CN105992125B - Method and device for protecting safety of electronic equipment - Google Patents

Method and device for protecting safety of electronic equipment Download PDF

Info

Publication number
CN105992125B
CN105992125B CN201510085067.4A CN201510085067A CN105992125B CN 105992125 B CN105992125 B CN 105992125B CN 201510085067 A CN201510085067 A CN 201510085067A CN 105992125 B CN105992125 B CN 105992125B
Authority
CN
China
Prior art keywords
electronic device
electronic equipment
connection
electronic
user account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510085067.4A
Other languages
Chinese (zh)
Other versions
CN105992125A (en
Inventor
李骏骅
胡国文
吴建超
杨扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banma Zhixing Network Hongkong Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510085067.4A priority Critical patent/CN105992125B/en
Priority to PCT/CN2016/073447 priority patent/WO2016131387A1/en
Publication of CN105992125A publication Critical patent/CN105992125A/en
Application granted granted Critical
Publication of CN105992125B publication Critical patent/CN105992125B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of communication, and discloses a method and a device for protecting the safety of electronic equipment, wherein the scheme is as follows: the method comprises the steps that the first electronic equipment establishes signal connection with the second electronic equipment in a preset mode, and when the first electronic equipment detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, an alarm signal is triggered. Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's electronic equipment of management that moreover can be better has improved factor of safety.

Description

Method and device for protecting safety of electronic equipment
Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for security protection of an electronic device.
Background
With the continuous development of modern communication technology and the continuous improvement of the living standard of people, the use of electronic equipment is more and more common, and the electronic equipment still has very wide market prospect. However, since electronic devices are generally expensive, they are likely to be targeted for theft by lawbreakers. Since the electronic device usually stores a lot of important information of the user, such as contact information, short message content, memo information, etc., once stolen, not only is inconvenience brought to the user, so research on anti-loss technology of the electronic device is urgent.
However, an effective alarm technology for the loss and theft of the electronic device is absent at present, so that the user is difficult to perceive the electronic device when the electronic device is lost or stolen, and property loss and information leakage are often caused.
Disclosure of Invention
The embodiment of the invention provides a method and a core device for protecting electronic equipment safety, which are used for avoiding property loss and information leakage caused by the fact that the loss of the electronic equipment is not found in time.
The embodiment of the invention provides the following specific technical scheme:
the method comprises the steps that a first electronic device establishes signal connection with a second electronic device in a preset mode;
and triggering an alarm signal when the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's electronic equipment of management that moreover can be better has improved factor of safety.
Preferably, the first electronic device is connected to the second electronic device through a predetermined method, including:
the first electronic device is connected by any one of communication connection methods.
Preferably, the communication connection mode at least comprises a bluetooth connection, a WIFI connection, a wireless network card connection and a non-contact radio frequency identification connection.
Preferably, after the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, before triggering the alarm signal, the method further includes:
the first electronic equipment performs user sign parameter measurement to obtain a measurement result;
and when the first electronic equipment determines that the measurement result exceeds the range of the second set threshold value, the first electronic equipment determines to alarm.
Preferably, further comprising:
and in a set time range, if the first electronic device is not detected to be connected with the second electronic device again, the first electronic device generates an unlocking password, and the unlocking password is used for locking the first electronic device or locking a set application installed in the first electronic device.
Preferably, the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlocking password is a randomly generated password, the method further comprises the following steps: and sending the unlocking password to the second electronic equipment or a designated third equipment.
Preferably, the method further comprises:
the first electronic equipment releases the locking state after receiving the unlocking password input by the user; or after detecting that the first electronic equipment is connected with the second electronic equipment again, releasing the locking state.
Preferably, the first electronic device sends the alarm signal, and the alarm signal includes:
the first electronic equipment periodically sends an alarm signal according to a preset time length.
Preferably, after the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, the method further includes:
the first electronic device determining a user account locally and commonly associated with the second electronic device;
the first electronic equipment requests the network service platform corresponding to the user account to remove the association relationship between the second electronic equipment and the user account; or the first electronic device sends an instruction to the second electronic device, where the instruction is used to release the association relationship between the second electronic device and the user account.
Preferably, further comprising:
and after the first electronic device detects that the connection with the second electronic device is reestablished, establishing the association relationship between the second electronic device and the user account.
Preferably, the alarm signal comprises:
and displaying the prompt message on the first electronic equipment.
Preferably, the prompt message includes:
the first operation entrance is used for triggering the locking of the second equipment or the setting application in the second equipment; and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is a user account jointly associated with the first electronic equipment and the second electronic equipment.
Preferably, the first electronic device includes: intelligent wearing equipment or intelligent terminal.
An apparatus for electronic device security, comprising:
the communication unit is used for establishing signal connection with another electronic device in a preset mode;
and the processing unit is used for triggering an alarm signal when the strength of the signal connection is detected to be lower than a preset signal threshold and the duration time reaches a preset time threshold.
Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's electronic equipment of management that moreover can be better has improved factor of safety.
Preferably, when the communication unit is connected to another electronic device in a preset manner, the communication unit is configured to:
the connection is made by any of the communication connections.
Preferably, the communication connection mode at least comprises a bluetooth connection, a WIFI connection, a wireless network card connection and a non-contact radio frequency identification connection.
Preferably, after detecting that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, before triggering an alarm signal, the processing unit is further configured to:
executing user sign parameter measurement to obtain a measurement result;
and when the measurement result is determined to exceed the range of a second set threshold value, determining to alarm.
Preferably, the processing unit is further configured to:
and in a set time range, if no reconnection with the other electronic equipment is detected, generating an unlocking password, wherein the unlocking password is used for locking the electronic equipment or locking the installed set application.
Preferably, the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlocking password is a randomly generated password, the processing unit is further configured to: and sending the unlocking password to another electronic device or a designated third device.
Preferably, the processing unit is further configured to:
after receiving the unlocking password input by the user, unlocking the locking state; or,
and after detecting that the electronic equipment is connected with the other electronic equipment again, releasing the locking state.
Preferably, when the alarm signal is sent, the processing unit is configured to:
and sending alarm signals periodically according to a preset time length.
Preferably, after detecting that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, the processing unit is further configured to:
determining a user account locally and commonly associated with the other electronic device;
requesting to a network service platform corresponding to the user account to release the association relationship between the other electronic equipment and the user account; or sending an instruction to the other electronic device, wherein the instruction is used for releasing the association relationship between the other electronic device and the user account.
Preferably, the communication unit is further configured to:
and after the connection with the other electronic equipment is detected to be reestablished, establishing the association relationship between the other electronic equipment and the user account.
Preferably, the alarm signal includes:
and prompt information displayed on the electronic equipment.
Preferably, the prompt message includes:
a first operation entry for triggering locking of the other device or a setting application in the other device; and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is the user account commonly associated with the other electronic equipment.
Preferably, the electronic device is: intelligent wearing equipment or intelligent terminal.
Drawings
FIG. 1 is a schematic flow chart illustrating an overview of security protection for an electronic device according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a device for protecting the safety of the electronic device according to an embodiment of the present invention.
Detailed Description
In practical application, there is an electronic device that can receive a service use request from a user, call a corresponding user account based on the service use request, call user verification information set for the corresponding user account to generate a verification barcode, present the verification barcode to a service use device, and trigger a corresponding service process after the service use device passes security verification based on the verification barcode.
For example, the student a borrows books in a library, the student account number can be input into the electronic device, the electronic device can borrow books when determining that the account number is consistent with a preset account, and the identity information (including name, class, age, mobile phone number, borrowed books, date and the like) of the student a can be inquired through the account.
Therefore, the identity information of the user can be acquired through the electronic equipment, and once the identity information is lost, personal information can be leaked.
For another example, the user B may perform the third-party remittance service through the electronic device, and input the password into the electronic device, and when the electronic device determines that the password is consistent with the preset password, the payment is successful, and may query the current account balance (e.g., the balance of the payer and the balance of the bound bank card) through the password.
It can be seen that third party money transfer services are available via electronic devices and, once lost, result in economic loss.
Therefore, security protection of electronic devices is particularly important. In the embodiment of the invention, a method for protecting the safety of electronic equipment is provided, and the scheme is as follows: the first electronic device triggers an alarm signal by detecting the signal intensity between the first electronic device and the second electronic device when the intensity of signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings. In the embodiment of the present invention, the first electronic device may be an intelligent wearable device, such as an intelligent watch, an intelligent bracelet, and intelligent glasses, or an intelligent device, such as a tablet computer, a mobile phone, and the like, and the second electronic device may also be an intelligent wearable device, such as an intelligent watch, an intelligent bracelet, and intelligent glasses, or an intelligent device, such as a tablet computer, a mobile phone, and the like.
Referring to fig. 1, in the embodiment of the present invention, an overview flow of the electronic device security protection is as follows:
step 100: the first electronic equipment establishes signal connection with the second electronic equipment through a preset mode.
In this embodiment of the present invention, the first electronic device is connected through any one of communication connection manners, where the connection manner at least includes: bluetooth, Wireless local area network (WIFI), Wireless network card connection, and contactless radio frequency identification connection.
Step 110: and triggering an alarm signal when the first electronic device detects that the strength of signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
In the embodiment of the present invention, in step 110, after the first electronic device detects that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, before the alarm signal is triggered, the first electronic device performs measurement of the user physical sign parameter to obtain a measurement result, and when the measurement result is determined to exceed the second set threshold range, it is determined to alarm.
The user physical sign parameter measurement refers to measurement of parameters such as human heart rate and body temperature, the second set threshold range refers to a normal range of human heart rate and body temperature, generally, the human heart rate is set to be 50-90 per second, and the body temperature is set to be 35.5-39 ℃ and belongs to the normal range.
For example, after the first electronic device detects that the intensity of the signal connection between the first electronic device and the second electronic device is lower than-100 dbm and the duration reaches 15 minutes (generally, the preset signal threshold is set to-100 dbm, and the preset duration threshold is 15 minutes), the first electronic device starts the user physical sign parameter measurement, the measured heart rate is 10 per second, the body temperature is about 10 ℃, and the measured heart rate is not within the normal range, and then the alarm is determined.
Optionally, within the set time range, if it is not detected that the first electronic device is reconnected with the second electronic device, the first electronic device generates an unlocking password, where the unlocking password is used to lock itself, and may also lock the set application installed in the first electronic device. When the unlocking password is set, the user can set the password in advance or randomly generate the password, the password generated randomly can be sent to the second electronic device or the appointed third device after the password is generated, and the user can obtain the unlocking password through the second device or the appointed third device.
Here, if it is not detected that the first electronic device is reconnected to the second electronic device, it means that the strength of the signal connection detected by the first electronic device to the second electronic device is still lower than the preset signal threshold.
In general, the setting application installed in the first electronic device may be a QQ mailbox, a memo, a payroll client, a short message, and the like on the first electronic device. The designated third device may be a QQ mailbox, a short message, etc. on other devices, and the third device may be a device of the user or its associated user.
For example, the time range is set to be half an hour, after the half hour, if it is not detected that the first electronic device is reconnected with the second electronic device, the first electronic device may lock only a memo in the device itself and send the randomly generated decryption password to the QQ mailbox, if the first electronic device of the user is not lost, the user may obtain the unlocking password as long as logging in the QQ mailbox, when the first electronic device receives the unlocking password input by the user, the locking state of the memo is released, and when it is detected that the first electronic device is reconnected with the second electronic device, the locking state may also be automatically released; if the first electronic equipment of the user is lost, other users cannot obtain a memo for entering the electronic equipment by the unlocking password.
For another example, the time range is set to be half an hour, after the half hour, if the reconnection between the first electronic device and the second electronic device is not detected, the first electronic device locks itself and generates a preset decryption password, if the first electronic device of the user is not lost, the user can unlock by directly inputting the preset password, when the first electronic device receives the unlocking password input by the user, the locking state is released, and when the reconnection between the first electronic device and the second electronic device is detected, the locking state can be automatically released; if the first electronic device of the user is lost, other users cannot obtain the unlocking password to operate the electronic device.
In addition, the function of generating the unlocking password can be set by a user, the function of closing the generated unlocking password can be set when the user takes a bath, has a rest or learns, and therefore the user can avoid unnecessary locking and unlocking operations.
On the other hand, the first electronic device periodically sends an alarm signal according to a preset time period, and the alarm signal can automatically set an audio file.
For example, assuming that the preset time period is 5 minutes, the first electronic device sends an alarm signal to the user every 5 minutes.
Further, after the first electronic device detects that the strength of the signal connection is lower than the preset signal threshold and the duration time reaches the preset time threshold, the first electronic device determines a local user account associated with the second electronic device together, requests the network service platform corresponding to the user account to release the association between the second electronic device and the user account, and the first electronic device may also send an indication to the second electronic device to indicate that the association between the second electronic device and the user account is released.
Here, the first electronic device may establish an account association relationship with a different electronic device, or may establish a plurality of account association relationships with the same electronic device. For example, in the same office, the first electronic device may establish a microblog account association relationship with the B electronic device, a mailbox association relationship with the C electronic device, and a third-party remittance service account association relationship with the D electronic device; the first electronic device can also establish a plurality of association relations such as a QQ mailbox, WeChat, book borrowing account and the like with the E electronic device.
For example, after the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold, if the first electronic device determines that a user account locally associated with the second electronic device is an electronic coupon account, the electronic coupon account can be discounted when used in a mall a, at this time, a request is made to a network service platform corresponding to the electronic coupon account to release the association relationship between the second electronic device and the electronic coupon account, and the second electronic device cannot reuse the electronic coupon account after the release, so that in case of loss of the second electronic device, other users cannot use the electronic coupon account of the second electronic device.
For another example, after the first electronic device detects that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, it is assumed that the first electronic device determines that the user account locally associated with the second electronic device is a short message service, at this time, the first electronic device sends an instruction to the second electronic device to instruct to release the association relationship between the second electronic device and the short message service, and after release, the second electronic device cannot refer to the short message service and cannot continue sending and receiving short messages related to the number of the electronic device.
In addition, the alarm signal is displayed on prompt information on the first electronic equipment, and the prompt information is used for triggering a first operation entrance for locking the second electronic equipment or the set application in the second electronic equipment;
and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is a user account jointly associated with the first electronic equipment and the second electronic equipment.
For example, when it is determined that an alarm is to be given, the first electronic device may display a prompt message, such as: if the first operation entry for locking the second electronic device (or the setting application in the second electronic device) is triggered, the user operates according to the prompt information, for example, if the user selects the first operation entry, the first electronic device may be triggered to execute an operation corresponding to the first operation entry, that is, if the first electronic device detects that the user triggers the first operation entry, the step of locking the second electronic device (or the setting application in the second electronic device) is executed, so that the operation efficiency is improved.
For another example, when it is determined to alarm, the first electronic device may display a prompt message, such as: and triggering a second operation entry for releasing the association relationship of the user account, where the user account is a user account associated with the first electronic device and the second electronic device together, and then the user performs an operation according to the prompt information, for example, if the user selects the second operation entry, the first electronic device may be triggered to execute an operation corresponding to the second operation entry, that is, if the first electronic device detects that the user triggers the second operation entry, the step of releasing the association relationship of the user account is executed, so as to improve the operation efficiency.
And when the first electronic equipment detects that the first electronic equipment is connected with the second electronic equipment again, stopping sending the alarm signal and re-associating the account.
Reestablishing the connection here means that the first electronic device detects that the strength of the signal connection with the second electronic device reaches a preset signal threshold.
For example, assuming that the originally established association relationship is still the electronic coupon account, after detecting that the first electronic device is re-connected with the second electronic device, the first electronic device stops sending the alarm signal, and the electronic coupon account associated with the second electronic device also recovers the association relationship, that is, the second electronic device can use the electronic coupon account again.
The above embodiments are further described in detail below using a specific application scenario. Take the first electronic device as a smart watch and the second electronic device as a mobile phone as an example.
For example, the smart watch and the mobile phone establish signal connection through bluetooth, when the smart watch detects that the strength of the signal connection is lower than a preset signal threshold (-100dbm) and the duration reaches a preset duration threshold (15 minutes), user sign parameter measurement is started, if the heart rate and the body temperature of the user are detected to be out of a normal range, the smart watch triggers an alarm signal, optionally, the smart watch generates an unlocking password, sends the decryption password to a QQ mailbox, and locks the smart watch; if the smart watch of the user is not lost, the user can log in a QQ mailbox to obtain a password, the smart watch releases the locking state after receiving an unlocking password input by the user, in addition, after an alarm signal is triggered, the smart watch requests a network platform corresponding to the WeChat to release the WeChat service commonly associated with the mobile phone on the assumption that the smart watch determines that a user account number commonly associated with the mobile phone is WeChat, and therefore, in case that the mobile phone is lost, service information related to the WeChat cannot be leaked through the mobile phone.
The above embodiments are further described in detail with a specific application scenario. Take the first electronic device as a mobile phone and the second electronic device as a smart watch as an example.
For example, the mobile phone and the smart watch are in signal connection through Bluetooth, when the mobile phone detects that the strength of the signal connection is lower than a preset signal threshold (-100dbm) and the duration reaches a preset duration threshold (15 minutes), user sign parameter measurement is started, if the heart rate and the body temperature of the user are detected to be out of normal ranges, the mobile phone triggers an alarm signal, optionally, the mobile phone generates an unlocking password, sends the decryption password to a mobile phone short message and locks the mobile phone short message; if the mobile phone of the user is not lost, the user can obtain the password through the short message, the locking state is released after the mobile phone receives the unlocking password input by the user, in addition, after the alarm signal is triggered, the mobile phone determines that the user account number commonly associated with the intelligent watch is the third-party remittance service, then the mobile phone requests a network platform corresponding to the third-party remittance service to release the third-party remittance service commonly associated with the intelligent mobile phone, and therefore, in case that the intelligent watch is lost, the third-party remittance service cannot be carried out through the intelligent watch.
Based on the above embodiments, referring to fig. 2, in an embodiment of the present invention, an apparatus for protecting electronic equipment includes: a communication unit 20 and a processing unit 21, wherein,
the communication unit 20 is used for establishing signal connection with another electronic device in a preset mode;
and the processing unit 21 is configured to trigger an alarm signal when it is detected that the strength of the signal connection is lower than a preset signal threshold and the duration reaches a preset duration threshold.
Preferably, when the electronic device is connected to another electronic device in a predetermined manner, the communication unit 20 is configured to:
the connection is made by any of the communication connections.
Preferably, the communication connection mode at least comprises Bluetooth connection, WIFI connection, wireless network card connection and non-contact radio frequency identification connection.
Preferably, after detecting that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, before triggering the alarm signal, the processing unit 21 is further configured to:
executing user sign parameter measurement to obtain a measurement result;
and when the measurement result is determined to exceed the range of the second set threshold value, determining to alarm.
Preferably, the processing unit 21 is further configured to:
and in a set time range, if no reconnection with another electronic device is detected, generating an unlocking password, wherein the unlocking password is used for locking the electronic device or locking the installed set application.
Preferably, the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlock password is a randomly generated password, the processing unit 21 is further configured to: and sending the unlocking password to the other electronic equipment or the designated third equipment.
Preferably, the processing unit 21 is further configured to:
after receiving an unlocking password input by a user, unlocking the locking state; or,
and after detecting that the electronic equipment is connected with another electronic equipment again, releasing the locking state.
Preferably, when sending the alarm signal, the processing unit 21 is configured to:
and sending alarm signals periodically according to a preset time length.
Preferably, after detecting that the strength of the signal connection is lower than the preset signal threshold and the duration reaches the preset duration threshold, the processing unit 21 is further configured to:
determining a user account locally and commonly associated with another electronic device;
requesting to a network service platform corresponding to the user account to remove the association relation between the other electronic equipment and the user account; or, an indication is sent to the other electronic device, and the indication is used for releasing the association relationship between the other electronic device and the user account.
Preferably, the communication unit 20 is further configured to:
and after the connection with the other electronic equipment is detected to be reestablished, establishing the association relationship between the other electronic equipment and the user account.
Preferably, the alarm signal comprises:
and prompt information displayed on the electronic equipment.
Preferably, the prompt message includes:
a first operation entrance for triggering locking of the other device or the setting application in the other device; and/or
And the second operation entrance is used for triggering the release of the association relationship of the user account, and the user account is a user account commonly associated with another electronic device.
Preferably, the electronic device is: intelligent wearing equipment or intelligent terminal.
In summary, in the embodiments of the present invention, the first electronic device establishes a signal connection with the second electronic device through a preset method, and when the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration reaches the preset duration threshold, the first electronic device triggers an alarm signal. Like this, whether confirm through the signal connection intensity between first electronic equipment detection and the second electronic equipment and trigger alarm signal, not only can effectively prevent losing of electronic equipment to and can avoid loss of property and information to reveal, through two-way electronic equipment safety device, user's that management that can be better has improved factor of safety moreover.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments of the present invention without departing from the spirit or scope of the embodiments of the invention. Thus, if such modifications and variations of the embodiments of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to encompass such modifications and variations.

Claims (26)

1. A method for electronic device security protection, the method comprising:
the method comprises the steps that a first electronic device establishes signal connection with a second electronic device in a preset mode;
when the first electronic device detects that the strength of the signal connection is lower than a preset signal threshold and the duration time reaches a preset time threshold, performing user sign parameter measurement to obtain a measurement result;
when the first electronic equipment determines that the measurement result exceeds a second set threshold range, triggering an alarm signal;
the alarm signal includes: prompt information displayed on the first electronic device; the prompt message comprises: the first operation entrance is used for triggering the locking of the second equipment or the setting application in the second equipment; and/or a second operation entrance used for triggering the release of the association relationship of the user account, wherein the user account is a user account jointly associated with the first electronic device and the second electronic device.
2. The method of claim 1, wherein the first electronic device is connected to the second electronic device in a predetermined manner, comprising:
the first electronic device is connected by any one of communication connection methods.
3. The method of claim 2, wherein the communication connection comprises at least a bluetooth connection, a WIFI connection, a wireless network card connection, and a contactless radio frequency identification connection.
4. The method of claim 1, further comprising:
and in a set time range, if the first electronic device is not detected to be connected with the second electronic device again, the first electronic device generates an unlocking password, and the unlocking password is used for locking the first electronic device or locking a set application installed in the first electronic device.
5. The method of claim 4, wherein the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlocking password is a randomly generated password, the method further comprises the following steps: and sending the unlocking password to the second electronic equipment or a designated third equipment.
6. The method of claim 4, wherein the method further comprises:
the first electronic equipment releases the locking state after receiving the unlocking password input by the user; or
And after detecting that the first electronic equipment is connected with the second electronic equipment again, releasing the locking state.
7. The method of claim 5, wherein the method further comprises:
the first electronic equipment releases the locking state after receiving the unlocking password input by the user; or
And after detecting that the first electronic equipment is connected with the second electronic equipment again, releasing the locking state.
8. The method of any of claims 1-7, wherein the first electronic device transmits an alarm signal comprising:
the first electronic equipment periodically sends an alarm signal according to a preset time length.
9. The method of any of claims 1-7, wherein after the first electronic device detects that the strength of the signal connection is below a predetermined signal threshold and the duration of the signal connection reaches a predetermined duration threshold, further comprising:
the first electronic device determining a user account locally and commonly associated with the second electronic device;
the first electronic equipment requests the network service platform corresponding to the user account to remove the association relationship between the second electronic equipment and the user account; or the first electronic device sends an instruction to the second electronic device, where the instruction is used to release the association relationship between the second electronic device and the user account.
10. The method of claim 9, further comprising:
and after the first electronic device detects that the connection with the second electronic device is reestablished, establishing the association relationship between the second electronic device and the user account.
11. The method of any of claims 1-7, 10, wherein the first electronic device comprises: intelligent wearing equipment or intelligent terminal.
12. The method of claim 8, wherein the first electronic device comprises: intelligent wearing equipment or intelligent terminal.
13. The method of claim 9, wherein the first electronic device comprises: intelligent wearing equipment or intelligent terminal.
14. An apparatus for securing electronic devices, the apparatus comprising:
the communication unit is used for establishing signal connection with another electronic device in a preset mode;
the processing unit is used for executing user sign parameter measurement to obtain a measurement result when the strength of the signal connection is detected to be lower than a preset signal threshold and the duration time reaches a preset time threshold; triggering an alarm signal when the measuring result is determined to exceed a second set threshold range;
the alarm signal includes: a prompt displayed on the electronic device; the prompt message comprises: a first operation entrance for triggering locking of the other electronic device or a setting application in the other electronic device; and/or a second operation entrance used for triggering the release of the association relationship of the user account, wherein the user account is a user account commonly associated with the other electronic equipment.
15. The apparatus as claimed in claim 14, wherein when the apparatus is connected to another electronic device by a predetermined method, the communication unit is configured to:
the connection is made by any of the communication connections.
16. The apparatus of claim 15, wherein the communication connection comprises at least one of a bluetooth connection, a WIFI connection, a wireless network card connection, and a contactless rfid connection.
17. The apparatus as recited in claim 14, said processing unit to further:
and in a set time range, if no reconnection with the other electronic equipment is detected, generating an unlocking password, wherein the unlocking password is used for locking the electronic equipment or locking the installed set application.
18. The apparatus of claim 17, wherein the unlocking password is a password preset by a user, or the unlocking password is a randomly generated password;
if the unlocking password is a randomly generated password, the processing unit is further configured to: and sending the unlocking password to another electronic device or a designated third device.
19. The apparatus as defined in claim 17, wherein the processing unit is further to:
after receiving the unlocking password input by the user, unlocking the locking state; or,
and after detecting that the electronic equipment is connected with the other electronic equipment again, releasing the locking state.
20. The apparatus as recited in claim 18, said processing unit to further:
after receiving the unlocking password input by the user, unlocking the locking state; or,
and after detecting that the electronic equipment is connected with the other electronic equipment again, releasing the locking state.
21. The apparatus according to any of claims 14-20, wherein the processing unit, when sending the alarm signal, is configured to:
and sending alarm signals periodically according to a preset time length.
22. The apparatus according to any of claims 14-20, wherein after detecting that the strength of the signal connection is below a preset signal threshold and the duration reaches a preset duration threshold, the processing unit is further configured to:
determining a user account locally and commonly associated with the other electronic device;
requesting to a network service platform corresponding to the user account to release the association relationship between the other electronic equipment and the user account; or sending an instruction to the other electronic device, wherein the instruction is used for releasing the association relationship between the other electronic device and the user account.
23. The apparatus of claim 22, wherein the communication unit is further for:
and after the connection with the other electronic equipment is detected to be reestablished, establishing the association relationship between the other electronic equipment and the user account.
24. The apparatus of any one of claims 14-20, 23, wherein the electronic device is: intelligent wearing equipment or intelligent terminal.
25. The apparatus of claim 21, wherein the electronic device is: intelligent wearing equipment or intelligent terminal.
26. The apparatus of claim 22, wherein the electronic device is: intelligent wearing equipment or intelligent terminal.
CN201510085067.4A 2015-02-16 2015-02-16 Method and device for protecting safety of electronic equipment Active CN105992125B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510085067.4A CN105992125B (en) 2015-02-16 2015-02-16 Method and device for protecting safety of electronic equipment
PCT/CN2016/073447 WO2016131387A1 (en) 2015-02-16 2016-02-04 Method and device for electronic device security protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510085067.4A CN105992125B (en) 2015-02-16 2015-02-16 Method and device for protecting safety of electronic equipment

Publications (2)

Publication Number Publication Date
CN105992125A CN105992125A (en) 2016-10-05
CN105992125B true CN105992125B (en) 2020-01-10

Family

ID=56688904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510085067.4A Active CN105992125B (en) 2015-02-16 2015-02-16 Method and device for protecting safety of electronic equipment

Country Status (2)

Country Link
CN (1) CN105992125B (en)
WO (1) WO2016131387A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110199531B (en) * 2017-01-23 2021-11-23 索尼公司 Communication apparatus, communication method, and program
CN108429561A (en) * 2017-02-15 2018-08-21 中兴通讯股份有限公司 A kind of information feedback method, apparatus and system
CN107396357A (en) * 2017-06-09 2017-11-24 上海斐讯数据通信技术有限公司 A kind of wireless network connecting method and a kind of wireless routing device
CN109714466B (en) * 2017-10-26 2021-08-17 中国电信股份有限公司 Dynamic password authentication processing method and device and mobile terminal thereof
CN108400983A (en) * 2018-02-23 2018-08-14 徐州道格信息科技有限公司 A kind of high security network security controller of computer based on cloud system
CN111750848B (en) * 2019-07-24 2024-03-19 广东小天才科技有限公司 Building positioning method and electronic equipment
CN112672278A (en) * 2020-12-17 2021-04-16 南昌逸勤科技有限公司 Positioning method and device of wearable equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119424A (en) * 2007-08-24 2008-02-06 叶志宝 Handset anti-theft method implementing through handset blue tooth technique
CN101859468A (en) * 2009-04-13 2010-10-13 中山市泰丰金属制品有限公司 Anti-lost alarm device
CN102509409A (en) * 2011-11-18 2012-06-20 重庆邮电大学 Mobile phone anti-theft and anti-loss alarming method based on Bluetooth technology
CN102819925A (en) * 2012-08-31 2012-12-12 北京邮电大学 Personal belonging real-time anti-theft method and system
CN102842197A (en) * 2011-06-24 2012-12-26 深圳中兴力维技术有限公司 Alarming method, device and system
CN103167137A (en) * 2012-09-07 2013-06-19 深圳市金立通信设备有限公司 System and method for achieving mobile phone thievery prevention based on bluetooth

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11331922A (en) * 1998-05-19 1999-11-30 Tokyo Telemessage Inc Positioning system
CN100466861C (en) * 2006-10-19 2009-03-04 宇龙计算机通信科技(深圳)有限公司 Anti-theft method for cell phone
KR20130027774A (en) * 2011-09-08 2013-03-18 삼성전자주식회사 Method and apparatus for providing user interface to control lock state
CN103702317B (en) * 2013-12-13 2017-11-10 北京奇虎科技有限公司 Anti-theft method for mobile terminal and client

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119424A (en) * 2007-08-24 2008-02-06 叶志宝 Handset anti-theft method implementing through handset blue tooth technique
CN101859468A (en) * 2009-04-13 2010-10-13 中山市泰丰金属制品有限公司 Anti-lost alarm device
CN102842197A (en) * 2011-06-24 2012-12-26 深圳中兴力维技术有限公司 Alarming method, device and system
CN102509409A (en) * 2011-11-18 2012-06-20 重庆邮电大学 Mobile phone anti-theft and anti-loss alarming method based on Bluetooth technology
CN102819925A (en) * 2012-08-31 2012-12-12 北京邮电大学 Personal belonging real-time anti-theft method and system
CN103167137A (en) * 2012-09-07 2013-06-19 深圳市金立通信设备有限公司 System and method for achieving mobile phone thievery prevention based on bluetooth

Also Published As

Publication number Publication date
CN105992125A (en) 2016-10-05
WO2016131387A1 (en) 2016-08-25

Similar Documents

Publication Publication Date Title
CN105992125B (en) Method and device for protecting safety of electronic equipment
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US11216549B2 (en) Security verification method and device
CN103874021B (en) Safety zone recognition methods, identification equipment and user terminal
CN105989485B (en) Service management method and device
US20180063126A1 (en) Methods and user device and authenticator device for authentication of the user device
US11341223B1 (en) Wearable computing device secure access badge
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN105320880B (en) The control method and device of terminal
CN107886602A (en) A kind of method for unlocking and system
US20220171839A1 (en) Wearable computing device for automatic user validation
US9456343B1 (en) Assessing mobile user authenticity based on communication activity
CN104243708A (en) Mobile terminal and anti-theft method and device of mobile terminal
JP2017513085A (en) Information processing method, terminal, server, communication method, and system
WO2017177789A1 (en) Anti-theft method and device for mobile terminal
CN107040497B (en) Network account anti-theft method and device
US20170236110A1 (en) Methods and apparatus for non-contact radio frequency detection and automatic establishment of corresponding communication channel
CN111046314A (en) Report form viewing method and device, electronic equipment and storage medium
CA2932921C (en) Method for detecting a fraudulent terminal by means of a cryptogram, corresponding device and program
CN105100120B (en) Monitoring method, device and the terminal of client identification module
CN114926166A (en) User consumption information processing method and device
CN106097531B (en) A kind of reserving method and mobile terminal and access control system applied to access control system
CN107094079B (en) Method, device and equipment for opening terminal function
CN106973032B (en) Information authentication method, server, terminal equipment and system
CN105323746B (en) A kind of method that realizing safety management, terminal, platform and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1229602

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201201

Address after: Room 603, 6 / F, Roche Plaza, 788 Cheung Sha Wan Road, Kowloon, China

Patentee after: Zebra smart travel network (Hong Kong) Limited

Address before: Cayman Islands Grand Cayman capital building, a four storey No. 847 mailbox

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right