WO2023155484A1 - 一种防拆目标设备 - Google Patents

一种防拆目标设备 Download PDF

Info

Publication number
WO2023155484A1
WO2023155484A1 PCT/CN2022/129015 CN2022129015W WO2023155484A1 WO 2023155484 A1 WO2023155484 A1 WO 2023155484A1 CN 2022129015 W CN2022129015 W CN 2022129015W WO 2023155484 A1 WO2023155484 A1 WO 2023155484A1
Authority
WO
WIPO (PCT)
Prior art keywords
tamper
target device
resistant
trigger event
power
Prior art date
Application number
PCT/CN2022/129015
Other languages
English (en)
French (fr)
Inventor
王增
Original Assignee
上海商汤智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海商汤智能科技有限公司 filed Critical 上海商汤智能科技有限公司
Publication of WO2023155484A1 publication Critical patent/WO2023155484A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources

Definitions

  • the present disclosure relates to the field of security technology, in particular to a tamper-resistant target device.
  • Access control systems are widely used in office buildings, government offices, telecommunication base stations, communities and other places.
  • the access control machine is the core equipment of the access control system, mainly used to protect the safety of personnel and property, so the access control machine itself needs to be safe.
  • Most of the access control devices have anti-dismantle protection functions.
  • the access control devices are remotely connected to control devices such as mobile phones or computers. Send an alarm message.
  • the tamper protection function cannot be triggered.
  • the access control device changes from the off state to the on state, and the tamper protection function will not be triggered, and the control terminal device cannot obtain the relevant records of the removal of the access control device in the off state.
  • the present disclosure proposes a tamper-resistant target device.
  • a tamper-resistant target device including: a tamper-resistant detection switch, which is used to detect whether there is a dismantling behavior for the tamper-proof target device, and when the dismantling behavior is detected, Next, report the tamper-evident triggering event to the control module; the control module is configured to determine that the tamper-evident triggering event corresponds to The tamper trigger event flag, wherein the tamper trigger event flag is used to indicate that there is the removal behavior for the tamper target device in a power-off state; the power supply module is used to activate the tamper target device In the case of a power-off state, power is supplied to the anti-tamper detection switch and the control module.
  • the anti-tamper target device further includes a central processing unit CPU, and the CPU is configured to: read the control Whether there is the tamper trigger event flag in the module; if the tamper trigger event flag is read in the control module, the tamper protection is triggered.
  • the CPU is further configured to: when the tamper protection is triggered, send a tamper protection request to the control terminal device corresponding to the tamper target device; receive the tamper protection request from the control terminal device A returned data deletion instruction; in response to the data deletion instruction, delete the target data stored in the tamper-resistant target device.
  • control module is further configured to: report the tamper-resistant trigger event and/or the tamper-resistant trigger event flag to a control terminal device corresponding to the tamper-resistant target device.
  • the anti-tamper target device further includes an alarm module; the control module is further configured to: trigger the alarm module to perform anti-tamper Call the police.
  • the power supply module is further configured to: supply power to the alarm module when the anti-tamper target device is in a power-off state.
  • the alarm module is further configured to: report the tamper trigger event to the control terminal device corresponding to the tamper target device when a tamper alarm is triggered.
  • the alarm module is further configured to issue an audible and visual alarm when the tamper alarm is triggered.
  • the tamper-resistant triggering event includes identification information of the tamper-resistant target device and/or time information of the removal behavior.
  • control module is a micro control unit MCU; and/or; the power supply module is a button battery.
  • the tamper-resistant target device is a tamper-resistant access control machine.
  • the tamper-resistant trigger event is reported to the control module , so that when the control module receives a tamper trigger event and the tamper target device is in a power-off state, it determines that the tamper trigger event corresponds to indicating that there is a dismantling behavior for the tamper target device in a power-off state
  • the tamper trigger event flag when the control module receives a tamper trigger event and the tamper target device is in a power-off state, it determines that the tamper trigger event corresponds to indicating that there is a dismantling behavior for the tamper target device in a power-off state.
  • the tamper target device also includes a power supply module, which can supply power to the tamper detection switch and the control module when the tamper target device is in a power-off state, thereby realizing , can record the tamper-evident triggering event, so as to effectively remind the anti-demolition target device that the demolition behavior has occurred in the power-off state, and effectively improve the security of the tamper-proof target device.
  • a power supply module which can supply power to the tamper detection switch and the control module when the tamper target device is in a power-off state, thereby realizing , can record the tamper-evident triggering event, so as to effectively remind the anti-demolition target device that the demolition behavior has occurred in the power-off state, and effectively improve the security of the tamper-proof target device.
  • FIG. 1 shows a block diagram of a tamper-resistant target device according to an embodiment of the present disclosure
  • FIG. 2 shows a flow chart of performing a tamper alarm on a tamper target device in a power-off state according to an embodiment of the present disclosure
  • FIG. 3 shows a flow chart of performing tamper protection on a tamper-resistant target device recovering from a power-off state to a normal power supply state according to an embodiment of the present disclosure
  • FIG. 4 shows a flow chart of performing a tamper alarm on a tamper target device in a normal power supply state according to an embodiment of the present disclosure
  • Fig. 5 shows a block diagram of an electronic device according to an embodiment of the present disclosure
  • FIG. 6 shows a block diagram of another electronic device according to an embodiment of the present disclosure.
  • the access control system is mainly used to protect the safety of personnel and property. Therefore, the access control device itself needs to be safe. At present, most of the access control devices have a tamper alarm function. When the access control device is working normally, if it is detected that the access control device is removed, the tamper alarm will be triggered. However, when the access control device is in a power-off state and cannot work normally, for example, when the access control device is in a power-off state or a power failure, it is impossible to detect whether the access control device has been removed. Anti-dismantle alarm will be given when dismantled. Moreover, when the access control device is restored to normal power supply, it is impossible to find that the access control device has been dismantled in a power-off state, which leads to lower security of the access control device.
  • An embodiment of the present disclosure provides a tamper-resistant target device.
  • the tamper-resistant target device whether there is a dismantling behavior for the tamper-resistant target device is detected through a tamper-resistant detection switch, and when a dismantling behavior is detected, the The module reports the tamper trigger event, so that the control module determines the corresponding tamper trigger event when the control module receives the tamper trigger event and the tamper target device is in a power-off state, and is used to indicate the anti-tamper The tamper trigger event flag of the dismantling behavior of the dismantling target device.
  • the tamper target device also includes a power supply module, which can supply power to the tamper detection switch and the control module when the tamper target device is in a power-off state, so that whether the tamper target device is in a normal power supply state or When the power is off, it can detect whether the tamper target device is removed, and when the tamper target device is in the power off state, it can record the tamper trigger event to effectively prompt the tamper target device to be disconnected.
  • the demolition behavior has occurred in the power state, which can effectively improve the security of the anti-tampering target device.
  • Fig. 1 shows a block diagram of a tamper-resistant target device according to an embodiment of the present disclosure.
  • the anti-tampering target device can be electronic equipment such as a terminal device or a server, and the terminal device can be a user equipment (User Equipment, UE), a mobile device, a user terminal, a terminal, a cellular phone, a cordless phone, a personal digital assistant (Personal Digital Assistant, PDA), etc. ), handheld devices, computing devices, in-vehicle devices, wearable devices, etc.
  • the tamper-resistant target device 10 may include: a tamper-resistant detection switch 101 , a control module 102 and a power supply module 103 .
  • the anti-tamper detection switch 101 is used to detect whether there is a dismantling action on the anti-tamper target device 10 , and to report a tamper-resistant trigger event to the control module 102 if the dismantling action is detected.
  • the anti-tamper detection switch 101 can detect whether there is a dismantling action on the anti-tamper target device 10 .
  • the removal behavior here may include artificially removing the shell of the tamper-proof target device 10 without permission, and may also include removing the tamper-proof target device 10 from its original position without permission. disassembled. For example, when the tamper-proof target device 10 is an access control device fixed on a wall, the access control device is disassembled, so that the access control device is separated from the wall and cannot work normally.
  • the anti-tamper detection switch 101 detects that there is a dismantling behavior of the anti-tamper target device 10 , it reports a tamper-proof trigger event to the control module 102 .
  • the control module 102 is configured to determine a tamper triggering event flag corresponding to the tampering trigger event when the tampering triggering event is received and the tampering target device 10 is in a power-off state, wherein the tampering triggering event flag is used to indicate There is a dismantling behavior for the tamper-resistant target device 10 in the power-off state.
  • the anti-tamper target device 10 In the case that the anti-tamper target device 10 is in a power-off state, by determining the anti-tamper trigger event flag corresponding to the anti-tamper trigger event, so that the current anti-tamper trigger event of the anti-tamper target device 10 in the power-off state can be performed Record.
  • the power supply module 103 is configured to supply power to the tamper detection switch 101 and the control module 102 when the tamper-resistant target device 10 is in a power-off state.
  • the power supply module 103 can supply power to the tamper detection switch 101 and the control module 102, so that no matter whether the tamper target device 10 is in a normal power supply state, the tamper detection switch 101 can continue to perform removal behavior detection, and then, the tamper target device 10 is in the power-off state and the tamper detection switch 101 detects that there is a dismantling behavior, the tamper detection switch 101 reports the tamper trigger event to the control module 102, and the control module 102 determines the tamper trigger event flag corresponding to the tamper trigger event , to record a tamper trigger event.
  • a tamper-evident trigger event can be reported to the control module when the dismantling behavior is detected , so that when the control module receives a tamper trigger event and the tamper target device is in a power-off state, it determines that the tamper trigger event corresponds to indicating that there is a dismantling behavior for the tamper target device in a power-off state
  • the tamper trigger event flag in the tamper-resistant target device, whether there is a dismantling behavior for the tamper-resistant target device is detected through the tamper detection switch, and a tamper-evident trigger event can be reported to the control module when the dismantling behavior is detected , so that when the control module receives a tamper trigger event and the tamper target device is in a power-off state, it determines that the tamper trigger event corresponds to indicating that there is a dismantling behavior for the tamper target device
  • the tamper target device also includes a power supply module, which can supply power to the tamper detection switch and the control module when the tamper target device is in a power-off state, thereby realizing , can record the tamper-evident triggering event, so as to effectively remind the anti-demolition target device that the demolition behavior has occurred in the power-off state, and effectively improve the security of the tamper-proof target device.
  • a power supply module which can supply power to the tamper detection switch and the control module when the tamper target device is in a power-off state, thereby realizing , can record the tamper-evident triggering event, so as to effectively remind the anti-demolition target device that the demolition behavior has occurred in the power-off state, and effectively improve the security of the tamper-proof target device.
  • control module 102 is a Microcontroller Unit (MCU, Microcontroller Unit); and/or, the power supply module 103 is a button battery.
  • MCU Microcontroller Unit
  • power supply module 103 is a button battery.
  • the button battery can be used as the power supply module 103 to supply power to the tamper-resistant detection switch 101 and the control module 102 .
  • the MCU with low power consumption can be used as the control module 102 to continuously perform tamper detection on the tamper-resistant target device 10 .
  • the anti-tamper target device 10 is a tamper-resistant access control machine.
  • the tamper-resistant target device 10 may be a tamper-evident access control device, and the tamper-resistant access control device can protect the safety of personnel and property.
  • the anti-tamper target device 10 may be not only a tamper-proof access control machine, but also a device with security requirements such as a tamper-proof mobile phone and a tamper-proof camera, which is not specifically limited in the present disclosure.
  • the anti-tamper trigger event includes identification information of the tamper-resistant target device 10 and/or time information of a dismantling action.
  • the anti-tamper trigger event may include identification information of the anti-tamper target device 10, wherein the identification information of the anti-tamper target device 10 is used to indicate which device the anti-tamper trigger event specifically occurs on.
  • the tamper triggering event may also include time information of the dismantling behavior, where the time information of the dismantling behavior is used to indicate the specific time when the tamper triggering event occurs. Relevant management personnel can perform relevant management operations on the anti-tamper target device 10 that has been dismantled according to the identification information of the tamper-resistant target device 10 and/or the time information of the dismantling behavior.
  • the anti-tampering trigger event may also include other attribute information, which may be flexibly set according to actual conditions, which is not specifically limited in the present disclosure.
  • control module 102 is further configured to report the tamper-resistant trigger event and/or the tamper-resistant trigger event flag to the control terminal device corresponding to the tamper-resistant target device 10 .
  • the control module 102 After the control module 102 determines the tamper-resistant trigger event flag, it can report the tamper-resistant trigger event and/or the tamper-resistant trigger event flag to the control terminal device corresponding to the tamper-resistant target device 10, wherein the control terminal device and the tamper-proof target device 10 can To communicate remotely.
  • the tamper trigger event and/or the tamper trigger event flag are reported to the control terminal device, so that the relevant management personnel can perform follow-up processing on the dismantling behavior of the tamper target device 10 according to the tamper trigger event and/or the tamper trigger event flag .
  • the control terminal device may be a computer, a mobile phone or other devices in the control room, which is not specifically limited in the present disclosure.
  • the anti-tamper target device 10 further includes an alarm module 104; the control module 102 is further configured to trigger the alarm module 104 to perform a tamper alarm when an anti-tamper trigger event is received.
  • control module 102 After the control module 102 receives the tamper-evident trigger event, it can trigger the alarm module 104 to perform a tamper-evident alarm, so as to notify relevant management personnel that there is a dismantling behavior for the tamper-evident target device 10, so that the tamper-evident trigger event can be processed in time.
  • the alarm module 104 is further configured to report a tamper trigger event to a control terminal device corresponding to the tamper target device 10 when a tamper alarm is triggered.
  • the alarm module 104 reports the tamper trigger event to the corresponding control terminal device of the tamper target device 10, so that the relevant management personnel receive the alarm information, and then can target the removal of the tamper target device 10 Behavior for subsequent processing.
  • the alarm module 104 is further configured to issue an audible and visual alarm when the tamper alarm is triggered.
  • the alarm module 104 can also perform an audible and visual alarm on site.
  • the alarm module 104 sends out an audible and visual alarm, for example, sends a preset sound alarm signal, or sends out a preset alarm signal.
  • the sound and light alarm can not only deter the demolition actor, but also enable the relevant management personnel to stop the demolition in time when they hear or see the alarm signal.
  • the power supply module 103 is further configured to supply power to the alarm module 104 when the anti-tamper target device 10 is in a power-off state.
  • the power supply module 103 can not only supply power to the anti-dismantlement detection switch 101 and the control module 102, but also can supply power to the alarm module 104, so that even when the anti-dismantlement target device 10 is in a power-off state, the anti-dismantlement detection switch 101 can also provide The dismantling behavior is detected, and when the dismantling behavior is detected, a tampering trigger event is reported to the control module 102, so that the control module 102 triggers the alarm module 104 to perform a tampering alarm.
  • the power supply module 103 may stop supplying power to the anti-tamper detection switch 101 , the control module 102 and the alarm module 104 to effectively save power.
  • Fig. 2 shows a flow chart of performing a tamper alarm on a tamper target device in a power-off state according to an embodiment of the present disclosure.
  • the anti-tamper detection switch 101 reports an anti-tamper trigger event to the control module 102 when detecting that there is a dismantling behavior for the anti-tamper target device 10 .
  • the control module 102 receives an anti-tamper trigger event, and detects whether the anti-tamper target device 10 is in a power-off state.
  • step S23 when the control module 102 detects that the tamper-resistant target device 10 is in a power-off state, it triggers the alarm module 104 to perform a tamper alarm, and determines a tamper-resistant trigger event flag corresponding to the tamper-resistant trigger event.
  • a tamper trigger event flag is generated if there is a tamper trigger event.
  • the tamper trigger event flag is marked as 0; if there is a tamper trigger event, the tamper trigger event flag is marked as 1.
  • the specific form of the anti-demolition trigger event flag can also be flexibly set according to the actual situation, which is not specifically limited in the present disclosure.
  • the tamper-resistant target device also includes a central processing unit 105 (CPU, Central Processing Unit), CPU105, which is used to read the control module when it detects that the tamper-resistant target device 10 resumes normal power supply Whether there is a tamper trigger event flag in 102; if it is read that there is a tamper trigger event flag in the control module 102, the tamper protection is triggered.
  • CPU Central Processing Unit
  • the CPU 105 When the anti-dismantlement target device 10 is in a power-off state, the CPU 105 cannot work normally and cannot trigger the anti-dismantlement protection. Therefore, by recording the anti-dismantlement trigger event flag through the control module 102, it can be determined that the anti-dismantlement target device 10 is in a power-off state. state, a tamper trigger event has occurred. Furthermore, when the tamper-resistant target device 10 resumes normal power supply, the CPU 105 may trigger the tamper-resistant protection when it is determined that there is a tamper-resistant trigger event flag.
  • Fig. 3 shows a flow chart of performing tamper protection on a tamper-resistant target device recovering from a power-off state to a normal power supply state according to an embodiment of the present disclosure.
  • the anti-tamper target device 10 restores normal power supply.
  • the CPU 105 reads whether there is an anti-tamper trigger event flag in the control module 102 . If yes, skip to step S33; if not, skip to step S34.
  • step S33 the CPU 105 triggers the tamper protection.
  • the tamper-resistant target device 10 works normally.
  • the CPU 105 is also configured to: when the tamper protection is triggered, send a tamper protection request to the control device corresponding to the tamper target device 10; receive a data deletion instruction returned by the control device ; Delete the target data stored in the tamper-resistant target device 10 in response to the data deletion instruction.
  • Data information is usually stored in the tamper-resistant target device 10.
  • the tamper-resistant target device 10 is a tamper-resistant access control device
  • data information such as faces and fingerprints can be stored in the tamper-resistant access control device.
  • These data information involve user privacy. , with high security requirements.
  • the anti-tamper target device 10 is dismantled, the data stored in the anti-tamper target device 10 may be illegally stolen or destroyed. Therefore, by triggering the anti-tamper protection, when the anti-tamper target device 10 is removed, the data information stored in the anti-tamper target device 10 is protected.
  • the CPU 105 After triggering the tamper protection, the CPU 105 sends a tamper protection request to the control terminal device corresponding to the tamper target device 10, and the relevant management personnel can send a data deletion instruction to the CPU 105 through the control terminal equipment, so that the CPU 105 responds to the data deletion instruction.
  • the target data in the tamper-resistant target device 10 is deleted, thereby effectively ensuring data security.
  • the CPU 105 may also automatically delete the target data in the anti-tamper target device 10 according to a preset data deletion instruction, so as to effectively ensure data security.
  • the target data may be all data stored in the tamper-resistant target device 10, or some important data set according to preset conditions, and the target data may be flexibly set according to actual conditions, which is not specifically limited in this disclosure.
  • Fig. 4 shows a flow chart of performing a tamper alarm on a tamper target device in a normal power supply state according to an embodiment of the present disclosure.
  • the anti-tamper detection switch 101 reports an anti-tamper trigger event to the control module 102 when detecting that there is a dismantling behavior for the anti-tamper target device 10 .
  • the control module 102 receives an anti-tamper trigger event, and detects whether the anti-tamper target device 10 is in a power-off state.
  • step S43 when the control module 102 detects that the tamper-resistant target device 10 is in a normal power supply state, the alarm module 104 is triggered to perform a tamper-proof alarm, and the tamper-resistant trigger event is reported to the CPU 105 in the tamper-resistant target device 10, So that the CPU 105 triggers the tamper protection.
  • control module 102 when the control module 102 detects that the tamper-resistant target device 10 is in a normal power supply state, it can also directly report the tamper-evident trigger event to the CPU 105, so that the CPU 105 triggers the alarm module 104 to perform a tamper alarm and triggers tamper protection. .
  • the anti-tampering target device 10 in the embodiment of the present disclosure may be provided as a terminal, a server or other electronic devices.
  • Fig. 5 shows a block diagram of an electronic device according to an embodiment of the present disclosure.
  • the electronic device 800 may be a user equipment (User Equipment, UE), a mobile device, a user terminal, a terminal, a cellular phone, a cordless phone, a personal digital assistant (PDA), a handheld device, a computing device, a vehicle Devices, wearable devices and other terminal equipment.
  • UE User Equipment
  • PDA personal digital assistant
  • electronic device 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and a communication component 816 .
  • the processing component 802 generally controls the overall operations of the electronic device 800, such as those associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802 .
  • the memory 804 is configured to store various types of data to support operations at the electronic device 800 . Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and the like.
  • the memory 804 can be implemented by any type of volatile or non-volatile storage device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 806 provides power to various components of the electronic device 800 .
  • Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for electronic device 800 .
  • the multimedia component 808 includes a screen providing an output interface between the electronic device 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or swipe action, but also detect duration and pressure associated with the touch or swipe action.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the electronic device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 810 is configured to output and/or input audio signals.
  • the audio component 810 includes a microphone (MIC), which is configured to receive external audio signals when the electronic device 800 is in operation modes, such as call mode, recording mode and voice recognition mode. Received audio signals may be further stored in memory 804 or sent via communication component 816 .
  • the audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • Sensor assembly 814 includes one or more sensors for providing status assessments of various aspects of electronic device 800 .
  • the sensor component 814 can detect the open/close state of the electronic device 800, the relative positioning of components, such as the display and the keypad of the electronic device 800, the sensor component 814 can also detect the electronic device 800 or a Changes in position of components, presence or absence of user contact with electronic device 800 , electronic device 800 orientation or acceleration/deceleration and temperature changes in electronic device 800 .
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 814 may also include an optical sensor, such as a complementary metal-oxide-semiconductor (CMOS) or charge-coupled device (CCD) image sensor, for use in imaging applications.
  • CMOS complementary metal-oxide-semiconductor
  • CCD charge-coupled device
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices.
  • the electronic device 800 can access wireless networks based on communication standards, such as wireless networks (Wi-Fi), second-generation mobile communication technologies (2G), third-generation mobile communication technologies (3G), fourth-generation mobile communication technologies (4G ), the long-term evolution (LTE) of the universal mobile communication technology, the fifth generation mobile communication technology (5G) or their combination.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wideband
  • Bluetooth Bluetooth
  • electronic device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the methods described above.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A programmable gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the methods described above.
  • a non-volatile computer-readable storage medium such as the memory 804 including computer program instructions, which can be executed by the processor 820 of the electronic device 800 to implement the above method.
  • This disclosure relates to the field of augmented reality.
  • acquiring the image information of the target object in the real environment and then using various visual correlation algorithms to detect or identify the relevant features, states and attributes of the target object, and thus obtain the image information that matches the specific application.
  • AR effect combining virtual and reality.
  • the target object may involve faces, limbs, gestures, actions, etc. related to the human body, or markers and markers related to objects, or sand tables, display areas or display items related to venues or places.
  • Vision-related algorithms can involve visual positioning, SLAM, 3D reconstruction, image registration, background segmentation, object key point extraction and tracking, object pose or depth detection, etc.
  • Specific applications can not only involve interactive scenes such as guided tours, navigation, explanations, reconstructions, virtual effect overlays and display related to real scenes or objects, but also special effects processing related to people, such as makeup beautification, body beautification, special effect display, virtual Interactive scenarios such as model display.
  • the relevant features, states and attributes of the target object can be detected or identified through the convolutional neural network.
  • the above-mentioned convolutional neural network is a network model obtained by performing model training based on a deep learning framework.
  • FIG. 6 shows a block diagram of another electronic device according to an embodiment of the present disclosure.
  • an electronic device 1900 may be provided as a server or a terminal device.
  • electronic device 1900 includes processing component 1922, which further includes one or more processors, and a memory resource represented by memory 1932 for storing instructions executable by processing component 1922, such as application programs.
  • the application programs stored in memory 1932 may include one or more modules each corresponding to a set of instructions.
  • the processing component 1922 is configured to execute instructions to perform the above method.
  • Electronic device 1900 may also include a power supply component 1926 configured to perform power management of electronic device 1900, a wired or wireless network interface 1950 configured to connect electronic device 1900 to a network, and an input-output (I/O) interface 1958 .
  • the electronic device 1900 can operate based on the operating system stored in the memory 1932, such as the Microsoft server operating system (Windows Server TM ), the graphical user interface-based operating system (Mac OS X TM ) introduced by Apple Inc., and the multi-user and multi-process computer operating system (Unix TM ), a free and open source Unix-like operating system (Linux TM ), an open source Unix-like operating system (FreeBSD TM ), or the like.
  • Microsoft server operating system Windows Server TM
  • Mac OS X TM graphical user interface-based operating system
  • Unix TM multi-user and multi-process computer operating system
  • Linux TM free and open source Unix-like operating system
  • FreeBSD TM open source Unix-like operating system
  • a non-transitory computer-readable storage medium such as the memory 1932 including computer program instructions, which can be executed by the processing component 1922 of the electronic device 1900 to implement the above method.
  • the present disclosure can be a system, method and/or computer program product.
  • a computer program product may include a computer readable storage medium having computer readable program instructions thereon for causing a processor to implement various aspects of the present disclosure.
  • a computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device.
  • a computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • flash memory static random access memory
  • SRAM static random access memory
  • CD-ROM compact disc read only memory
  • DVD digital versatile disc
  • memory stick floppy disk
  • mechanically encoded device such as a printer with instructions stored thereon
  • a hole card or a raised structure in a groove and any suitable combination of the above.
  • computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.
  • Computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
  • the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
  • Computer program instructions for performing the operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or Source or object code written in any combination, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as the “C” language or similar programming languages.
  • Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement.
  • the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as via the Internet using an Internet service provider). connect).
  • LAN local area network
  • WAN wide area network
  • an electronic circuit such as a programmable logic circuit, field programmable gate array (FPGA), or programmable logic array (PLA)
  • FPGA field programmable gate array
  • PDA programmable logic array
  • These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processor of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram.
  • These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
  • each block in a flowchart or block diagram may represent a module, a portion of a program segment, or an instruction that includes one or more Executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.
  • the computer program product can be specifically realized by means of hardware, software or a combination thereof.
  • the computer program product is embodied as a computer storage medium, and in another optional embodiment, the computer program product is embodied as a software product, such as a software development kit (Software Development Kit, SDK) etc. wait.
  • a software development kit Software Development Kit, SDK
  • the writing order of each step does not mean a strict execution order and constitutes any limitation on the implementation process.
  • the specific execution order of each step should be based on its function and possible
  • the inner logic is OK.
  • the product applying the technical solution of this application has clearly notified the personal information processing rules and obtained the individual's independent consent before processing personal information.
  • the technical solution of this application involves sensitive personal information
  • the products applying the technical solution of this application have obtained individual consent before processing sensitive personal information, and at the same time meet the requirements of "express consent". For example, at a personal information collection device such as a camera, a clear and prominent sign is set up to inform that it has entered the scope of personal information collection, and personal information will be collected.
  • the personal information processing rules may include Personal information processors, personal information processing purposes, processing methods, and types of personal information processed.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

一种防拆目标设备包括:防拆检测开关,用于检测是否存在针对防拆目标设备的拆除行为,以及在检测到存在拆除行为的情况下,向控制模块上报防拆触发事件;控制模块,用于在接收到防拆触发事件且防拆目标设备处于断电状态的情况下,确定防拆触发事件对应的防拆触发事件标志,其中,防拆触发事件标志用于指示针对处于断电状态下的防拆目标设备存在拆除行为;供电模块,用于在防拆目标设备处于断电状态的情况下,为防拆检测开关、控制模块供电。

Description

一种防拆目标设备
本申请要求2022年02月18日提交、申请号为202210150409.6,发明名称为“一种防拆目标设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本公开涉及安防技术领域,尤其涉及一种防拆目标设备。
背景技术
门禁系统广泛应用于大厦写字楼、政府办公机构、电信基站、小区等场所。门禁机是门禁系统的核心设备,主要用于保护人员和财产安全,因此门禁机设备自身需要具有安全性。目前,门禁机设备大多都有防拆保护功能,门禁机设备与手机或电脑等控制端设备远程连接,当开机状态的门禁机设备被拆除时,就会触发防拆保护功能,向控制端设备发出报警信息。然而,关机状态下的门禁机设备被分拆除时,就无法触发防拆保护功能。并且,拆除行为发生过后,门禁机设备由关机状态变为开机状态,仍然不会触发防拆保护功能,控制端设备也无法获取关机状态下门禁机设备被拆除的相关记录。
发明内容
本公开提出了一种防拆目标设备。
根据本公开的一方面,提供了一种防拆目标设备,包括:防拆检测开关,用于检测是否存在针对所述防拆目标设备的拆除行为,以及在检测到存在所述拆除行为的情况下,向控制模块上报防拆触发事件;所述控制模块,用于在接收到所述防拆触发事件且所述防拆目标设备处于断电状态的情况下,确定所述防拆触发事件对应的防拆触发事件标志,其中,所述防拆触发事件标志用于指示针对处于断电状态下的所述防拆目标设备存在所述拆除行为;供电模块,用于在所述防拆目标设备处于断电状态的情况下,为所述防拆检测开关、所述控制模块供电。
在一种可能的实现方式中,所述防拆目标设备还包括中央处理器CPU,所述CPU,用于:在检测到所述防拆目标设备恢复正常供电的情况下,读取所述控制模块中是否存在所述防拆触发事件标志;在读取到所述控制模块中存在所述防拆触发事件标志的情况下,触发防拆保护。
在一种可能的实现方式中,所述CPU,还用于:在触发防拆保护的情况下,向所述防拆目标设备对应的控制端设备发送防拆保护请求;接收所述控制端设备返回的数据删除指令;响应于所述数据删除指令,对所述防拆目标设备中所存储的目标数据进行删除。
在一种可能的实现方式中,所述控制模块,还用于:将所述防拆触发事件和/或所述防拆触发事件标志上报所述防拆目标设备对应的控制端设备。
在一种可能的实现方式中,所述防拆目标设备还包括报警模块;所述控制模块,还用于:在接收到所述防拆触发事件的情况下,触发所述报警模块进行防拆报警。
在一种可能的实现方式中,所述供电模块,还用于:在所述防拆目标设备处于断电状态的情况下,为所述报警模块供电。
在一种可能的实现方式中,所述报警模块,还用于:在触发防拆报警的情况下,将所述防拆触发事件上报所述防拆目标设备对应的控制端设备。
在一种可能的实现方式中,所述报警模块,还用于:在触发防拆报警的情况下,进行声光报警。
在一种可能的实现方式中,所述防拆触发事件包括所述防拆目标设备的标识信息和/或所述拆除行为的时间信息。
在一种可能的实现方式中,所述控制模块为微控制单元MCU;和/或;所述供电模块为纽扣电池。
在一种可能的实现方式中,所述防拆目标设备为防拆门禁机。
在本公开实施例中,在防拆目标设备中,通过防拆检测开关检测是否存在针对防拆目标设备的拆除行为,以及在检测到存在拆除行为的情况下,向控制模块上报防拆触发事件,以使得控制模块在接收到防拆触发事件且防拆目标设备处于断电状态的情况下,确定防拆触发事件对应的,用于指示针对处于断电状态下的防拆目标设备存在拆除行为的防拆触发事件标志。其中,防拆目标设备中还包括供电模块,可以在防拆目标设备处于断电状态的情况下,为防拆检测开关、控制模块供电,从而实现在防拆目标设备处于断电状态的情况下,能够对防拆触发事件进行记录,以有效提示防拆目标设备在断电状态下发生过拆除行为,有效提高防拆目标设备的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,而非限制本公开。根据下面参考附图对示例性实施例的详细说明,本公开的其它特征及方面将变得清楚。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,这些附图示出了符合本公开的实施例,并与说明书一起用于说明本公开的技术方案。
图1示出根据本公开实施例的一种防拆目标设备的框图;
图2示出根据本公开实施例的对处于断电状态下的防拆目标设备进行防拆报警的流程图;
图3示出根据本公开实施例的对从断电状态恢复正常供电状态的防拆目标设备进行防拆保护的流程图;
图4示出根据本公开实施例的对处于正常供电状态下的防拆目标设备进行防拆报警的流程图;
图5示出根据本公开实施例的一种电子设备的框图;
图6示出根据本公开实施例的另一种电子设备的框图。
具体实施方式
以下将参考附图详细说明本公开的各种示例性实施例、特征和方面。附图中相同的附图标记表示功能相同或相似的组件。尽管在附图中示出了实施例的各种方面,但是除非特别指出,不必按比例绘制附图。
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中术语“至少一种”表示多种中的任意一种或多种中的至少两种的任意组合,例如,包括A、B、C中的至少一种,可以表示包括从A、B和C构成的集合中选择的任意一个或多个元素。
另外,为了更好地说明本公开,在下文的具体实施方式中给出了众多的具体细节。本领域技术人员应当理解,没有某些具体细节,本公开同样可以实施。在一些实例中,对于本领域技术人员熟知的方法、手段、组件和电路未作详细描述,以便于凸显本公开的主旨。
门禁系统主要用于保护人员和财产安全,因此,门禁机设备自身需要具有安全性。目前,门禁机设备大多都有防拆报警功能,当门禁机设备正常工作的情况下,如果检测到门禁机设备被拆除,就会触发防拆报警。然而,当门禁机设备处于断电状态无法正常工作的情况下,例如,门禁机设备处于关机状态或者停电状态下,就无法检测门禁机设备是否被拆除,此时,也无法在门禁机设备被拆除时进行防拆报警。并且,在门禁机设备恢复正常供电时,也无法发现门禁机设备处于断电状态下被拆除过,这就导致门禁机设备的安全性较低。
本公开实施例提供了一种防拆目标设备,在防拆目标设备中,通过防拆检测开关检测是否存在针对防拆目标设备的拆除行为,以及在检测到存在拆除行为的情况下,向控制模块上报防拆触发事件,以使得控制模块在接收到防拆触发事件且防拆目标设备处于断电状态的情况下,确定防拆触发事件对应的,用于指示针对处于断电状态下的防拆目标设备存在拆除行为的防拆触发事件标志。其中,防拆目标设备中还包括供电模块,可以在防拆目标设备处于断电状态的情况下,为防拆检测开关、控制模块供电,以使得可以实现无论防拆目标设备处于正常供电状态还是断电状态的情况下,都能检测防拆目标设备是否被拆除,以及在防拆目标设备处于断电状态的情况下,能够对防拆触发事件进行记录,以有效提示防拆目标设备在断电状态下发生过拆除行为,从而可以有效提高防拆目标设备的安全性。
图1示出根据本公开实施例的一种防拆目标设备的框图。防拆目标设备可以是终端设备或服务器等电子设备,终端设备可以为用户设备(User Equipment,UE)、移动设备、用户终端、终端、蜂窝电话、无绳电话、个人数字助理(Personal Digital Assistant,PDA)、 手持设备、计算设备、车载设备、可穿戴设备等。如图1所示,防拆目标设备10可以包括:防拆检测开关101、控制模块102和供电模块103。
防拆检测开关101,用于检测是否存在针对防拆目标设备10的拆除行为,以及在检测到存在拆除行为的情况下,向控制模块102上报防拆触发事件。
防拆检测开关101可以检测是否存在针对防拆目标设备10的拆除行为。这里的拆除行为可以包括在未经允许的情况下,人为地对防拆目标设备10的外壳进行拆除,也可以包括在未经允许的情况下,将防拆目标设备10从原有的位置上拆卸下来。例如,在防拆目标设备10是固定于墙体上的门禁机设备的情况下,对门禁机设备进行拆卸,使得门禁机设备与墙体分离而无法正常工作。在防拆检测开关101检测到存在防拆目标设备10的拆除行为的情况下,向控制模块102上报防拆触发事件。
控制模块102,用于在接收到防拆触发事件且防拆目标设备10处于断电状态的情况下,确定防拆触发事件对应的防拆触发事件标志,其中,防拆触发事件标志用于指示针对处于断电状态下的防拆目标设备10存在拆除行为。
在防拆目标设备10处于断电状态的情况下,通过确定防拆触发事件对应的防拆触发事件标志,以使得可以对处于断电状态下的防拆目标设备10的当前防拆触发事件进行记录。
供电模块103,用于在防拆目标设备10处于断电状态的情况下,为防拆检测开关101、控制模块102供电。
供电模块103可以为防拆检测开关101、控制模块102供电,以使得无论防拆目标设备10是否处于正常供电状态,防拆检测开关101都可以持续进行拆除行为检测,进而,在防拆目标设备10处于断电状态且防拆检测开关101检测到存在拆除行为的情况下,防拆检测开关101向控制模块102上报防拆触发事件,控制模块102确定防拆触发事件对应的防拆触发事件标志,以记录防拆触发事件。
在本公开实施例中,在防拆目标设备中,通过防拆检测开关检测是否存在针对防拆目标设备的拆除行为,可以在检测到存在拆除行为的情况下,向控制模块上报防拆触发事件,以使得控制模块在接收到防拆触发事件且防拆目标设备处于断电状态的情况下,确定防拆触发事件对应的,用于指示针对处于断电状态下的防拆目标设备存在拆除行为的防拆触发事件标志。其中,防拆目标设备中还包括供电模块,可以在防拆目标设备处于断电状态的情况下,为防拆检测开关、控制模块供电,从而实现在防拆目标设备处于断电状态的情况下,能够对防拆触发事件进行记录,以有效提示防拆目标设备在断电状态下发生过拆除行为,有效提高防拆目标设备的安全性。
在一种可能的实现方式中,控制模块102为微控制单元(MCU,Microcontroller Unit);和/或,供电模块103为纽扣电池。
在防拆目标设备10处于断电状态的情况下,纽扣电池可以作为供电模块103为防拆检测开关101、控制模块102进行供电。
低功耗的MCU可以作为控制模块102,实现对防拆目标设备10持续进行防拆检测。
在一种可能的实现方式中,防拆目标设备10为防拆门禁机。
防拆目标设备10可以为防拆门禁机,利用防拆门禁机,可以保护人员和财产安全。防拆目标设备10除了可以是防拆门禁机之外,也可以是防拆手机、防拆摄像头等具有安全性要求的设备,本公开对此不作具体限定。
在一种可能的实现方式中,防拆触发事件包括防拆目标设备10的标识信息和/或拆除行为的时间信息。
防拆触发事件可以包括防拆目标设备10的标识信息,其中,防拆目标设备10的标识信息用于指示防拆触发事件具体发生于哪个设备。防拆触发事件还可以包括拆除行为的时间信息,其中,拆除行为的时间信息用于指示防拆触发事件发生的具体时间。相关管理人员可以根据防拆目标设备10的标识信息和/或拆除行为的时间信息对存在拆除行为的防拆目标设备10进行相关管理操作。
此外,防拆触发事件还可以包括其它的属性信息,可以根据实际情况灵活设置,本公开对此不作具体限定。
在一种可能的实现方式中,控制模块102,还用于将防拆触发事件和/或防拆触发事件标志上报防拆目标设备10对应的控制端设备。
控制模块102在确定防拆触发事件标志之后,可以将防拆触发事件和/或防拆触发事件标志上报防拆目标设备10对应的控制端设备,其中,控制端设备与防拆目标设备10可以进行远程通信。防拆触发事件和/或防拆触发事件标志上报到控制端设备,以使得相关管理人员可以根据防拆触发事件和/或防拆触发事件标志,针对防拆目标设备10的拆除行为进行后续处理。其中,控制端设备可以是电脑、手机或者是控制室中其它设备,本公开对此不作具体限定。
在一种可能的实现方式中,防拆目标设备10还包括报警模块104;控制模块102,还用于在接收到防拆触发事件的情况下,触发报警模块104进行防拆报警。
控制模块102在接收到防拆触发事件后,可以触发报警模块104进行防拆报警,以通知相关管理人员有针对防拆目标设备10的拆除行为发生,使防拆触发事件及时得到处理。
在一种可能的实现方式中,报警模块104,还用于在触发防拆报警的情况下,将防拆触发事件上报防拆目标设备10对应的控制端设备。
在触发防拆报警的情况下,报警模块104将防拆触发事件上报给防拆目标设备10对应的控制端设备,以使得相关管理人员接收到报警信息,进而可以针对防拆目标设备10的拆除行为进行后续处理。
在一种可能的实现方式中,报警模块104,还用于在触发防拆报警的情况下,进行声光报警。
在触发防拆报警的情况下,报警模块104还可以在现场进行声光报警。例如,在防拆目标设备10是小区门禁机设备的情况下,在存在针对小区门禁机设备的拆除行为时,报 警模块104发出声光报警,例如,发出预设声音报警信号,或者,发出预设灯光闪烁报警信号。声光报警既可以对拆除行为人有震慑作用,还可以使得相关管理人员在听到或看到报警信号时,可以及时地制止此次拆除行为。
在一种可能的实现方式中,供电模块103,还用于:在防拆目标设备10处于断电状态的情况下,为报警模块104供电。
供电模块103不仅可以为防拆检测开关101、控制模块102供电,还可以为报警模块104供电,以使得即使在防拆目标设备10处于断电状态的情况下,防拆检测开关101也能够对拆除行为进行检测,并在检测到存在拆除行为的情况下,向控制模块102上报防拆触发事件,以实现控制模块102触发报警模块104进行防拆报警。
在一示例中,在防拆目标设备10处于正常供电状态的情况下,供电模块103可以停止为防拆检测开关101、控制模块102和报警模块104供电,以有效节约电量。
图2示出根据本公开实施例的对处于断电状态下的防拆目标设备进行防拆报警的流程图。如图2所示,在步骤S21中,防拆检测开关101在检测到存在针对防拆目标设备10的拆除行为的情况下,向控制模块102上报防拆触发事件。在步骤S22中,控制模块102接收防拆触发事件,并检测防拆目标设备10是否处于断电状态。在步骤S23中,控制模块102在检测到防拆目标设备10处于断电状态的情况下,触发报警模块104进行防拆报警,并确定防拆触发事件对应的防拆触发事件标志。
在一示例中,在存在防拆触发事件的情况下,生成防拆触发事件标志。
在一示例中,在不存在防拆触发事件的情况下,将防拆触发事件标志记为0;在存在防拆触发事件的情况下,将防拆触发事件标志记为1。防拆触发事件标志的具体形式还可以根据实际情况灵活设置,本公开对此不作具体限定。
在一种可能的实现方式中,防拆目标设备还包括中央处理器105(CPU,Central Processing Unit),CPU105,用于在检测到防拆目标设备10恢复正常供电的情况下,读取控制模块102中是否存在防拆触发事件标志;在读取到控制模块102中存在防拆触发事件标志的情况下,触发防拆保护。
在防拆目标设备10处于断电状态的情况下,CPU105无法正常工作,就无法触发防拆保护,因此,通过控制模块102记录防拆触发事件标志,可以确定在防拆目标设备10处于断电状态时,发生了防拆触发事件。进而,在防拆目标设备10恢复正常供电的情况下,CPU105可以在确定存在防拆触发事件标志的情况下,触发防拆保护。
图3示出根据本公开实施例的对从断电状态恢复正常供电状态的防拆目标设备进行防拆保护的流程图。如图3所示,在步骤S31中,防拆目标设备10恢复正常供电。在步骤S32中,CPU105读取控制模块102中是否存在防拆触发事件标志。若是,则跳转执行步骤S33;若否,则跳转执行步骤S34。在步骤S33中,CPU105触发防拆保护。在步骤S34中,防拆目标设备10正常工作。
在一种可能的实现方式中,CPU105,还用于:在触发防拆保护的情况下,向防拆目 标设备10对应的控制端设备发送防拆保护请求;接收控制端设备返回的数据删除指令;响应于数据删除指令,对防拆目标设备10中所存储的目标数据进行删除。
防拆目标设备10中通常存储有数据信息,例如,在防拆目标设备10是防拆门禁机的情况下,防拆门禁机中可以存储人脸、指纹等数据信息,这些数据信息涉及用户隐私,有较高的安全性要求。当防拆目标设备10受到拆除时,防拆目标设备10中所存储的数据可能遭到非法窃取或破坏。因此,通过触发防拆保护,以使得在防拆目标设备10受到拆除时,对防拆目标设备10中所存储的数据信息进行保护。
在触发防拆保护之后,CPU105向防拆目标设备10对应的控制端设备发送防拆保护请求,相关管理人员可以通过控制端设备向CPU105发送数据删除指令,以使得CPU105响应于数据删除指令,对防拆目标设备10中的目标数据进行删除,从而有效保障数据安全。
在一示例中,在触发防拆保护之后,CPU105也可以根据预先设置好的数据删除指令,对防拆目标设备10中的目标数据进行自动删除,从而有效保障数据安全。
其中,目标数据可以是防拆目标设备10中所存储的所有数据,也可以是根据预设条件设置的部分重要数据,目标数据可以根据实际情况灵活设置,本公开对此不作具体限定。
图4示出根据本公开实施例的对处于正常供电状态下的防拆目标设备进行防拆报警的流程图。如图4所示,在步骤S41中,防拆检测开关101在检测到存在针对防拆目标设备10的拆除行为的情况下,向控制模块102上报防拆触发事件。在步骤S42中,控制模块102接收防拆触发事件,并检测防拆目标设备10是否处于断电状态。在步骤S43中,控制模块102在检测到防拆目标设备10处于正常供电状态的情况下,触发报警模块104进行防拆报警,并将防拆触发事件上报给防拆目标设备10中的CPU105,以使得CPU105触发防拆保护。
此外,控制模块102在检测到防拆目标设备10处于正常供电状态的情况下,也可以将防拆触发事件直接上报给CPU105,以使得CPU105触发报警模块104进行防拆报警,并触发防拆保护。
可以理解,本公开提及的上述各个实施例,在不违背原理逻辑的情况下,均可以彼此相互结合形成结合后的实施例,限于篇幅,本公开不再赘述。本领域技术人员可以理解,在上述具体实施方式中,各模块的具体执行顺序应当以其功能和可能的内在逻辑确定。
本公开实施例的防拆目标设备10可以被提供为终端、服务器或其它形态的电子设备。
图5示出根据本公开实施例的一种电子设备的框图。参见图5,电子设备800可以是用户设备(User Equipment,UE)、移动设备、用户终端、终端、蜂窝电话、无绳电话、个人数字处理(Personal Digital Assistant,PDA)、手持设备、计算设备、车载设备、可穿戴设备等终端设备。
参照图5,电子设备800可以包括以下一个或多个组件:处理组件802,存储器804, 电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)接口812,传感器组件814,以及通信组件816。
处理组件802通常控制电子设备800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在电子设备800的操作。这些数据的示例包括用于在电子设备800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为电子设备800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为电子设备800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述电子设备800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当电子设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当电子设备800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为电子设备800提供各个方面的状态评估。例如,传感器组件814可以检测到电子设备800的打开/关闭状态,组件的相对定位,例如所述组件为电子设备800的显示器和小键盘,传感器组件814还可以检测电子设备800 或电子设备800一个组件的位置改变,用户与电子设备800接触的存在或不存在,电子设备800方位或加速/减速和电子设备800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如互补金属氧化物半导体(CMOS)或电荷耦合装置(CCD)图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于电子设备800和其他设备之间有线或无线方式的通信。电子设备800可以接入基于通信标准的无线网络,如无线网络(Wi-Fi)、第二代移动通信技术(2G)、第三代移动通信技术(3G)、第四代移动通信技术(4G)、通用移动通信技术的长期演进(LTE)、第五代移动通信技术(5G)或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,电子设备800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子组件实现,用于执行上述方法。
在示例性实施例中,还提供了一种非易失性计算机可读存储介质,例如包括计算机程序指令的存储器804,上述计算机程序指令可由电子设备800的处理器820执行以完成上述方法。
本公开涉及增强现实领域,通过获取现实环境中的目标对象的图像信息,进而借助各类视觉相关算法实现对目标对象的相关特征、状态及属性进行检测或识别处理,从而得到与具体应用匹配的虚拟与现实相结合的AR效果。示例性的,目标对象可涉及与人体相关的脸部、肢体、手势、动作等,或者与物体相关的标识物、标志物,或者与场馆或场所相关的沙盘、展示区域或展示物品等。视觉相关算法可涉及视觉定位、SLAM、三维重建、图像注册、背景分割、对象的关键点提取及跟踪、对象的位姿或深度检测等。具体应用不仅可以涉及跟真实场景或物品相关的导览、导航、讲解、重建、虚拟效果叠加展示等交互场景,还可以涉及与人相关的特效处理,比如妆容美化、肢体美化、特效展示、虚拟模型展示等交互场景。可通过卷积神经网络,实现对目标对象的相关特征、状态及属性进行检测或识别处理。上述卷积神经网络是基于深度学习框架进行模型训练而得到的网络模型。
图6示出根据本公开实施例的另一种电子设备的框图。参见图6,电子设备1900可以被提供为一服务器或终端设备。参照图6,电子设备1900包括处理组件1922,其进一步包括一个或多个处理器,以及由存储器1932所代表的存储器资源,用于存储可由处理组件 1922的执行的指令,例如应用程序。存储器1932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1922被配置为执行指令,以执行上述方法。
电子设备1900还可以包括一个电源组件1926被配置为执行电子设备1900的电源管理,一个有线或无线网络接口1950被配置为将电子设备1900连接到网络,和一个输入输出(I/O)接口1958。电子设备1900可以操作基于存储在存储器1932的操作系统,例如微软服务器操作系统(Windows Server TM),苹果公司推出的基于图形用户界面操作系统(Mac OS X TM),多用户多进程的计算机操作系统(Unix TM),自由和开放原代码的类Unix操作系统(Linux TM),开放原代码的类Unix操作系统(FreeBSD TM)或类似。
在示例性实施例中,还提供了一种非易失性计算机可读存储介质,例如包括计算机程序指令的存储器1932,上述计算机程序指令可由电子设备1900的处理组件1922执行以完成上述方法。
本公开可以是系统、方法和/或计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于使处理器实现本公开的各个方面的计算机可读程序指令。
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是(但不限于)电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。
这里所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。
用于执行本公开操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言—诸如Smalltalk、C++等,以及常规的过程序编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作 为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本公开的各个方面。
这里参照根据本公开实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本公开的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。
附图中的流程图和框图显示了根据本公开的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
该计算机程序产品可以具体通过硬件、软件或其结合的方式实现。在一个可选实施例中,所述计算机程序产品具体体现为计算机存储介质,在另一个可选实施例中,计算机程序产品具体体现为软件产品,例如软件开发包(Software Development Kit,SDK)等等。
上文对各个实施例的描述倾向于强调各个实施例之间的不同之处,其相同或相似之处可以互相参考,为了简洁,本文不再赘述。
本领域技术人员可以理解,在具体实施方式的上述方法中,各步骤的撰写顺序并不意味着严格的执行顺序而对实施过程构成任何限定,各步骤的具体执行顺序应当以其功能和可能的内在逻辑确定。
若本申请技术方案涉及个人信息,应用本申请技术方案的产品在处理个人信息前,已明确告知个人信息处理规则,并取得个人自主同意。若本申请技术方案涉及敏感个人信息,应用本申请技术方案的产品在处理敏感个人信息前,已取得个人单独同意,并且同时满足“明示同意”的要求。例如,在摄像头等个人信息采集装置处,设置明确显着的标识告知已进入个人信息采集范围,将会对个人信息进行采集,若个人自愿进入采集范围即视为同意对其个人信息进行采集;或者在个人信息处理的装置上,利用明显的标识/信息告知个人信息处理规则的情况下,通过弹窗信息或请个人自行上传其个人信息等方式获得个人授权;其中,个人信息处理规则可包括个人信息处理者、个人信息处理目的、处理方式以及处理的个人信息种类等信息。
以上已经描述了本公开的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术的改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。

Claims (11)

  1. 一种防拆目标设备,其特征在于,包括:
    防拆检测开关,用于检测是否存在针对所述防拆目标设备的拆除行为,以及在检测到存在所述拆除行为的情况下,向控制模块上报防拆触发事件;
    所述控制模块,用于在接收到所述防拆触发事件且所述防拆目标设备处于断电状态的情况下,确定所述防拆触发事件对应的防拆触发事件标志,其中,所述防拆触发事件标志用于指示针对处于断电状态下的所述防拆目标设备存在所述拆除行为;
    供电模块,用于在所述防拆目标设备处于断电状态的情况下,为所述防拆检测开关、所述控制模块供电。
  2. 根据权利要求1所述的防拆目标设备,其特征在于,所述防拆目标设备还包括中央处理器CPU,所述CPU,用于:
    在检测到所述防拆目标设备恢复正常供电的情况下,读取所述控制模块中是否存在所述防拆触发事件标志;
    在读取到所述控制模块中存在所述防拆触发事件标志的情况下,触发防拆保护。
  3. 根据权利要求2所述的防拆目标设备,其特征在于,所述CPU,还用于:
    在触发防拆保护的情况下,向所述防拆目标设备对应的控制端设备发送防拆保护请求;
    接收所述控制端设备返回的数据删除指令;
    响应于所述数据删除指令,对所述防拆目标设备中所存储的目标数据进行删除。
  4. 根据权利要求1至3中任意一项所述的防拆目标设备,其特征在于,所述控制模块,还用于:
    将所述防拆触发事件和/或所述防拆触发事件标志上报所述防拆目标设备对应的控制端设备。
  5. 根据权利要求1至4中任意一项所述的防拆目标设备,其特征在于,所述防拆目标设备还包括报警模块;
    所述控制模块,还用于:
    在接收到所述防拆触发事件的情况下,触发所述报警模块进行防拆报警。
  6. 根据权利要求5所述的防拆目标设备,其特征在于,所述供电模块,还用于:
    在所述防拆目标设备处于断电状态的情况下,为所述报警模块供电。
  7. 根据权利要求5或6所述的防拆目标设备,其特征在于,所述报警模块,还用于:
    在触发防拆报警的情况下,将所述防拆触发事件上报所述防拆目标设备对应的控制端设备。
  8. 根据权利要求5至7中任意一项所述的防拆目标设备,其特征在于,所述报警模块,还用于:
    在触发防拆报警的情况下,进行声光报警。
  9. 根据权利要求1至8中任意一项所述的防拆目标设备,其特征在于,所述防拆触发事件包括所述防拆目标设备的标识信息和/或所述拆除行为的时间信息。
  10. 根据权利要求1至9中任意一项所述的防拆目标设备,其特征在于,所述控制模块为微控制单元MCU;和/或,
    所述供电模块为纽扣电池。
  11. 根据权利要求1至10中任意一项所述的防拆目标设备,其特征在于,所述防拆目标设备为防拆门禁机。
PCT/CN2022/129015 2022-02-18 2022-11-01 一种防拆目标设备 WO2023155484A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210150409.6A CN114550398A (zh) 2022-02-18 2022-02-18 一种防拆目标设备
CN202210150409.6 2022-02-18

Publications (1)

Publication Number Publication Date
WO2023155484A1 true WO2023155484A1 (zh) 2023-08-24

Family

ID=81675798

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/129015 WO2023155484A1 (zh) 2022-02-18 2022-11-01 一种防拆目标设备

Country Status (2)

Country Link
CN (1) CN114550398A (zh)
WO (1) WO2023155484A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114550398A (zh) * 2022-02-18 2022-05-27 深圳市商汤科技有限公司 一种防拆目标设备
CN116028999A (zh) * 2023-03-28 2023-04-28 成都万创科技股份有限公司 一种电力网关基于时间的防拆卸系统及方法

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231945A (zh) * 2011-04-29 2011-11-02 三一重工股份有限公司 一种防拆装置和gps移动目标监控终端
US20170204638A1 (en) * 2015-12-04 2017-07-20 Universal Surveillance Systems, Llc Theft deterrent tag
CN107451496A (zh) * 2017-08-23 2017-12-08 成都三零凯天通信实业有限公司 一种终端电子防拆卸的装置和系统
CN110823277A (zh) * 2018-08-07 2020-02-21 中惠创智无线供电技术有限公司 一种设备防拆装置及具有防拆功能的设备
CN211058486U (zh) * 2019-10-12 2020-07-21 四川省桑瑞光辉标识系统股份有限公司 一种防拆报警的智能门锁
CN212353838U (zh) * 2019-12-06 2021-01-15 北京万集科技股份有限公司 一种无源状态下的obu防拆装置
CN213024764U (zh) * 2020-10-09 2021-04-20 四川铁集共联科技股份有限公司 一种物联网设备防拆报警器
CN114550398A (zh) * 2022-02-18 2022-05-27 深圳市商汤科技有限公司 一种防拆目标设备

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902934B (zh) * 2012-12-26 2018-07-17 研祥智能科技股份有限公司 一种机箱防拆机侦测方法和装置
CN209821614U (zh) * 2018-12-13 2019-12-20 四川省能源投资集团有限责任公司 一种多功能防拆集中控制器系统
CN112632647A (zh) * 2020-12-17 2021-04-09 深圳酷派技术有限公司 电子设备信息防盗方法、相关装置及计算机存储介质

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231945A (zh) * 2011-04-29 2011-11-02 三一重工股份有限公司 一种防拆装置和gps移动目标监控终端
US20170204638A1 (en) * 2015-12-04 2017-07-20 Universal Surveillance Systems, Llc Theft deterrent tag
CN107451496A (zh) * 2017-08-23 2017-12-08 成都三零凯天通信实业有限公司 一种终端电子防拆卸的装置和系统
CN110823277A (zh) * 2018-08-07 2020-02-21 中惠创智无线供电技术有限公司 一种设备防拆装置及具有防拆功能的设备
CN211058486U (zh) * 2019-10-12 2020-07-21 四川省桑瑞光辉标识系统股份有限公司 一种防拆报警的智能门锁
CN212353838U (zh) * 2019-12-06 2021-01-15 北京万集科技股份有限公司 一种无源状态下的obu防拆装置
CN213024764U (zh) * 2020-10-09 2021-04-20 四川铁集共联科技股份有限公司 一种物联网设备防拆报警器
CN114550398A (zh) * 2022-02-18 2022-05-27 深圳市商汤科技有限公司 一种防拆目标设备

Also Published As

Publication number Publication date
CN114550398A (zh) 2022-05-27

Similar Documents

Publication Publication Date Title
WO2023155484A1 (zh) 一种防拆目标设备
EP3163854B1 (en) Reduced notifications for same push messages
WO2018058373A1 (zh) 用于电子设备的控制方法、装置及电子设备
RU2658165C2 (ru) Способ и устройство для уведомления об аномальной видеоинформации
CN107948708B (zh) 弹幕展示方法及装置
BR112015027215B1 (pt) Método e dispositivo para eliminar uma cena inteligente
EP3099063A1 (en) Video communication method and apparatus
US11288531B2 (en) Image processing method and apparatus, electronic device, and storage medium
CN113011290A (zh) 事件检测方法及装置、电子设备和存储介质
WO2022188305A1 (zh) 信息展示方法及装置、电子设备、存储介质及计算机程序
EP3754959A1 (en) Quick access to an application in the lock screen
CN112101238A (zh) 聚类方法及装置、电子设备和存储介质
TW202109360A (zh) 圖像處理方法及圖像處理裝置、電子設備和電腦可讀儲存介質
CN110942036A (zh) 人员识别方法及装置、电子设备和存储介质
CN111243224A (zh) 一种实现报警的方法及装置
CN110807393A (zh) 基于视频分析的预警方法及装置、电子设备和存储介质
WO2023040202A1 (zh) 人脸识别方法及装置、电子设备和存储介质
CN106331328B (zh) 信息提示的方法及装置
US10423195B2 (en) Verification method, device and computer-readable storage medium based on a flexible display screen
CN111625671A (zh) 数据处理方法及装置、电子设备及存储介质
WO2023045185A1 (zh) 对象检测方法及装置、电子设备和存储介质
CN105872245B (zh) 消息处理方法和装置
RU2679719C2 (ru) Способ и устройство для управления рабочим состоянием
CN106774902B (zh) 应用锁定方法及装置
WO2022198821A1 (zh) 人脸和人体匹配的方法、装置、电子设备、存储介质及程序

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22926788

Country of ref document: EP

Kind code of ref document: A1