CN107657700A - A kind of terminal anti-theft method based on electronic lock - Google Patents

A kind of terminal anti-theft method based on electronic lock Download PDF

Info

Publication number
CN107657700A
CN107657700A CN201710985797.9A CN201710985797A CN107657700A CN 107657700 A CN107657700 A CN 107657700A CN 201710985797 A CN201710985797 A CN 201710985797A CN 107657700 A CN107657700 A CN 107657700A
Authority
CN
China
Prior art keywords
terminal
electronic lock
lock
identification information
control instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710985797.9A
Other languages
Chinese (zh)
Inventor
张学刚
陈学亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201710985797.9A priority Critical patent/CN107657700A/en
Publication of CN107657700A publication Critical patent/CN107657700A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The application is related to terminal security technical field, more particularly to a kind of terminal anti-theft method based on electronic lock;Wherein, there is electronic lock at least partly external ring-type to latch to enable the terminal to be fixed to external component;The electronic lock can control ring-type lock to open to perform unblock operation, or control ring-type lock closure to perform lock operation when receiving control instruction;Methods described includes:Electronic lock is fixedly attached to terminal by predetermined way;After electronic lock is fixedly attached to terminal, the data annexation of electronic lock and terminal is established;Obtain the feature identification information of user's typing terminal;When the feature identification information is predetermined information, control instruction is generated;The control instruction is sent to electronic lock, to control electronic lock to perform unblock operation or lock operation;Above-mentioned technical proposal by using electronic lock by terminal locking in external component, effectively terminal can be prevented to be stolen, there is very strong practicality.

Description

A kind of terminal anti-theft method based on electronic lock
Technical field
The application is related to terminal security technical field, more particularly to a kind of terminal anti-theft method based on electronic lock.
Background technology
With the continuous development of terminal technology, the important role of present terminal increasingly performer, people will be many important For data storage on mobile phone, terminal is in use, more next due to the variation of the complexity and application program of system Closer to PC used in everyday.Due to the portability of mobile terminal, user often gets used to believing important individual In the terminal, for commercial mobile terminal, more there is very great information for breath and file storage.Separately The development of outer terminal mobile payment, also terminal is caused to become mobile wallet;Due to the portability of mobile terminal, its is stolen Probability is also greatly increased, once mobile terminal is stolen, great economic loss may be caused to user;Particularly on the road, Mobile phone is often placed in bag or in clothes by people, it is easy to is stolen by thief;Mobile terminal is antitheft in the prior art Method is typically all to be realized by software, and it can only protect personal information after mobile terminal is stolen or prevent from using;Can not be from Fundamentally prevent terminal to be stolen, it is therefore desirable to a kind of mode of soft or hard combination by phone lock on external component, fundamentally Terminal is prevented to be stolen.
The content of the invention
The purpose of the application is to provide a kind of terminal anti-theft method based on electronic lock, can be in the base of existing electronic lock It is improved on plinth, electronic lock is fixedly connected in terminal, and then terminal can be fixed on outside by electronic lock, is prevented Mobile phone directly goes adrift, and can sense the connection status of electronic lock and terminal, disconnects and being fixedly connected with terminal in electronic lock When, information warning is sent, so as to further prevent mobile phone to be stolen.
To solve the above problems, the first aspect of the application provides a kind of terminal anti-theft method based on electronic lock, its In, there is electronic lock at least partly external ring-type to latch to enable the terminal to be fixed to external component;The electronic lock exists When receiving control instruction, ring-type lock can be controlled to open to perform unblock operation, or control ring-type lock closure to perform Lock operation;Methods described includes:
Electronic lock is fixedly attached to terminal by predetermined way;
After detecting that electronic lock is fixedly attached to terminal, the data annexation of electronic lock and terminal is established;
Obtain the feature identification information of user's typing terminal;
When the feature identification information is predetermined information, control instruction is generated;
The control instruction is sent to electronic lock, to control electronic lock to perform unblock operation or lock operation.
As a preferred embodiment, after detecting that electronic lock is successfully fixed to terminal, methods described also includes:
The connection status of real-time detection terminal and electronic lock;
If terminal is fixedly connected with electronic lock disconnection or data are connected, control terminal sends alarm.
As a preferred embodiment, electronic lock is fixedly attached to the method for terminal by predetermined way to be included:
The connecting portion being preset on electronic lock is fixedly attached to default detection zone in terminal;
Wherein, preset on the connecting portion and be equipped with recognizable chip;The recognizable chip can when approaching detection zone It is detected region recognition;
Based on the detection zone, the recognizable chip is detected to judge whether electronic lock is fixedly connected with terminal.
As a preferred embodiment, the method for the data annexation for establishing electronic lock and terminal includes:
Obtain the testing result obtained after detection zone is detected;
It is fixedly connected if the testing result is electronic lock with terminal, the data that triggering is established between terminal and electronic lock connect Connect;
It is not fixedly connected if the testing result is electronic lock with terminal, the data do not established between terminal and electronic lock Connection;
Wherein, the data are connected as wireless connection and/or wired connection.
As a preferred embodiment, described detect the recognizable chip to judge whether electronic lock is consolidated with terminal Surely the method connected includes:
Detect in the detection zone with the presence or absence of recognizable chip;
If detecting the presence of recognizable chip, judge that electronic lock has been fixedly connected with terminal;
If being not detected by recognizable chip, electronic lock and the unlocked connection of terminal are judged.
As a preferred embodiment, after recognizable chip is detected the presence of, in addition to:
Read the pre-configured unique identification information in the recognizable chip;
Judge whether the unique identification information and the predetermined identification information for being stored in terminal are consistent;
If consistent, judge that electronic lock has been fixedly connected with terminal;
If inconsistent, electronic lock and the unlocked connection of terminal are judged;And terminal is controlled to send alert messages;
Wherein, the predetermined identification information be terminal when carrying out initial configuration with recognizable chip, know from described Read and preserve in other chip;
The initial configuration refers to:The detection zone of terminal detects recognizable chip and read in recognizable chip only first One identification information;And the preservation based on user's input instructs unique identification information being stored in terminal;
The recognizable chip is radio frequency discrimination RFID chip.
As a preferred embodiment, the control instruction includes:For controlling electronic lock to perform unblock operation First control instruction, and for controlling electronic lock to perform the second control instruction of lock operation.
As a preferred embodiment, described when the feature identification information is predetermined information, generation control refers to The method of order includes:
Obtain the status information of the ring-type lock of the electronic lock detected by the detection means being preset on electronic lock;
The folding condition of the ring-type lock of electronic lock is judged based on the status information;
If the ring-type lock is in opening, the second control instruction is generated;
If the ring-type lock is in closure state, the first control instruction is generated.
As a preferred embodiment, the predetermined information comprises at least:First predetermined information and the second predetermined letter Breath;
It is described when the feature identification information is predetermined information, generating the method for control instruction includes:
Judge the classification of the feature identification information;
If the feature identification information is the first predetermined information, the first control instruction is generated;
If the feature identification information is the second predetermined information, the second control instruction is generated.
As a preferred embodiment, the feature identification information includes:Fingerprint identification information, gesture identification letter Breath, hand vein recognition information, iris recognition information, recognition of face information, voice identification information, touch track on a terminal screen It is at least one in identification information.
The above-mentioned technical proposal of the application is improved on the basis of existing electronic lock, and connection is set up on electronic lock Portion, electronic lock is fixedly connected in terminal, and then terminal can be fixed on outside by electronic lock, prevent mobile phone directly quilt Steal;And by the recognizable chip and the detection module of terminal being arranged on the connecting portion of electronic lock, sensing can be realized The connection status of electronic lock and terminal, when electronic lock disconnects with terminal and is fixedly connected, information warning is sent, so as to further prevent Only mobile phone is stolen, and the security of terminal is effectively ensured.
Brief description of the drawings
Fig. 1 is the indicative flowchart for the terminal anti-theft method based on electronic lock that the first embodiment of the application provides;
Fig. 2 is the terminal anti-theft based on electronic lock for the second embodiment on the basis of first embodiment that the application provides The indicative flowchart of method;
Fig. 3 is the detection that embodiments herein provides and the schematic stream for realizing the method that electronic lock is connected with terminal Cheng Tu;
Fig. 4 is the structural representation of the electronic lock that embodiments herein provides and external component;
Reference:
1- electronic locks;11- ring-types latch;12- connecting portions;2- external components.
Embodiment
To make the purpose, technical scheme and advantage of the application of greater clarity, with reference to embodiment and join According to accompanying drawing, the application is further described.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this Shen Scope please.In addition, in the following description, the description to known features and technology is eliminated, to avoid unnecessarily obscuring this The concept of application.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the application The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clear Chu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments. Based on the embodiment in the application, those of ordinary skill in the art are obtained all under the premise of creative work is not made Other embodiment, belong to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is only merely for the mesh of description specific embodiment , and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.Also It should be appreciated that term "and/or" used herein refers to and list items purposes comprising one or more mutually bindings are any Or it is possible to combine.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without Consideration order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.Under in addition, As long as involved technical characteristic does not form conflict can phase each other in the application different embodiments described by face Mutually combine.
For the clearer each accompanying drawing of description, in various figures, different marks is given for same step.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone, PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device And one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable device Type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics can be included Clothes), decorated type (such as pad skin, tatoo or built in electronic device) etc., or several combination.In some realities of the application Apply in example, the electronic equipment can be flexible, be not limited to the said equipment, or can be one kind in above-mentioned various equipment Or several combination.In this application, term " user " can be indicated using the people of electronic equipment or setting using electronic equipment Standby (such as artificial intelligence electronic equipment).
According to the preferred embodiment of the application, the technical scheme of the application is elaborated successively according to Fig. 1 to 3 order.
Fig. 1 is refer to, Fig. 1 is the schematic stream for the terminal anti-theft method based on electronic lock that embodiments herein provides Cheng Tu;
As shown in figure 1, the shown terminal anti-theft method based on electronic lock includes:
Step S101:Electronic lock is fixedly attached to terminal by predetermined way;
Step S102:After electronic lock is fixedly attached to terminal, the data annexation of electronic lock and terminal is established;
Step S103:Obtain the feature identification information of user's typing terminal;
Step S104:When the feature identification information is predetermined information, control instruction is generated;
Step S105:The control instruction is sent to electronic lock, to control, electronic lock performs unblock operation or locking is grasped Make;
Wherein, there is electronic lock at least partly external ring-type to latch to enable the terminal to be fixed to external component;Institute Electronic lock is stated when receiving control instruction, ring-type lock can be controlled to open to perform unblock operation, or control ring-type lock Close to perform lock operation.
Fig. 2 is refer to, after detecting that electronic lock is successfully fixed to terminal, methods described also includes:
Step S201:The connection status of real-time detection terminal and electronic lock;
Step S202:Judge that terminal is fixedly connected with whether electronic lock disconnects;
It is fixedly connected if terminal disconnects with electronic lock, into step S203:Control terminal sends alarm;
Otherwise, step S201 is returned to.
By after electronic lock is fixedly connected with terminal, in a manner of detecting recognizable chip detecting electronic lock and terminal is No disconnection is fixedly connected, and terminal sends alarm upon opening, after installing electronic lock in terminal, can prevent that thief is straight Connect and steal terminal, such as the annexation of thief's pressure disconnected end and electronic lock, then send alarm, and then prompt user, so as to Reach the stolen technique effect of anti-terminal.
Electronic lock is fixedly attached to the method for terminal by predetermined way to be included:
The connecting portion being preset on electronic lock is fixedly attached to default detection zone in terminal;
Wherein, preset on the connecting portion and be equipped with recognizable chip;The recognizable chip can when approaching detection zone It is detected region recognition;
Based on the detection zone, the recognizable chip is detected to judge whether electronic lock is fixedly connected with terminal.
Fig. 3 is refer to, the method for the data annexation for establishing electronic lock and terminal includes:
Obtain the testing result obtained after detection zone is detected;Wherein, the testing result is by step S301 and step Rapid S302 is obtained;
Wherein, step S301 includes:Based on the detection zone, recognizable chip is detected;
Step S302 includes:Judge whether electronic lock is fixedly connected with terminal;
It is fixedly connected if the testing result is electronic lock with terminal, into step S303:Terminal and electricity are established in triggering Data connection between son lock;
It is not fixedly connected if the testing result is electronic lock with terminal, into step S304:Terminal and electricity are not established Data connection between son lock;
Wherein, the data are connected as wireless connection and/or wired connection.
As a preferred embodiment, described detect the recognizable chip to judge whether electronic lock is consolidated with terminal Surely the method connected includes:
Detect in the detection zone with the presence or absence of recognizable chip;
If detecting the presence of recognizable chip, judge that electronic lock has been fixedly connected with terminal;
If being not detected by recognizable chip, electronic lock and the unlocked connection of terminal are judged.
As a preferred embodiment, after recognizable chip is detected the presence of, in addition to:
Read the pre-configured unique identification information in the recognizable chip;
Judge whether the unique identification information and the predetermined identification information for being stored in terminal are consistent;
If consistent, judge that electronic lock has been fixedly connected with terminal;
If inconsistent, electronic lock and the unlocked connection of terminal are judged;And terminal is controlled to send alert messages;
Wherein, the predetermined identification information be terminal when carrying out initial configuration with recognizable chip, know from described Read and preserve in other chip;
The initial configuration refers to:The detection zone of terminal detects recognizable chip and read in recognizable chip only first One identification information;And the preservation based on user's input instructs unique identification information being stored in terminal;
The recognizable chip is radio frequency discrimination RFID chip.
As a preferred embodiment, the control instruction includes:For controlling electronic lock to perform unblock operation First control instruction, and for controlling electronic lock to perform the second control instruction of lock operation.
As a preferred embodiment, described when the feature identification information is predetermined information, generation control refers to The method of order includes:
Obtain the status information of the ring-type lock of the electronic lock detected by the detection means being preset on electronic lock;
The folding condition of the ring-type lock of electronic lock is judged based on the status information;
If the ring-type lock is in opening, the second control instruction is generated;
If the ring-type lock is in closure state, the first control instruction is generated.
As a preferred embodiment, the predetermined information comprises at least:First predetermined information and the second predetermined letter Breath;
It is described when the feature identification information is predetermined information, generating the method for control instruction includes:
Judge the classification of the feature identification information;
If the feature identification information is the first predetermined information, the first control instruction is generated;
If the feature identification information is the second predetermined information, the second control instruction is generated.
As a preferred embodiment, the feature identification information includes:Fingerprint identification information, gesture identification letter Breath, hand vein recognition information, iris recognition information, recognition of face information, voice identification information, touch track on a terminal screen It is at least one in identification information.
Wherein, as a kind of alternatively embodiment, when not getting feature identification information, the generation control instruction Method include:
Whether detection terminal occurs to shield lock event;The screen lock event includes:Unlocking screen event and screen locking event;
If generation screen locking event, based on the screen locking event, generate corresponding control instruction.
Further, based on the screen locking event, generating the method for corresponding control instruction includes:
The unlocking screen event of detection terminal;
Wherein, the unlocking screen event refers to:Terminal generates unlock instruction after identity characteristic information is verified and releases screen Curtain lock-out state;
If detecting, unlocking screen event occurs for terminal, and the first control instruction is generated based on unlocking screen event.
If detecting, screen locking event occurs for terminal, and the second control instruction is generated based on screen locking event;
Wherein, the screen locking event refers to:Terminal receives screen locking instruction lock-screen.
Further, the method that the first control instruction is generated based on unlocking screen event is included:
Obtain the identity characteristic information for generating unlock instruction relieving lock state of screen;
Judge the type of the identity characteristic information;
If the identity properties information is predefined type, after terminal unlocking, the first control instruction is generated;
Otherwise, after terminal unlocking, the first control instruction is not generated.
Such as when detecting that user is locked by thumb unlocked by fingerprint end panel, then the first control instruction is generated, is used When other finger prints unlock screen terminal, the first control instruction is not generated;
Say for another example, when detecting that user is locked by unlocked by fingerprint end panel, then generate the first control;
When detecting that user unlocks end panel lock by recognition of face or other modes, the first control instruction is not generated.
For the more preferable clearer above-mentioned technical proposal for explaining the application, embodiments herein is based on above-mentioned method Technical scheme provides a kind of system, it is necessary to which explanation, can support that it is not to realize that above-mentioned technical proposal provides software and hardware There are the whole technical schemes for being fully contemplated by the above method, be illustrated only for which part technical scheme, following institute State the explanation being merely exemplary, it is intended to the technical scheme of the above method is explained further, if following above-mentioned in the presence of not covering The part of method and technology scheme, it can be realized completely by adding software and/or hardware module.
A kind of terminal anti-theft system based on electronic lock 1, wherein, electronic lock 1 has ring-type lock 11, and for receiving To after control instruction, control ring-type lock 11 is opened to perform unblock operation or the closure of control ring-type lock 11 to perform locking behaviour The electronic control module of work;The system includes:
It is arranged at the first end of electronic lock 1;It is arranged at the second end of terminal;
The first end includes:First communication module;First communication module is connected with electronic control module, for automatically controlled Module sends control instruction;
Second end includes:For establishing the second communication module that data are connected with the first communication module;With for giving birth to Into the directive generation module of control instruction;
Wherein, the directive generation module is connected with second communication module, for by the control instruction of generation via Second communication module is sent to the first communication module.
Wherein, the control instruction includes:For controlling electronic control module to perform the first control instruction of unblock operation, or use The second control instruction of lock operation is performed in control electronic control module.
The first end also includes:For electronic lock 1 to be fixedly attached to the connecting portion 12 of terminal;
Second end also includes:Detection module;The detection module has predetermined detection region in terminal, described pre- Determine detection zone to be used to be fixedly connected with the connecting portion 12.
The recognizable chip that can be identified by the detection module is embedded with the connecting portion 12;It is solid in the connecting portion 12 When being connected to the predetermined detection region surely, the detection module detection identifies the recognizable chip.
The unique identification information of module identification can be detected by being prestored in the recognizable chip;The unique identification information For unique mark electronic lock 1;The recognizable chip is radio frequency discrimination RFID chip.
Second end also includes:
Central Control Module and data obtaining module;
The detection module is connected to Central Control Module, for the unique mark in the recognizable chip detected to be believed Breath is sent to Central Control Module;
Central Control Module, it is connected with data obtaining module, for verifying the unique identification information received, and is verifying By rear generation activation instruction and send to data obtaining module;
Wherein, the activation instruction is used for the feature identification information that active information acquisition module obtains user's typing terminal.
Described information acquisition module, is connected with Central Control Module, for obtaining user's record after activation instruction is received Enter the feature identification information of terminal and send to Central Control Module;
The Central Control Module, is connected to directive generation module, for differentiating the class of the feature identification information received Not, and according to differentiating that the corresponding generation of result generation instructs send to directive generation module;
The directive generation module generates corresponding control instruction according to the generation of reception instruction;
Wherein, if differentiating, result is:The feature identification information is the first predetermined information, then is sent to directive generation module First generation instructs so that call instruction generation module generates the first control instruction;
If differentiating, result is:The feature identification information is the second predetermined information, then sends second to directive generation module Generation instructs so that call instruction generation module generates the second control instruction.
Second end also includes:
Data memory module, the data memory module are connected with Central Control Module;
The data memory module is used to store predetermined unique identification information;Unique mark is received in Central Control Module After information, predetermined unique identification information is obtained from the data memory module to verify the unique identification information whether with making a reservation for Unique identification information is consistent, if unanimously, being verified;
The data memory module is additionally operable to store the first predetermined information and the second predetermined information, is connect in Central Control Module After receiving feature identification information, obtain the first predetermined information and the second predetermined information from the data memory module and received with differentiating The classification of the feature identification information arrived.
The first end also includes:
The state detection module of electronic lock 1, is connected with the first communication module, and the ring-type for detecting electronic lock 1 latches 11 The state of closure or openness is to obtain state-detection result;
Wherein, the detection module at the second end be additionally operable to connecting portion 12 of the detection with recognizable chip whether depart from it is pre- Determine detection zone;And when departing from predetermined detection region, feedback message is sent to Central Control Module;
Second end also includes:Prompting module, the prompting module are connected with Central Control Module,
The Central Control Module is after feedback message is received, by the first communication module, and via the second communication mould Block obtains state-detection result to the state detection module of electronic lock 1;
Wherein, 11 when being in closure state is latched in state-detection result for the ring-type of electronic lock 1;Central Control Module Control prompting module sends reminder message.
Present invention also provides a kind of electronic lock 1, including:Ring-type lock 11, and for after control instruction is received, controlling Ring-type lock 11 processed is opened to perform unblock operation or the closure of control ring-type lock 11 to perform the electronic control module of lock operation;Its It is characterised by, the electronic lock 1 is provided with first end as described above;The ring-type lock 11 includes:First arcuation latch fitting and Second arcuation latch fitting, the ring-type lock 11 is in closure, the first arcuation latch fitting and the mutually chimeric shape of the second arcuation latch fitting Into the arc structure of closing;When opening, the first arcuation latch fitting and the second arcuation latch fitting mutually divide the ring-type lock 11 From arc structure of the formation with opening., wherein it is desired to explanation, the electric control module controls ring-type lock 11 of electronic lock 1 is opened Open or control the closure of ring-type lock 11 that there is mechanical structure and electric connection structure, the mechanical structure and electric connection structure are adopted It can be realized with prior art any one and the mechanical structure for the electronic lock 1 unlocked or locked and the binding that is electrically connected are realized according to instruction Structure;Do not illustrate herein.
Present invention also provides a kind of terminal, the terminal is provided with the second end as described above.
The above-mentioned technical proposal of the application is improved on the basis of existing electronic lock, and connection is set up on electronic lock Portion, electronic lock is fixedly connected in terminal, and then terminal can be fixed on external component 2 by electronic lock, prevent mobile phone Directly go adrift;And pass through the recognizable chip and the detection module of terminal being arranged on the connecting portion of electronic lock, Neng Goushi Now sense the connection status of electronic lock and terminal, when electronic lock disconnects with terminal and is fixedly connected, information warning is sent, so as to enter One step prevents mobile phone to be stolen, and the security of terminal is effectively ensured.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.Finally, it is also necessary to explanation That a series of above-mentioned processing not only include the processing that is performed in temporal sequence with order described here, and including parallel or The processing respectively rather than in chronological order performed.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with To be completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium, The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
It should be appreciated that the above-mentioned embodiment of the application is used only for exemplary illustration or explains the application's Principle, without forming the limitation to the application.Therefore, that is done in the case of without departing from spirit and scope is any Modification, equivalent substitution, improvement etc., should be included within the protection domain of the application.In addition, the application appended claims purport Covering the whole changes fallen into scope and border or this scope and the equivalents on border and repairing Change example.

Claims (10)

1. a kind of terminal anti-theft method based on electronic lock, wherein, electronic lock there is at least partly external ring-type to latch so that External component can be fixed to by obtaining terminal;The electronic lock when receiving control instruction, can control ring-type lock open with Unblock operation, or control ring-type lock closure are performed to perform lock operation;Characterized in that, methods described includes:
Electronic lock is fixedly attached to terminal by predetermined way;
After electronic lock is fixedly attached to terminal, the data annexation of electronic lock and terminal is established;
Obtain the feature identification information of user's typing terminal;
When the feature identification information is predetermined information, control instruction is generated;
The control instruction is sent to electronic lock, to control electronic lock to perform unblock operation or lock operation.
2. according to the method for claim 1, it is characterised in that described after detecting that electronic lock is successfully fixed to terminal Method also includes:The connection status of real-time detection terminal and electronic lock;
It is fixedly connected if terminal disconnects with electronic lock, control terminal sends alarm.
3. according to the method for claim 1, it is characterised in that electronic lock is fixedly attached to terminal by predetermined way Method includes:
The connecting portion being preset on electronic lock is fixedly attached to default detection zone in terminal;
Wherein, preset on the connecting portion and be equipped with recognizable chip;The recognizable chip can be detected when approaching detection zone Survey region recognition;
Based on the detection zone, the recognizable chip is detected to judge whether electronic lock is fixedly connected with terminal.
4. according to the method for claim 3, it is characterised in that the data annexation for establishing electronic lock and terminal Method includes:
Obtain the testing result obtained after detection zone is detected;
It is fixedly connected if the testing result is electronic lock with terminal, the data connection that triggering is established between terminal and electronic lock;
It is not fixedly connected if the testing result is electronic lock with terminal, the data do not established between terminal and electronic lock connect Connect;
Wherein, the data are connected as wireless connection and/or wired connection.
5. according to the method for claim 3, it is characterised in that the detection recognizable chip is to judge electronic lock The no method being fixedly connected with terminal includes:
Detect in the detection zone with the presence or absence of recognizable chip;
If detecting the presence of recognizable chip, judge that electronic lock has been fixedly connected with terminal;
If being not detected by recognizable chip, electronic lock and the unlocked connection of terminal are judged.
6. according to the method for claim 5, it is characterised in that after recognizable chip is detected the presence of, in addition to:
Read the pre-configured unique identification information in the recognizable chip;
Judge whether the unique identification information and the predetermined identification information for being stored in terminal are consistent;
If consistent, judge that electronic lock has been fixedly connected with terminal;
If inconsistent, electronic lock and the unlocked connection of terminal are judged;And terminal is controlled to send alert messages;
Wherein, the predetermined identification information be terminal when carrying out initial configuration with recognizable chip, from the recognizable core Read and preserve in piece;
The initial configuration refers to:The detection zone of terminal detects recognizable chip and reads unique mark in recognizable chip first Know information;And the preservation based on user's input instructs unique identification information being stored in terminal;The recognizable chip is radio frequency Identify RFID chip.
7. according to the method for claim 1, it is characterised in that the control instruction includes:For controlling electronic lock to perform The first control instruction of operation is unlocked, and for controlling electronic lock to perform the second control instruction of lock operation.
8. according to the method for claim 7, it is characterised in that it is described when the feature identification information is predetermined information, The method of generation control instruction includes:
Obtain the status information of the ring-type lock of the electronic lock detected by the detection means being preset on electronic lock;
The folding condition of the ring-type lock of electronic lock is judged based on the status information;
If the ring-type lock is in opening, the second control instruction is generated;
If the ring-type lock is in closure state, the first control instruction is generated.
9. according to the method for claim 7, it is characterised in that the predetermined information comprises at least:First predetermined information and Second predetermined information;
It is described when the feature identification information is predetermined information, generating the method for control instruction includes:
Judge the classification of the feature identification information;
If the feature identification information is the first predetermined information, the first control instruction is generated;
If the feature identification information is the second predetermined information, the second control instruction is generated.
10. according to the method for claim 9, it is characterised in that the feature identification information includes:Fingerprint identification information, Gesture recognition information, hand vein recognition information, iris recognition information, recognition of face information, voice identification information, on a terminal screen Touch track identification information in it is at least one.
CN201710985797.9A 2017-10-20 2017-10-20 A kind of terminal anti-theft method based on electronic lock Pending CN107657700A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710985797.9A CN107657700A (en) 2017-10-20 2017-10-20 A kind of terminal anti-theft method based on electronic lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710985797.9A CN107657700A (en) 2017-10-20 2017-10-20 A kind of terminal anti-theft method based on electronic lock

Publications (1)

Publication Number Publication Date
CN107657700A true CN107657700A (en) 2018-02-02

Family

ID=61119256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710985797.9A Pending CN107657700A (en) 2017-10-20 2017-10-20 A kind of terminal anti-theft method based on electronic lock

Country Status (1)

Country Link
CN (1) CN107657700A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110125935A (en) * 2019-05-14 2019-08-16 南京邮电大学 A kind of robot gestural control method based on RFID
WO2020154922A1 (en) * 2019-01-29 2020-08-06 华为技术有限公司 Intelligent lock control method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060083455A (en) * 2005-01-17 2006-07-21 삼성전자주식회사 Attachable near field communication module
CN202795628U (en) * 2012-10-12 2013-03-13 王子健 Mobile phone unlocking type theft-proof anti-lost alarm device
CN203180985U (en) * 2013-02-08 2013-09-04 贺静琦 Mobile phone with antitheft device
CN206003248U (en) * 2016-08-31 2017-03-08 贺云靖 A kind of anti-stealing device for handset
CN106570972A (en) * 2016-11-14 2017-04-19 浙江大华技术股份有限公司 Unlocking method, system, and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060083455A (en) * 2005-01-17 2006-07-21 삼성전자주식회사 Attachable near field communication module
CN202795628U (en) * 2012-10-12 2013-03-13 王子健 Mobile phone unlocking type theft-proof anti-lost alarm device
CN203180985U (en) * 2013-02-08 2013-09-04 贺静琦 Mobile phone with antitheft device
CN206003248U (en) * 2016-08-31 2017-03-08 贺云靖 A kind of anti-stealing device for handset
CN106570972A (en) * 2016-11-14 2017-04-19 浙江大华技术股份有限公司 Unlocking method, system, and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020154922A1 (en) * 2019-01-29 2020-08-06 华为技术有限公司 Intelligent lock control method and apparatus
CN110125935A (en) * 2019-05-14 2019-08-16 南京邮电大学 A kind of robot gestural control method based on RFID

Similar Documents

Publication Publication Date Title
KR102001913B1 (en) Mobile Terminal and Operating Method for the Same
EP3314493B1 (en) Method and apparatus for enabling the touchscreen display of a mobile device
US9800570B1 (en) Method of persistent authentication with disablement upon removal of a wearable device
CN208314779U (en) Electronic device
JP6063859B2 (en) Portable key device and device control method
CN104090710A (en) Intelligent terminal unlocking method and intelligent terminal
CN105930078A (en) Screen control system combining strength and fingerprint identification and control mode thereof
CN104916010A (en) Control system of mobile device and wearable control equipment
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN106683242A (en) Intelligent lock system, intelligent lock and intelligent wearable equipment
CN103366788A (en) Mobile hard disk
US20140230026A1 (en) Biometric-Based Access Control System Comprising a Near Field Communication Link
CN105912898A (en) Identity authentication method and identity authentication device based on intelligent wearable equipment
CN107424274A (en) The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked
CN107657700A (en) A kind of terminal anti-theft method based on electronic lock
CN105421934A (en) Network intelligent fingerprint safe case
CN106716502A (en) A campus dormitory locker system
CN206193989U (en) Lock and vehicle
Govindraj et al. Smart door using biometric NFC band and OTP based methods
CN108229125A (en) A kind of control method and electronic equipment
TW201426400A (en) Electronic device and quickly sending email method thereof method and system for unlocking screen
CN205644642U (en) Payment password input device based on RFID technique
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal
CN106845197A (en) A kind of fingerprint identification method and device
CN107516215A (en) The intelligent POS terminal and method of PIN code can be inputted safely

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180202

WD01 Invention patent application deemed withdrawn after publication