WO2019056344A1 - 一种移动终端防盗装置及其报警器和相应检测使用方法 - Google Patents

一种移动终端防盗装置及其报警器和相应检测使用方法 Download PDF

Info

Publication number
WO2019056344A1
WO2019056344A1 PCT/CN2017/103101 CN2017103101W WO2019056344A1 WO 2019056344 A1 WO2019056344 A1 WO 2019056344A1 CN 2017103101 W CN2017103101 W CN 2017103101W WO 2019056344 A1 WO2019056344 A1 WO 2019056344A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
alarm
central processing
mobile terminal
processing module
Prior art date
Application number
PCT/CN2017/103101
Other languages
English (en)
French (fr)
Inventor
曾繁清
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to PCT/CN2017/103101 priority Critical patent/WO2019056344A1/zh
Publication of WO2019056344A1 publication Critical patent/WO2019056344A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of mobile phone applications, and in particular, to a mobile terminal anti-theft device and device.
  • the anti-theft function of mobile phones means that after we lose the mobile phone, we can lock the mobile phone, erase the mobile phone data and locate the mobile phone through remote control.
  • most mobile phones are equipped with the function of mobile phone anti-theft, and the application of the mobile phone system assistant class also provides corresponding functions.
  • the principle of the mobile phone anti-theft function can be simply summarized as two types: positioning transmission and remote locking. Take the iPhone as an example, if it turns on the anti-theft function of the mobile phone, and if the mobile phone is accidentally lost. Then we can use the "find my iPhone" function on Apple's official website to track the location of the mobile phone. If necessary, you can remotely lock the mobile phone or erase all important information in the mobile phone. In addition, some mobile phone anti-theft features can also automatically enable the front camera, take a photo of the thief and pass it back to the owner.
  • the mobile phone anti-theft function mainly includes the functions of locating the mobile phone, locking the mobile phone, ringing the alarm, erasing the data and so on.
  • the anti-theft features of these phones are often integrated into the cloud service.
  • the mobile phone system itself does not have anti-theft function, we can also download the mobile assistant software, because these softwares provide the function of mobile phone anti-theft.
  • the steps to activate the anti-theft feature are as simple as setting the password and binding the alternate number.
  • these anti-theft features have a weakness that is caused by keeping the phone turned on.
  • the anti-theft function of the mobile assistant software if the mobile phone is directly shut down after being stolen, the thief can remove the data of the software by brushing the machine afterwards, and finally the mobile phone is still very easy to completely steal.
  • the mobile phone anti-theft function can reduce the risk of losing the mobile phone, most users will not want to ignore this function, perhaps it will be remembered after the phone is stolen. However, if the relevant settings are not made in advance, the mobile phone loses the initiative of the mobile phone theft after theft.
  • an anti-theft frame is added to the mobile phone in the mobile phone store, as shown in FIG.
  • the anti-theft frame will issue a "drip" alarm until there is a store manager to check and close the alarm.
  • the technology anti-theft must be able to play the anti-theft function through the mobile phone anti-theft frame. If you encounter a mobile phone in the airport lounge, train station or bus station waiting room, you need to use a public outlet to charge the phone, you must always stare at the charging hand. Machine, otherwise there is the risk of being stolen or taken wrong by others.
  • the mobile phone anti-theft frame is only for the mobile phone store display, and must be fixed with 3M glue. The scope of this technology is relatively narrow, which is not conducive to personal mobile phone theft.
  • the central processing module receives the information and makes corresponding instructions
  • a displacement detecting module connected to the central processing module to sense a displacement change and transmit the change information to the central processing module
  • a first alarm prompting module is connected to the central processing module and is controlled by the central processing module to issue an alarm prompt
  • the fingerprint detecting module is connected to the central processing module, and the central processing module determines whether the input fingerprint is correct.
  • the displacement detecting module is a three-axis acceleration sensor or a gyroscope.
  • the first alarm prompting module comprises an audio sub-module and/or a vibrating sub-module and/or a photo-flash sub-module, which is connected to the central processing module and is controlled by the central processing module. Alert prompt.
  • the above-mentioned mobile terminal anti-theft device further includes a charging line detecting module connected to the central processing module, detecting whether the charging line is disconnected, and transmitting the change information to the central processing module.
  • the above-mentioned mobile terminal anti-theft device further includes a first wireless communication module connected to the central processing module, controlled by the central processing module to communicate with the remote device, and the instruction is transmitted.
  • the above-mentioned mobile terminal anti-theft device wherein the first wireless communication module is a Bluetooth module or a hotspot module.
  • a mobile terminal alarm device for use with the above anti-theft device includes:
  • a second wireless communication module connected to the control module, and controlled by the control module to communicate with the remote mobile terminal;
  • the second alarm prompting module is connected to the control module and is controlled by the control module to issue an alarm prompt.
  • the above mobile terminal alarm device wherein the second wireless communication module is a Bluetooth module or a hotspot module.
  • a mobile terminal anti-theft detecting method using any one of the above mobile terminal anti-theft devices, comprising the following steps:
  • the displacement detecting module detects a distance that the mobile phone is moved
  • the first alarm prompting module issues an alarm
  • the fingerprint detection module detects the fingerprint
  • a method for using an anti-theft mobile phone comprising the above-mentioned complete alarm device, comprising the following steps:
  • a theft-proof mobile phone includes any of the above-mentioned mobile terminal anti-theft devices, and the anti-theft function is turned on before charging.
  • the invention is convenient and simple, and only needs to turn on the anti-theft function of the mobile terminal when using.
  • the invention is safer for personal use of theft, as long as the mobile phone is moved beyond the limit, an alarm voice will be issued immediately.
  • the invention contains a relatively safe fingerprint and only cancels the alarm voice reminding function, and the security of the mobile terminal is more secure.
  • 1 is a prior art mobile phone anti-theft frame.
  • FIG. 2 is a block diagram of an alarm device in the present invention.
  • FIG. 3 is a block diagram of an improved set of alarm devices in accordance with the present invention.
  • Figure 4 is a block diagram of the improved set of alarm devices of the present invention.
  • Figure 5 is a flow chart showing the processing of the alarm device of the present invention.
  • Figure 6 is a flow chart of fingerprint comparison processing in the present invention.
  • Fig. 7 is a comparison diagram of fingerprint processing effects in the present invention.
  • Fig. 8 is a second comparison diagram of the fingerprint processing effect in the present invention.
  • Fig. 9 is a third comparison diagram of the fingerprint processing effect in the present invention.
  • Figure 10 is a process flow diagram of an embodiment of the present invention.
  • Figure 11 is a schematic illustration of the effective range of the alarm in the present invention.
  • a mobile terminal anti-theft device module diagram includes a central processing module 1, a displacement detecting module 2, a first alarm prompting module 4, and a fingerprint detecting module 3.
  • the central processing module 1 is configured to receive information from the displacement detecting module 2 and the fingerprint detecting module 3. And a corresponding instruction is made to instruct the first alarm prompting module 4 to alarm or stop the alarm.
  • the displacement detecting module 2 is connected to the central processing module 1 to sense the displacement change, and transmits the change information to the central processing module 1 to inform the central processing module 1 of the change amount of the current position of the mobile terminal.
  • Displacement detection module 2 can be a three-axis accelerometer or gyroscope. The displacement is detected in the three directions of X, Y and Z, and the protection is provided in all directions. If it is detected only on the X and Y planes, the possibility of moving only in the Z-axis direction will be missed.
  • the first alarm prompting module 4 is connected to the central processing module 1 and is controlled by the central processing module 1 to issue an alarm prompt, and the alarm prompt continues until the user manually releases the alarm.
  • the first alarm prompting module 4 includes an audio sub-module and/or a vibrating sub-module and/or a photo-flashing sub-module, which is connected to the central processing module and is controlled by the central processing module to issue an alarm prompt.
  • There are a variety of ways to send an alarm which can be prompted by a single sound, light flash, vibration, or a combination of two methods.
  • the fingerprint detecting module 3 is connected to the central processing module 1.
  • the central processing module 1 compares the received fingerprint with a known fingerprint pre-stored in the fingerprint database to determine whether the input fingerprint can be Fingerprint matching is known. If the match is given, the alarm is stopped, and if it does not match, the strength of the alarm will be strengthened.
  • Figure 6 shows a process of fingerprint identification and comparison. Specific steps are as follows:
  • the preprocessing of the fingerprint image specifically includes:
  • FIGS. 7 to 9 it is a comparison diagram of effects before and after the process shown in FIG. 6.
  • Figure 7 is taken in step S41
  • the contrast and sharpness of the image are not enough to identify the feature points. Therefore, it is necessary to perform preprocessing such as steps S421 to S424 to filter noise and improve the edge definition of the texture.
  • Fig. 8 shows an image in which both contrast and sharpness obtained by binarization in step S43 are improved.
  • step S44 is performed to extract simple line information necessary for distinguishing feature points.
  • Step S46 extracts the feature points therein by using the fingerprint image shown in FIG. 9, traverses the fingerprint database, and confirms whether the input fingerprint is a correct unlock fingerprint, thereby performing the next operation.
  • the mobile terminal anti-theft device described above may further include a charging line detecting module.
  • the output end is connected to the central processing module 1, and the central processing module 1 detects whether the charging line is disconnected. If it is not disconnected, it continues to maintain the charging state, and if it is found to be disconnected, an alarm is immediately issued.
  • the mobile terminal anti-theft device may further include a first wireless communication module 5 connected to the central processing module 5, and controlled by the central processing module 1 to communicate with the remote device to transmit instructions.
  • the remote device may be an alarm device as described below, and the alarm device is carried by the user, so that the user can receive the alarm prompt signal in time even if the mobile terminal is invisible to the user.
  • the wireless communication module does not need to have the function of long-distance networking communication, as long as short-distance point-to-point communication can be realized. Therefore, the first wireless communication module 5 is a Bluetooth module or a hotspot module.
  • FIG. 3 and Figure 4 are block diagrams of a complete set of alarm devices.
  • 3 is a block diagram of a mobile terminal
  • FIG. 4 is a block diagram of a corresponding alarm.
  • the block diagram shown in FIG. 3 is a modified version of the mobile terminal anti-theft device with the wireless communication module described above.
  • FIG 4 shows a mobile terminal alarm, which is used in conjunction with the mobile terminal anti-theft device shown in Figure 3, and includes:
  • the second wireless communication module 8 is connected to the control module 6, and is controlled by the control module 6 to communicate with the remote mobile terminal anti-theft device. Similar to the mobile terminal anti-theft device shown in FIG. 3, considering that the user and the mobile terminal cannot be separated from each other, the second wireless communication module 8 does not need to have the function of long-distance networking communication, as long as the short-distance point can be realized. Correct Point communication. Therefore, the second wireless communication module 8 is a Bluetooth module or a hotspot module.
  • the second alarm prompting module 7 is connected to the control module 6 and is controlled by the control module 6 to issue an alarm prompt. Similar to the mobile terminal anti-theft device shown in FIG. 3, the second alarm prompting module 7 includes an audio sub-module and/or a vibrating sub-module and/or a photo-flash sub-module, which is connected to the control module 6 and controlled by the control module 6. Alert you. There are a variety of ways to send an alarm, which can be prompted by a single sound, light flash, vibration, or a combination of two methods. There are three ways to prompt at the same time when necessary. However, the hint strength can be much weaker than the mobile terminal anti-theft device shown in FIG. 3, as long as the user is enough to prompt the user, and does not need to attract the attention of others.
  • FIG. 5 it is a mobile terminal anti-theft detection method, and the hardware support thereof is the mobile terminal anti-theft device described above, and includes the following steps:
  • the displacement detecting module 2 detects a distance that the mobile phone is moved
  • the first alarm prompting module 4 issues an alarm
  • the fingerprint detecting module 3 detects a fingerprint.
  • the displacement detecting module 2 detects the displacements in the three directions of X, Y and Z, and calculates the magnitude and direction of the combined displacement, and supplies them to the central processing module 1.
  • the central processing module 1 compares and compares the new synthetic displacement with the previous position information, and performs no alarm processing for reasonable and unexpected movement within the length of the charging line.
  • the central processing module 1 instructs the first alert prompt module 4 to issue an alert.
  • the alert can be by voice, flashing lights or vibration.
  • Voice alarm content, flashing rules, vibration intensity and rhythm can all be set freely by the user.
  • the first alarm prompting module 4 can be uniquely released only after the mobile phone inputs the correct unlocking fingerprint, otherwise the first alarm prompting module 4 maintains the alarm state.
  • the mobile terminal anti-theft alarm function is determined by the user to enable or not, and can be set to be turned on and off in the software. When charging in a public place, it is recommended to turn this feature on. It is recommended to turn it off at a safe place such as at home or in a company.
  • a method of using an anti-theft mobile phone comprising the set of alarm devices described in FIG. 3 and FIG. 4, comprising the following steps:
  • the alarm function is also turned on at the corresponding alarm terminal to receive the alarm signal sent by the mobile terminal;
  • the so-called safety distance includes not only ensuring the distance between the mobile phone and the alarm, but also ensuring that the user can return to the mobile phone in time after receiving the alarm.
  • An anti-theft mobile phone comprising any of the mobile terminal anti-theft devices of the present invention requires an anti-theft function to be activated before charging.
  • FIG. 10 it is a flow chart of a preferred mobile terminal implementation.
  • the central processing module 1 in the mobile terminal first determines if the charging line is out. For the case where the mobile terminal charging line is out, an immediate alarm is required. At this point, there may be someone who is committing malicious encroachment, or the charging line may fall off unexpectedly. In either case, the user needs to return immediately for subsequent processing.
  • the central processing module 1 further monitors the location of the mobile phone. Considering that the public situation is complicated, the mobile terminal is allowed to make small movements within the length of the charging line. Therefore, the position monitoring of the mobile terminal needs to calculate the displacement amount, and the displacement exceeds the charging line length to raise an alarm.
  • FIG. 11 it is a schematic diagram of the mobile range of the mobile phone and the range of the user's movement. The user's range of motion is as described in "A Method of Using the Anti-Theft Phone" above.
  • the present invention proposes a new method for controlling the square photographing, which causes a square view by occlusion of the screen display, effectively avoids the pause caused by switching the preview, and improves the preview. Speed, optimize the camera process and effects, thus improving the user experience.

Abstract

一种移动终端防盗装置,适用于在公共场合充电的设备,包括:中央处理模块,接收信息,并做出相应指令;位移检测模块,与所述中央处理模块连接,感应位移变化,并将变化信息传递给中央处理模块;第一警报提示模块,与所述中央处理模块连接,受中央处理模块控制发出警报提示;指纹检测模块,与所述中央处理模块连接,所述中央处理模块判断输入的指纹是否正确。本发明的优点在于个人在公众场合充电时,只要手机有被挪动位置,就会立即发出报警语音,使用指纹唯一解除报警语音提醒功能,移动终端防盗效果更加安全。

Description

一种移动终端防盗装置及其报警器和相应检测使用方法 技术领域
本发明涉及手机应用领域,具体涉及一种移动终端防盗装置及装置。
背景技术
随着手机功能的不断增加,手机的角色已经发生转变,提供了丰富的移动互联生活体验以及多媒体功能。所以,玩手机已经成为我们零碎时间中最常见的消遣方式,特别是我们乘坐地铁的时候。由于用户手机丢失变得越来越普遍,所以现在越来越多的手机都支持了防盗功能或找回手机的功能。
手机防盗功能就是我们掉失手机后,可以通过远程控制锁定手机、擦除手机数据和定位手机位置等等。目前绝大多数手机都配备了手机防盗的功能,此外手机系统助手类的应用也提供有相应的功能。
目前,手机防盗功能的原理可以简单概括为定位发送和远程锁机两种。以iPhone为例,如果其开启手机的防盗功能,又假如手机不慎丢失。那么我们便可以在苹果的官网通过“查找我的iphone”这一功能,跟踪定位手机的位置,必要的时候还可以远程锁定手机或者擦除手机里面所有的重要资料。此外,有些手机的防盗功能还可以自动静默启用前置摄像头,拍摄小偷的照片并回传给失主。
由于手机通过该软件开通手机防盗功能后,若给手机换上新SIM卡时,手机便会自动将该新SIM卡的号码发送到沈小姐的备用号码(开启防盗功能时需要用户填写备用号码)。无论是手机系统自带手机防盗功能,还是第三方系统助手类应用,手机防盗功能主要包括了定位手机位置、锁定手机、响警报言、擦除数据等功能。
手机在我们的工作生活中扮演着越来越重要的角色,许多重要资料都会储存在手机中,如果丢失肯定会给工作和生活带来不便。手机的防盗功能可以降低这样的风险,如果iPhone可能通过找回我的iPhone功能及时锁机或删除重要和隐私的资料。所以,手机防 盗功能至少可以对我们个人资料有着一定的保持作用。
需要说明的是这些手机的防盗功能往往都是整合在云服务里面。此外,如果手机系统本身没有防盗功能,我们也可以下载手机助手类软件,因为这些软件均有提供手机防盗的功能。手机开通防盗功能的步骤还算简单,只要设置密码和绑定备用号码便可以完成设置。
虽然设置手机使之具有防盗功能的操作比较简单,但真实使用起来还是比较烦琐。比如,你手机失窃后,想定位手机的位置,你需要使用电脑或其它设置登陆手机品牌对应的官网进行查找或其它操作。有着明显的局限性,想要找回手机并不容易。
另外,这些防盗功能还有一个致使的弱点,就是要保持手机在开机状态下才能使用。特别是手机助手类软件的防盗功能,如果手机失窃后直接被关机,小偷事后可以通过刷机移除这些软件的数据,最后手机还是很容易彻底失窃。
虽然手机防盗功能可以降低我们掉失手机的风险,但是大部分用户往往都会勿略此功能,或许是手机失窃后才会想起这项功能。但是如果事先没有进行相关的设置,手机失窃后便失去了手机防盗的主动权。
我们可以通过远程锁定手机和擦除数据以保持我们的重要资料,这样小偷也无法正常使用你的手机。但是小偷也可以通过刷机清除数据最终成功盗窃你手机。此外,如果实在没办法解锁手机,小偷还可以通过拆解成零件进行贩卖。所以,找回手机的操作极其复杂,而且找回的可能性也不会太大。
随着各种新型设备的发展,在商场、机场等高人流量的公众场合出现了越来越多的自助设备。手机自助充电机的出现能够解决人们的当务之急,同时伴生的是充电中的手机的看管问题。手机的充电时间至少要半小时才能达到支持手机运行的基本容量。这段时间机主不可能一直人工紧盯,因此需要有技术手段来帮助机主看管。
现有技术中,手机卖场中给手机加装了防盗架,如图1所示。当手机和防盗架之间的连线被断开,防盗架会发出“滴滴滴”的警报,直至有卖场管理人员来检查和关闭警报。
现在技术防盗必须通过手机防盗架才可以起到防盗作用。如果在机场候机室、火车站或汽车站候车室遇到手机没电,需要使用公共插座给手机充电时,必须时刻盯着充电的手 机,否则存在被偷或别人拿错的风险,手机防盗架只针对于手机卖场展示、必须使用3M胶固定。此技术使用的范围比较窄,不利于个人手机防盗。若有种技术,不用人紧紧盯着,也可以起到发出报警提醒语音的功能告知机主:手机被移动了,这样只要手机没有发出语音报警提醒,你可以放心的看书或吃饭等动作,也不用担心手机被盗的风险。
发明的公开
本发明的目的在于提供一种移动终端防盗装置,为在公共场合充电的设备提供防盗监测。
具体包括:
中央处理模块,接收信息,并做出相应指令;
位移检测模块,与所述中央处理模块连接,感应位移变化,并将变化信息传递给中央处理模块;
第一警报提示模块,与所述中央处理模块连接,受中央处理模块控制发出警报提示;
指纹检测模块,与所述中央处理模块连接,所述中央处理模块判断输入的指纹是否正确。
上述的一种移动终端防盗装置,其中,所述位移检测模块为三轴加速度传感器或陀螺仪。
上述的一种移动终端防盗装置,其中,所述第一警报提示模块包含音频子模块和/或振动子模块和/或光闪子模块,与所述中央处理模块相连,受中央处理模块控制发出警报提示。
上述的一种移动终端防盗装置,其中,还包含充电线检测模块,与所述中央处理模块相连,检测充电线是否断开,并将变化信息传递给中央处理模块。
上述的一种移动终端防盗装置,其中,还包含第一无线通信模块,与所述中央处理模块相连,受中央处理模块控制与远端设备通信,传递指令。
上述的一种移动终端防盗装置,其中,所述第一无线通信模块为蓝牙模块或热点模块。
一种移动终端报警器,与上述的防盗装置配合使用,包括:
控制模块;
第二无线通信模块,与控制模块连接,受控制模块控制与远端的移动终端通信;
第二警报提示模块,与控制模块连接,受控制模块控制发出警报提示。
上述的一种移动终端报警器,其中,所述第二无线通信模块为蓝牙模块或热点模块。
一种移动终端防盗检测方法,使用上述的任一项移动终端防盗装置,包括以下步骤:
S1、手机被移动;
S2、位移检测模块检测手机被移动的距离;
S3、第一警报提示模块发出警报;
S4、指纹检测模块检测指纹;
S5、警报解除。
一种防盗手机使用方法,包括上述的成套报警装置,包括以下步骤:
在手机端开启防盗功能;
在报警器端开启报警功能;
随身携带报警器在安全距离内活动。
一种防盗手机,包括上述的任一种移动终端防盗装置,在充电前开启防盗功能。
本发明的优点和有益效果是:
1).相对于防盗展示架,本发明方便,简单,使用时只需开启移动终端防盗功能。
2).本发明对于个人使用防盗更安全,只要手机被挪动位置超限,就会立即发出报警语音。
3).本发明含有比较安全的指纹唯一解除报警语音提醒功能,对移动终端防盗更加安全。
本领域技术人员将认识到,可以按照被认为有用的任何方式来组合本发明提及的多个方案。
在本描述的基础上,本领域的普通技术人员能够执行与所述系统的所描述的修改或变形相对应的手机、平板电脑、个人终端的修改和变形。
附图的简要说明
为了更清楚地说明本发明实施例中的技术方案,下面将对本发明实施例描述中所需要使用的附图作简单的介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据本发明实施例的内容和这些附图获得其他附图。
图1是现有技术中的手机防盗架。
图2是本发明中报警装置的模块图。
图3是本发明中改进的成套报警装置的模块图之一。
图4是本发明中改进的成套报警装置的模块图之二。
图5是本发明中报警装置的处理流程图。
图6是本发明中指纹对比处理流程图。
图7是本发明中指纹处理效果对比图之一。
图8是本发明中指纹处理效果对比图之二。
图9是本发明中指纹处理效果对比图之三。
图10是本发明中实施例处理流程图。
图11是本发明中报警有效范围示意图。
实现本发明的最佳方式
以下结合附图,通过详细说明若干个较佳的具体实施例,对本发明做进一步阐述。
如图2所示的一种移动终端防盗装置模块图中,包括中央处理模块1、位移检测模块2、第一警报提示模块4和指纹检测模块3。
中央处理模块1,用于接收来自位移检测模块2和指纹检测模块3的信息。并做出相应指令,指示第一警报提示模块4报警或停止报警。
位移检测模块2,输出端与所述中央处理模块1连接,感应位移变化,并将变化信息传递给中央处理模块1,告知中央处理模块1移动终端当前位置的改变量。所述位移检测模块 2可以为三轴加速度传感器或陀螺仪。在X、Y、Z三个方向分别检测位移,全方位提供保护。若只在X、Y平面检测,会遗漏只在Z轴方向移动的可能性。
第一警报提示模块4,输入端与所述中央处理模块1连接,受中央处理模块1控制发出警报提示,警报提示一直持续到用户手动解除警报。所述第一警报提示模块4包含音频子模块和/或振动子模块和/或光闪子模块,与所述中央处理模块相连,受中央处理模块控制发出警报提示。发出警报的方式有多种,可以通过单一的声响、光闪、振动来进行提示,也可以同时采用其中两种方式结合来进行提示。甚至有必要时,可以同时采用三种方法进行提示。突然的、大范围的警报提示不仅仅起到提醒用户的作用,同时对偷盗者也能产生震慑的作用,还能引起路人关注。
指纹检测模块3,输出端与所述中央处理模块1连接,所述中央处理模块1将接收到的指纹与指纹库中预存储的已知指纹进行特征点比对,判断输入的指纹是否能与已知指纹匹配。如果匹配就给出指令,停止警报,如果不匹配将加强报警的力度。如图6所示是一个指纹识别和对比的过程。具体步骤如下:
S41、采集指纹信息,得到指纹图像;
S42、对指纹图像进行预处理;
S43、对S42所得的图像进行二值化处理;
S44、提取S43所得的图像中的线条信息;
S45、提取S44所得的图像中的指纹特征点;
S46、将S45所得的图像与指纹库图像进行比对;
S47、得出结论。
其中,对指纹图像进行预处理具体包含:
S421、极值滤波;
S422、一次平滑;
S423、锐化;
S424、二次平滑;
如图7~图9所示,是经过如图6所示的过程处理前后的效果对比图。图7为步骤S41采 集所得到的原始的指纹图像。其图像的对比度和清晰度都不够,无法辨认特征点。因此需要对其进行如步骤S421~S424的预处理,过滤噪点,提高纹路边缘清晰度。图8所示是经步骤S43二值化后得到的对比度和清晰度都得到提高的图像。但图8中信息量太大,不利于处理器提取特征点,因此进行步骤S44,提取辨别特征点所必须的简单线条信息。步骤S46利用图9所示的指纹图像提取其中的特征点,遍历指纹库,确认输入的指纹是否为正确的解锁指纹,从而进行下一步操作。
进一步地,考虑到如果充电中的移动终端被他人取走,必然存在充电线断开的过程。这一断开信号也可作为触发报警的标志。因此所述的一种移动终端防盗装置,还可以包含充电线检测模块。其输出端与所述中央处理模块1相连,由中央处理模块1检测充电线是否断开,如未断开则继续保持充电状态,如发现断开则立即发出警报。
进一步地,考虑充电过程中移动终端和用户之间可能距离较远,可能被其他人或物阻隔视线,一个更佳的方案是加入无线通信模块。因此所述的一种移动终端防盗装置,还可以包含一第一无线通信模块5,与所述中央处理模块5相连,受中央处理模块1控制与远端设备通信,传递指令。所述的远端设备可以是下文所述的报警器,报警器由用户随身携带,从而即便移动终端对用户不可见,用户也能及时收到报警提示信号。考虑到用户与移动终端之间不可能相隔遥远,此无线通信模块不需要具有远距离组网通信的功能,只要能实现短距离点对点通信即可。因此所述第一无线通信模块5为蓝牙模块或热点模块。
如图3和图4所示的是成套报警装置的模块图。图3为移动终端的模块图,图4为相应报警器的模块图。
图3所示的模块图即为上文所述的带无线通信模块的移动终端防盗装置的改进型方案。
图4所示为一种移动终端报警器,与图3所示的移动终端防盗装置配合使用,包括:
控制模块6;
第二无线通信模块8,与控制模块6连接,受控制模块6控制与远端的移动终端防盗装置通信。与图3所示的移动终端防盗装置相类似,考虑到用户与移动终端之间不可能相隔遥远,第二无线通信模块8也不需要具有远距离组网通信的功能,只要能实现短距离点对 点通信即可。因此所述第二无线通信模块8为蓝牙模块或热点模块。
第二警报提示模块7,输入端与控制模块6连接,受控制模块6控制发出警报提示。与图3所示的移动终端防盗装置相类似,第二警报提示模块7包含音频子模块和/或振动子模块和/或光闪子模块,与所述控制模块6相连,受控制模块6控制发出警报提示。发出警报的方式有多种,可以通过单一的声响、光闪、振动来进行提示,也可以同时采用其中两种方式结合来进行提示。甚至有必要时,可以同时采用三种方法进行提示。但其提示强度与图3所示的移动终端防盗装置相比可以弱许多,只要足够提示用户即可,不需要引起他人的注意。
如图5所示,是一种移动终端防盗检测方法,其硬件支持是上文所述的移动终端防盗装置,包括以下步骤:
S1、手机被移动;
S2、位移检测模块2检测手机被移动的距离;
S3、第一警报提示模块4发出警报;
S4、指纹检测模块3检测指纹;
S5、警报解除。
手机是否移位由位移检测模块2感知。发现有移动时,把信息反馈给中央处理模块1。
同时,位移检测模块2在X、Y、Z三个方向分别检测位移,并计算其合成位移的大小和方向,提供给中央处理模块1。所述中央处理模块1根据新的合成位移与之前的位置信息进行对比,并进行判断,对于在充电线线长范围内的合理、意外移动不做报警处理。
对于超出范围的移动,中央处理模块1指示第一警报提示模块4发出警报。警报的方式可以是语音、闪灯或振动。语音警报内容、闪灯规律、振动强度和节奏等都可以由用户自由设置。
中央处理模块1判断到指纹输入准确后,解除警报。手机只有输入正确解锁指纹后,第一警报提示模块4才能唯一解除,否则第一警报提示模块4一直维持警报状态。
移动终端防盗报警功能由用户决定是否启用,在软件里可以设置开启和关闭。在公共场所充电时,建议开启此项功能,在家或公司等比较安全的地方,建议关闭。
一种防盗手机使用方法,包括图3和图4所描述的成套报警装置,包括以下步骤:
●在公众场合或用户认为必要时,在手机端开启防盗功能,监测手机充电过程;
●与上一条呼应,在相应的报警器端也开启报警功能,以接收手机端发送的报警信号;
●用户需随身携带报警器在安全距离内活动,所谓安全距离不仅包括保证手机和报警器点对点通信的距离,还需保证用户在收到报警后能够及时回到手机边的距离。
一种防盗手机,包括本发明所述的任一种移动终端防盗装置,需在充电前开启防盗功能。
实施例
如图10所示,是一个较佳的移动终端端实施方案的流程图。在一个典型监测过程中,移动终端中的中央处理模块1首先判断充电线是否脱出。对于移动终端充电线脱出的情况需要立即提出警报。此时可能是有人正在进行恶意侵占的行为,也可能是充电线意外脱落,无论是哪种情况,都需要用户立刻返回进行后续处理。
若充电线在正常工作中,中央处理模块1进而对手机位置进行监测。考虑到公众场合情况复杂,允许移动终端在充电线的长度范围内做小幅度移动,因此对移动终端的位置监测需计算位移量,位移超过充电线长才提出警报。如图11所示,是手机的移动范围和用户移动范围的示意图。用户的移动范围如上文“一种防盗手机使用方法”中所述。
后续解除警报流程也在上文中有所描述,此处不再赘述。
解除警报后,若继续充电,则不停重复本流程。
以上结合附图详细说明了本发明的技术方案,本发明提出了一种新的正方拍照控制方法,通过对屏幕显示的遮挡造成正方形视图,有效的避免了切换预览而带来的停顿,提高预览速度,优化拍照过程和效果,从而提升了用户的使用体验。
本领域技术人员应认识到,可以按照被认为有用的任何方式来组合本发明所提及的多 个方案、实施例。
尽管本发明的内容已经通过上述优选实施例作了详细介绍,但应当认识到上述的描述不应被认为是对本发明的限制。在本领域技术人员阅读了上述内容后,对于本发明的多种修改和替代都将是显而易见的。因此,本发明的保护范围应由所附的权利要求来限定。

Claims (10)

  1. 一种移动终端防盗装置,适用于在公共场合充电的设备,其特征在于,包括:
    中央处理模块(1),接收信息,并做出相应指令;
    位移检测模块(2),与所述中央处理模块(1)连接,感应位移变化,并将变化信息传递给中央处理模块(1);
    第一警报提示模块(4),与所述中央处理模块(1)连接,受中央处理模块(1)控制发出警报提示;
    指纹检测模块(3),与所述中央处理模块(1)连接,所述中央处理模块(1)判断输入的指纹是否正确。
  2. 如权利要求1所述的一种移动终端防盗装置,其特征在于,所述位移检测模块(2)为三轴加速度传感器或陀螺仪。
  3. 如权利要求1所述的一种移动终端防盗装置,其特征在于,所述第一警报提示模块(4)包含音频子模块和/或振动子模块和/或闪光子模块,与所述中央处理模块相连,受中央处理模块控制发出警报提示。
  4. 如权利要求1所述的一种移动终端防盗装置,其特征在于,还包含充电线检测模块,与所述中央处理模块(1)相连,检测充电线是否断开,并将变化信息传递给中央处理模块(1)。
  5. 如权利要求1~4所述的任意一种移动终端防盗装置,其特征在于,还包含第一无线通信模块(5),与所述中央处理模块(5)相连,受中央处理模块(1)控制与远端设备通信,传递指令。
  6. 如权利要求5所述的一种移动终端防盗装置,其特征在于,所述第一无线通信模块(5)为蓝牙模块或热点模块。
  7. 一种移动终端报警器,其特征在于,与权利要求5所述的防盗装置配合使用,包括:
    控制模块(6);
    第二无线通信模块(8),与控制模块(6)连接,受控制模块(6)控制与远端的移动终端通信;
    第二警报提示模块(7),与控制模块(6)连接,受控制模块(6)控制发出警报提示。
  8. 如权利要求7所述的一种移动终端报警器,其特征在于,所述第二无线通信模块(7)为蓝牙模块或热点模块。
  9. 一种移动终端防盗检测方法,其特征在于,使用如权利要求1~6中所述的任一项移动终端防盗装置,包括以下步骤:
    S1、手机被移动;
    S2、位移检测模块(2)检测手机被移动的距离;
    S3、第一警报提示模块(4)发出警报;
    S4、指纹检测模块(3)检测指纹;
    S5、警报解除。
  10. 一种防盗手机使用方法,其特征在于,包括如权利要求1和权利要求7所述的成套报警装置,包括以下步骤:
    在手机端开启防盗功能;
    在报警器端开启报警功能;
    随身携带报警器在安全距离内活动。
PCT/CN2017/103101 2017-09-25 2017-09-25 一种移动终端防盗装置及其报警器和相应检测使用方法 WO2019056344A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/103101 WO2019056344A1 (zh) 2017-09-25 2017-09-25 一种移动终端防盗装置及其报警器和相应检测使用方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/103101 WO2019056344A1 (zh) 2017-09-25 2017-09-25 一种移动终端防盗装置及其报警器和相应检测使用方法

Publications (1)

Publication Number Publication Date
WO2019056344A1 true WO2019056344A1 (zh) 2019-03-28

Family

ID=65810937

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/103101 WO2019056344A1 (zh) 2017-09-25 2017-09-25 一种移动终端防盗装置及其报警器和相应检测使用方法

Country Status (1)

Country Link
WO (1) WO2019056344A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572883A (zh) * 2021-07-14 2021-10-29 谢凯玲 一种新型智能化电子产品的防盗保护壳
CN114664037A (zh) * 2022-03-22 2022-06-24 冠捷电子科技(福建)有限公司 显示器防盗报警控制方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140354409A1 (en) * 2010-09-29 2014-12-04 Certicom Corp. Systems and Methods for Managing Lost Devices
CN104580573A (zh) * 2013-10-29 2015-04-29 西安景行数创信息科技有限公司 一种手机主动防盗系统
CN104574868A (zh) * 2014-12-05 2015-04-29 上海斐讯数据通信技术有限公司 移动终端用的防盗报警系统及方法
CN104821068A (zh) * 2015-03-27 2015-08-05 努比亚技术有限公司 移动终端实时防盗报警的方法和装置
CN105827811A (zh) * 2015-10-21 2016-08-03 维沃移动通信有限公司 一种防盗方法、移动终端及穿戴设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140354409A1 (en) * 2010-09-29 2014-12-04 Certicom Corp. Systems and Methods for Managing Lost Devices
CN104580573A (zh) * 2013-10-29 2015-04-29 西安景行数创信息科技有限公司 一种手机主动防盗系统
CN104574868A (zh) * 2014-12-05 2015-04-29 上海斐讯数据通信技术有限公司 移动终端用的防盗报警系统及方法
CN104821068A (zh) * 2015-03-27 2015-08-05 努比亚技术有限公司 移动终端实时防盗报警的方法和装置
CN105827811A (zh) * 2015-10-21 2016-08-03 维沃移动通信有限公司 一种防盗方法、移动终端及穿戴设备

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572883A (zh) * 2021-07-14 2021-10-29 谢凯玲 一种新型智能化电子产品的防盗保护壳
CN113572883B (zh) * 2021-07-14 2023-07-07 谢凯玲 一种新型智能化电子产品的防盗保护壳
CN114664037A (zh) * 2022-03-22 2022-06-24 冠捷电子科技(福建)有限公司 显示器防盗报警控制方法

Similar Documents

Publication Publication Date Title
US9930715B2 (en) Method and apparatus for operating an electronic device
US9801068B2 (en) Terminal device
US11113940B2 (en) Wireless merchandise security system
JP6371007B2 (ja) 対象取り返し情報供給方法、装置、プログラムおよび記録媒体
RU2617679C2 (ru) Способ и устройство для защиты терминальной аппаратуры и терминальная аппаратура
US20180157817A1 (en) Unlocking method and apparatus, and storage medium
US9904812B2 (en) Method of protecting power receiver and related wireless charging device
JP6293984B2 (ja) 警報通知メッセージを送信する方法及び装置
CN103870738A (zh) 基于虹膜识别的可穿戴式身份认证装置
CN108550210B (zh) 控制车辆解除锁定状态的方法和装置
CN106251682A (zh) 停车位识别车辆的方法及装置
CN105892664B (zh) 一种信息处理方法及电子设备
WO2019056344A1 (zh) 一种移动终端防盗装置及其报警器和相应检测使用方法
CN110517036A (zh) 一种二维码付款防盗刷支付的方法及装置
JP5749761B2 (ja) 傘アラームシステム及び傘アラーム方法
CN108932817A (zh) 一种报警方法、报警装置和终端设备
CN108521514A (zh) 终端防盗提醒方法、移动终端及计算机可读存储介质
CN110290270B (zh) 防盗方法和移动终端
CN106343694A (zh) 行李箱安全监控方法及装置
JP7384154B2 (ja) 情報処理装置、情報処理方法、情報処理プログラム、端末装置、端末装置の制御方法および制御プログラム
WO2023280273A1 (zh) 一种控制方法和系统
US9445228B2 (en) Mobile device monitor system
CN110162944B (zh) 一种数据获取方法及终端
KR102385720B1 (ko) 데이터 처리 방법 및 그 전자 장치
KR102105024B1 (ko) 스마트 여행 가방 및 그 제어 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17926113

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17926113

Country of ref document: EP

Kind code of ref document: A1