WO2015123964A1 - 一种保护终端设备的方法、装置及终端设备 - Google Patents
一种保护终端设备的方法、装置及终端设备 Download PDFInfo
- Publication number
- WO2015123964A1 WO2015123964A1 PCT/CN2014/082914 CN2014082914W WO2015123964A1 WO 2015123964 A1 WO2015123964 A1 WO 2015123964A1 CN 2014082914 W CN2014082914 W CN 2014082914W WO 2015123964 A1 WO2015123964 A1 WO 2015123964A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- alarm
- terminal
- status information
- earphone
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000007613 environmental effect Effects 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims description 2
- 230000003213 activating effect Effects 0.000 claims 2
- 238000004891 communication Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000001133 acceleration Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1445—Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04R—LOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
- H04R29/00—Monitoring arrangements; Testing arrangements
Definitions
- the present invention is based on a Chinese patent application with the application number of CN2014100569120 and the application date being February 19, 2014, and claims the priority of the Chinese patent application, the Chinese patent application The entire disclosure is hereby incorporated by reference.
- the present disclosure relates to the field of terminal technologies, and in particular, to a method, device and terminal device for protecting a terminal device. Background technique
- terminal devices With the continuous development of terminal technologies, the functions of terminal devices are becoming more and more diverse, bringing people a very good experience, and people are increasingly using terminal devices in various occasions. For example, when using public transportation, use the terminal device to surf the Internet, listen to music, watch videos, etc., use the terminal device to listen to music, record running information (running route, running time), etc. while running.
- terminal equipment As people increasingly use terminal equipment in a variety of situations, especially when using terminal equipment in public, terminal equipment has also become a target for criminals. For example, when a user inserts a headset into a terminal device to listen to music, the terminal device is usually placed in a pocket of a garment or a carry-on bag, which gives the criminals an opportunity to take out the terminal device and quickly pull it out. Escape after the headphones. Therefore, there is a need for a method to protect the terminal device. Summary of the invention
- the present disclosure provides a method, a device and a terminal device for protecting a terminal device, which can function as an antitheft.
- a method for protecting a terminal device including: acquiring state information of a terminal device inserted into the earphone;
- the alarm mode of the terminal device is activated.
- the status information includes one or more of the following: environment information of the terminal device, motion information of the terminal device, an application program that the terminal device is running, Whether the terminal device is in a screen off state and whether an image captured by a front camera of the terminal device includes a human face.
- the environment information of the terminal device includes one or more of the following: GPS information of the terminal device and a name of a Wi-Fi network where the terminal device is located.
- the method further includes: detecting whether the earphone is pulled out; and when detecting that the earphone is pulled out, performing an alarm operation.
- the alarm operation includes one or more of the following: an audible alarm, a vibration alarm, a flash alarm, and a lock screen operation unlocked by a password.
- the alarm operation is continued.
- an apparatus for protecting a terminal device including: an acquiring module, configured to acquire state information of a terminal device that is inserted into the earphone;
- a determining module configured to determine whether the status information meets a preset condition
- a startup module configured to start an alarm mode of the terminal device when the status information meets a preset condition.
- the status information includes one or more of the following: environment information of the terminal device, motion information of the terminal device, an application program that the terminal device is running, Whether the terminal device is in a screen off state and whether an image captured by a front camera of the terminal device includes a human face.
- the environment information of the terminal device includes one or more of the following: GPS information of the terminal device and a name of a Wi-Fi network where the terminal device is located.
- the device further includes:
- a detecting module configured to detect whether the earphone is removed after starting an alarm mode of the terminal device
- an execution module configured to perform an alarm operation when detecting that the earphone is pulled out.
- the alarm operation includes one or more of the following: an audible alarm, a vibration alarm, a flash alarm, and a lock screen operation unlocked by a password.
- the execution module is further configured to: continue to perform an alarm operation when detecting that an earphone is inserted into the terminal device when performing an alarm operation.
- an apparatus for protecting a terminal device including: a processor;
- a memory for storing processor-executable instructions; wherein the processor is configured to: obtain state information of a terminal device inserted into the earphone; Determining whether the status information satisfies a preset condition;
- the alarm mode of the terminal device is activated.
- the state information of the terminal device is used to determine whether to activate the alarm mode of the terminal device. Therefore, the solution for starting the alarm mode according to the state information of the terminal device itself is realized, and the user does not need to manually start the alarm mode of the terminal device, thereby improving the user experience. Moreover, since the alarm mode can be activated according to the state information of the terminal device in a timely manner, the situation that the user forgets to start the alarm mode is avoided, and the anti-theft property of the terminal device is further improved.
- FIG. 1 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
- FIG. 2 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
- FIG. FIG. 4 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
- FIG. 5 is a flowchart according to an exemplary embodiment.
- FIG. 6 is a flowchart of a method for protecting a terminal device according to an exemplary embodiment.
- FIG. 7 is a device for protecting a terminal device according to an exemplary embodiment.
- FIG. 8 is a schematic diagram of an apparatus for protecting a terminal device according to an exemplary embodiment.
- FIG. 9 is a block diagram of an apparatus according to an exemplary embodiment. detailed description
- FIG. 1 is a flowchart of a method of protecting a terminal device according to an exemplary embodiment.
- the method for protecting a terminal device is used in a terminal device, and the method includes the following steps:
- step S101 status information of a terminal device inserted into the earphone is obtained.
- the status information includes, but is not limited to, one or more of the following: environment information of the terminal device, motion information of the terminal device, an application program that the terminal device is running, and whether the terminal device is in The screen is off.
- the environmental information of the terminal device includes, for example, GPS information of the terminal device and a name of the Wi-Fi network where the terminal device is located.
- the motion information of the terminal device includes, for example but not limited to, one or more of the following: a vibration frequency of the terminal device, a displacement of the terminal device, a speed of the terminal device, and an acceleration of the terminal device.
- step S102 it is determined whether the status information satisfies a preset condition.
- step S103 when the status information satisfies a preset condition, the alarm mode of the terminal device is started.
- the alarm mode of the terminal device means that when the earphone inserted into the terminal device is pulled out, the terminal device will perform an alarm operation to remind the user that the alarm operation may include but is not limited to one or more of the following: audible alarm, vibration alarm, flash Alarm and lock screen operation unlocked by password.
- the method for protecting a terminal device determines whether to activate an alarm mode of the terminal device by using status information of the terminal device. Therefore, a solution for starting an alarm mode according to status information of the terminal device itself is implemented, and the user does not need to manually start the terminal device.
- the alarm mode improves the user experience, and since the alarm mode can be activated according to the state information of the terminal device in a timely manner, the situation that the user forgets to start the alarm mode is avoided, and the anti-theft property of the terminal device is further improved.
- FIG. 2 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 2, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is started.
- the preset condition of the alarm mode of the terminal device is:
- the vibration frequency of the terminal device is not zero within a preset duration.
- the method includes the following steps:
- step S201 it is determined whether or not a headset is inserted into the terminal device, and if so, step S202 is performed; if not, the process ends.
- step S202 the vibration frequency of the terminal device inserted into the earphone is acquired.
- the motion information of the terminal device can be obtained through a vibration sensor, an acceleration sensor, or the like configured in the terminal device.
- GPS technology can also be utilized to acquire motion information of the terminal device.
- the movement of the human body may cause a change in the GPS return value, so that the change in the GPS value can be detected to determine whether the terminal device is in a motion state in which the position is constantly changing.
- the terminal equipment carried by the user will also generate corresponding acceleration, vibration frequency or displacement. Therefore, it can be determined whether the user (and the terminal device) is in a motion state based on the motion information of the terminal device.
- step S203 it is determined whether the acquired vibration frequency is not zero within the preset duration; if yes, step S204 is performed; if not, then is ended.
- step S204 the alarm mode of the terminal device is started.
- step S205 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S206 is performed; if not, the step is repeatedly performed.
- step S206 an alarm operation is performed.
- the alarm operation may include, but is not limited to, one or more of the following: an audible alarm, a vibration alarm, a flash alarm, and a lock screen operation unlocked by a password.
- the alarm operation may include an audible alarm of the maximum value of the system, a light of the strongest light of the LED, a vibration of the strongest vibration frequency of the mobile phone, and an interface for inputting a password on the screen.
- the user needs to input a preset graphic or number to complete the unlocking; Before the completion, the phone can't execute any command; if the password is entered incorrectly, it will remain locked until the password is entered correctly; after the password is entered correctly, the alarm is released, the sound stops, the LED flash is off, the vibration stops, and the phone returns to normal.
- the alarm mode of the terminal device is activated, thereby providing protection for the terminal device used by the user in a state of motion such as walking or running.
- FIG. 3 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 3, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is started.
- the preset condition of the alarm mode of the terminal device is: The GPS information of the terminal device is outside the preset position.
- the method includes the following steps:
- step S301 it is determined whether or not a headset is inserted into the terminal device, and if so, step S302 is performed; if not, the process ends.
- step S302 GPS information of the terminal device inserted into the earphone is acquired.
- step S303 it is determined whether the acquired GPS information is outside the preset position; if yes, step S304 is performed; if not, then ending.
- the preset position includes, for example, the location of the home and the unit, and according to the acquired GPS information, it can be known whether the terminal device is at home or a unit.
- step S304 the alarm mode of the terminal device is started.
- step S305 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S306 is performed; if not, the step is repeated.
- step S306 an alarm operation is performed.
- the alarm mode of the terminal device is activated, so that the terminal device can be provided with protection of the use environment other than the home and the unit, for example.
- FIG. 4 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 4, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is started.
- the preset condition of the alarm mode of the terminal device is:
- the application that the terminal device is running is the specified application. The method includes the following steps:
- step S401 it is determined whether or not a headset is inserted into the terminal device, and if so, step S402 is performed; if not, the process ends.
- step S402 an application that the terminal device inserted into the earphone is running is acquired.
- step S403 it is determined whether the application that the terminal device is running is the specified application; if yes, step S404 is performed; if not, the process ends.
- the specified application is an application that plays songs, an application that listens to the broadcast, and an application that answers the call, and the user may put the phone in his pocket when using the application.
- step S404 the alarm mode of the terminal device is activated.
- step S405 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S206 is performed; if not, the step is repeatedly performed.
- step S406 an alarm operation is performed.
- the alarm mode of the terminal device is started. , which can provide protection for terminal devices that use headphones.
- FIG. 5 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment.
- the method for protecting a terminal device is used in a terminal device.
- the method is started.
- the preset condition of the alarm mode of the terminal device is:
- the screen state of the terminal device is off.
- the party In step S501, it is determined whether or not an earphone is inserted into the terminal device, and if so, step S502 is performed; if not, the process ends.
- step S502 the screen state of the terminal device inserted into the earphone is acquired.
- step S503 it is determined whether the screen state of the terminal device is the off state; if yes, step S504 is performed; if not, the process is ended.
- step S504 the alarm mode of the terminal device is started.
- step S505 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S506 is performed; if not, the step is repeated.
- step S506 an alarm operation is performed.
- the alarm mode of the terminal device is started, thereby avoiding waste of resources when the user uses the earphone to watch the video or play the game, because the user usually watches.
- the terminal device will not be easily stolen.
- FIG. 6 is a flowchart of a method for protecting a terminal device according to another exemplary embodiment. As shown in FIG. 6, the method for protecting a terminal device is used in a terminal device. In this embodiment, the method is obtained. The image captured by the front camera of the terminal device; when the image includes a human face, the alarm mode of the terminal device is not activated. The method includes the following steps:
- step S601 it is determined whether or not the earphone is inserted into the terminal device, and if so, step S602 is performed; if not, the process ends.
- step S602 an image captured by a front camera of the terminal device is acquired.
- step S603 it is determined whether a face is included in the acquired image, and if not, step S504 is performed; if yes, the process ends.
- it includes a specified face, such as the owner of the terminal device.
- step S604 the alarm mode of the terminal device is started.
- step S605 it is detected whether the earphone inserted into the terminal device is pulled out, and if so, step S506 is performed; if not, the step is repeated.
- step S606 an alarm operation is performed.
- the image captured by the front camera includes an alarm mode in which the face does not activate the terminal device, because when the image captured by the front camera usually includes a face, the user is facing the terminal device.
- the terminal device will not be easily stolen. Therefore, the waste of resources for starting the alarm mode is avoided.
- two or more of the above embodiments may be combined. For example, it may be determined whether the application that the terminal device is running is a specified application and the screen state of the terminal device is determined. Whether it is combined for the closed state, the alarm operation is performed when the application that the terminal device is running is playing music, and the screen of the terminal device is turned off. Because, when the screen is turned on, it means that the user is using it in the visible range, and it can not alarm.
- the device may be determined whether the acquired GPS information is outside the preset position and whether the captured image captured by the front camera is included in the image, and when the GPS information of the terminal device is in a preset position, And when the image captured by the front camera of the terminal device does not include a human face, the alarm operation is started, because there is a case where the user is using the terminal face to face even if the GPS information of the terminal device is outside the preset position.
- the device at this time, can not start the alarm operation, saving resources.
- the method for protecting a terminal device is mainly for automatically starting an alarm mode for a terminal device when the terminal device meets a preset condition, and on the other hand, reducing the pair as much as possible.
- the interference of the user's normal operation reduces the time cost of the user's operation habit of manually starting the alarm mode in the scenario where the mobile phone is easily lost.
- the alarm mode can be automatically activated, the user can be prevented from losing the mobile phone due to forgetting or in the future, and the "earphone pull-out is alarm" function has a better user experience and more. Good running effect.
- the settings may be made according to the circumstances, and are not limited to the embodiments enumerated in the present disclosure.
- FIG. 7 is a schematic diagram of an apparatus for protecting a terminal device according to an exemplary embodiment. As shown in FIG. 7, the device includes an obtaining module 701, a determining module 702, and a starting module 703.
- the obtaining module 701 is configured to acquire state information of the terminal device inserted into the earphone; the determining module 702 is configured to determine whether the state information meets a preset condition; the starting module 703 is configured to: when the state information meets a preset When the condition is met, the alarm mode of the terminal device is activated.
- the status information includes one or more of the following: the environment information of the terminal device, the motion information of the terminal device, the application program that the terminal device is running, whether the terminal device is in a screen off state. Whether or not a human face is included in an image captured by a front camera of the terminal device.
- the environment information of the terminal device includes one or more of the following: a GPS information of the terminal device and a name of a Wi-Fi network where the terminal device is located.
- the apparatus further includes a detection module 704 and an execution module 705.
- the detecting module 704 is configured to detect whether the earphone is pulled out after the alarm mode of the terminal device is activated;
- the execution module 705 is configured to perform an alarm operation when it is detected that the earphone is unplugged.
- the alarm operation includes one or more of the following: audible alarm, vibration alarm, flash alarm and lock screen operation unlocked by password.
- the execution module 705 is further configured to continue to perform an alarm operation when detecting that an earphone is inserted into the terminal device when performing an alarm operation.
- FIG. 9 is a block diagram of an apparatus 800 for:
- device 800 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
- device 800 can include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, And a communication component 816.
- Processing component 802 typically controls the overall operation of device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 802 can include one or more processors 820 to execute instructions to perform all or part of the steps described above.
- processing component 802 can include one or more modules to facilitate interaction between component 802 and other components.
- processing component 802 can include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
- Memory 804 is configured to store various types of data to support operation at device 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 804 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPR0M), erasable Programmable Read Only Memory (EPR0M), Programmable Read Only Memory (PR0M), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
- SRAM static random access memory
- EEPR0M electrically erasable programmable read only memory
- EPR0M erasable Programmable Read Only Memory
- PR0M Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 806 provides power to various components of device 800.
- Power component 806 can include a power management system, one or more power sources, and others that generate, manage, and distribute power for device 800. Associated components.
- the multimedia component 808 includes a screen between the device 800 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor can sense not only the boundaries of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 808 includes a front camera and/or a rear camera. When the device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
- Audio component 810 is configured to output and/or input audio signals.
- audio component 810 includes a microphone (MIC) that is configured to receive an external audio signal when device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 804 or transmitted via communication component 816.
- audio component 810 also includes a speaker for outputting an audio signal.
- the I/O interface 812 provides an interface between the processing component 802 and the peripheral interface module.
- the peripheral interface module can be a keyboard, a click wheel, a button, and the like. These buttons can include, but are not limited to: Home button, Volume button, Start button, and Lock button.
- Sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of device 800.
- sensor component 814 can detect an open/closed state of device 800, a relative positioning of components, such as the display and keypad of device 800, and sensor component 814 can also detect the location of device 800 or device 800 components. Changes, the presence or absence of user contact with device 800, device 800 orientation or acceleration/deceleration and temperature variation of device 800.
- Sensor assembly 814 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 814 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 816 is configured to facilitate wired or wireless communication between device 800 and other devices.
- the device 800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- communication component 816 receives from the outside via a broadcast channel Broadcast the broadcast signal or broadcast related information of the system.
- the communication component 816 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above method.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor or other electronic component implementation for performing the above method.
- non-transitory computer readable storage medium comprising instructions, such as a memory 804 comprising instructions executable by processor 820 of apparatus 800 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- a non-transitory computer readable storage medium when the instructions in the storage medium are executed by a processor of the terminal device, to enable the mobile terminal to perform a method of protecting the terminal device, the method comprising:
- the alarm mode of the terminal device is activated.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Burglar Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2015139025A RU2617679C2 (ru) | 2014-02-19 | 2014-07-24 | Способ и устройство для защиты терминальной аппаратуры и терминальная аппаратура |
MX2014011336A MX350348B (es) | 2014-02-19 | 2014-07-24 | Metodo y dispositivo para proteger el aparato terminal y un aparato terminal. |
KR1020147026565A KR101648499B1 (ko) | 2014-02-19 | 2014-07-24 | 단말장치 보호방법, 장치, 단말장치, 프로그램 및 기록매체 |
JP2016503535A JP6461087B2 (ja) | 2014-02-19 | 2014-07-24 | 端末装置を保護する方法、装置、端末装置、プログラム及び記録媒体 |
US14/533,106 US9721454B2 (en) | 2014-02-19 | 2014-11-05 | Method for protecting terminal devices and the terminal device thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410056912.0A CN103841264A (zh) | 2014-02-19 | 2014-02-19 | 一种保护终端设备的方法、装置及终端设备 |
CN201410056912.0 | 2014-02-19 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/533,106 Continuation US9721454B2 (en) | 2014-02-19 | 2014-11-05 | Method for protecting terminal devices and the terminal device thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015123964A1 true WO2015123964A1 (zh) | 2015-08-27 |
Family
ID=50804378
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/082914 WO2015123964A1 (zh) | 2014-02-19 | 2014-07-24 | 一种保护终端设备的方法、装置及终端设备 |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP2911126A1 (zh) |
JP (1) | JP6461087B2 (zh) |
KR (1) | KR101648499B1 (zh) |
CN (1) | CN103841264A (zh) |
MX (1) | MX350348B (zh) |
RU (1) | RU2617679C2 (zh) |
WO (1) | WO2015123964A1 (zh) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103841264A (zh) * | 2014-02-19 | 2014-06-04 | 小米科技有限责任公司 | 一种保护终端设备的方法、装置及终端设备 |
US9721454B2 (en) | 2014-02-19 | 2017-08-01 | Xiaomi Inc. | Method for protecting terminal devices and the terminal device thereof |
CN105934933B (zh) * | 2014-12-30 | 2020-06-26 | 华为技术有限公司 | 一种防止终端丢失的方法和终端 |
CN105825609A (zh) * | 2015-01-10 | 2016-08-03 | 鸿富锦精密工业(武汉)有限公司 | 报警电路及应用该报警电路的电子装置 |
CN105426794A (zh) * | 2015-12-21 | 2016-03-23 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
CN105632064A (zh) * | 2016-01-26 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | 终端防盗的报警方法、报警装置和终端 |
CN105827848A (zh) * | 2016-04-28 | 2016-08-03 | 维沃移动通信有限公司 | 一种提醒方法及移动终端 |
CN105976842A (zh) * | 2016-04-29 | 2016-09-28 | 广东欧珀移动通信有限公司 | 一种音频文件播放方法及移动终端 |
CN105827865A (zh) * | 2016-05-16 | 2016-08-03 | 李�浩 | 一种防盗报警系统、电子设备以及防盗控制方法 |
CN106603830A (zh) * | 2016-11-30 | 2017-04-26 | 努比亚技术有限公司 | 一种终端设备的告警提示装置和方法 |
CN107065016B (zh) * | 2017-03-01 | 2019-04-12 | 歌尔科技有限公司 | 一种用于头戴式耳机的佩戴检测方法、装置及头戴式耳机 |
CN107277657B (zh) * | 2017-05-18 | 2019-12-17 | 深圳市冠旭电子股份有限公司 | 一种耳机找回方法、装置及耳机 |
CN107147801A (zh) * | 2017-06-06 | 2017-09-08 | 华东交通大学 | 基于usb接口附件的安卓手机防盗方法及系统 |
CN107277236A (zh) * | 2017-06-06 | 2017-10-20 | 华东交通大学 | 基于sim卡的安卓手机防盗方法及系统 |
CN107040665A (zh) * | 2017-06-06 | 2017-08-11 | 华东交通大学 | 基于耳机孔附件的安卓手机防盗方法及系统 |
CN107968891B (zh) * | 2017-12-22 | 2020-09-01 | 维沃移动通信有限公司 | 一种移动终端的提醒方法及移动终端 |
ES2730392A1 (es) * | 2019-03-12 | 2019-11-11 | Ruiz Castillo Pedro Jose | Alarma y procedimiento de seguridad personal |
WO2021131074A1 (ja) * | 2019-12-27 | 2021-07-01 | ジャパンエレベーターサービスホールディングス株式会社 | 防犯カメラ装置および防犯カメラ装置制御プログラム |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783845A (zh) * | 2009-12-22 | 2010-07-21 | 康佳集团股份有限公司 | 一种手机防盗方法以及防盗手机 |
CN102915607A (zh) * | 2011-08-05 | 2013-02-06 | 上海晨兴希姆通电子科技有限公司 | 耳机防盗窃移动终端 |
CN103024164A (zh) * | 2012-12-03 | 2013-04-03 | 北京百度网讯科技有限公司 | 移动终端的防盗方法和装置 |
CN103051787A (zh) * | 2012-12-12 | 2013-04-17 | 惠州Tcl移动通信有限公司 | 移动终端及防止移动终端被盗的方法 |
CN103841264A (zh) * | 2014-02-19 | 2014-06-04 | 小米科技有限责任公司 | 一种保护终端设备的方法、装置及终端设备 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2260840C2 (ru) * | 2000-05-05 | 2005-09-20 | Финглок Аб | Средство защиты |
RU66093U1 (ru) * | 2005-12-22 | 2007-08-27 | Виктор Викторович Тугучев | Устройство личной безопасности, работающее в составе мобильного телефона |
RU67306U1 (ru) * | 2006-02-26 | 2007-10-10 | Евгений Алексеевич Куликов | Способ защиты мобильного телефона и других предметов от краж |
JP2009053855A (ja) * | 2007-08-24 | 2009-03-12 | Panasonic Corp | 携帯端末装置 |
KR101158742B1 (ko) * | 2010-09-30 | 2012-06-22 | (주) 시큐앱 | 도난방지 기능을 구비한 휴대전화기 및 그 도난방지방법 |
CN103220637A (zh) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | 手机防盗保护方法及装置 |
KR101209558B1 (ko) * | 2012-03-24 | 2012-12-07 | 브라운이노베이션 주식회사 | 스마트기기 도난방지장치 및 그 방법 |
CN103365554A (zh) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | 移动终端和解锁操作处理方法 |
KR101377644B1 (ko) * | 2012-05-11 | 2014-03-27 | 조정현 | 스마트 도난 방지 장치 및 이를 구비한 전자기기 |
KR101403705B1 (ko) * | 2012-07-11 | 2014-06-05 | 주식회사 아이큐브 | 모바일 단말, 그 모바일 단말에서 이어폰 단자를 이용한 긴급 상황 경고 장치 및 방법 |
KR200469009Y1 (ko) | 2012-07-24 | 2013-09-12 | 이태현 | 휴대폰 장식용 연결잭 |
CN103327175A (zh) * | 2013-05-21 | 2013-09-25 | 上海斐讯数据通信技术有限公司 | 移动终端防盗系统及方法 |
-
2014
- 2014-02-19 CN CN201410056912.0A patent/CN103841264A/zh active Pending
- 2014-07-24 RU RU2015139025A patent/RU2617679C2/ru active
- 2014-07-24 WO PCT/CN2014/082914 patent/WO2015123964A1/zh active Application Filing
- 2014-07-24 KR KR1020147026565A patent/KR101648499B1/ko active IP Right Grant
- 2014-07-24 MX MX2014011336A patent/MX350348B/es active IP Right Grant
- 2014-07-24 JP JP2016503535A patent/JP6461087B2/ja active Active
- 2014-11-21 EP EP14194305.0A patent/EP2911126A1/en not_active Ceased
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783845A (zh) * | 2009-12-22 | 2010-07-21 | 康佳集团股份有限公司 | 一种手机防盗方法以及防盗手机 |
CN102915607A (zh) * | 2011-08-05 | 2013-02-06 | 上海晨兴希姆通电子科技有限公司 | 耳机防盗窃移动终端 |
CN103024164A (zh) * | 2012-12-03 | 2013-04-03 | 北京百度网讯科技有限公司 | 移动终端的防盗方法和装置 |
CN103051787A (zh) * | 2012-12-12 | 2013-04-17 | 惠州Tcl移动通信有限公司 | 移动终端及防止移动终端被盗的方法 |
CN103841264A (zh) * | 2014-02-19 | 2014-06-04 | 小米科技有限责任公司 | 一种保护终端设备的方法、装置及终端设备 |
Also Published As
Publication number | Publication date |
---|---|
RU2015139025A (ru) | 2017-03-16 |
KR20150108029A (ko) | 2015-09-24 |
CN103841264A (zh) | 2014-06-04 |
KR101648499B1 (ko) | 2016-08-16 |
MX350348B (es) | 2017-09-05 |
JP6461087B2 (ja) | 2019-01-30 |
JP2016521478A (ja) | 2016-07-21 |
RU2617679C2 (ru) | 2017-04-26 |
EP2911126A1 (en) | 2015-08-26 |
MX2014011336A (es) | 2016-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015123964A1 (zh) | 一种保护终端设备的方法、装置及终端设备 | |
US10610152B2 (en) | Sleep state detection method, apparatus and system | |
US10282031B2 (en) | Method and device for restraining edge touches | |
WO2016112699A1 (zh) | 切换显示模式的方法及装置 | |
EP3163854B1 (en) | Reduced notifications for same push messages | |
WO2016173245A1 (zh) | 权限管理方法和装置 | |
US20150350406A1 (en) | Method and device for calendar reminding | |
EP3136699A1 (en) | Method and device for connecting external equipment | |
WO2017185573A1 (zh) | 一种进行解锁的方法和装置 | |
EP3076745B1 (en) | Methods and apparatuses for controlling wireless access point | |
WO2017045307A1 (zh) | 接听扩展功能显示方法及装置 | |
JP2017535895A (ja) | 移動端末制御方法および移動端末 | |
WO2017016109A1 (zh) | 事件提醒方法及装置 | |
CN105554255B (zh) | 用于终端设备的操作控制方法及装置 | |
EP3024211B1 (en) | Method and device for announcing voice call | |
WO2016065750A1 (zh) | 事项内容显示方法及装置 | |
WO2017036018A1 (zh) | 指纹识别方法、装置及移动终端 | |
WO2017201891A1 (zh) | 控制触控屏状态的方法及装置、电子设备 | |
JP6276863B2 (ja) | モバイルルータのトラフィック制御方法及び装置 | |
WO2017080205A1 (zh) | 一种锁屏壁纸相关信息获取方法及装置 | |
WO2017092500A1 (zh) | 功能键的触控方法及装置 | |
US9721454B2 (en) | Method for protecting terminal devices and the terminal device thereof | |
WO2016095395A1 (zh) | 激活移动终端的操作状态的方法及装置 | |
WO2016015404A1 (zh) | 呼叫转移的方法、装置及终端 | |
WO2017016145A1 (zh) | 状态通知方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2016503535 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2014/011336 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 20147026565 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2015139025 Country of ref document: RU Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14882945 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112014025060 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14882945 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112014025060 Country of ref document: BR Kind code of ref document: A2 Effective date: 20141008 |