一示例性实施例示出的一种保护终端设备的装置的示意图; 图 9是根据一示例性实施例示出的一种装置的框图。 具体实施方式
这里将详细地对示例性实施例进行说明, 其示例表示在附图中。 下面的描 述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。 以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施 方式。 相反, 它们仅是与如所附权利要求书中所详述的、 本发明的一些方面相 一致的装置和方法的例子。
图 1是根据一示例性实施例示出的一种保护终端设备的方法的流程图。如 图 1所示, 该保护终端设备的方法用于终端设备中, 该方法包括以下步骤: 在步骤 S101中, 获取插入耳机的终端设备的状态信息。
其中, 状态信息包括但不限于以下的一种或多种: 所述终端设备所处的环 境信息、 所述终端设备的运动信息、 所述终端设备正在运行的应用程序和所述 终端设备是否处于屏幕关闭状态。
终端设备所处的环境信息例如包括: 终端设备的 GPS信息、 终端设备所处 的 Wi-Fi网络的名称。
终端设备的运动信息例如包括但不限于以下的一项或多项: 终端设备的振 动频率、 终端设备的位移、 终端设备的速度和终端设备的加速度。
在步骤 S102中, 判断所述状态信息是否满足预设条件。
在步骤 S103 中, 当所述状态信息满足预设条件时, 启动所述终端设备的 报警模式。
终端设备的报警模式是指当插入终端设备的耳机被拔出时, 终端设备将进 行报警操作以提醒用户, 报警操作可以包括但不限于以下的一种或多种: 声音 报警、 振动报警、 闪光报警和通过密码解锁的锁屏操作。
本公开提供的保护终端设备的方法, 通过终端设备的状态信息来判断是否 启动终端设备的报警模式, 因此, 实现了根据终端设备自身的状态信息来启动 报警模式的方案, 无需用户手动启动终端设备的报警模式, 提高了用户的使用 体验, 并且, 由于可根据终端设备自身的状态信息适时地启动报警模式, 避免 了用户忘记启动报警模式的情形, 进一步提高了终端设备的防盗性。
图 2是根据另一示例性实施例示出的一种保护终端设备的方法的流程图, 如图 2所示, 该保护终端设备的方法用于终端设备中, 在该实施例中, 启动所 述终端设备的报警模式的预设条件为: 终端设备的振动频率在预设时长内不为 零。 该方法包括以下步骤:
在步骤 S201中, 判断是否有耳机插入终端设备, 若是, 执行步骤 S202 ; 若否, 则结束。
在步骤 S202中, 获取插入耳机的终端设备的振动频率。
可以通过终端设备中配置的振动传感器、加速度传感器等来获取终端设备 的运动信息。 此外, 还可以利用 GPS技术来获取终端设备的运动信息。 例如, 人体移动会导致 GPS返回值的变化, 从而可以检测 GPS值的变化, 来判断终端 设备是否处于位置不停发生变化的运动状态。 当使用终端设备的用户处于行走 或奔跑状态时, 用户随身携带的终端设备也会产生相应的加速度、 振动频率或 位移。 因此, 根据终端设备的运动信息可判断用户 (以及终端设备)是否处于 运动状态中。
在步骤 S203 中, 判断获取的振动频率是否在预设时长内不为零; 若是, 执行步骤 S204; 若否, 则结束。
当运动信息中的振动频率不为零时, 则判断终端设备处于运动状态。 在步骤 S204中, 启动终端设备的报警模式。
在步骤 S205 中, 检测插入终端设备的耳机是否被拔出, 若是, 执行步骤 S206 ; 若否, 则重复执行该步骤。
智能手机耳机插拔过程中, 会造成电流的微小变化。 通过检测这一电流变 化, 可判断耳机插拔状态和动作过程。
在步骤 S206中, 执行报警操作。
其中, 报警操作可以包括但不限于以下中的一种或多种: 声音报警、 振动 报警、 闪光报警和通过密码解锁的锁屏操作。 例如, 报警操作可包括系统最大 值的声音报警、 LED最强光的光、 手机最强振动频率的振动以及屏幕显示输入 密码界面, 用户需输入预先设定的图形或数字完成解锁; 在解锁未完成前, 手 机不可执行任何命令; 若密码输入错误, 则保持锁屏状态, 直至密码输入正确 为止; 密码输入正确后, 警报解除, 声音停止, LED闪光灯熄灭, 振动停止, 手机恢复正常。
在本实施例中, 只要检测到终端设备处于运动状态时, 就启动终端设备的 报警模式, 从而可以为处于走路、 跑步等运动状态中的用户使用的终端设备提 供保护。
图 3是根据另一示例性实施例示出的一种保护终端设备的方法的流程图, 如图 3所示, 该保护终端设备的方法用于终端设备中, 在该实施例中, 启动所 述终端设备的报警模式的预设条件为: 终端设备的 GPS信息处于预设的位置之 外。 该方法包括以下步骤:
在步骤 S301中, 判断是否有耳机插入终端设备, 若是, 执行步骤 S302 ; 若否, 则结束。
在步骤 S302中, 获取插入耳机的终端设备的 GPS信息。
在步骤 S303中, 判断获取的 GPS信息是否处于预设的位置之外; 若是, 执行步骤 S304; 若否, 则结束。 预设的位置例如包括家、 单位的位置, 根据获取的 GPS信息可以获知终端 设备是否在家或单位。
在步骤 S304中, 启动终端设备的报警模式。
在步骤 S305 中, 检测插入终端设备的耳机是否被拔出, 若是, 执行步骤 S306 ; 若否, 则重复执行该步骤。
在步骤 S306中, 执行报警操作。
在本实施例中, 只要检测到终端设备处于预设的位置之外时, 就启动终端 设备的报警模式, 从而可以为终端设备提供例如除了家和单位之外的使用环境 的保护。
图 4是根据另一示例性实施例示出的一种保护终端设备的方法的流程图, 如图 4所示, 该保护终端设备的方法用于终端设备中, 在该实施例中, 启动所 述终端设备的报警模式的预设条件为: 终端设备正在运行的应用程序为指定的 应用程序。 该方法包括以下步骤:
在步骤 S401中, 判断是否有耳机插入终端设备, 若是, 执行步骤 S402 ; 若否, 则结束。
在步骤 S402中, 获取插入耳机的终端设备正在运行的应用程序。
在步骤 S403 中, 判断终端设备正在运行的应用程序是否为指定的应用程 序; 若是, 执行步骤 S404; 若否, 则结束。
例如, 指定的应用程序为播放歌曲的应用程序、 收听广播的应用程序、 接 听电话的应用程序, 用户在使用这些应用程序时可能会将手机放入口袋里。
在步骤 S404中, 启动终端设备的报警模式。
在步骤 S405 中, 检测插入终端设备的耳机是否被拔出, 若是, 执行步骤 S206 ; 若否, 则重复执行该步骤。
在步骤 S406中, 执行报警操作。
在本实施例中, 只要检测到终端设备中运行的应用程序为指定的应用程序 (用户在使用这些应用程序时, 通常使用耳机后将终端设备放入口袋) 时, 就 启动终端设备的报警模式, 从而可以为使用耳机的终端设备提供保护。
图 5是根据另一示例性实施例示出的一种保护终端设备的方法的流程图, 如图 5所示, 该保护终端设备的方法用于终端设备中, 在该实施例中, 启动所 述终端设备的报警模式的预设条件为: 终端设备的屏幕状态为关闭状态。 该方 在步骤 S501中, 判断是否有耳机插入终端设备, 若是, 执行步骤 S502 ; 若否, 则结束。
在步骤 S502中, 获取插入耳机的终端设备的屏幕状态。
在步骤 S503 中, 判断终端设备的屏幕状态是否为关闭状态; 若是, 执行 步骤 S504; 若否, 则结束。
在步骤 S504中, 启动终端设备的报警模式。
在步骤 S505 中, 检测插入终端设备的耳机是否被拔出, 若是, 执行步骤 S506 ; 若否, 则重复执行该步骤。
在步骤 S506中, 执行报警操作。
在本实施例中,检测到终端设备的屏幕处于关闭状态时才启动终端设备的 报警模式, 因此, 避免了当用户使用耳机观看视频或玩游戏时也启动报警模式 的资源浪费, 因为通常用户观看视频或玩游戏时, 终端设备不会被轻易盗走。
图 6是根据另一示例性实施例示出的一种保护终端设备的方法的流程图, 如图 6所示, 该保护终端设备的方法用于终端设备中, 在该实施例中, 获取所 述终端设备的前置摄像头捕捉到的图像; 当图像中包括人脸时, 不启动所述终 端设备的报警模式。 该方法包括以下步骤:
在步骤 S601中, 判断是否有耳机插入终端设备, 若是, 执行步骤 S602 ; 若否, 则结束。
在步骤 S602中, 获取所述终端设备的前置摄像头捕捉到的图像。
在步骤 S603中, 判断获取的图像中是否包括人脸, 若否, 执行步骤 S504; 若是, 则结束。
更可以是, 包括指定的人脸, 例如终端设备的主人。
在步骤 S604中, 启动终端设备的报警模式。
在步骤 S605 中, 检测插入终端设备的耳机是否被拔出, 若是, 执行步骤 S506 ; 若否, 则重复执行该步骤。
在步骤 S606中, 执行报警操作。
在本实施例中,检测到前置摄像头捕捉到的图像中包括人脸不启动终端设 备的报警模式, 因为通常前置摄像头捕捉到的图像中包括人脸时, 表示用户正 与终端设备面对面, 这种使用情形下, 终端设备不会被轻易盗走。 因此, 避免 了启动报警模式的资源浪费。
在本公开的另一个实施例中, 当执行报警操作时检测到有耳机再次插入该 终端设备时, 可以继续执行报警操作。
在本公开的其他实施例中, 可以将上述实施例中的两项或两项以上结合起 来, 例如, 可以将判断终端设备正在运行的应用程序是否为指定的应用程序以 及判断终端设备的屏幕状态是否为关闭状态结合起来, 当终端设备正在运行的 应用程序为播放音乐, 并且终端设备的屏幕关闭时才执行报警操作。 因为, 通 常屏幕开启时表示用户正在可见范围内使用, 可以不报警。 再例如, 可以将判 断获取的 GPS信息是否处于预设的位置之外以及判断获取的前置摄像头捕捉的 图像中是否包括人脸结合起来, 当终端设备的 GPS信息处于预设的位置之外, 并且终端设备的前置摄像头捕捉的图像中不包括人脸时, 启动报警操作, 因为 会有这样的情况, 即使终端设备的 GPS信息处于预设的位置之外, 但是用户正 在面对面地使用该终端设备, 这时就可以不启动报警操作, 节省资源。
综上, 本领域技术人员应当了解的是, 本公开提供的保护终端设备的方法 的主旨在于在终端设备满足预设条件的情况下为终端设备自动启动报警模式, 一方面尽可能的减小对用户正常操作的干扰, 另一方面减小用户在易丢失手机 的场景中需要手动启动报警模式这一操作习惯养成的时间成本。 同时, 由于可 自动启动报警模式, 可从一定程度上避免用户因忘记或未来得及选择打开报警 模式而丢失手机的情况发生, 使得 "耳机拔出即报警"功能拥有了更优的用户 体验和更好的运行效果。 至于预设条件具体为何, 可以根据情况进行设定, 并 不受限于本公开中所列举的实施例。
图 7是根据一示例性实施例示出的一种保护终端设备的装置示意图, 如图 7所示, 该装置包括获取模块 701、 判断模块 702和启动模块 703。
该获取模块 701被配置为获取插入耳机的终端设备的状态信息; 该判断模块 702被配置为判断所述状态信息是否满足预设条件; 该启动模块 703被配置为当所述状态信息满足预设条件时, 启动所述终端 设备的报警模式。
其中, 状态信息包括以下的一种或多种: 所述终端设备所处的环境信息、 所述终端设备的运动信息、 所述终端设备正在运行的应用程序、 所述终端设备 是否处于屏幕关闭状态和所述终端设备的前置摄像头捕捉到的图像中是否包 含人脸。
其中, 所述终端设备所处的环境信息包括以下的一种或多种: 所述终端设 备的 GPS信息和所述终端设备所处的 Wi-Fi网络的名称。 如图 8所示, 所述装置还包括检测模块 704和执行模块 705。
该检测模块 704被配置为启动所述终端设备的报警模式后, 检测所述耳机 是否被拔出;
该执行模块 705被配置为当检测到所述耳机被拔出时, 执行报警操作。 其中, 报警操作包括以下的一种或多种: 声音报警、 振动报警、 闪光报警 和通过密码解锁的锁屏操作。
其中, 该执行模块 705还被配置为执行报警操作时检测到有耳机插入所述 终端设备时, 继续执行报警操作。
关于上述实施例中的装置, 其中各个模块执行操作的具体方式已经在有关 该方法的实施例中进行了详细描述, 此处将不做详细阐述说明。
图 9是根据一示例性实施例示出的一种用于……的装置 800的框图。例如, 装置 800可以是移动电话, 计算机, 数字广播终端, 消息收发设备, 游戏控制 台, 平板设备, 医疗设备, 健身设备, 个人数字助理等。
参照图 9, 装置 800可以包括以下一个或多个组件: 处理组件 802, 存储 器 804, 电源组件 806, 多媒体组件 808, 音频组件 810, 输入 /输出 (I/ O ) 的接口 812, 传感器组件 814, 以及通信组件 816。
处理组件 802通常控制装置 800的整体操作, 诸如与显示, 电话呼叫, 数 据通信, 相机操作和记录操作相关联的操作。 处理元件 802可以包括一个或多 个处理器 820来执行指令, 以完成上述的方法的全部或部分步骤。 此外, 处理 组件 802可以包括一个或多个模块,便于处理组件 802和其他组件之间的交互。 例如, 处理部件 802可以包括多媒体模块, 以方便多媒体组件 808和处理组件 802之间的交互。
存储器 804被配置为存储各种类型的数据以支持在设备 800的操作。这些 数据的示例包括用于在装置 800上操作的任何应用程序或方法的指令, 联系人 数据, 电话簿数据, 消息, 图片, 视频等。 存储器 804可以由任何类型的易失 性或非易失性存储设备或者它们的组合实现, 如静态随机存取存储器(SRAM) , 电可擦除可编程只读存储器 (EEPR0M ) , 可擦除可编程只读存储器 (EPR0M ) , 可编程只读存储器 (PR0M ) , 只读存储器 (ROM ) , 磁存储器, 快闪存储器, 磁 盘或光盘。
电力组件 806为装置 800的各种组件提供电力。 电力组件 806可以包括电 源管理系统, 一个或多个电源, 及其他与为装置 800生成、 管理和分配电力相 关联的组件。
多媒体组件 808包括在所述装置 800和用户之间的提供一个输出接口的屏 幕。 在一些实施例中, 屏幕可以包括液晶显示器 (LCD ) 和触摸面板 (TP)。 如 果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。 触摸面板包括一个或多个触摸传感器以感测触摸、 滑动和触摸面板上的手势。 所述触摸传感器可以不仅感测触摸或滑动动作的边界, 而且还检测与所述触摸 或滑动操作相关的持续时间和压力。 在一些实施例中, 多媒体组件 808包括一 个前置摄像头和 /或后置摄像头。 当设备 800处于操作模式, 如拍摄模式或视 频模式时, 前置摄像头和 /或后置摄像头可以接收外部的多媒体数据。 每个前 置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变 焦能力。
音频组件 810被配置为输出和 /或输入音频信号。 例如, 音频组件 810包 括一个麦克风(MIC), 当装置 800处于操作模式, 如呼叫模式、 记录模式和语 音识别模式时, 麦克风被配置为接收外部音频信号。 所接收的音频信号可以被 进一步存储在存储器 804或经由通信组件 816发送。 在一些实施例中, 音频组 件 810还包括一个扬声器, 用于输出音频信号。
I/ O接口 812为处理组件 802和外围接口模块之间提供接口, 上述外围接 口模块可以是键盘, 点击轮, 按钮等。 这些按钮可包括但不限于: 主页按钮、 音量按钮、 启动按钮和锁定按钮。
传感器组件 814包括一个或多个传感器, 用于为装置 800提供各个方面的 状态评估。 例如, 传感器组件 814可以检测到设备 800的打开 /关闭状态, 组 件的相对定位, 例如所述组件为装置 800的显示器和小键盘, 传感器组件 814 还可以检测装置 800或装置 800—个组件的位置改变, 用户与装置 800接触的 存在或不存在, 装置 800方位或加速 /减速和装置 800的温度变化。 传感器组 件 814可以包括接近传感器, 被配置用来在没有任何的物理接触时检测附近物 体的存在。 传感器组件 814还可以包括光传感器, 如 CMOS或 CCD图像传感器, 用于在成像应用中使用。 在一些实施例中, 该传感器组件 814还可以包括加速 度传感器, 陀螺仪传感器, 磁传感器, 压力传感器或温度传感器。
通信组件 816被配置为便于装置 800和其他设备之间有线或无线方式的通 信。 装置 800可以接入基于通信标准的无线网络, 如 WiFi, 2G或 3G, 或它们 的组合。 在一个示例性实施例中, 通信部件 816经由广播信道接收来自外部广 播管理系统的广播信号或广播相关信息。 在一个示例性实施例中, 所述通信部 件 816还包括近场通信 (NFC ) 模块, 以促进短程通信。 例如, 在 NFC模块可 基于射频识别 (RFID ) 技术, 红外数据协会 (IrDA ) 技术, 超宽带 (UWB ) 技 术, 蓝牙 (BT) 技术和其他技术来实现。
在示例性实施例中,装置 800可以被一个或多个应用专用集成电路 (ASIC)、 数字信号处理器(DSP)、 数字信号处理设备 (DSPD)、 可编程逻辑器件 (PLD)、 现场可编程门阵列 (FPGA)、 控制器、 微控制器、 微处理器或其他电子元件实 现, 用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介 质, 例如包括指令的存储器 804, 上述指令可由装置 800的处理器 820执行以 完成上述方法。 例如, 所述非临时性计算机可读存储介质可以是 R0M、 随机存 取存储器 (RAM)、 CD-ROM, 磁带、 软盘和光数据存储设备等。
一种非临时性计算机可读存储介质, 当所述存储介质中的指令由终端设备 的处理器执行时, 使得移动终端能够执行一种保护终端设备的方法, 所述方法 包括:
获取插入耳机的终端设备的状态信息;
判断所述状态信息是否满足预设条件;
当所述状态信息满足预设条件时, 启动所述终端设备的报警模式。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发 明的其它实施方案。本申请旨在涵盖本发明的任何变型、用途或者适应性变化, 这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开 的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性 的, 本发明的真正范围和精神由下面的权利要求指出。
应当理解的是, 本发明并不局限于上面已经描述并在附图中示出的精确结 构, 并且可以在不脱离其范围进行各种修改和改变。 本发明的范围仅由所附的 权利要求来限制。

Claims

权利要求
1、 一种保护终端设备的方法, 其特征在于, 所述方法包括:
获取插入耳机的终端设备的状态信息;
判断所述状态信息是否满足预设条件;
当所述状态信息满足预设条件时, 启动所述终端设备的报警模式。
2、 根据权利要求 1所述的方法, 其特征在于, 所述状态信息包括以下的 一种或多种: 所述终端设备所处的环境信息、 所述终端设备的运动信息、 所述 终端设备正在运行的应用程序、所述终端设备是否处于屏幕关闭状态和所述终 端设备的前置摄像头捕捉到的图像中是否包含人脸。
3、 根据权利要求 2所述的方法, 其特征在于, 所述终端设备所处的环境 信息包括以下的一种或多种: 所述终端设备的 GPS信息和所述终端设备所处的 Wi-Fi网络的名称。
4、 根据权利要求 1所述的方法, 其特征在于, 启动所述设备终端的报警 模式之后, 所述方法还包括:
检测所述耳机是否被拔出;
当检测到所述耳机被拔出时, 执行报警操作。
5、 根据权利要求 4所述的方法, 其特征在于, 所述报警操作包括以下的 一种或多种: 声音报警、 振动报警、 闪光报警和通过密码解锁的锁屏操作。
6、 根据权利要求 4所述的方法, 其特征在于, 当执行报警操作时检测到 有耳机插入所述终端设备时, 继续执行报警操作。
7、 一种保护终端设备的装置, 其特征在于, 所述装置包括:
获取模块, 用于获取插入耳机的终端设备的状态信息;
判断模块, 用于判断所述状态信息是否满足预设条件;
启动模块, 用于当所述状态信息满足预设条件时, 启动所述终端设备的报 警模式。
8、 根据权利要求 7所述的装置, 其特征在于, 所述状态信息包括以下的 一种或多种: 所述终端设备所处的环境信息、 所述终端设备的运动信息、 所述 终端设备正在运行的应用程序、所述终端设备是否处于屏幕关闭状态和所述终 端设备的前置摄像头捕捉到的图像中是否包含人脸。
9、 根据权利要求 8所述的装置, 其特征在于, 所述终端设备所处的环境 信息包括以下的一种或多种: 所述终端设备的 GPS信息和所述终端设备所处的 Wi-Fi网络的名称。
10、 根据权利要求 7所述的装置, 其特征在于, 所述装置还包括: 检测模块, 用于启动所述终端设备的报警模式后, 检测所述耳机是否被拔 出;
执行模块, 用于当检测到所述耳机被拔出时, 执行报警操作。
11、 根据权利要求 10所述的装置, 其特征在于, 所述报警操作包括以下 的一种或多种: 声音报警、 振动报警、 闪光报警和通过密码解锁的锁屏操作。
12、 根据权利要求 10所述的方法, 其特征在于, 所述执行模块还用于: 执行报警操作时检测到有耳机插入所述终端设备时, 继续执行报警操作。
13、 一种保护终端设备的装置, 其特征在于, 包括:
处理器;
用于存储处理器可执行指令的存储器;
其中, 所述处理器被配置为:
获取插入耳机的终端设备的状态信息;
判断所述状态信息是否满足预设条件;
当所述状态信息满足预设条件时, 启动所述终端设备的报警模式。
PCT/CN2014/082914 2014-02-19 2014-07-24 一种保护终端设备的方法、装置及终端设备 WO2015123964A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
RU2015139025A RU2617679C2 (ru) 2014-02-19 2014-07-24 Способ и устройство для защиты терминальной аппаратуры и терминальная аппаратура
MX2014011336A MX350348B (es) 2014-02-19 2014-07-24 Metodo y dispositivo para proteger el aparato terminal y un aparato terminal.
KR1020147026565A KR101648499B1 (ko) 2014-02-19 2014-07-24 단말장치 보호방법, 장치, 단말장치, 프로그램 및 기록매체
JP2016503535A JP6461087B2 (ja) 2014-02-19 2014-07-24 端末装置を保護する方法、装置、端末装置、プログラム及び記録媒体
US14/533,106 US9721454B2 (en) 2014-02-19 2014-11-05 Method for protecting terminal devices and the terminal device thereof

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410056912.0A CN103841264A (zh) 2014-02-19 2014-02-19 一种保护终端设备的方法、装置及终端设备
CN201410056912.0 2014-02-19

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/533,106 Continuation US9721454B2 (en) 2014-02-19 2014-11-05 Method for protecting terminal devices and the terminal device thereof

Publications (1)

Publication Number Publication Date
WO2015123964A1 true WO2015123964A1 (zh) 2015-08-27

Family

ID=50804378

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/082914 WO2015123964A1 (zh) 2014-02-19 2014-07-24 一种保护终端设备的方法、装置及终端设备

Country Status (7)

Country Link
EP (1) EP2911126A1 (zh)
JP (1) JP6461087B2 (zh)
KR (1) KR101648499B1 (zh)
CN (1) CN103841264A (zh)
MX (1) MX350348B (zh)
RU (1) RU2617679C2 (zh)
WO (1) WO2015123964A1 (zh)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841264A (zh) * 2014-02-19 2014-06-04 小米科技有限责任公司 一种保护终端设备的方法、装置及终端设备
US9721454B2 (en) 2014-02-19 2017-08-01 Xiaomi Inc. Method for protecting terminal devices and the terminal device thereof
CN105934933B (zh) * 2014-12-30 2020-06-26 华为技术有限公司 一种防止终端丢失的方法和终端
CN105825609A (zh) * 2015-01-10 2016-08-03 鸿富锦精密工业(武汉)有限公司 报警电路及应用该报警电路的电子装置
CN105426794A (zh) * 2015-12-21 2016-03-23 联想(北京)有限公司 一种信息处理方法及电子设备
CN105632064A (zh) * 2016-01-26 2016-06-01 宇龙计算机通信科技(深圳)有限公司 终端防盗的报警方法、报警装置和终端
CN105827848A (zh) * 2016-04-28 2016-08-03 维沃移动通信有限公司 一种提醒方法及移动终端
CN105976842A (zh) * 2016-04-29 2016-09-28 广东欧珀移动通信有限公司 一种音频文件播放方法及移动终端
CN105827865A (zh) * 2016-05-16 2016-08-03 李�浩 一种防盗报警系统、电子设备以及防盗控制方法
CN106603830A (zh) * 2016-11-30 2017-04-26 努比亚技术有限公司 一种终端设备的告警提示装置和方法
CN107065016B (zh) * 2017-03-01 2019-04-12 歌尔科技有限公司 一种用于头戴式耳机的佩戴检测方法、装置及头戴式耳机
CN107277657B (zh) * 2017-05-18 2019-12-17 深圳市冠旭电子股份有限公司 一种耳机找回方法、装置及耳机
CN107147801A (zh) * 2017-06-06 2017-09-08 华东交通大学 基于usb接口附件的安卓手机防盗方法及系统
CN107277236A (zh) * 2017-06-06 2017-10-20 华东交通大学 基于sim卡的安卓手机防盗方法及系统
CN107040665A (zh) * 2017-06-06 2017-08-11 华东交通大学 基于耳机孔附件的安卓手机防盗方法及系统
CN107968891B (zh) * 2017-12-22 2020-09-01 维沃移动通信有限公司 一种移动终端的提醒方法及移动终端
ES2730392A1 (es) * 2019-03-12 2019-11-11 Ruiz Castillo Pedro Jose Alarma y procedimiento de seguridad personal
WO2021131074A1 (ja) * 2019-12-27 2021-07-01 ジャパンエレベーターサービスホールディングス株式会社 防犯カメラ装置および防犯カメラ装置制御プログラム

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783845A (zh) * 2009-12-22 2010-07-21 康佳集团股份有限公司 一种手机防盗方法以及防盗手机
CN102915607A (zh) * 2011-08-05 2013-02-06 上海晨兴希姆通电子科技有限公司 耳机防盗窃移动终端
CN103024164A (zh) * 2012-12-03 2013-04-03 北京百度网讯科技有限公司 移动终端的防盗方法和装置
CN103051787A (zh) * 2012-12-12 2013-04-17 惠州Tcl移动通信有限公司 移动终端及防止移动终端被盗的方法
CN103841264A (zh) * 2014-02-19 2014-06-04 小米科技有限责任公司 一种保护终端设备的方法、装置及终端设备

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2260840C2 (ru) * 2000-05-05 2005-09-20 Финглок Аб Средство защиты
RU66093U1 (ru) * 2005-12-22 2007-08-27 Виктор Викторович Тугучев Устройство личной безопасности, работающее в составе мобильного телефона
RU67306U1 (ru) * 2006-02-26 2007-10-10 Евгений Алексеевич Куликов Способ защиты мобильного телефона и других предметов от краж
JP2009053855A (ja) * 2007-08-24 2009-03-12 Panasonic Corp 携帯端末装置
KR101158742B1 (ko) * 2010-09-30 2012-06-22 (주) 시큐앱 도난방지 기능을 구비한 휴대전화기 및 그 도난방지방법
CN103220637A (zh) * 2012-01-19 2013-07-24 腾讯科技(深圳)有限公司 手机防盗保护方法及装置
KR101209558B1 (ko) * 2012-03-24 2012-12-07 브라운이노베이션 주식회사 스마트기기 도난방지장치 및 그 방법
CN103365554A (zh) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 移动终端和解锁操作处理方法
KR101377644B1 (ko) * 2012-05-11 2014-03-27 조정현 스마트 도난 방지 장치 및 이를 구비한 전자기기
KR101403705B1 (ko) * 2012-07-11 2014-06-05 주식회사 아이큐브 모바일 단말, 그 모바일 단말에서 이어폰 단자를 이용한 긴급 상황 경고 장치 및 방법
KR200469009Y1 (ko) 2012-07-24 2013-09-12 이태현 휴대폰 장식용 연결잭
CN103327175A (zh) * 2013-05-21 2013-09-25 上海斐讯数据通信技术有限公司 移动终端防盗系统及方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783845A (zh) * 2009-12-22 2010-07-21 康佳集团股份有限公司 一种手机防盗方法以及防盗手机
CN102915607A (zh) * 2011-08-05 2013-02-06 上海晨兴希姆通电子科技有限公司 耳机防盗窃移动终端
CN103024164A (zh) * 2012-12-03 2013-04-03 北京百度网讯科技有限公司 移动终端的防盗方法和装置
CN103051787A (zh) * 2012-12-12 2013-04-17 惠州Tcl移动通信有限公司 移动终端及防止移动终端被盗的方法
CN103841264A (zh) * 2014-02-19 2014-06-04 小米科技有限责任公司 一种保护终端设备的方法、装置及终端设备

Also Published As

Publication number Publication date
RU2015139025A (ru) 2017-03-16
KR20150108029A (ko) 2015-09-24
CN103841264A (zh) 2014-06-04
KR101648499B1 (ko) 2016-08-16
MX350348B (es) 2017-09-05
JP6461087B2 (ja) 2019-01-30
JP2016521478A (ja) 2016-07-21
RU2617679C2 (ru) 2017-04-26
EP2911126A1 (en) 2015-08-26
MX2014011336A (es) 2016-02-19

Similar Documents

Publication Publication Date Title
WO2015123964A1 (zh) 一种保护终端设备的方法、装置及终端设备
US10610152B2 (en) Sleep state detection method, apparatus and system
US10282031B2 (en) Method and device for restraining edge touches
WO2016112699A1 (zh) 切换显示模式的方法及装置
EP3163854B1 (en) Reduced notifications for same push messages
WO2016173245A1 (zh) 权限管理方法和装置
US20150350406A1 (en) Method and device for calendar reminding
EP3136699A1 (en) Method and device for connecting external equipment
WO2017185573A1 (zh) 一种进行解锁的方法和装置
EP3076745B1 (en) Methods and apparatuses for controlling wireless access point
WO2017045307A1 (zh) 接听扩展功能显示方法及装置
JP2017535895A (ja) 移動端末制御方法および移動端末
WO2017016109A1 (zh) 事件提醒方法及装置
CN105554255B (zh) 用于终端设备的操作控制方法及装置
EP3024211B1 (en) Method and device for announcing voice call
WO2016065750A1 (zh) 事项内容显示方法及装置
WO2017036018A1 (zh) 指纹识别方法、装置及移动终端
WO2017201891A1 (zh) 控制触控屏状态的方法及装置、电子设备
JP6276863B2 (ja) モバイルルータのトラフィック制御方法及び装置
WO2017080205A1 (zh) 一种锁屏壁纸相关信息获取方法及装置
WO2017092500A1 (zh) 功能键的触控方法及装置
US9721454B2 (en) Method for protecting terminal devices and the terminal device thereof
WO2016095395A1 (zh) 激活移动终端的操作状态的方法及装置
WO2016015404A1 (zh) 呼叫转移的方法、装置及终端
WO2017016145A1 (zh) 状态通知方法及装置

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2016503535

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2014/011336

Country of ref document: MX

ENP Entry into the national phase

Ref document number: 20147026565

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2015139025

Country of ref document: RU

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14882945

Country of ref document: EP

Kind code of ref document: A1

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112014025060

Country of ref document: BR

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14882945

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 112014025060

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20141008