Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-theft method and device of terminal and terminal equipment

An anti-theft method and anti-theft device technology, applied in the input/output process of data processing, instruments, electronic digital data processing, etc., can solve the problems of endangering personal property safety, lack of quality, and life impact, and increase the standby time , save resource consumption, and reduce the risk of terminal theft

Inactive Publication Date: 2014-03-26
XIAOMI INC
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once stolen, it will have a great impact on personal life and work, bring inconvenience, and even endanger personal property safety.
At present, there are more and more incidents of smart terminal being stolen. However, there is no better solution in related technologies to solve this problem, which has become a technical problem that needs to be solved urgently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method and device of terminal and terminal equipment
  • Anti-theft method and device of terminal and terminal equipment
  • Anti-theft method and device of terminal and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] In Embodiment 1, the distance sensor on the terminal is used to detect the distance between the terminal and the object, and when the distance between the terminal and the object is detected to be less than the second preset distance, the anti-theft circuit designed on the terminal (such as figure 2 shown) to detect whether an object touches the terminal. like image 3 As shown, a terminal anti-theft method includes the following steps:

[0086] In step 301, the terminal detects that the distance to the object is less than a second preset distance, and the method of this embodiment can be applied to terminal devices such as smartphones and tablet computers.

[0087] The distance sensor on the terminal can be used to detect the distance between the terminal and the object. When it is detected that the distance between the terminal and the object is less than the second preset distance, the distance sensor will set the distance between the terminal and the object to be ...

Embodiment 2

[0097] In the second embodiment, the terminal is associated with the setting terminal, and when the distance between the terminal and the setting terminal exceeds the first preset distance, the stolen information is sent to the setting terminal, and the user can start from the setting terminal at the first time. You can get prompt information at the designated terminal, effectively reducing the risk of the terminal being stolen. like Figure 4A As shown, a terminal anti-theft method includes the following steps:

[0098] In step 401, the terminal detects and sets the distance between the terminals. The method of this embodiment can be applied to terminal devices such as smartphones and tablet computers.

[0099] In step 402, when it is detected that the distance from the set terminal exceeds the first preset distance, the terminal sends a stolen message to the set terminal.

[0100] In step 403, the terminal obtains a touch operation.

[0101] Wherein, the touch operation m...

Embodiment 3

[0109] In the third embodiment, the stolen information is output to the setting terminal or the server, and the setting terminal or server outputs the prompting information, so that the user can receive the prompting information in time to prevent the terminal from being stolen. like Figure 4B As shown, a terminal anti-theft method includes the following steps:

[0110] In step 411, the terminal detects that the distance to the object is less than the second preset distance, and the method of this embodiment can be applied to terminal devices such as smartphones and tablet computers.

[0111] In step 412, the terminal obtains a touch operation.

[0112]In step 413 , the terminal judges whether the acquired duration of the touch operation is greater than or equal to the preset duration, if yes, proceeds to step 414 ; otherwise, returns to continue execution of step 413 .

[0113] In step 414, the terminal detects the number of unlocking operations.

[0114] In step 415, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-theft method and device of a terminal and terminal equipment. The anti-theft method and device of the terminal and the terminal equipment can prevent the terminal from being stolen right the first time, and effectively reduce the risk that the terminal is stolen. The anti-theft method comprises the steps of obtaining touch operation, judging whether the time length of the obtained touch operation is larger than a preset time length or not, detecting the number of unlocking operation times when the time length of the touch operation is judged to be not smaller than the preset time length, judging whether the number of the unlocking operation times is larger than the number of preset unlocking times or not, and outputting information prompting that the terminal is stolen when the number of the unlocking operation times exceeds the number of the preset unlocking times.

Description

technical field [0001] The present disclosure relates to the technical field of smart terminals, in particular to a terminal anti-theft method, device and terminal equipment. Background technique [0002] With the continuous increase of functions of smart terminals (such as smart phones, tablet computers, etc.), smart terminals are greatly changing people's way of life and work. For example, people can use smart terminals to send and receive emails for office work, online shopping, social interaction, and so on. Once it is stolen, it will have a great impact on personal life and work, bring inconvenience, and even endanger personal property safety. At present, there are more and more incidents of theft of smart terminals, but there is no better solution in related technologies to solve this problem, which has become a technical problem to be solved urgently. Contents of the invention [0003] In order to overcome the problems existing in the related technologies, the pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88G06F3/0488
CPCG06F21/88G06F3/0488
Inventor 王义春石新明底浩
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products