Terminal control method
A terminal control and terminal technology, applied in the field of communication, can solve problems such as low security performance, information loss, loss, etc., to achieve the effect of increasing security performance and solving low security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0027] A terminal control method, comprising the following steps:
[0028] Step 1. Bind the first terminal with the second terminal, specifically: the first terminal sends its own identification code to the second terminal, and the second terminal stores its own identification code of the first terminal and at the same time sends its own identification code to the The first terminal completes the binding of the two terminals;
[0029] Step 2. Set the time range and the command information corresponding to the time range on the second terminal, store the time range and command information in the command list, and learn the second terminal according to the time range and command information in the command list ;
[0030] Step 3, the first terminal sends instruction information to the second terminal, and judges whether the distance between the first terminal and the second terminal is less than or equal to the distance threshold, and if so, executes step 4; otherwise, prompts t...
Embodiment 2
[0035] A terminal control method, comprising the following steps:
[0036] Step 1. Bind the first terminal with the second terminal, specifically: the first terminal sends its own identification code to the second terminal, and the second terminal stores its own identification code of the first terminal and at the same time sends its own identification code to the The first terminal completes the binding of the two terminals;
[0037] Step 2. Set the time range and the command information corresponding to the time range on the second terminal, store the time range and command information in the command list, and learn the second terminal according to the time range and command information in the command list , the learning process is to perform the corresponding instruction operation at the current time;
[0038] Step 3. The first terminal sends instruction information to the second terminal to determine whether the distance between the first terminal and the second terminal ...
Embodiment 3
[0043] The command list is shown in Table 1, and the distance threshold is 5 meters:
[0044] Table 1:
[0045] time limit command information 6:30-7:00 turn off the alarm 7:35-8:30 turn on radio
[0046] Bind the first terminal with the second terminal, the distance between the first terminal and the second terminal is 4.3 meters and less than 5 meters, and at 6:40 the first terminal sends the "turn off the alarm clock" command to the second terminal, 6 in Table 1: 40 is between 6:30-7:00, the instruction sent by the first terminal matches the instruction stored in Table 1, and controls the second terminal to turn off the alarm clock.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More