Anti-theft alarm method and device for notebook computer

文档序号:1906338 发布日期:2021-11-30 浏览:19次 中文

阅读说明:本技术 一种笔记本电脑防盗报警方法和装置 (Anti-theft alarm method and device for notebook computer ) 是由 刘光勇 于 2021-08-31 设计创作,主要内容包括:本发明公开了一种笔记本电脑防盗报警方法和装置,涉及安全防范技术领域,一种笔记本电脑防盗报警方法包括:获取电脑实时位置和用户终端实时位置;根据电脑实时位置,计算电脑实时位置与用户终端实时位置之间的距离,并形成距离差值;根据距离差值,判断距离差值是否大于预设安全距离;若判断为是,形成距离报警信息;根据距离报警信息,形成控制指令,所述控制指令用于控制报警器报警,所述报警器设置于用户终端;若判断为否,则形成监控指令,所述监控指令用于监控电脑状态。本申请能够实现用户及时察觉笔记本电脑丢失的目的。(The invention discloses a method and a device for anti-theft alarm of a notebook computer, relating to the technical field of safety precaution, wherein the method for anti-theft alarm of the notebook computer comprises the following steps: acquiring a real-time position of a computer and a real-time position of a user terminal; calculating the distance between the real-time position of the computer and the real-time position of the user terminal according to the real-time position of the computer, and forming a distance difference value; judging whether the distance difference is greater than a preset safety distance or not according to the distance difference; if the judgment result is yes, forming distance alarm information; forming a control instruction according to the distance alarm information, wherein the control instruction is used for controlling an alarm to give an alarm, and the alarm is arranged on a user terminal; if not, a monitoring instruction is formed and used for monitoring the state of the computer. The method and the device can achieve the purpose that the user can timely detect that the notebook computer is lost.)

1. A notebook computer anti-theft alarm method is characterized by comprising the following steps:

acquiring a real-time position of a computer and a real-time position of a user terminal;

calculating the distance between the real-time position of the computer and the real-time position of the user terminal according to the real-time position of the computer, and forming a distance difference value;

judging whether the distance difference value is larger than a preset safe distance value or not according to the distance difference value;

if the judgment result is yes, forming distance alarm information;

forming a control instruction according to the distance alarm information, wherein the control instruction is used for controlling an alarm to give an alarm, and the alarm is arranged on a user terminal;

if not, a monitoring instruction is formed and used for monitoring the state of the computer.

2. The anti-theft alarm method for the notebook computer according to claim 1, wherein a control instruction is formed according to distance alarm information, the control instruction is used for controlling an alarm to alarm, the alarm is arranged behind a user terminal, and the method comprises the following steps:

responding to judgment information according to the distance alarm information, wherein the judgment information is input after being checked by a user, and the content of the judgment information comprises 'theft confirmation' and 'alarm cancellation';

judging the content of the judgment information according to the judgment information;

if the judgment result is 'theft is determined', forming a query distance instruction, wherein the query distance instruction is used for querying all police positions;

positioning all police stations according to the inquiry distance instruction, and displaying the positions to a user terminal;

and if the alarm is cancelled, forming an alarm closing instruction, wherein the alarm closing instruction is used for closing the alarm.

3. The anti-theft alarm method for the notebook computer according to claim 2, wherein after positioning all the police stations, the method comprises:

calculating the distance between the real-time position of the user terminal and each police station position according to all the police station positions to form a position distance;

comparing all the position distances;

and selecting the police station position corresponding to the minimum position distance, and displaying the police station position to the user terminal.

4. The anti-theft alarm method for notebook computer according to claim 3, wherein after selecting the police station position corresponding to the minimum position distance, the method comprises:

planning a driving route between the real-time position of the user and the nearest police station position according to the nearest police station position to form a route difference value;

comparing the difference values of all routes;

and selecting the driving route corresponding to the minimum route difference value, and displaying the driving route to the user terminal.

5. The burglar alarm method of a notebook computer according to claim 1, wherein if it is determined not, a monitoring instruction is formed, and after the monitoring instruction is used for monitoring the state of the computer, the method comprises:

responding to a computer starting request instruction, and automatically sending the starting request instruction after a user opens the computer;

acquiring a facial image of the opener according to the opening request instruction;

judging whether the facial image of the opener is consistent with the facial image of the user or not according to the facial image of the opener;

if the judgment result is yes, forming a passing instruction, wherein the passing instruction is used for automatically entering a main page after the computer is started;

if not, forming a failure instruction, wherein the failure instruction is used for controlling the computer to stay at an interface for acquiring the face image of the starter.

6. The burglar alarm method of a notebook computer according to claim 5, wherein if it is determined that the user is not present, a failure command is formed, the failure command is used for controlling the computer to stay behind the interface for obtaining the face image of the user, and the method comprises:

calculating the recognition times of the facial images of the opener according to the facial images of the opener and accumulating the recognition times;

acquiring the comparison times of the facial image of the opener and the facial image of the user;

judging whether the comparison times exceed preset times or not according to the comparison times;

if the judgment result is yes, forming times excess alarm information, wherein the times excess alarm information is used for reminding a user that the computer is tried to be opened by others.

7. The burglar alarm method of a notebook computer according to claim 5, wherein if it is determined that the alarm is positive, a pass instruction is formed, and the pass instruction is used after the computer automatically enters the main page after being started, the method comprises:

responding to a folder browsing request instruction, and automatically sending the browsing request instruction when a folder is opened through user operation;

acquiring password input numbers according to the browsing request instruction;

judging whether the password input number is consistent with a preset password number or not according to the password input number;

if the password input number is consistent with the preset password number, a browsing approval instruction is formed, and the browsing approval instruction is used for controlling the computer to automatically enter an interface for opening the folder when the password input number is consistent with the preset password number;

if not, a browsing failure instruction is formed and used for controlling the computer to stop on an interface for judging whether the password input number is consistent with the preset password number when the password input number is not consistent with the preset password number.

8. A notebook computer burglar alarm device, its characterized in that includes:

the computer real-time position acquisition module is used for acquiring the real-time position of the computer;

the user terminal real-time position acquisition module is used for acquiring the real-time position of the user terminal;

the distance difference forming module is used for calculating the distance between the real-time position of the computer and the real-time position of the user terminal;

the judging module is used for judging whether the distance between the real-time position of the computer and the real-time position of the user terminal is greater than a preset safety distance or not;

the distance alarm information forming module is used for forming alarm information;

the control instruction forming module is used for controlling the alarm to give an alarm;

and the monitoring instruction forming module is used for judging whether the computer is opened or not.

9. A notebook computer, characterized in that: the notebook computer comprises a processor and a memory, wherein at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to realize the anti-theft alarm method of the notebook computer according to any one of claims 1 to 7.

10. A computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the method of burglar alarm of a notebook computer according to any one of claims 1 to 7.

Technical Field

The invention relates to the field of safety precaution, in particular to a method and a device for anti-theft alarm of a notebook computer.

Background

A notebook computer, called notebook for short, also called portable computer, hand-held computer, palm computer or laptop, features small size. Is more portable than a desktop computer, and is a personal computer which is small and convenient to carry.

In the related art, reference is made to the chinese patent publication No. CN112817373A, which discloses a notebook computer, comprising a host, a display, a connector, an antenna, and an electromagnetic gap structure. The host has a first side and a second side opposite to each other. The display has a third side and a fourth side opposite to each other. The connecting piece is provided with a first end and a second end which are opposite to each other, the first end is pivotally arranged on the second side of the host, and the second end is pivotally arranged on the third side of the display. The antenna is disposed on the fourth side of the display and the electromagnetic energy gap structure is disposed on the first side of the host, or the antenna is disposed on the first side of the host and the electromagnetic energy gap structure is disposed on the fourth side of the display.

In view of the above, the inventors consider that the following drawbacks exist: because the volume of the notebook is small, the notebook is easy to lose when being carried, and the user cannot timely notice the loss of the notebook.

Disclosure of Invention

The invention provides a method and a device for anti-theft alarm of a notebook computer, aiming at achieving the purpose that a user can timely detect the loss of the notebook computer.

In a first aspect, the present application provides a method for burglar alarm of a notebook computer.

A notebook computer anti-theft alarm method comprises the following steps:

acquiring a real-time position of a computer and a real-time position of a user terminal;

calculating the distance between the real-time position of the computer and the real-time position of the user terminal according to the real-time position of the computer, and forming a distance difference value;

judging whether the distance difference value is larger than a preset safe distance value or not according to the distance difference value;

if the judgment result is yes, forming distance alarm information;

forming a control instruction according to the distance alarm information, wherein the control instruction is used for controlling an alarm to give an alarm, and the alarm is arranged on a user terminal;

if not, a monitoring instruction is formed and used for monitoring the state of the computer.

By adopting the technical scheme, when the real-time position of the computer exceeds the preset safety distance, alarm information is formed, and a control instruction is formed according to the alarm information, so that the alarm is controlled to give an alarm, a user is reminded that the computer is possibly stolen, and the computer is checked in time, and the user can conveniently and timely perceive the computer.

Optionally, according to distance alarm information, form control command, control command is used for controlling the alarm and reports to the police, the alarm sets up behind user terminal, includes:

responding to judgment information according to the distance alarm information, wherein the judgment information is input after being checked by a user, and the content of the judgment information comprises 'theft confirmation' and 'alarm cancellation';

judging the content of the judgment information according to the judgment information;

if the judgment result is 'theft is determined', forming a query distance instruction, wherein the query distance instruction is used for querying all police positions;

positioning all police stations according to the inquiry distance instruction, and displaying the positions to a user terminal;

and if the alarm is cancelled, forming an alarm closing instruction, wherein the alarm closing instruction is used for closing the alarm.

By adopting the technical scheme, after the alarm gives an alarm, a user checks whether the computer is stolen or used by other people, after the check is completed, a check result is input, if the computer is stolen, the user clicks to confirm that the computer is stolen, if the computer is not stolen, the user clicks to cancel the alarm, after the computer confirms that the computer is stolen, the positions of all police stations are inquired and displayed to the user terminal, and the user can conveniently know the position.

Optionally, after positioning all the police stations, the method includes:

calculating the distance between the real-time position of the user terminal and each police station position according to all the police station positions to form a position distance;

comparing all the position distances;

and selecting the police station position corresponding to the minimum position distance, and displaying the police station position to the user terminal.

By adopting the technical scheme, after the user terminal receives all the police stations, the distance between the real-time position of the user terminal and each police station position is calculated, the distances between all the police stations and the real-time position of the user terminal are compared, the police station position closest to the real-time position of the user terminal is selected, and the closest police station position is sent to the user terminal, so that the user can conveniently put on a record in the police station as soon as possible.

Optionally, after the police station location corresponding to the minimum location distance is selected, the method includes:

planning a driving route between the real-time position of the user and the nearest police station position according to the nearest police station position to form a route difference value;

comparing the difference values of all routes;

and selecting the driving route corresponding to the minimum route difference value, and displaying the driving route to the user terminal.

By adopting the technical scheme, the user terminal selects the nearest police station position, plans all driving routes between the real-time position of the user terminal and the nearest police station position, selects the nearest driving route, and displays the nearest driving route to the user terminal, so that a user can conveniently drive according to the indication.

Optionally, if it is determined that the computer state is not the first state, a monitoring instruction is formed, where the monitoring instruction is used to monitor the computer state, and the method includes:

responding to a computer starting request instruction, and automatically sending the starting request instruction after a user opens the computer;

acquiring a facial image of the opener according to the opening request instruction;

judging whether the facial image of the opener is consistent with the facial image of the user or not according to the facial image of the opener;

if the judgment result is yes, forming a passing instruction, wherein the passing instruction is used for automatically entering a main page after the computer is started;

if not, forming a failure instruction, wherein the failure instruction is used for controlling the computer to stay at an interface for acquiring the face image of the starter.

By adopting the technical scheme, when the computer is started, the face image of the starter is obtained, the face image of the starter is compared with the face image of the user, if the comparison is successful, the user enters the main page of the computer, and if the comparison is unsuccessful, a failure instruction is formed and is used for the computer to stay on an interface for continuously comparing the face image of the starter with the face image of the user.

Optionally, if it is determined that the user is not the opener, a failure instruction is formed, where the failure instruction is used to control the computer to stay behind the interface for obtaining the face image of the opener, and the method includes:

calculating the recognition times of the facial images of the opener according to the facial images of the opener and accumulating the recognition times;

acquiring the comparison times of the facial image of the opener and the facial image of the user;

judging whether the comparison times exceed preset times or not according to the comparison times;

if the judgment result is yes, forming times excess alarm information, wherein the times excess alarm information is used for reminding a user that the computer is tried to be opened by others.

By adopting the technical scheme, when the facial image of the opener is compared with the facial image of the user, the comparison times are accumulated, and if the comparison times exceed the preset times, the number excess alarm information is formed and used for reminding the user that the computer is tried to be opened by other people.

Optionally, if it is determined that the user equipment is a mobile terminal, forming a pass instruction, where the pass instruction is used after the computer is started and automatically enters a main page, and the pass instruction includes:

responding to a folder browsing request instruction, and automatically sending the browsing request instruction when a folder is opened through user operation;

acquiring password input numbers according to the browsing request instruction;

judging whether the password input number is consistent with a preset password number or not according to the password input number;

if the password input number is consistent with the preset password number, a browsing approval instruction is formed, and the browsing approval instruction is used for controlling the computer to automatically enter an interface for opening the folder when the password input number is consistent with the preset password number;

if not, a browsing failure instruction is formed and used for controlling the computer to stop on an interface for judging whether the password input number is consistent with the preset password number when the password input number is not consistent with the preset password number.

By adopting the technical scheme, when the folder is opened after the computer is started, a user needs to input a password, the password input number is compared with the preset password number, and if the password input number is consistent with the preset password number, the folder is opened, so that the user can browse conveniently; if the password input number is inconsistent with the preset password number, a browsing failure instruction is formed and used for controlling the computer to stay on an interface for judging whether the password input number is consistent with the preset password number when the password input number is inconsistent with the preset password number, so that the possibility of content leakage in the folder is reduced.

In a second aspect, the present application provides a notebook computer burglar alarm, comprising:

the computer real-time position acquisition module is used for acquiring the real-time position of the computer;

the user terminal real-time position acquisition module is used for acquiring the real-time position of the user terminal;

the distance difference forming module is used for calculating the distance between the real-time position of the computer and the real-time position of the user terminal;

the judging module is used for judging whether the distance between the real-time position of the computer and the real-time position of the user terminal is greater than a preset safety distance or not;

the distance alarm information forming module is used for forming alarm information;

the control instruction forming module is used for controlling the alarm to give an alarm;

and the monitoring instruction forming module is used for judging whether the computer is opened or not.

By adopting the technical scheme, the user terminal establishes contact with the computer and is used for monitoring the position of the computer, and when the distance between the real-time position of the computer and the position of the user terminal exceeds the preset safety distance, distance alarm information is formed and is used for controlling the alarm to give an alarm and reminding a user to check the computer.

In a third aspect, a notebook computer is provided, which includes a processor and a memory, where at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the anti-theft alarm method for a notebook computer according to any one of claims 1 to 7.

In a fourth aspect, a computer-readable storage medium is provided, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which is loaded and executed by a processor to implement the anti-theft alarm method for a notebook computer according to the first aspect.

In summary, the present application has the following beneficial technical effects:

1. when the real-time position of the computer exceeds a preset safety distance, alarm information is formed, and a control instruction is formed according to the alarm information and used for controlling an alarm to give an alarm to remind a user that the computer is possibly stolen and to check in time, so that the user can conveniently and timely perceive the alarm;

2. and establishing a relation between the user terminal and the computer for monitoring the position of the computer, and forming distance alarm information when the distance between the real-time position of the computer and the position of the user terminal exceeds a preset safety distance for controlling an alarm to give an alarm and reminding a user to check the computer.

Drawings

Fig. 1 is a schematic flow chart illustrating a method for determining whether distance differences are greater than a preset safety distance according to an embodiment of the present application.

Fig. 2 is a schematic flow chart illustrating the content of the judgment information in the anti-theft alarm method for the notebook computer according to the embodiment of the present application.

Fig. 3 is a schematic flow chart illustrating a method for selecting a recent driving route according to an embodiment of the present application.

Fig. 4 shows all driving routes of a method for preventing a burglar alarm of a notebook computer according to an embodiment of the present application.

Fig. 5 is a flowchart illustrating a method for determining whether a computer is turned on according to an embodiment of the present application.

Fig. 6 is a flowchart illustrating a method for determining whether a folder is opened according to an embodiment of the present application.

Fig. 7 is a flowchart illustrating a method for determining whether the comparison times exceed the preset times according to an embodiment of the present application.

Fig. 8 is a block diagram illustrating a flow chart of an anti-theft alarm device for a notebook computer according to an embodiment of the present application.

Description of reference numerals:

1. a computer real-time position acquisition module; 2. a user terminal real-time position acquisition module; 3. a distance difference forming module; 4. a judgment module; 5. a control instruction forming module; 6. and a monitoring instruction forming module.

Detailed Description

The present application is described in further detail below with reference to the accompanying drawings.

The embodiment of the application discloses a notebook computer anti-theft alarm method, which comprises the following steps:

referring to fig. 1, S1: and acquiring the real-time position of the computer and the real-time position of the user terminal.

Specifically, the computer and the user terminal are both provided with a GPS locator for monitoring the real-time position of the computer and the real-time position of the user terminal in real time. For example, the user terminal may be a mobile phone, a tablet, or the like.

S2: and calculating the distance between the real-time position of the computer and the real-time position of the user terminal, and forming a distance difference value.

Specifically, the distance difference is equal to the subtraction of the real-time position of the computer and the real-time position of the user terminal. For example, when the real-time location of the computer minus the real-time location of the user terminal is equal to 500 meters, the distance difference is 500 meters.

S3: and judging whether the distance difference value is larger than a preset safe distance value.

If yes, the process proceeds to S4.

If no, the process goes to S7.

Specifically, after the distance difference is calculated, the distance difference is compared with a preset safety distance entry, and whether the distance difference is greater than a preset safety distance is judged. Wherein the preset safety distance is entered in advance by the user. For example, the preset safe distance is set to 2 meters, and when the distance difference is 10, the process goes to S4.

S4: and forming distance alarm information.

Wherein, the distance alarm information is the information when the distance difference is greater than the preset safe distance.

S5: forming a control instruction.

Specifically, the control instruction is used for controlling an alarm to give an alarm, the alarm is installed on a user terminal and belongs to a carrier on the user terminal, the alarm is actually a buzzer, and the control instruction controls the buzzer to give an alarm sound so as to remind a user of checking whether a computer is lost.

Referring to fig. 2, after S5, the method further includes:

s6: responding to the decision information.

Specifically, the determination information is entered after being checked by the user. The specific content of the judgment information includes "theft is confirmed" and "alarm is cancelled". For example, after the alarm gives an alarm, the computer is automatically checked whether the computer is stolen, and the check result is input, namely, the judgment information is input.

S7: the content of the judgment information is judged.

If a decision is made that "theft is determined", the flow proceeds to S8.

If it is judged to be "cancel alarm", the flow goes to S14.

Specifically, after the alarm gives an alarm sound, the user checks the computer by himself to judge whether the computer is lent to others for use, forgotten to carry, stolen, or the like.

S8: forming a query distance instruction.

Specifically, if the computer is judged to be truly stolen, an inquiry distance instruction is automatically formed and used for inquiring all police positions, wherein when the police positions are inquired, the user terminal is automatically networked, and the inquiry is directly and automatically searched on the network.

S9: all police locations are located.

Specifically, after all the police stations are inquired, all the police stations are displayed to the user terminal, so that the user can conveniently go to the police station to report the case as required.

S10: and calculating the distance between the real-time position of the user terminal and each police station position to form a position difference value.

Specifically, after all the police stations are inquired, the distance between the real-time position of the user terminal and each police station position is calculated, and a position difference value is formed. For example, the positions of the police stations are respectively set as police station a, police station B, police station C and … …, and the real-time position of the user terminal is 300 meters away from police station a, 500 meters away from police station B and 800 meters away from police station C, … ….

S11: and comparing the sizes of all position difference values.

For example, the real-time location of the user terminal is compared with the police station a, the police station B, the police station C and the police station … … in sequence.

S12: and selecting the police station position corresponding to the minimum position difference value.

Specifically, according to all the police stations, the police station position with the smallest position difference is selected, namely the police station position closest to the real-time position of the user terminal is selected, so that the user can know the police station conveniently, and the user can arrive at the nearest police station in the shortest time according to the prompt, so that staff in the police station can track the computer conveniently. For example, according to S64, the nearest a-police station to the user' S real-time location is selected, and the location of the a-police station is displayed on the user terminal.

Referring to fig. 3 and 4, after S12, the method further includes:

s121: and planning a driving route between the real-time position of the user and the nearest police station position, and forming a route difference value.

Specifically, after the position of the user terminal in real time is selected from the nearest police station position, the driving route of the user to the nearest police station position is automatically planned. For example, the real-time position of the user terminal is closest to the police station a, a route for the user to reach the police station a is planned, three driving routes are provided, the first driving route is a → b → c → d → e, and 2 hours is needed; the second driving route is a → b → d → e, and takes 1 hour and 30 minutes; the third driving route is a → b → e, and takes 1 hour.

S122: and comparing the difference values of all the routes.

Specifically, three routes are compared, and the distance of each route is analyzed.

S123: and selecting the driving route corresponding to the minimum route difference value.

For example, in S121, three routes are planned, in S122, the three routes are compared, a latest driving route between the real-time location of the user terminal and the nearest police station location, that is, a third driving route, is selected, and the third driving route is used for the shortest time, and the third driving route is displayed on the user terminal, and is used for guiding the user to reach the police station a.

S13: forming a close alarm command.

Specifically, after the user checks the computer, if the content of the judgment information is judged not to be 'certain stolen', an alarm closing instruction is formed and used for closing the alarm.

Referring back to fig. 1, further includes:

s14: forming a monitoring instruction.

Specifically, the monitoring instructions are used for monitoring the state of the computer, including an open state and a closed state.

Referring to fig. 5, after S14, the method further includes:

s15: responding to the computer startup request instruction.

Specifically, if the computer is opened by others after the user leaves the computer, an opening request instruction is automatically formed.

S16: an opener face image is acquired.

Specifically, after the user opens the computer, the user automatically obtains the face image of the user who opens the computer. Wherein, the computer is provided with a camera, and when the computer is started, the camera works to scan the image of the forehead of the user who starts the computer.

S17: and judging whether the facial image of the opener is consistent with the facial image of the user.

If yes, the process proceeds to S18.

If no, the process goes to S21.

Specifically, after the user opens the computer, the facial image of the opener is acquired in S9, and the facial image of the opener is compared to determine whether the facial image of the opener is consistent with the facial image of the user, so as to determine whether the user opens the computer, and if not, the security performance of the computer is increased by comparing the facial image of the opener with the facial image of the user. Wherein the user facial image is entered by the user in advance.

S18: a pass instruction is formed.

Specifically, when the facial image of the opener is consistent with the facial image of the user, the user opens the computer by himself, and a pass instruction is formed for the computer to automatically enter the main page after the computer is opened.

After S18, further comprising:

s19: and responding to the folder browsing request instruction.

Specifically, according to S18, after the computer enters the home page, the user responds to the folder browsing request command, and the command is automatically issued when opening the folder by the user operation, so as to increase the security of the computer and reduce the possibility of stealing the contents in the folder.

S20: a password entry number is obtained.

Specifically, according to S19, the password input number is acquired.

Referring to fig. 6, S201: and judging whether the password input number is consistent with the preset password number.

If yes, the process goes to S202.

If no, the process goes to S203.

Wherein the preset password number is entered in advance by the user. For example, the preset password number is 13456, the password input number is 12345, and if the comparison between the password input number and the preset password number is unsuccessful, the process goes to S203 directly.

S202: and forming a browsing approval instruction.

Specifically, when the password input number is consistent with the preset password number, a browsing approval instruction is formed and is used for controlling the computer to automatically enter an interface for opening the folder when the password input number is consistent with the preset password number.

S203: and forming a browsing failure instruction.

Specifically, when the password input number is inconsistent with the preset password number, a browsing failure instruction is formed and used for controlling the computer to stop on an interface for judging whether the password input number is consistent with the preset password number when the password input number is inconsistent with the preset password number, so that the confidentiality of the folder is improved, and the possibility of file content leakage is reduced.

Referring back to fig. 5, further includes:

s21: a failure instruction is formed.

Specifically, when the facial image of the opener is inconsistent with the user facial image, it is indicated that the user does not open the computer by himself, a failure instruction is formed for controlling the computer to stay in the interface for acquiring the facial image of the opener, so that the possibility that the user steals the contents in the computer after opening the computer is reduced, and the security performance of the computer is improved.

After S21, further comprising:

referring to fig. 7, S211: and calculating and accumulating the identification times of the facial images of the starters.

Specifically, when the user opens the computer, the user compares the face image of the user with the face image of the user, and the comparison times are accumulated.

S212: and acquiring the comparison times of the facial image of the opener and the facial image of the user.

For example, when the facial image of the opener is compared with the facial image of the user once, the comparison number is 1, when the comparison is performed twice, the comparison number is 2, and when the comparison is performed three times, the comparison number is 3, … ….

S213: and judging whether the comparison times exceed the preset times.

If yes, the process goes to S214.

Wherein the preset times are entered in advance by the user. For example, the preset number of times is set to 5, and when the comparison number exceeds 5, the process goes to S214.

S214: and forming the number excess alarm information.

Specifically, when the comparison times exceed 5, times excess alarm information is formed and displayed to the user terminal to remind the user that the computer is being opened by others.

The embodiment of the application also discloses a notebook computer anti-theft alarm device.

Referring to fig. 8, the anti-theft alarm device for the notebook computer comprises a computer real-time position acquisition module 1, a user terminal real-time position acquisition module 2, a distance difference forming module 3, a judgment module 4, a distance alarm information forming module 5, a control instruction forming module 6 and a monitoring instruction forming module 7.

The computer real-time position acquisition module 1 is used for acquiring the real-time position of a computer;

the user terminal real-time position acquisition module 2 is used for acquiring the real-time position of the user terminal;

the distance difference forming module 3 is used for calculating the distance between the real-time position of the computer and the real-time position of the user terminal;

the judging module 4 is used for judging whether the distance between the real-time position of the computer and the real-time position of the user terminal is greater than a preset safety distance or not;

the judging module 5 is used for forming alarm information;

the control instruction forming module 6 is used for controlling an alarm to give an alarm;

and the monitoring instruction forming module 7 is used for judging whether the computer is opened or not.

The embodiment of the application also discloses an intelligent terminal which comprises a memory and a processor, wherein the memory is stored with a computer program which can be loaded by the processor and can execute the anti-theft alarm method of the notebook computer.

The embodiment of the present application further discloses a computer readable storage medium, which stores a computer program that can be loaded by a processor and execute the above anti-theft alarm method for a notebook computer, and the computer readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.

The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

17页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:不可再激活声磁防盗标签、版标、卷标及永久去激活方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!