WO2016145794A1 - 终端保护方法及装置 - Google Patents

终端保护方法及装置 Download PDF

Info

Publication number
WO2016145794A1
WO2016145794A1 PCT/CN2015/088670 CN2015088670W WO2016145794A1 WO 2016145794 A1 WO2016145794 A1 WO 2016145794A1 CN 2015088670 W CN2015088670 W CN 2015088670W WO 2016145794 A1 WO2016145794 A1 WO 2016145794A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
privacy
state
wearable device
parameter
Prior art date
Application number
PCT/CN2015/088670
Other languages
English (en)
French (fr)
Inventor
徐源源
陈斌
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016145794A1 publication Critical patent/WO2016145794A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communications, and in particular to a terminal protection method and apparatus.
  • subways, buses, Internet cafes, restaurants, shopping malls, railway stations, elevators, fitting rooms and schools are the most vulnerable places for the nine mobile phones.
  • the above are likely to cause commonality in the location where the mobile phone is stolen, such as "personnel intensive, fluid, and noisy".
  • In shopping malls, fitting rooms attention is easy to disperse when selecting or trying out products.
  • Mobile phones are easy to be left behind or stolen.
  • Internet cafes, schools, etc. are places where people stay for a long time. It is easier for people to relax their vigilance, so it also needs to be caused. Pay attention to it.
  • the survey also found that the morning and evening peaks and holidays are the main time and period of the mobile phone theft case. During this period, the shopping malls are crowded with crowds and the density is high. The frequency of public transportation is high, which is more likely to cause mobile phone theft and needs special attention.
  • Apple also discloses a scheme for performing security level adjustment based on geographic location, proximity to a specific device, specific network detection, and specific access point detection techniques to determine the current scene.
  • the terminal has not proposed an effective solution to the problem of how to prevent when the terminal is in danger of being stolen or the privacy is in danger of being leaked.
  • the embodiment of the invention provides a terminal protection method and device, so as to at least solve the problem of how to prevent the terminal in the related art when the danger of being stolen or the privacy is in danger of being leaked.
  • a terminal protection method includes: detecting a speed at which a terminal is away from a wearable device and/or a distance between the terminal and the wearable device; and the speed is greater than a first predetermined threshold and/or Or if the distance is greater than the second predetermined threshold, the terminal and/or the wearable device are controlled to issue an alarm signal.
  • the method before detecting the speed of the terminal away from the wearable device and/or the distance between the terminal and the wearable device, the method includes: receiving the first indication information, where the first indication information is used to indicate that the terminal is in a high-risk scenario Or indicating that the terminal is in a high-risk scenario of privacy leakage; confirming that the first indication information is consistent with the first designated information pre-stored in the terminal; and controlling the terminal to enter a stolen alert state or enter a privacy alert state.
  • the terminal when the terminal is in the privacy alert state, prohibiting, by the terminal, displaying the details of the second designated information and/or prohibiting modifying the third specified information of the terminal.
  • the method includes: receiving the second indication information, where the second indication information is used to indicate that the terminal exits the stolen high-risk scenario or is used to indicate that the terminal exits.
  • the second indication information is used to indicate that the terminal exits the stolen high-risk scenario or is used to indicate that the terminal exits.
  • the method includes: controlling the terminal to store the first parameter corresponding to the stolen alert state and/or the second parameter corresponding to the privacy alert state; and acquiring the terminal a state parameter of the environment; wherein the state parameter includes at least one of the following information: geographic location information of the terminal, a route of the terminal moving, a gyro parameter of the terminal, and a network state parameter of the network connected by the terminal; When the state parameter is within the predetermined range of the first parameter, controlling the terminal to enter the stolen alert state, and/or controlling the terminal to enter the privacy alert when the state parameter is within a predetermined range of the second parameter status.
  • the terminal is wirelessly connected to the wearable device.
  • a terminal protection apparatus including: a detection module configured to detect a speed at which the terminal is away from the wearable device and/or a distance between the terminal and the wearable device; and an alarm module And being arranged to control the terminal and/or the wearable device to issue an alarm signal if the speed is greater than a first predetermined threshold and/or the distance is greater than a second predetermined threshold.
  • the device further includes: a first receiving module, configured to receive the first indication information, where the first indication information is used to indicate that the terminal is in a high-risk scenario or is used to indicate that the terminal is in a high risk of privacy leakage a first confirmation module, configured to confirm that the first indication information is consistent with the first designated information pre-stored in the terminal; and the entering module is configured to control the terminal to enter a stolen alert state or enter a privacy alert state.
  • a first receiving module configured to receive the first indication information, where the first indication information is used to indicate that the terminal is in a high-risk scenario or is used to indicate that the terminal is in a high risk of privacy leakage
  • a first confirmation module configured to confirm that the first indication information is consistent with the first designated information pre-stored in the terminal
  • the entering module is configured to control the terminal to enter a stolen alert state or enter a privacy alert state.
  • the foregoing apparatus further includes: a prohibiting module, configured to prohibit, when the terminal is in the privacy alarm state, prohibiting the display of the second specified information by the terminal and/or prohibiting modifying the third specified information of the terminal .
  • a prohibiting module configured to prohibit, when the terminal is in the privacy alarm state, prohibiting the display of the second specified information by the terminal and/or prohibiting modifying the third specified information of the terminal .
  • the device further includes: a second receiving module, configured to receive the second indication information, where the second indication information is used to indicate that the terminal exits the stolen high-risk scene or is used to instruct the terminal to exit the privacy Exposing a high-risk scenario; the second confirmation module is configured to confirm that the first indication information is consistent with the fourth designation information pre-stored in the terminal; the exit module is configured to control the terminal to exit the foregoing according to the second indication information Burglary Leave the status or exit the above privacy alert status.
  • a second receiving module configured to receive the second indication information, where the second indication information is used to indicate that the terminal exits the stolen high-risk scene or is used to instruct the terminal to exit the privacy Exposing a high-risk scenario
  • the second confirmation module is configured to confirm that the first indication information is consistent with the fourth designation information pre-stored in the terminal
  • the exit module is configured to control the terminal to exit the foregoing according to the second indication information Burglary Leave the status or exit the above privacy alert status.
  • the device further includes: a first control module, configured to control the terminal to store the first parameter corresponding to the stolen alert state and/or the second parameter corresponding to the privacy alert state; and the acquiring module is configured to Acquiring the state parameter of the environment in which the terminal is located; wherein the state parameter includes at least one of the following information: geographic location information of the terminal, a route of the terminal moving, a gyro parameter of the terminal, and a network of the network connected to the terminal a second control module, configured to control the terminal to enter the stolen alert state when the state parameter is within a predetermined range of the first parameter, and/or, wherein the state parameter is in the second parameter When the predetermined range is within, the terminal is controlled to enter the privacy alarm state.
  • a first control module configured to control the terminal to store the first parameter corresponding to the stolen alert state and/or the second parameter corresponding to the privacy alert state
  • the acquiring module is configured to Acquiring the state parameter of the environment in which the terminal is located
  • the state parameter includes at least one
  • the terminal is wirelessly connected to the wearable device.
  • the speed of detecting the terminal away from the wearable device and/or the distance between the terminal and the wearable device is adopted; if the speed is greater than the first predetermined threshold and/or the distance is greater than the second predetermined threshold, The control terminal and/or the wearable device emit an alarm signal.
  • the invention solves the problem of how to prevent the terminal when the terminal is in danger of being stolen or the privacy is in danger of being leaked, thereby avoiding theft of the terminal and the leakage of the terminal privacy as much as possible.
  • FIG. 1 is a flowchart of a terminal protection method according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing the structure of a terminal protection device according to an embodiment of the present invention.
  • FIG. 3 is a structural block diagram (1) of a terminal protection device according to an embodiment of the present invention.
  • FIG. 4 is a structural block diagram (2) of a terminal protection device according to an embodiment of the present invention.
  • FIG. 5 is a structural block diagram (3) of a terminal protection apparatus according to an embodiment of the present invention.
  • FIG. 6 is a structural block diagram (4) of a terminal protection device according to an embodiment of the present invention.
  • FIG. 7 is a flow chart (1) of a mobile phone anti-theft and privacy protection based on a wearable device according to an embodiment of the present invention
  • FIG. 8 is a flow chart (2) of a mobile phone anti-theft and privacy protection based on a wearable device according to an embodiment of the present invention
  • FIG. 9 is a block diagram showing the results of a wearable device-based mobile phone theft prevention and privacy protection according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a terminal protection method according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
  • Step S102 detecting a speed at which the terminal is away from the wearable device and/or a distance between the terminal and the wearable device;
  • Step S104 in the case that the speed is greater than the first predetermined threshold and/or the distance is greater than the second predetermined threshold, the control terminal and/or the wearable device issues an alarm signal.
  • the first indication information is received, where the first indication information is used to indicate that the terminal is in a high risk of being stolen.
  • the scenario is used to indicate that the terminal is in a high-risk scenario of privacy leakage, and confirms that the first indication information is consistent with the first specified information pre-stored in the terminal, and controls the terminal to enter a stolen alert state or enter a privacy alert state.
  • the details of the second specified information are prohibited from being displayed by the terminal, and in another alternative implementation, the modification of the third specified information of the terminal is prohibited.
  • the new message prompt mode is automatically switched to the privacy prompt mode according to the current distance from the wristband. If there is a distance from the wristband, the details are not displayed; and when the distance exceeds the wearable device, the mobile phone is hard-keyed from the sleep state. Or if the gesture wakes up, the prompt is made on the wearable device, and the guest mode is immediately entered regardless of which group of passwords are input when the mobile phone is woken up.
  • the terminal is often changed in the above-mentioned stolen alert state or the privacy alert state and the normal state.
  • the terminal and/or the wearable device sends an alarm signal
  • the terminal receives the second indication information, wherein the second indication
  • the information is used to indicate that the terminal exits the stolen high-risk scenario or is used to indicate that the terminal exits the high-risk scenario of the privacy leakage, confirms that the first indication information is consistent with the fourth designated information pre-stored in the terminal, and controls the terminal according to the second indication information. Exit the stolen alert status or exit the privacy alert status.
  • the control terminal stores the first parameter corresponding to the stolen alert state and/or the second parameter corresponding to the privacy alert state, and acquires the terminal.
  • a status parameter of the environment wherein the status parameter includes information of at least one of: geographic location information of the terminal, route of the terminal movement, gyroscope parameters of the terminal, network state parameters of the network to which the terminal is connected, and the state parameter
  • the control terminal enters the stolen alert state, and/or, when the state parameter is within a predetermined range of the second parameter, the control terminal enters the privacy alert state.
  • the terminal is connected to the wearable device via a wireless connection, such as over a wireless network or via Bluetooth.
  • the method can be implemented by means of software plus the necessary general hardware platform, of course, it can also be through hardware, but in many cases the former is a better implementation.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium (such as ROM/RAM, disk).
  • the optical disc includes a plurality of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method described in various embodiments of the present invention.
  • a terminal protection device is also provided, which is used to implement the foregoing embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • the method includes: a detecting module 22 configured to detect a speed of the terminal away from the wearable device and/or a distance between the terminal and the wearable device.
  • the alarm module 24 is configured to control the terminal and/or the wearable device to issue an alarm signal if the speed is greater than the first predetermined threshold and/or the distance is greater than the second predetermined threshold.
  • FIG. 3 is a structural block diagram (1) of a terminal protection apparatus according to an embodiment of the present invention.
  • the apparatus further includes: a first receiving module 32 configured to receive first indication information, wherein the first indication The information is used to indicate that the terminal is in a high-risk scenario of being stolen or used to indicate that the terminal is in a high-risk scenario of privacy leakage; the first confirmation module 34 is configured to confirm that the first indication information is consistent with the first specified information pre-stored in the terminal.
  • the entry module 36 is configured to control the terminal to enter the stolen alert state or enter a privacy alert state.
  • the apparatus further includes: a prohibition module 42 configured to prohibit the passage of the terminal when the terminal is in the privacy alarm state.
  • the terminal displays the details of the second specified information and/or prohibits modification of the third specified information of the terminal.
  • the apparatus further includes: a second receiving module 52 configured to receive second indication information, wherein the second The indication information is used to indicate that the terminal exits the stolen high-risk scenario or is used to instruct the terminal to exit the privacy leakage high-risk scenario; the second confirmation module 54 is configured to confirm the first indication information and the fourth pre-stored in the terminal. The designation information is consistent; the exiting module 56 is configured to control the terminal to exit the stolen alert state or exit the privacy alert state according to the second indication information.
  • FIG. 6 is a structural block diagram (4) of a terminal protection apparatus according to an embodiment of the present invention.
  • the apparatus further includes: a first control module 62 configured to control the terminal to store the stolen alarm state corresponding to a first parameter and/or a second parameter corresponding to the privacy alarm state;
  • the obtaining module 64 is configured to acquire a state parameter of an environment in which the terminal is located; wherein the state parameter includes information of at least one of: a geography of the terminal Position information, a route moved by the terminal, a gyroscope parameter of the terminal, and a network state parameter of the network to which the terminal is connected;
  • the second control module 66 is configured to be when the state parameter is within a predetermined range of the first parameter, Controlling the terminal to enter the stolen alert state, and/or controlling the terminal to enter the privacy alert state when the state parameter is within a predetermined range of the second parameter.
  • the terminal is wirelessly connected to the wearable device.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the control terminal and/or the wearable device issues an alarm signal.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor executes the above S1 and S2 according to the stored program code in the storage medium.
  • three scenarios are distinguished: a high-risk scenario of being stolen, a high-risk scenario of privacy, and a common scenario; for the first two scenarios, the first use of voice commands issued by the owner enters and exits the scenario; for theft and privacy
  • the judgment parameters and subsequent responses of the scene are differentiated and judged according to their respective characteristics to further meet the requirements of the user's actual use scene; and have the learning ability to learn various parameters of the mobile phone record in the user-specified scene (according to the stolen and
  • the two scenarios of privacy also have parameter distinctions, so that in the future use, it is not necessary to frequently issue instructions, and the user can automatically enter the required scene according to the previous usage, which is convenient for the user to use.
  • the scene is judged, and the anti-theft or the prevention of privacy leakage is monitored according to the characteristics of each scene.
  • Step 1 The wearable device has a specific command voice command receiving and storing system, a network connection with the mobile phone (such as Bluetooth), and an instruction sending/receiving system; the mobile phone has a network connection with the wearable device and an instruction receiving/issuing system;
  • the mobile phone has a specific command voice command receiving and storing system, a network connection with the mobile phone (such as Bluetooth), and an instruction sending/receiving system;
  • the mobile phone has a network connection with the wearable device and an instruction receiving/issuing system;
  • Step 2 When the wearable device receives the specific voice command 1 issued by the user indicating that the high-risk scene is now stolen, the mobile phone receives the command and compares the currently voiced voiceprint with the main voiceprint of the mobile phone. After determining that the instruction is issued by the owner, the system is in a state of being stolen; first, the mobile phone adds a verification identity link to the preset shutdown operation; and notifies the wearable device, the wearable device and the mobile phone when detecting that the mobile phone is long pressed by the power button At the same time, an alarm is issued; and the distance between the wearable device and the mobile phone and the motion state of the mobile phone are detected in real time regardless of whether the mobile phone is in use or in a dormant state. When it is detected that the mobile phone and the wearable device are away from each other at a speed higher than a preset speed, or the distance between the two is more than a preset, the wearable device and the mobile phone simultaneously issue an alarm;
  • Step 3 When the wearable device receives a specific voice command 11 issued by the user, indicating that the stolen high-risk scene is now exited, The mobile phone receives the command and compares the currently printed voiceprint with the main voiceprint of the mobile phone, and determines that the system exits the stolen alert state after being commanded by the owner;
  • Step 4 Record the geographical location, the moving route, the gyroscope parameters, and the connected hotspots from entering the high-risk state of theft prevention to the high-risk state, forming a parameter condition data packet A1; when the next user is the same parameter condition data packet B1 and The similarity of the data packet A1 reaches a certain index, and it is detected that the wristband is in a normal wearing state (temperature, pulse, strap buckle, etc.), and the user does not need to issue a voice command again, and automatically enters the stolen alert state;
  • the specific instruction 11 (specific operation or voice) is issued again or the current parameter condition data packet C1 and the recorded data packet A1 are dissimilar to a certain index, and the state is released;
  • Step 5 As shown in FIG. 8 when the wearable device receives the specific voice command 2 issued by the user, indicating that the user is currently in a high-risk scenario, the mobile phone receives the command and compares the currently voiced voiceprint with the main voiceprint of the mobile phone. Yes, after determining that the command is issued by the owner, the system is in a privacy alert state; the mobile phone usage status is monitored. And automatically switch the new message prompt mode to the privacy prompt mode according to the current distance from the wristband.
  • the details are not displayed; and when the distance exceeds the wearable device, the mobile phone is hard-keyed from the sleep state or When the gesture wakes up, the prompt is made on the wearable device, and the guest mode is immediately entered regardless of which group of passwords are input when the mobile phone is woken up;
  • Step 6 As shown in FIG. 8, when the wearable device receives the specific voice command 22 issued by the user indicating that the user is currently in a high-risk privacy scene, the mobile phone receives the command and performs the voice voice pattern of the current command and the voiceprint of the machine inside the mobile phone. After the comparison, it is determined that the instruction issued by the owner, the system exits the privacy alert state;
  • Step 7 As shown in FIG. 8, record the geographical location from the entry to the exit high-risk state of privacy, the connected hotspot, the biometric characteristics of the non-owner user, and the connected device form the parameter condition data packet A2; the next time the user is detected the same The degree of similarity between the conditional data packet B2 and the data packet A2 reaches a certain index, and the wristband is detected to be in a normal wearing state (temperature, pulse, strap buckle, etc.), so that the user does not need to issue a voice command again, automatically Entering a high-risk state of privacy; until the user again issues a specific command (specific operation or voice) or the current parameter condition data packet C2 and the recorded data packet A2 dissimilarity reaches a certain index, the state is released;
  • a specific command specific operation or voice
  • Step 8 If the system does not receive the specific user instruction, and the parameter condition data packet has the similarity degree with the preset stolen security data packet or the privacy high-risk data packet, the system is in the normal state;
  • the embodiment provides a mobile phone anti-theft and privacy protection system and method based on the wearable device. Please refer to FIG. 7 , which is a schematic flowchart of the method provided by the embodiment.
  • Step 1 The wearable device has a specific command voice command receiving and storing system, a network connection with the mobile phone (such as Bluetooth), and an instruction sending/receiving system; the mobile phone has a network connection with the wearable device and an instruction receiving/issuing system;
  • the mobile phone has a specific command voice command receiving and storing system, a network connection with the mobile phone (such as Bluetooth), and an instruction sending/receiving system;
  • the mobile phone has a network connection with the wearable device and an instruction receiving/issuing system;
  • Step 2 As shown in FIG. 7, when the wearable device receives the specific voice command 1 issued by the user indicating that the high-risk scene is now stolen, the mobile phone receives the command and sends the voice voice pattern of the current command and the main voiceprint of the mobile phone. After the comparison is made, it is determined that the system is in a stolen alert state after the instruction issued by the owner; first, the mobile phone adds a verification identity link to the preset shutdown operation; and the wearable device is notified when it is detected that the mobile phone is long pressed by the power button. The wearable device and the mobile phone simultaneously issue an alarm; and the distance between the wearable device and the mobile phone and the mobile phone are detected in real time regardless of whether the mobile phone is in use or in a dormant state. Movement state. When it is detected that the mobile phone and the wearable device are away from each other at a speed higher than a preset speed, or the distance between the two is more than a preset, the wearable device and the mobile phone simultaneously issue an alarm;
  • Step 3 As shown in FIG. 7, when the wearable device receives the specific voice command 11 issued by the user to indicate that the stolen high-risk scene is now exited, the mobile phone receives the command and performs the voiceprint of the current command and the main voiceprint of the mobile phone. After the comparison, it is determined that after the instruction issued by the owner, the system exits the stolen alert state;
  • Step 4 Record the geographical location, the moving route, the gyroscope parameters, and the connected hotspots from entering the high-risk state of theft prevention to the high-risk state, forming a parameter condition data packet A1; when the next user is the same parameter condition data packet B1 and The similarity of the data packet A1 reaches a certain index, and it is detected that the wristband is in a normal wearing state (temperature, pulse, strap buckle, etc.), and the user does not need to issue a voice command again, and automatically enters the stolen alert state;
  • the specific instruction 11 (specific operation or voice) is issued again or the current parameter condition data packet C1 and the recorded data packet A1 are dissimilar to a certain index, and the state is released;
  • Step 5 As shown in FIG. 8 when the wearable device receives the specific voice command 2 issued by the user, indicating that the user is currently in a high-risk scenario, the mobile phone receives the command and compares the currently voiced voiceprint with the main voiceprint of the mobile phone. Yes, after determining that the command is issued by the owner, the system is in a privacy alert state; the mobile phone usage status is monitored. And automatically switch the new message prompt mode to the privacy prompt mode according to the current distance from the wristband.
  • the details are not displayed; and when the distance exceeds the wearable device, the mobile phone is hard-keyed from the sleep state or When the gesture wakes up, the prompt is made on the wearable device, and the guest mode is immediately entered regardless of which group of passwords are input when the mobile phone is woken up;
  • Step 6 As shown in FIG. 8, when the wearable device receives the specific voice command 22 issued by the user indicating that the user is currently in a high-risk privacy scene, the mobile phone receives the command and performs the voice voice pattern of the current command and the voiceprint of the machine inside the mobile phone. After the comparison, it is determined that the instruction issued by the owner, the system exits the privacy alert state;
  • Step 7 As shown in FIG. 8, record the geographical location from the entry to the exit high-risk state of privacy, the connected hotspot, the biometric characteristics of the non-owner user, and the connected device form the parameter condition data packet A2; the next time the user is detected the same The degree of similarity between the conditional data packet B2 and the data packet A2 reaches a certain index, and the wristband is detected to be in a normal wearing state (temperature, pulse, strap buckle, etc.), so that the user does not need to issue a voice command again, automatically Entering a high-risk state of privacy; until the user again issues a specific command (specific operation or voice) or the current parameter condition data packet C2 and the recorded data packet A2 dissimilarity reaches a certain index, the state is released;
  • a specific command specific operation or voice
  • Step 8 If the system does not receive the specific user command, and the parameter condition data packet has a similarity with the preset stolen alert data packet or the privacy high risk data packet, the system is in a normal state.
  • the voice command is issued to the watch: anti-theft; then the mobile phone enters the anti-theft high-risk mode: automatically adjusts the shutdown to require the verification of the main identity mode, and begins Real-time calculation of the mutual position of the watch and the mobile phone. If the mobile phone is taken away by the person, the bottom layer can judge that the watch and the mobile phone are far away from each other at a certain speed, and both the watch and the mobile phone will simultaneously give an alarm prompt for sound and vibration;
  • the mobile phone receives the command, and remembers that the current position is xx, records its moving route, the connected wifi is zzz, and the gyroscope records the motion state; Then These parameters are recorded as the anti-theft high-risk mode parameter A1.
  • the next time you take the bus you only need to judge that the connected wifi is zzz, and the current position meets a certain point in the previous route.
  • the gyroscope's motion state is consistent with the characteristics of the bus. Then automatically enter the anti-theft high-risk mode;
  • the user sends a voice command in the office: privacy; then the mobile phone enters the privacy high-risk mode: monitors the state of use of the mobile phone, adjusts the new message prompt to a mode according to the distance from the watch to switch to whether the details are displayed; and once the distance is detected After the safety distance is exceeded, the mobile phone is actively illuminated, and the watch immediately reminds the owner of the machine, and immediately enters the guest mode regardless of which group of passwords are input when the mobile phone is woken up;
  • the mobile phone received the command and remembered that the current location is xx xx, the connected wifi is zzz, and the person in the middle used the mobile phone. Then, these parameters are recorded as the privacy high-risk mode parameter A2.
  • the privacy high-risk mode is automatically entered;
  • FIG. 9 is a block diagram showing results of a mobile phone anti-theft and privacy protection based on a wearable device according to an embodiment of the present invention, as shown in FIG. 9, wherein S901, S902, S903, S904, S905, and S906 are equipped with both wearable devices and mobile phones.
  • Basic module
  • the S907 voice command module is responsible for receiving a specific voice command sent by the user in the wearable device of the embodiment of the present invention. After receiving and identifying, the command and the voice packet are sent to the mobile phone to respond to the identification of the command; the S910 sound of the mobile phone is provided.
  • the pattern recognition module detects that the voice packet corresponding to the voice instruction conforms to the preset voiceprint feature, and the state switching function corresponding to the voice command is actually effective;
  • S908, S909, S911, S912 are used as parameter memory modules in the high-risk mode and high-risk mode of privacy. According to different module calls, different parameters are recorded to form high-risk parameter packages; and in daily use, feedback is also based on these modules. The parameters are compared with the high-risk parameter package to determine whether to automatically switch to the anti-theft high-risk mode and the privacy high-risk mode.
  • the embodiments of the present invention solve the problem of how to prevent the terminal when the terminal is in danger of being stolen or the privacy is in danger of being leaked, thereby avoiding theft of the terminal and the privacy of the terminal as much as possible.
  • the leak is a problem of how to prevent the terminal when the terminal is in danger of being stolen or the privacy is in danger of being leaked, thereby avoiding theft of the terminal and the privacy of the terminal as much as possible. The leak.
  • modules or steps of the embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the speed of detecting the terminal away from the wearable device and/or the terminal and the wearable device are adopted.
  • the control terminal and/or the wearable device issues an alarm signal if the speed is greater than the first predetermined threshold and/or the distance is greater than the second predetermined threshold.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种终端保护方法及装置,其中,该方法包括:检测终端远离可穿戴设备的速度和/或该终端与该可穿戴设备的距离;在该速度大于第一预定阈值和/或该距离大于第二预定阈值的情况下,控制终端和/或可穿戴设备发出报警信号。解决了相关技术中终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题,进而尽可能的避免了终端的被盗和终端隐私的泄漏。

Description

终端保护方法及装置 技术领域
本发明涉及通信领域,具体而言,涉及一种终端保护方法及装置。
背景技术
有关报告指出,地铁、公交、网吧、餐厅、商场、火车站、电梯、试衣间以及学校是九大手机最易失窃的高危地点。以上容易造成手机被盗的地点存在共性,比如“人员密集、流动性大、声音嘈杂”等。而在商场、试衣间,挑选或试用商品时注意力容易分散,手机很容易被遗落或偷走;网吧、学校等是人们长期停留的地方,较易让人放松警惕,因此也需要引起重视。
并且调查发现,早晚高峰、节假日是手机失窃案件发生的主要时段和时期,这期间商场景点人流拥挤、密度大乘坐公用交通工具频次高,较容易发生手机失窃,需要特别关注。
手机一旦被盗,往往不仅是财产,而且会造成账户、隐私外泄等更为严重的损失,是用户需要密切关注的。作为厂家,也需要通过合理的设计,尽量帮助用户避免此类事件。
手机硬件被盗会造成损失,而看似安全的家里或者办公室则很容易发生隐私泄露事件。
目前有很多防盗软件可以通过设置账号绑定手机的方式进行防盗。一旦发现被盗,可以在其他设备上登陆账号后远程操控被盗手机进行手机锁定、拍照上传、发出报警音、远程资料销毁等操作。
苹果公司在US886217这篇专利中还揭示了一种根据地理位置、临近特定设备、特定网络检测、特定接入点检测这几种技术判断当前场景后进行安全等级调整的方案。
隐私保护方面也有很多软件可以进行保护,一般来说用户可以将隐私的资料转移入一个空间(专门的软件或者账号),点击进入需要验证生物特征或特定密码。
已有技术方案更多揭示的是手机被盗后如何进行找回,或如何设置隐私空间;但对于防盗当下的阻止或者有隐私被偷窥危险时的防护则没有太多的涉及。并且往往对于多密码对应多空间的隐私保护策略,往往只能骗到不太熟悉的用户,而很难被亲密的人所相信。
针对相关技术中,终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题,还未提出有效的解决方案。
发明内容
本发明实施例提供了一种终端保护方法及装置,以至少解决相关技术中终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题。
根据本发明实施例的一个方面,提供了一种终端保护方法,包括:检测终端远离可穿戴设备的速度和/或上述终端与上述可穿戴设备的距离;在上述速度大于第一预定阈值和/或上述距离大于第二预定阈值的情况下,控制上述终端和/或上述可穿戴设备发出报警信号。
可选地,检测终端远离可穿戴设备的速度和/或上述终端与上述可穿戴设备的距离之前包括:接收第一指示信息,其中,上述第一指示信息用于指示上述终端处于被盗高危场景或者用于指示上述终端处于隐私泄露高危场景;确认上述第一指示信息与在上述终端中预先存储的第一指定信息一致;控制上述终端进入被盗警戒状态或者进入隐私告警状态。
可选地,在上述终端处于上述隐私告警状态时,禁止通过上述终端显示第二指定信息的详情和/或禁止对上述终端的第三指定信息进行修改。
可选地,上述终端和/或上述可穿戴设备发出报警信号之后包括:接收第二指示信息,其中,上述第二指示信息用于指示上述终端退出上述被盗高危场景或者用于指示上述终端退出上述隐私泄露高危场景;确认上述第一指示信息与在上述终端中预先存储的第四指定信息一致;根据上述第二指示信息控制上述终端退出上述被盗警戒状态或者退出上述隐私告警状态。
可选地,上述终端和/或上述可穿戴设备发出报警信号之后包括:控制上述终端存储上述被盗警戒状态对应的第一参数和/或者上述隐私告警状态对应的第二参数;获取上述终端所处环境的状态参数;其中,上述状态参数包括以下至少之一的信息:上述终端的地理位置信息、上述终端移动的路线、上述终端的陀螺仪参数、上述终端连接的网络的网络状态参数;在上述状态参数在上述第一参数的预定范围内时,控制上述终端进入上述被盗警戒状态,和/或,在上述状态参数在上述第二参数的预定范围内时,控制上述终端进入上述隐私告警状态。
可选地,上述终端与上述可穿戴设备通过无线连接。
根据本发明实施例的另一个方面,还提供了一种终端保护装置,包括:检测模块,被设置为检测终端远离可穿戴设备的速度和/或上述终端与上述可穿戴设备的距离;报警模块,被设置为在上述速度大于第一预定阈值和/或上述距离大于第二预定阈值的情况下,控制上述终端和/或上述可穿戴设备发出报警信号。
可选地,上述装置还包括:第一接收模块,被设置为接收第一指示信息,其中,上述第一指示信息用于指示上述终端处于被盗高危场景或者用于指示上述终端处于隐私泄露高危场景;第一确认模块,被设置为确认上述第一指示信息与在上述终端中预先存储的第一指定信息一致;进入模块,被设置为控制上述终端进入被盗警戒状态或者进入隐私告警状态。
可选地,上述装置还包括:禁止模块,被设置为在上述终端处于上述隐私告警状态时,禁止通过上述终端显示第二指定信息的详情和/或禁止对上述终端的第三指定信息进行修改。
可选地,上述装置还包括:第二接收模块,被设置为接收第二指示信息,其中,上述第二指示信息用于指示上述终端退出上述被盗高危场景或者用于指示上述终端退出上述隐私泄露高危场景;第二确认模块,被设置为确认上述第一指示信息与在上述终端中预先存储的第四指定信息一致;退出模块,被设置为根据上述第二指示信息控制上述终端退出上述被盗警 戒状态或者退出上述隐私告警状态。
可选地,上述装置还包括:第一控制模块,被设置为控制上述终端存储上述被盗警戒状态对应的第一参数和/或者上述隐私告警状态对应的第二参数;获取模块,被设置为获取上述终端所处环境的状态参数;其中,上述状态参数包括以下至少之一的信息:上述终端的地理位置信息、上述终端移动的路线、上述终端的陀螺仪参数、上述终端连接的网络的网络状态参数;第二控制模块,被设置为在上述状态参数在上述第一参数的预定范围内时,控制上述终端进入上述被盗警戒状态,和/或,在上述状态参数在上述第二参数的预定范围内时,控制上述终端进入上述隐私告警状态。
可选地,上述终端与上述可穿戴设备通过无线连接。
通过本发明实施例,采用检测终端远离可穿戴设备的速度和/或该终端与该可穿戴设备的距离;在该速度大于第一预定阈值和/或该距离大于第二预定阈值的情况下,控制终端和/或可穿戴设备发出报警信号。解决了相关技术中终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题,进而尽可能的避免了终端的被盗和终端隐私的泄漏。
附图说明
此处所说明的附图用来提供对本发明实施例的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是根据本发明实施例的终端保护方法的流程图;
图2是根据本发明实施例的终端保护装置的结构框图;
图3是根据本发明实施例的终端保护装置的结构框图(一);
图4是根据本发明实施例的终端保护装置的结构框图(二);
图5是根据本发明实施例的终端保护装置的结构框图(三);
图6是根据本发明实施例的终端保护装置的结构框图(四);
图7是根据本发明实施例的基于可穿戴设备的手机防盗以及隐私保护的流程图(一);
图8是根据本发明实施例的基于可穿戴设备的手机防盗以及隐私保护的流程图(二);
图9是根据本发明实施例的基于可穿戴设备的手机防盗以及隐私保护的结果框图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用 于区别类似的对象,而不必用于描述特定的顺序或先后次序。
在本实施例中提供了一种终端保护方法,图1是根据本发明实施例的终端保护方法的流程图,如图1所示,该流程包括如下步骤:
步骤S102,检测终端远离可穿戴设备的速度和/或终端与可穿戴设备的距离;
步骤S104,在该速度大于第一预定阈值和/或该距离大于第二预定阈值的情况下,控制终端和/或可穿戴设备发出报警信号。
通过上述步骤,可以通过终端远离可穿戴设备的速度或者终端与可穿戴设备的距离,判断终端是否正在或者已经远离终端的机主,进而可以防止终端被盗或者终端的隐私被泄漏,相比于相关技术中,仅仅涉及到的是终端被盗后如何找回或者如何设置隐私空间,解决了相关技术中终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题,进而尽可能的避免了终端的被盗和终端隐私的泄漏。
在一个可选实施例中,检测终端远离可穿戴设备的速度和/或该终端与该可穿戴设备的距离之前,接收第一指示信息,其中,第一指示信息用于指示终端处于被盗高危场景或者用于指示该终端处于隐私泄露高危场景,确认第一指示信息与在终端中预先存储的第一指定信息一致,控制终端进入被盗警戒状态或者进入隐私告警状态。
在终端处于隐私告警状态时,可以限制终端的很多功能,下面对此进行举例说明。在一个可选实施例中,禁止通过终端显示第二指定信息的详情,在另一个可选实施中,禁止对终端的第三指定信息进行修改。例如并自动将新消息提示方式根据当前与手环的距离切换为隐私提示方式,如果距离手环有一段距离则不显示详情;并且当超过可穿戴设备一定距离后的手机从休眠状态被硬键或者手势唤醒,则在可穿戴设备上进行提示,并且不论手机被唤醒时输入的是哪组密码,均立即进入访客模式。
终端时常在上述被盗警戒状态或者隐私告警状态以及普通状态进行却换,在一个可选实施例中,终端和/或可穿戴设备发出报警信号之后,接收第二指示信息,其中,第二指示信息用于指示该终端退出该被盗高危场景或者用于指示该终端退出该隐私泄露高危场景,确认第一指示信息与在终端中预先存储的第四指定信息一致,根据第二指示信息控制终端退出该被盗警戒状态或者退出该隐私告警状态。在另一个可选实施例中,终端和/或该可穿戴设备发出报警信号之后,控制终端存储该被盗警戒状态对应的第一参数和/或者该隐私告警状态对应的第二参数,获取终端所处环境的状态参数,其中,该状态参数包括以下至少之一的信息:终端的地理位置信息、终端移动的路线、终端的陀螺仪参数、终端连接的网络的网络状态参数,在该状态参数在该第一参数的预定范围内时,控制终端进入该被盗警戒状态,和/或,在该状态参数在第二参数的预定范围内时,控制终端进入该隐私告警状态。
在一个可选实施例中,终端与可穿戴设备通过无线连接,例如通过无线网络进行连接或者通过蓝牙进行连接。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方 法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
在本实施例中还提供了一种终端保护装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图2是根据本发明实施例的终端保护装置的结构框图,如图2所示,包括:检测模块22,被设置为检测终端远离可穿戴设备的速度和/或该终端与可穿戴设备的距离;报警模块24,被设置为在该速度大于第一预定阈值和/或该距离大于第二预定阈值的情况下,控制终端和/或可穿戴设备发出报警信号。
图3是根据本发明实施例的终端保护装置的结构框图(一),如图3所示,该装置还包括:第一接收模块32,被设置为接收第一指示信息,其中,第一指示信息用于指示该终端处于被盗高危场景或者用于指示该终端处于隐私泄露高危场景;第一确认模块34,被设置为确认第一指示信息与在该终端中预先存储的第一指定信息一致;进入模块36,被设置为控制终端进入被盗警戒状态或者进入隐私告警状态。
图4是根据本发明实施例的终端保护装置的结构框图(二),如图4所示,该装置还包括:禁止模块42,被设置为在该终端处于该隐私告警状态时,禁止通过该终端显示第二指定信息的详情和/或禁止对终端的第三指定信息进行修改。
图5是根据本发明实施例的终端保护装置的结构框图(三),如图5所示,该装置还包括:第二接收模块52,被设置为接收第二指示信息,其中,该第二指示信息用于指示该终端退出该被盗高危场景或者用于指示终端退出该隐私泄露高危场景;第二确认模块54,被设置为确认该第一指示信息与在该终端中预先存储的第四指定信息一致;退出模块56,被设置为根据第二指示信息控制该终端退出该被盗警戒状态或者退出该隐私告警状态。
图6是根据本发明实施例的终端保护装置的结构框图(四),如图6所示,该装置还包括:第一控制模块62,被设置为控制该终端存储该被盗警戒状态对应的第一参数和/或者该隐私告警状态对应的第二参数;获取模块64,被设置为获取该终端所处环境的状态参数;其中,该状态参数包括以下至少之一的信息:该终端的地理位置信息、该终端移动的路线、该终端的陀螺仪参数、该终端连接的网络的网络状态参数;第二控制模块66,被设置为在该状态参数在该第一参数的预定范围内时,控制该终端进入该被盗警戒状态,和/或,在该状态参数在该第二参数的预定范围内时,控制该终端进入该隐私告警状态。
可选地,该终端与该可穿戴设备通过无线连接。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述模块分别位于多个处理器中。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,检测终端远离可穿戴设备的速度和/或终端与可穿戴设备的距离;
S2,在该速度大于第一预定阈值和/或该距离大于第二预定阈值的情况下,控制终端和/或可穿戴设备发出报警信号。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行上述S1和S2。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
在本可选实施例中,区分3种场景:被盗高危场景、隐私高危场景、普通场景;对于前两种场景首次使用根据机主发出的语音指令进入和退出场景;对于被盗和隐私高危场景的判断参数和其后响应都根据各自的特点进行区分判断和控制,以进一步符合用户实际使用场景需求;并且具有学习能力,能够学习用户指定场景中手机记录的各项参数(根据被盗和隐私两种场景也有参数的区分),以便在以后的使用中不需要频繁发出指令就能够根据之前的使用情况自动进入所需场景,方便用户的使用。
根据可穿戴设备(智能手环或者手表)和手机组成的整体系统,进行场景的判断,并根据各个场景的特征进行防盗或者防止隐私泄露的监控。
本可选实施例使用具体包括以下步骤:
步骤1:可穿戴设备具有特定指令语音指令接收与存储系统、与手机的网络连接(比如蓝牙)和指令发出/接收系统;手机具有与可穿戴设备的网络连接和指令接收/发出系统;
步骤2:当可穿戴设备接收到用户发出的特定语音指令1标示现在处于被盗高危场景时,手机接收此指令并将当前发出指令的语音声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统处于被盗警戒状态;首先手机对预设的关机操作增加验证身份环节;并且在检测到手机被长按电源键时通知可穿戴设备,可穿戴设备和手机同时发出警报;并且不论手机处于使用状态还是休眠状态,都实时检测可穿戴设备和手机的距离以及手机的运动状态。当检测到手机和可穿戴设备在以某个高于预设的速度互相远离,或者两者距离超过预设,则可穿戴设备和手机同时发出警报;
步骤3:当可穿戴设备接收到用户发出的特定语音指令11标示现在退出被盗高危场景时, 手机接收此指令并将当前发出指令的声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统退出被盗警戒状态;
步骤4:记录从进入此防盗高危状态到退出高危状态的地理位置、移动的路线、陀螺仪参数、连接的热点,形成参数条件数据包A1;当下次用户同样的各项参数条件数据包B1与数据包A1的相似程度达到某个指标,并检测到手环处于正常佩戴状态(温度、脉搏、表带搭扣等检测),则不需要用户再次发出语音指令,自动进入被盗警戒状态;直到用户再次发出特定指令11(特定操作或语音)或者当前的各项参数条件数据包C1与记录的数据包A1的不相似程度达到某个指标,解除此状态;
步骤5:如图8当可穿戴设备接收到用户发出的特定语音指令2标示现在处于隐私高危场景时,手机接收此指令并将当前发出指令的语音声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统处于隐私警戒状态;对手机使用状态进行监控。并自动将新消息提示方式根据当前与手环的距离切换为隐私提示方式,如果距离手环有一段距离则不显示详情;并且当超过可穿戴设备一定距离后的手机从休眠状态被硬键或者手势唤醒,则在可穿戴设备上进行提示,并且不论手机被唤醒时输入的是哪组密码,均立即进入访客模式;
步骤6:如图8,当可穿戴设备接收到用户发出的特定语音指令22标示现在处于隐私高危场景时,手机接收此指令并将当前发出指令的语音声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统退出隐私警戒状态;
步骤7:如图8,记录从进入到退出此隐私高危状态的地理位置、连接的热点,非机主使用人的生物特征、连接的设备形成参数条件数据包A2;当下次检测到用户同样的各项参数条件数据包B2与数据包A2的相似程度达到某个指标,并检测到手环处于正常佩戴状态(温度、脉搏、表带搭扣等检测),则不需要用户再次发出语音指令,自动进入隐私高危状态;直到用户再次发出特定指令(特定操作或语音)或者当前的各项参数条件数据包C2与记录的数据包A2的不相似程度达到某个指标,解除此状态;
步骤8:如果系统未接收到特定用户指令,也没有参数条件数据包与预设的被盗警戒数据包或者隐私高危数据包有符合指标的相似度,则系统处于普通状态;
本实施例提供了一种基于可穿戴设备的手机防盗和隐私保护系统和方法,请参考图7,附图为本实施例提供的方法的流程示意图,具体为:
步骤1:可穿戴设备具有特定指令语音指令接收与存储系统、与手机的网络连接(比如蓝牙)和指令发出/接收系统;手机具有与可穿戴设备的网络连接和指令接收/发出系统;
步骤2:如图7,当可穿戴设备接收到用户发出的特定语音指令1标示现在处于被盗高危场景时,手机接收此指令并将当前发出指令的语音声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统处于被盗警戒状态;首先手机对预设的关机操作增加验证身份环节;并且在检测到手机被长按电源键时通知可穿戴设备,可穿戴设备和手机同时发出警报;并且不论手机处于使用状态还是休眠状态,都实时检测可穿戴设备和手机的距离以及手机的 运动状态。当检测到手机和可穿戴设备在以某个高于预设的速度互相远离,或者两者距离超过预设,则可穿戴设备和手机同时发出警报;
步骤3:如图7,当可穿戴设备接收到用户发出的特定语音指令11标示现在退出被盗高危场景时,手机接收此指令并将当前发出指令的声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统退出被盗警戒状态;
步骤4:记录从进入此防盗高危状态到退出高危状态的地理位置、移动的路线、陀螺仪参数、连接的热点,形成参数条件数据包A1;当下次用户同样的各项参数条件数据包B1与数据包A1的相似程度达到某个指标,并检测到手环处于正常佩戴状态(温度、脉搏、表带搭扣等检测),则不需要用户再次发出语音指令,自动进入被盗警戒状态;直到用户再次发出特定指令11(特定操作或语音)或者当前的各项参数条件数据包C1与记录的数据包A1的不相似程度达到某个指标,解除此状态;
步骤5:如图8当可穿戴设备接收到用户发出的特定语音指令2标示现在处于隐私高危场景时,手机接收此指令并将当前发出指令的语音声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统处于隐私警戒状态;对手机使用状态进行监控。并自动将新消息提示方式根据当前与手环的距离切换为隐私提示方式,如果距离手环有一段距离则不显示详情;并且当超过可穿戴设备一定距离后的手机从休眠状态被硬键或者手势唤醒,则在可穿戴设备上进行提示,并且不论手机被唤醒时输入的是哪组密码,均立即进入访客模式;
步骤6:如图8,当可穿戴设备接收到用户发出的特定语音指令22标示现在处于隐私高危场景时,手机接收此指令并将当前发出指令的语音声纹和手机内部的机主声纹进行比对,确定是机主发出的指令后,系统退出隐私警戒状态;
步骤7:如图8,记录从进入到退出此隐私高危状态的地理位置、连接的热点,非机主使用人的生物特征、连接的设备形成参数条件数据包A2;当下次检测到用户同样的各项参数条件数据包B2与数据包A2的相似程度达到某个指标,并检测到手环处于正常佩戴状态(温度、脉搏、表带搭扣等检测),则不需要用户再次发出语音指令,自动进入隐私高危状态;直到用户再次发出特定指令(特定操作或语音)或者当前的各项参数条件数据包C2与记录的数据包A2的不相似程度达到某个指标,解除此状态;
步骤8:如果系统未接收到特定用户指令,也没有参数条件数据包与预设的被盗警戒数据包或者隐私高危数据包有符合指标的相似度,则系统处于普通状态。
用户买到新的智能手机和手表后,第一次乘公交车后,对手表发出语音指令:防盗;则此时手机进入防盗高危模式:自动将关机调整为需要验证机主身份模式,并且开始实时计算手表和手机的相互位置,如果手机被人拿走,则底层能够判断到以一定的速度手表和手机在互相远离,则手表和手机都会同时发出声音、震动的警报提示;
在对手表发出“防盗”到“退出防盗”语音指令的中间过程中,手机接收此指令,并且记忆当前的位置是xx路,记录其移动路线,连接的wifi是zzz,陀螺仪记录运动状态;则将 这几个参数记录为防盗高危模式参数A1,下次乘坐公交车时,只要判断连接的wifi是zzz,当前位置符合之前的路线中的某一点,陀螺仪的运动状态符合乘坐公交车的特征,则自动进入防盗高危模式;
用户在办公室发出语音指令:隐私;则此时手机进入隐私高危模式:对手机使用状态进行监控,将新消息提示调整为根据与手表的距离切换为是否显示详情的模式;并且一旦检测到距离手表超过安全距离后,手机被主动点亮,则手表立即对机主进行提醒,并且不论手机被唤醒时输入的是哪组密码,均立即进入访客模式;
在办公室第一次对手表发出“隐私”到退出“隐私”语音指令的同时,手机接收此指令,并且记忆当前的位置是xx路xx号,连接的wifi是zzz,中间有哪个人使用过手机;则将这几个参数记录为隐私高危模式参数A2,下次在办公室时,只要判断连接的wifi是zzz,当前位置符合xx路,则自动进入隐私高危模式;
图9是根据本发明实施例的基于可穿戴设备的手机防盗以及隐私保护的结果框图,如图9所示,其中,S901、S902、S903、S904、S905、S906为可穿戴设备和手机均配备的基础模块;
S907语音指令模块在本发明实施例的可穿戴设备中负责接收用户发出的特定语音指令,接收并识别后,将指令和语音包均发送给手机进行是否响应本指令的识别;手机配备的S910声纹识别模块检测到对应该语音指令的语音包符合预设的声纹特征,改语音指令对应的状态切换功能才真正生效;
S908、S909、S911、S912则作为处于防盗高危模式及隐私高危模式下的参数记忆模块,根据不同的模块调用记录不同的参数形成高危参数包;并且在日常的使用中,也根据这些模块反馈的参数和高危参数包进行比对,判断是否要自动切换为防盗高危模式及隐私高危模式。
综上所述,通过本发明实施例解决了相关技术中终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题,进而尽可能的避免了终端的被盗和终端隐私的泄漏。
显然,本领域的技术人员应该明白,上述的本发明实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
在本发明实施例中,采用检测终端远离可穿戴设备的速度和/或该终端与该可穿戴设备的 距离;在该速度大于第一预定阈值和/或该距离大于第二预定阈值的情况下,控制终端和/或可穿戴设备发出报警信号。解决了相关技术中终端在处于被盗窃的危险或者隐私处于被泄露的危险时,如何进行防范的问题,进而尽可能的避免了终端的被盗和终端隐私的泄漏。

Claims (12)

  1. 一种终端保护方法,包括:
    检测终端远离可穿戴设备的速度和/或所述终端与所述可穿戴设备的距离;
    在所述速度大于第一预定阈值和/或所述距离大于第二预定阈值的情况下,控制所述终端和/或所述可穿戴设备发出报警信号。
  2. 根据权利要求1所述的方法,其中,检测终端远离可穿戴设备的速度和/或所述终端与所述可穿戴设备的距离之前包括:
    接收第一指示信息,其中,所述第一指示信息用于指示所述终端处于被盗高危场景或者用于指示所述终端处于隐私泄露高危场景;
    确认所述第一指示信息与在所述终端中预先存储的第一指定信息一致;
    控制所述终端进入被盗警戒状态或者进入隐私告警状态。
  3. 根据权利要求2所述的方法,其中,在所述终端处于所述隐私告警状态时,禁止通过所述终端显示第二指定信息的详情和/或禁止对所述终端的第三指定信息进行修改。
  4. 根据权利要求2所述的方法,其中,所述终端和/或所述可穿戴设备发出报警信号之后包括:
    接收第二指示信息,其中,所述第二指示信息用于指示所述终端退出所述被盗高危场景或者用于指示所述终端退出所述隐私泄露高危场景;
    确认所述第一指示信息与在所述终端中预先存储的第四指定信息一致;
    根据所述第二指示信息控制所述终端退出所述被盗警戒状态或者退出所述隐私告警状态。
  5. 根据权利要求2所述的方法,其中,所述终端和/或所述可穿戴设备发出报警信号之后包括:
    控制所述终端存储所述被盗警戒状态对应的第一参数和/或者所述隐私告警状态对应的第二参数;
    获取所述终端所处环境的状态参数;其中,所述状态参数包括以下至少之一的信息:
    所述终端的地理位置信息、所述终端移动的路线、所述终端的陀螺仪参数、所述终端连接的网络的网络状态参数;
    在所述状态参数在所述第一参数的预定范围内时,控制所述终端进入所述被盗警戒状态,和/或,在所述状态参数在所述第二参数的预定范围内时,控制所述终端进入所述隐私告警状态。
  6. 根据权利要求1至5中任一项所述的方法,其中,所述终端与所述可穿戴设备通过无线连接。
  7. 一种终端保护装置,包括:
    检测模块,被设置为检测终端远离可穿戴设备的速度和/或所述终端与所述可穿戴设备的距离;
    报警模块,被设置为在所述速度大于第一预定阈值和/或所述距离大于第二预定阈值的情况下,控制所述终端和/或所述可穿戴设备发出报警信号。
  8. 根据权利要求7所述的装置,其中,所述装置还包括:
    第一接收模块,被设置为接收第一指示信息,其中,所述第一指示信息用于指示所述终端处于被盗高危场景或者用于指示所述终端处于隐私泄露高危场景;
    第一确认模块,被设置为确认所述第一指示信息与在所述终端中预先存储的第一指定信息一致;
    进入模块,被设置为控制所述终端进入被盗警戒状态或者进入隐私告警状态。
  9. 根据权利要求8所述的装置,其中,所述装置还包括:
    禁止模块,被设置为在所述终端处于所述隐私告警状态时,禁止通过所述终端显示第二指定信息的详情和/或禁止对所述终端的第三指定信息进行修改。
  10. 根据权利要求8所述的装置,其中,所述装置还包括:
    第二接收模块,被设置为接收第二指示信息,其中,所述第二指示信息用于指示所述终端退出所述被盗高危场景或者用于指示所述终端退出所述隐私泄露高危场景;
    第二确认模块,被设置为确认所述第一指示信息与在所述终端中预先存储的第四指定信息一致;
    退出模块,被设置为根据所述第二指示信息控制所述终端退出所述被盗警戒状态或者退出所述隐私告警状态。
  11. 根据权利要求8所述的装置,其中,所述装置还包括:
    第一控制模块,被设置为控制所述终端存储所述被盗警戒状态对应的第一参数和/或者所述隐私告警状态对应的第二参数;
    获取模块,被设置为获取所述终端所处环境的状态参数;其中,所述状态参数包括以下至少之一的信息:
    所述终端的地理位置信息、所述终端移动的路线、所述终端的陀螺仪参数、所述终端连接的网络的网络状态参数;
    第二控制模块,被设置为在所述状态参数在所述第一参数的预定范围内时,控制所述终端进入所述被盗警戒状态,和/或,在所述状态参数在所述第二参数的预定范围内时,控制所述终端进入所述隐私告警状态。
  12. 根据权利要求7至11中任一项所述的装置,其中,所述终端与所述可穿戴设备通过无线连接。
PCT/CN2015/088670 2015-07-21 2015-08-31 终端保护方法及装置 WO2016145794A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510431712.3 2015-07-21
CN201510431712.3A CN106375540A (zh) 2015-07-21 2015-07-21 终端保护方法及装置

Publications (1)

Publication Number Publication Date
WO2016145794A1 true WO2016145794A1 (zh) 2016-09-22

Family

ID=56918359

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/088670 WO2016145794A1 (zh) 2015-07-21 2015-08-31 终端保护方法及装置

Country Status (2)

Country Link
CN (1) CN106375540A (zh)
WO (1) WO2016145794A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363452A (zh) * 2021-12-31 2022-04-15 湖南工学院 基于体感交互的智能手机防盗与追踪的方法
US11479906B2 (en) 2019-06-17 2022-10-25 Koninklijke Philips N.V. Portable textile treatment device with image sensor and thermal insulation means

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135307A (zh) * 2017-04-25 2017-09-05 长治市星锐科技有限公司 一种手机意外关机的信息反馈方法
CN107948801B (zh) * 2017-12-21 2020-02-07 广东小天才科技有限公司 一种耳机的控制方法及耳机
CN108389345A (zh) * 2018-03-23 2018-08-10 酷博创意有限公司 可移动智能终端预警系统及其应用
CN111317445B (zh) * 2020-02-27 2022-12-23 大哉乾元(杭州)科技有限公司 一种具有防盗功能的智能穿戴设备
CN112566031B (zh) * 2020-12-16 2023-08-01 深圳市沃特沃德股份有限公司 关联智能穿戴设备的防盗方法、装置和计算机设备
CN113781731B (zh) * 2021-07-29 2022-08-30 荣耀终端有限公司 告警方法和装置
CN114063873A (zh) * 2021-11-09 2022-02-18 维沃移动通信有限公司 信息显示方法、信息显示装置和电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917662A (zh) * 2010-06-23 2010-12-15 中兴通讯股份有限公司 移动终端防盗方法、系统及移动终端、防盗装置
CN102254387A (zh) * 2010-05-19 2011-11-23 康佳集团股份有限公司 一种报警系统及报警手表
CN103024164A (zh) * 2012-12-03 2013-04-03 北京百度网讯科技有限公司 移动终端的防盗方法和装置
US8773275B1 (en) * 2013-02-21 2014-07-08 Cynthia Ann Parenteau Method and system for alerting and retrieving lost device
CN103957323A (zh) * 2014-05-08 2014-07-30 深圳市中兴移动通信有限公司 移动终端及其防盗方法
CN104332012A (zh) * 2014-10-31 2015-02-04 小米科技有限责任公司 终端设备防盗的方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254387A (zh) * 2010-05-19 2011-11-23 康佳集团股份有限公司 一种报警系统及报警手表
CN101917662A (zh) * 2010-06-23 2010-12-15 中兴通讯股份有限公司 移动终端防盗方法、系统及移动终端、防盗装置
CN103024164A (zh) * 2012-12-03 2013-04-03 北京百度网讯科技有限公司 移动终端的防盗方法和装置
US8773275B1 (en) * 2013-02-21 2014-07-08 Cynthia Ann Parenteau Method and system for alerting and retrieving lost device
CN103957323A (zh) * 2014-05-08 2014-07-30 深圳市中兴移动通信有限公司 移动终端及其防盗方法
CN104332012A (zh) * 2014-10-31 2015-02-04 小米科技有限责任公司 终端设备防盗的方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11479906B2 (en) 2019-06-17 2022-10-25 Koninklijke Philips N.V. Portable textile treatment device with image sensor and thermal insulation means
CN114363452A (zh) * 2021-12-31 2022-04-15 湖南工学院 基于体感交互的智能手机防盗与追踪的方法

Also Published As

Publication number Publication date
CN106375540A (zh) 2017-02-01

Similar Documents

Publication Publication Date Title
WO2016145794A1 (zh) 终端保护方法及装置
US9626814B2 (en) Smart door lock
US9666047B2 (en) Fixed property monitoring with moving asset location tracking
US20160292464A1 (en) Security and protection device and methodology
US10878135B2 (en) Wireless device security system
KR102323166B1 (ko) 비콘 신호를 이용하여 도어 출입을 관리하기 위한 방법 및 시스템
US9799190B2 (en) Security system tracking of remote items using reduced power
US8559914B2 (en) Interactive personal surveillance and security (IPSS) system
AU2011274218B2 (en) Automatic creation and modification of dynamic geofences
US9741223B2 (en) Automated security system for schools and other structures
CA2799170C (en) System and method for monitoring an area using nfc tags
US20230401919A1 (en) Release monitoring through check-in and tethering system
KR101633006B1 (ko) 감시구역 이탈 원격 관리시스템 및 그 방법
EP3142089B1 (en) System arm notification based on ble position
CN104952228B (zh) 防盗保护开启方法、装置及系统
TWI505235B (zh) 門禁控制方法
KR100742754B1 (ko) 무인 감지 보안 시스템 및 그 작동방법
US9847016B2 (en) System and method of communicating data from an alarm system to emergency services personnel
EP3379497A1 (en) Secure authentication for access control, home control, and alarm systems
US10347115B1 (en) Method for alerting the guest to collect the belongings in safe before checkout
JP2022177446A (ja) 警備システム、携帯端末及びプログラム
CN116225235A (zh) 数据处理方法、装置、设备以及介质
KR20180127291A (ko) 타이머를 이용하여 사용자의 위험 상태를 공유하는 방법 및 이를 위한 장치
KR20180088000A (ko) 타이머를 이용하여 사용자의 위험 상태를 공유하는 방법 및 이를 위한 장치
JP2006217097A (ja) 携帯情報端末の機能制限システム及びその方法並びにそれに用いる携帯情報端末及び機能制限装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15885169

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15885169

Country of ref document: EP

Kind code of ref document: A1