Alarm method and device

文档序号:1954934 发布日期:2021-12-10 浏览:13次 中文

阅读说明:本技术 告警方法和装置 (Alarm method and device ) 是由 刘运杰 于 2021-07-29 设计创作,主要内容包括:本申请提供一种告警方法和装置,涉及终端技术领域。该告警方法电子设备可以与可穿戴设备建立通信连接。电子设备可以响应于对第一界面中的第一控件的触发操作,进入预设模式。电子设备检测到触控屏的任意区域接收到触碰操作且触碰操作在触控屏产生的电容值在容值范围内且处于预设模式时,向可穿戴设备发送告警通知。可穿戴设备接收来自电子设备的告警通知执行报警。当电子设备被盗取的情况下,位于口袋内的电子设备即可检测到触控屏被手指触碰到。可见,电子设备检测到被盗取具有实时性。再者,执行告警操作的是佩戴在用户身上的可穿戴设备。即使电子设备被盗取后距离用户较远的情况下,用户仍然可以感知到可穿戴设备告警,提高了告警的可靠性。(The application provides an alarm method and device, and relates to the technical field of terminals. The alarm method is characterized in that the electronic equipment can establish communication connection with the wearable equipment. The electronic device can enter a preset mode in response to a triggering operation of a first control in the first interface. When the electronic equipment detects that any area of the touch screen receives touch operation and the capacitance value generated by the touch operation on the touch screen is within the capacitance value range and in a preset mode, an alarm notification is sent to the wearable equipment. The wearable device receives the alarm notification from the electronic device to perform an alarm. When the electronic equipment is stolen, the electronic equipment in the pocket can detect that the touch screen is touched by fingers. It can be seen that the electronic device detects that the theft is in real time. Further, it is a wearable device worn on the user that performs the alarm operation. Even if the electronic equipment is stolen and is far away from the user, the user can still perceive the alarm of the wearable equipment, and the alarm reliability is improved.)

1. The warning method is applied to a warning system, the warning system comprises an electronic device and a wearable device, the electronic device comprises a touch screen, and the method comprises the following steps:

the electronic device establishes a communication connection with the wearable device;

under the condition that the electronic equipment is in a preset mode, the electronic equipment detects whether the touch screen receives touch operation;

when the electronic equipment detects that any area of the touch screen receives touch operation and the capacitance value generated by the touch screen is within a capacitance value range, the electronic equipment sends an alarm notification to the wearable equipment;

and the wearable equipment executes alarm according to the alarm notice.

2. The alerting method of claim 1 wherein the method further comprises:

the electronic equipment acquires a first control instruction, wherein the first control instruction is used for indicating to enter the preset mode.

3. The warning method according to claim 2, wherein the electronic device obtains the first control instruction, and comprises:

the electronic equipment displays a first interface, wherein a first control used for controlling the on/off of the preset mode is displayed on the first interface;

the electronic equipment responds to the starting operation of the first control to acquire the first control instruction;

and the electronic equipment responds to the first control instruction and enters the preset mode.

4. The warning method according to claim 2, wherein the electronic device obtains the first control instruction, and comprises:

the wearable device displays a second interface, wherein a target control is displayed on the second interface, and the target control is used for indicating and displaying an interface for setting the preset mode;

responding to the triggering operation of the target control by the wearable device, and displaying a third interface, wherein the third interface displays the identifier of the electronic device and a second control for controlling the preset mode to be opened/closed;

the wearable device responds to the opening operation of the second control and sends the first control instruction to the electronic device;

and the electronic equipment responds to the first control instruction and enters the preset mode.

5. The warning method according to claim 2, wherein the electronic device obtains the first control instruction, and comprises:

the electronic equipment responds to sliding operation on a fourth interface and displays a sidebar, wherein the sidebar is a display panel popped up when the edge of the fourth interface receives the sliding operation, and a third control used for controlling the opening/closing of the preset mode is displayed in the sidebar;

the electronic equipment responds to the opening operation of the third control to acquire a first control instruction;

and the electronic equipment responds to the first control instruction and enters the preset mode.

6. The alerting method of claim 1 wherein the method further comprises:

and the electronic equipment enters the preset mode under the condition of meeting preset conditions.

7. The warning method according to claim 6, wherein the electronic device enters the preset mode if a preset condition is met, and the preset mode comprises:

and entering the preset mode under the condition that the electronic equipment detects that the moment of the electronic equipment is in the target time interval and the light intensity is switched from being greater than a preset first light intensity threshold value to being smaller than a preset second light intensity threshold value, wherein the second light intensity threshold value is smaller than the first light intensity threshold value.

8. The warning method according to claim 6, wherein the electronic device enters the preset mode if a preset condition is met, and the preset mode comprises:

and under the condition that the variation amplitude of the acceleration of the electronic equipment on the X axis, the Y axis and the Z axis of the screen coordinate system is within a preset range, the electronic equipment enters the preset mode.

9. The warning method according to claim 1, wherein the electronic device comprises a fingerprint collection area, and the sending of the warning notification to the wearable device by the electronic device in the case that the electronic device detects that a touch operation is received in any area of the touch screen and a capacitance value generated by the touch operation on the touch screen is within a tolerance range comprises:

and sending an alarm notification to the wearable device under the condition that the electronic device detects that any area of the touch screen receives touch operation and the touch operation is in a capacitance range of a capacitance value generated by the touch screen, and under the condition that the similarity between the fingerprint acquired by the fingerprint acquisition area and the stored fingerprint is lower than a preset threshold value.

10. The alert method as recited in claim 1, wherein after the electronic device enters the preset mode, the method further comprises:

the wearable device sends a second control instruction to the electronic device, wherein the second control instruction is used for indicating the electronic device to exit the preset mode;

and the electronic equipment responds to the second control instruction and exits the preset mode.

11. The alert method of claim 10, wherein the wearable device sends a second control instruction to the electronic device, comprising:

the wearable device displays a second interface, wherein a target control is displayed on the second interface, and the target control is used for indicating and displaying an interface for setting the preset mode;

responding to the triggering operation of the target control by the wearable device, and displaying a third interface, wherein the third interface displays the identifier of the electronic device and a second control for controlling the preset mode to be opened/closed;

the wearable device responds to the closing operation of the second control and sends the second control instruction to the electronic device.

12. The alert method of claim 10, wherein the wearable device sends a second control instruction to the electronic device, comprising:

and the wearable device sends the second control instruction to the electronic device under the condition that the voice information for indicating to exit the preset mode is identified.

13. The alerting method of claim 10 wherein the wearable device sends the second control instruction to the electronic device, comprising:

the electronic equipment sends prompt information for indicating exiting the preset mode to the wearable equipment when detecting that the variation amplitude of the acceleration on the X axis, the Y axis and the Z axis of the screen coordinate system is larger than a preset threshold value;

the wearable device displays the prompt message;

the wearable device responds to the confirmation operation of the prompt message and sends the second control instruction to the electronic device.

14. An alarm device, applied to an electronic device, the device comprising:

the first communication unit is used for establishing communication connection with the wearable device;

the first processing unit is used for detecting whether a touch screen of the electronic equipment receives touch operation under the condition of a preset mode;

the first communication unit is further configured to send an alarm notification to the wearable device when detecting that a touch operation is received in any area of the touch screen and the capacitance value generated by the touch operation on the touch screen is within a tolerance range.

15. The warning device according to claim 14, wherein the first processing unit is further configured to obtain a first control instruction, wherein the first control instruction is used to instruct to enter the preset mode.

16. The alerting device of claim 15 wherein the device further comprises:

the first display unit is used for displaying a first interface, wherein the first interface displays a first control for controlling the preset mode to be turned on/off;

the first processing unit is specifically configured to obtain the first control instruction in response to a start operation of the first control, and enter the preset mode in response to the first control instruction.

17. The alerting device of claim 15 wherein the device further comprises:

the first display unit is used for responding to sliding operation of a fourth interface and displaying a sidebar, wherein the sidebar is a display panel popped up when the edge of the fourth interface receives the sliding operation, and a third control used for controlling the opening/closing of the preset mode is displayed in the sidebar;

the first processing unit is specifically configured to respond to a starting operation of the third control to acquire a first control instruction; and responding to the first control instruction, and entering the preset mode.

18. The warning device according to claim 14, wherein the first processing unit is configured to enter the preset mode when a preset condition is met.

19. The warning device according to claim 18, wherein the first processing unit is specifically configured to enter the preset mode when the electronic device is detected to be in the target time period at the moment and the light intensity is switched from being greater than a preset first light intensity threshold to being smaller than a preset second light intensity threshold, where the second light intensity threshold is smaller than the first light intensity threshold.

20. The warning device according to claim 18, wherein the first processing unit is configured to enter the preset mode when the variation range of the acceleration in the X-axis, the Y-axis and the Z-axis of the screen coordinate system is within a preset range.

21. The alerting device of claim 14 wherein the electronic device includes a fingerprint acquisition area,

the first communication unit is specifically configured to send an alarm notification to the wearable device when it is detected that a touch operation is received in any area of the touch screen, and the touch operation is performed in a capacitance range of a capacitance value generated by the touch screen, and when the similarity between a fingerprint acquired in the fingerprint acquisition area and a stored fingerprint is lower than a preset threshold value.

22. The warning device of claim 18, wherein the first communication unit is further configured to receive a second control instruction from the wearable device, wherein the second control instruction is used to instruct exiting the preset mode;

the first communication unit is used for responding to the second control instruction and exiting the preset mode.

23. An alarm device, applied to a wearable device, the device comprising:

the second communication unit is used for establishing communication connection with the electronic equipment;

the second communication unit is further used for receiving an alarm notification from the electronic equipment;

and the second processing unit is used for executing the alarm according to the alarm notification.

24. The alerting device of claim 23 wherein the device further comprises:

the second display unit is used for displaying a second interface, wherein a target control is displayed on the second interface, and the target control is used for indicating and displaying an interface for setting a preset mode;

the second display unit is further used for responding to the triggering operation of the target control and displaying a third interface, wherein the third interface displays the identifier of the electronic equipment and a second control used for controlling the preset mode to be turned on/off;

the second communication unit is further configured to respond to a starting operation of the second control and send a first control instruction to the electronic device, where the first control instruction is used to instruct the electronic device to enter the preset mode.

25. The warning device of claim 24, wherein the second communication unit is further configured to send a second control instruction to the electronic device, wherein the second control instruction is used to instruct the electronic device to exit the preset mode.

26. The warning device of claim 25, wherein the second display unit is configured to display a second interface, and wherein the second interface displays a target control, and wherein the target control is configured to instruct to display an interface for setting the preset mode;

the second display unit is further configured to display a third interface in response to a trigger operation on the target control, where the third interface displays an identifier of the electronic device and a second control for controlling the preset mode to be turned on/off;

the second communication unit is further configured to send the second control instruction to the electronic device in response to a closing operation of the second control.

27. The warning device of claim 25, wherein the second communication unit is further configured to send the second control instruction to the electronic equipment if voice information indicating to exit the preset mode is recognized.

28. The warning device of claim 25, wherein the second communication unit is further configured to receive a prompt from the electronic device for instructing to exit from the preset mode;

the second display unit is also used for displaying the prompt message;

the second communication unit is further configured to send the second control instruction to the electronic device in response to a confirmation operation on the prompt information.

Technical Field

The present application relates to the field of terminal technologies, and in particular, to an alarm method and apparatus.

Background

Currently, with the development of terminal technology, terminal devices have become a part of people's work and life. People can usually carry terminal equipment with them, for example, carry terminal equipment with them in places such as buses and shopping malls. However, when a user puts the terminal device in a pocket to sit in a bus, go shopping, and the like, the terminal device may be stolen, which may cause property loss to people.

In general, the terminal device may alarm by detecting that the distance to the external object is greater than a preset threshold.

However, the reliability and real-time performance of the alarm of the method are not high, and the property loss of people is still caused.

Disclosure of Invention

The application provides an alarm method and an alarm device, wherein the alarm is executed when the terminal equipment is stolen, and the alarm has real-time performance and high reliability.

In a first aspect, the present application provides an alarm method applied to an alarm system, where the alarm system includes an electronic device and a wearable device, and the electronic device includes a touch screen. The warning method provided by the application comprises the following steps: the electronic device establishes a communication connection with the wearable device. Under the condition that the electronic equipment is in a preset mode, the electronic equipment detects whether the touch screen receives touch operation. When the electronic equipment detects that any area of the touch screen receives touch operation and the touch operation is in a capacitance range, the electronic equipment sends an alarm notification to the wearable equipment. And the wearable device executes the alarm according to the alarm notification.

In this way, the electronic device is established a communication connection with the wearable device. The electronic device can enter a preset mode in response to a triggering operation of a first control in the first interface. The electronic equipment sends an alarm notification to the wearable equipment when detecting that any area of the touch screen receives touch operation and the touch operation is in a capacitance range and in a preset mode when the capacitance value generated by the touch screen is in the capacitance range. The wearable device receives an alert notification from the electronic device and performs an alert.

Understandably, the touch screen of the electronic device has a larger touch area. When the electronic equipment in the pocket is stolen, the probability that any area of the touch screen of the electronic equipment is touched is high. Furthermore, the electronic device has high reliability in detecting the theft. In addition, when the electronic device is stolen, the electronic device in the pocket can detect that the touch screen receives touch operation and the capacitance value generated by the touch operation on the touch screen is within the capacitance range, namely that the touch screen is touched by a finger. It can be seen that the electronic device detects that the theft is in real time. Further, in the above-described embodiment, it is not the electronic device that performs the alarm operation, but the wearable device worn on the user. It can be understood that even if the electronic device is stolen and is far away from the user, the user can still perceive the alarm executed by the wearable device, and the reliability of the alarm is further improved. Therefore, due to the fact that the reliability of the stolen electronic equipment is high, the real-time property and the alarm reliability of the stolen electronic equipment are high, the electronic equipment is more convenient for the user A to recover after being stolen, and the property loss probability of the user A is reduced.

In an optional implementation manner, the method provided by the present application further includes: the electronic equipment acquires a first control instruction. The first control instruction is used for indicating entering a preset mode.

Further, the electronic device acquires a first control instruction, including: the electronic equipment displays a first interface, wherein the first interface displays a first control used for controlling the opening/closing of the preset mode. The electronic equipment responds to the opening operation of the first control and obtains a first control instruction. The electronic equipment responds to the first control instruction and enters a preset mode.

In this way, the electronic device may enter the preset mode in response to a user's trigger operation on the first interface.

Or, further, the electronic device acquires the first control instruction, including: the wearable device displays a second interface, wherein the second interface displays a target control. The target control is used for indicating and displaying an interface for setting a preset mode. The wearable device responds to the triggering operation of the target control and displays a third interface. And the third interface displays the identifier of the electronic equipment and a second control for controlling the opening/closing of the preset mode. The wearable device responds to the opening operation of the second control and sends a first control instruction to the electronic device. The electronic equipment responds to the first control instruction and enters a preset mode.

In this way, the wearable device may control the electronic device to enter the preset mode in response to a user triggering operation of a second control of the second interface.

Or, further, the electronic device acquires the first control instruction, including: the electronic device displays the sidebar in response to a sliding operation on the fourth interface. The sidebar is a display panel popped up when the edge of the fourth interface receives the sliding operation, and a third control used for controlling the opening/closing of the preset mode is displayed in the sidebar. And the electronic equipment responds to the opening operation of the third control to acquire a first control instruction. The electronic equipment responds to the first control instruction and enters a preset mode.

In this way, the electronic device may enter the preset mode in response to a user's trigger operation on the sidebar of the fourth interface.

In another optional implementation manner, the method provided by the present application further includes: and the electronic equipment enters a preset mode under the condition of meeting preset conditions.

Further, the electronic device enters a preset mode when meeting a preset condition, and the method includes: and entering a preset mode under the condition that the electronic equipment detects that the moment of the electronic equipment is in the target time interval and the light intensity is switched from being larger than a preset first light intensity threshold value to being smaller than a preset second light intensity threshold value, wherein the second light intensity threshold value is smaller than the first light intensity threshold value.

Therefore, the electronic equipment can automatically enter the preset mode.

Or, further, the electronic device enters a preset mode when a preset condition is met, including: under the condition that the variation amplitude of the acceleration of the electronic equipment on the X axis, the Y axis and the Z axis of the screen coordinate system is within a preset range, the electronic equipment enters a preset mode.

Therefore, the electronic equipment can automatically enter the preset mode.

In an optional embodiment, the electronic device includes a fingerprint collection area, and in a case that the electronic device detects that a touch operation is received in any area of the touch screen and the capacitance value generated by the touch operation on the touch screen is within a tolerance range, the electronic device sends an alarm notification to the wearable device, including: and sending an alarm notification to the wearable device under the condition that the electronic device detects that any area of the touch screen receives touch operation and the touch operation is within a capacitance range of a capacitance value generated by the touch screen, and under the condition that the similarity between the fingerprint acquired by the fingerprint acquisition area and the stored fingerprint is lower than a preset threshold value.

In this way, the reliability of the issued alert notification is further enhanced.

In an optional implementation manner, after the electronic device enters the preset mode, the method provided by the present application further includes:

the wearable device sends a second control instruction to the electronic device. The second control instruction is used for indicating the electronic equipment to exit the preset mode. And the electronic equipment responds to the second control instruction and exits the preset mode.

Therefore, after the electronic equipment successfully exits the preset mode, the user can take out the electronic equipment for normal use. Because the electronic device has exited the preset mode, the electronic device does not send an alert notification to the wearable device when detecting that the user's finger touches the touch screen of the electronic device. Therefore, false alarm of the wearable device can not be caused, and the use experience of the user is improved.

Further, the wearable device sends a second control instruction to the electronic device, including: the wearable device displays a second interface. And the second interface displays a target control. The target control is used for indicating and displaying an interface for setting a preset mode. The wearable device responds to the triggering operation of the target control and displays a third interface. And the third interface displays the identifier of the electronic equipment and a second control for controlling the opening/closing of the preset mode. The wearable device responds to the closing operation of the second control and sends a second control instruction to the electronic device.

In this way, the wearable device may control the electronic device to exit the preset mode in response to a user's triggering operation of the second control of the third interface.

Or, further, the wearable device sends a second control instruction to the electronic device, including: and the wearable device sends a second control instruction to the electronic device under the condition that the voice information for indicating the exit of the preset mode is recognized.

Therefore, the wearable device controls the electronic device to exit the preset mode by recognizing the voice information of the user

Or, further, the wearable device sends a second control instruction to the electronic device, including: the electronic device sends prompt information for indicating exiting the preset mode to the wearable device when detecting that the variation amplitude of the acceleration on the X axis, the Y axis and the Z axis of the screen coordinate system is larger than a preset threshold value. The wearable device displays the prompt message. The wearable device responds to the confirmation operation of the prompt message and sends a second control instruction to the electronic device.

In this way, when the posture of the electronic apparatus is largely changed, the user may take out the pocket and use the electronic apparatus. As such, a prompt is sent to the wearable device indicating to exit the preset mode. And after the wearable device responds to the confirmation operation of the user on the prompt message, the electronic device exits the preset mode.

In a second aspect, the present application further provides an alarm device applied to an electronic device, where the alarm device includes: the first communication unit is used for establishing communication connection with the wearable device. The first processing unit is used for detecting whether a touch screen of the electronic equipment receives touch operation under the condition of being in a preset mode. The first communication unit is further used for sending an alarm notification to the wearable device when detecting that any area of the touch screen receives touch operation and the touch operation is within a capacitance range.

In an optional implementation manner, the first processing unit is further configured to obtain the first control instruction. The first control instruction is used for indicating entering a preset mode.

Further, the device that this application provided still includes: the first display unit is used for displaying the first interface. The first interface is provided with a first control used for controlling the opening/closing of the preset mode. The first processing unit is specifically configured to respond to a starting operation of the first control, acquire a first control instruction, respond to the first control instruction, and enter a preset mode.

Or, further, the apparatus provided by the present application further comprises: the first display unit is used for responding to the sliding operation of the fourth interface and displaying a sidebar, wherein the sidebar is a display panel popped up when the edge of the fourth interface receives the sliding operation, and a third control used for controlling the opening/closing of the preset mode is displayed in the sidebar. The first processing unit is specifically used for responding to the opening operation of the third control and acquiring a first control instruction; and responding to the first control instruction, and entering a preset mode.

In another optional embodiment, the first processing unit is specifically configured to enter a preset mode when a preset condition is met.

Further, the first processing unit is specifically configured to enter a preset mode when it is detected that the electronic device is in the target time period at the moment and the light intensity is switched from being greater than a preset first light intensity threshold to being smaller than a preset second light intensity threshold, where the second light intensity threshold is smaller than the first light intensity threshold.

Or, further, the first processing unit is specifically configured to enter the preset mode when the variation amplitudes of the accelerations on the X axis, the Y axis, and the Z axis of the screen coordinate system are within the preset range.

In an alternative embodiment, the electronic device includes a fingerprint acquisition area. The first communication unit is specifically used for sending an alarm notification to the wearable device when detecting that any area of the touch screen receives touch operation and the touch operation is within a capacitance range of a capacitance value generated by the touch screen and the similarity between a fingerprint acquired by the fingerprint acquisition area and a stored fingerprint is lower than a preset threshold value.

Further, the first communication unit is further configured to receive a second control instruction from the wearable device, where the second control instruction is used to instruct to exit the preset mode. And the first communication unit is used for responding to the second control instruction and exiting the preset mode.

In a third aspect, an embodiment of the present application further provides an alarm device, which is applied to wearable equipment. The application provides an alarm device includes: and the second communication unit is used for establishing communication connection with the electronic equipment. And the second communication unit is also used for receiving the alarm notice from the electronic equipment. And the second processing unit is used for executing the alarm according to the alarm notification.

In an optional implementation, the apparatus provided herein further comprises: and the second display unit is used for displaying a second interface, wherein the second interface displays a target control, and the target control is used for indicating and displaying an interface for setting a preset mode. And the second display unit is also used for responding to the triggering operation of the target control and displaying a third interface, wherein the third interface displays the identifier of the electronic equipment and a second control for controlling the opening/closing of the preset mode. And the second communication unit is also used for responding to the opening operation of the second control and sending a first control instruction to the electronic equipment. The first control instruction is used for indicating the electronic equipment to enter a preset mode.

In an optional implementation manner, the second communication unit is further configured to send a second control instruction to the electronic device. The second control instruction is used for indicating the electronic equipment to exit the preset mode.

Further, the second display unit is used for displaying the second interface. And the second interface displays a target control, wherein the target control is used for indicating and displaying an interface for setting a preset mode. And the second display unit is also used for responding to the triggering operation of the target control and displaying a third interface. And the third interface displays the identifier of the electronic equipment and a second control for controlling the opening/closing of the preset mode. And the second communication unit is also used for responding to the closing operation of the second control and sending a second control instruction to the electronic equipment.

Or, further, the second communication unit is further configured to send a second control instruction to the electronic device in a case where the voice information for instructing to exit the preset mode is recognized.

Or, further, the second communication unit is also used for receiving prompt information for instructing the electronic equipment to exit the preset mode. And the second display unit is also used for displaying prompt information. And the second communication unit is also used for responding to the confirmation operation of the prompt message and sending a second control instruction to the electronic equipment.

In a fourth aspect, an embodiment of the present application provides an electronic device, including a processor and a memory, where the memory is used to store code instructions; the processor is configured to execute the code instructions to cause the electronic device to perform the alert method as described in the first aspect or any implementation of the first aspect.

In a fifth aspect, embodiments of the present application provide a wearable device, including a processor and a memory, the memory storing code instructions; the processor is configured to execute the code instructions to cause the electronic device to perform an alert method as described in the first aspect or any implementation of the first aspect.

In a sixth aspect, the present application further provides a computer-readable storage medium storing instructions that, when executed, cause a computer to perform an alert method performed by an electronic device or a wearable device as described in the first aspect or any implementation manner of the first aspect.

In a seventh aspect, this application embodiment further provides a computer program product, including a computer program, which when executed, causes a computer to execute the alert method performed by an electronic device or a wearable device as described in the first aspect or any implementation manner of the first aspect.

It should be understood that the second to seventh aspects of the present application correspond to the technical solutions of the first aspect of the present application, and the advantageous effects obtained by the aspects and the corresponding possible implementations are similar and will not be described again.

Drawings

FIG. 1 is a schematic view of a warning method;

fig. 2 is a schematic diagram of a hardware system architecture of a terminal device according to an embodiment of the present disclosure;

fig. 3 is a schematic diagram of a software system architecture of a terminal device and a wearable device provided in an embodiment of the present application;

fig. 4 is a schematic view of a scenario in which a mobile phone and a smart watch establish a communication connection according to an embodiment of the present application;

fig. 5 is a schematic interface diagram illustrating that a user triggers a mobile phone to enter a preset mode according to an embodiment of the present application;

fig. 6 is a schematic interface diagram of triggering a mobile phone to enter a preset mode by a smart watch according to an embodiment of the present application;

fig. 7 is a schematic view of a scenario in which a mobile phone sends an alarm notification to a smart watch according to an embodiment of the present application;

fig. 8 is a scene schematic diagram of an alarm operation executed by a smart watch according to an embodiment of the present application;

fig. 9 is a schematic interface diagram of triggering the mobile phone to exit the preset mode by the smart watch according to the embodiment of the present application;

FIG. 10 is a flowchart of an alarm method according to an embodiment of the present application;

fig. 11 is a second flowchart of an alarm method according to an embodiment of the present application;

fig. 12 is a block diagram of an alarm device 1200 according to an embodiment of the present application;

fig. 13 is a block diagram of an alarm device 1300 according to an embodiment of the present disclosure;

fig. 14 is a schematic hardware structure diagram of an electronic device or a wearable device provided in an embodiment of the present application;

fig. 15 is a schematic structural diagram of a chip according to an embodiment of the present application.

Detailed Description

In the embodiments of the present application, terms such as "first" and "second" are used to distinguish the same or similar items having substantially the same function and action. For example, the first value and the second value are only used to distinguish different values, and the order of the values is not limited. Those skilled in the art will appreciate that the terms "first," "second," etc. do not denote any order or quantity, nor do the terms "first," "second," etc. denote any order or importance.

It is noted that, in the present application, words such as "exemplary" or "for example" are used to mean exemplary, illustrative, or descriptive. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.

In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.

When people put the terminal equipment in a pocket to carry out activities such as bus sitting, shopping and the like, the terminal equipment is possibly stolen, and further property loss is caused. Furthermore, the current terminal equipment sets an anti-theft alarm strategy. As shown in fig. 1, a user a pushes a terminal device in a pocket to sit on a bus, and at this time, the terminal device detects that the distance between the terminal device and the pocket is smaller than a preset threshold value, and no alarm is given. When the thief B takes the terminal equipment out of the pocket of the user A, the terminal equipment detects that the distance between the terminal equipment and the pocket is larger than a preset threshold value, and the terminal equipment vibrates to give an alarm. However, at this point, thief B may have carried the terminal device away and user a may not be aware of the alarm of the terminal device. Therefore, the reliability of the alarm mode is low.

Moreover, when the user takes the terminal device out of the pocket for personal normal use, the terminal device also detects that the distance from the inner side of the pocket is greater than a preset threshold value, and therefore a false alarm is generated, and the experience of the user A is poor.

In view of this, the embodiment of the present application provides an alarm method, where a terminal device may establish a communication connection with a wearable device on a user a in advance. And, the terminal device may turn on the preset mode in response to the trigger of the user a. In a preset mode, if the terminal device detects that a finger touches any area of a touch screen of the terminal device, an alarm notification is sent to the wearable device. And the wearable device executes the alarm operation under the condition of receiving the alarm notification. Therefore, the touch screen of the terminal equipment has a larger touch area. When the thief B steals the terminal equipment from the pocket of the user A, the probability that the touch screen of the terminal equipment is touched is high. Further, the reliability of detecting theft by the thief B is high. In addition, when the terminal equipment is stolen, the terminal equipment in the pocket can immediately detect that the touch screen is touched by the finger of the thief B. Therefore, the terminal equipment has real-time property of detecting that the thief B is stolen. In addition, because the wearable device worn on the user A executes the alarm, the user A can accurately sense the alarm of the wearable device, and the alarm reliability is further improved.

Moreover, when the terminal device is in the preset mode, the wearable device may alarm. When the user a needs to normally use the terminal device, the wearable device may send, to the terminal device, an instruction for instructing to exit the preset mode in response to an operation of the user a at the wearable device that triggers to exit the preset mode, so that the terminal device exits the preset mode. Therefore, when the user A takes the terminal device out of the pocket and touches the touch screen of the terminal device, the false alarm can not be generated.

It is understood that the terminal device may also be referred to as a terminal (terminal), a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), etc. The terminal device may be a mobile phone (mobile phone), a Virtual Reality (VR) terminal device, or an Augmented Reality (AR) terminal device. The embodiment of the present application does not limit the specific technology and the specific device form adopted by the terminal device.

In order to better understand the embodiments of the present application, the following describes structures of a terminal device and a wearable device according to the embodiments of the present application. Exemplarily, fig. 2 is a schematic structural diagram of a terminal device provided in an embodiment of the present application.

The terminal device may include a processor 110, an internal memory 121, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a sensor module 180, a motor 191, a display screen 194, and the like. The sensor module 180 may include a gyroscope sensor 180B, an acceleration sensor 180E, a distance sensor 180F, a fingerprint sensor 180H, a touch sensor 180K, an ambient light sensor 180L, and the like.

It is to be understood that the illustrated structure of the embodiments of the present application does not constitute a specific limitation to the terminal device. In other embodiments of the present application, a terminal device may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components may be used. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.

Processor 110 may include one or more processing units. The different processing units may be separate devices or may be integrated into one or more processors. A memory may also be provided in processor 110 for storing instructions and data.

The wireless communication function of the terminal device can be realized by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, the baseband processor, and the like.

The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Antennas in terminal devices may be used to cover single or multiple communication bands. For example, antennas 1 and 2 may be used to transmit and receive bluetooth signals and Wi-Fi signals.

The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied on the terminal device. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation.

The wireless communication module 160 may provide a solution for wireless communication applied to a terminal device, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), Bluetooth (BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), and the like.

The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. In some embodiments, the terminal device may include 1 or N display screens 194, with N being a positive integer greater than 1.

The internal memory 121 may be used to store computer-executable program code, which includes instructions. The internal memory 121 may include a program storage area and a data storage area. The internal memory 121 may also be used to store an identifier for characterizing the mode in which the terminal device is located in the embodiment of the present application. For example, when the terminal device is not in the preset mode, the stored identifier is a binary number "0"; when the terminal device is in the preset mode, the stored identification is a binary number "1". Or, when the terminal device is not in the preset mode, the stored identifier is a binary number "1"; when the terminal device is in the preset mode, the stored identifier is a binary number "0".

The terminal device may implement audio functions through the audio module 170, the speaker 170, and the application processor. Such as music playing, recording, voice alarm, buzzer alarm, etc.

The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The speaker 170A, also called a "horn", is used to convert the audio electrical signal into an acoustic signal. The terminal device can sound an alarm through the speaker 170A or listen to a hands-free call.

The gyro sensor 180B may be used to determine the motion attitude of the terminal device. The air pressure sensor 180C is used to measure air pressure. The magnetic sensor 180D includes a hall sensor. The acceleration sensor 180E can detect the magnitude of acceleration of the terminal device in various directions (generally, three axes). A distance sensor 180F for measuring a distance. The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The ambient light sensor 180L is used to sense the ambient light level. The fingerprint sensor 180H is used to collect a fingerprint. The touch sensor 180K may be disposed on the display screen 194, and a touch screen, also referred to as a "touch screen", is formed by the touch sensor 180K and the display screen 194. The touch screen may be used to detect a touch operation by a finger.

The motor 191 may be a rotor motor and/or a linear motor, such as an X-axis linear motor or a Z-axis linear motor. At least one motor 191 may be included in the electronic device. Motor motion, such as motor rotation or linear motion, can produce vibrations that can cause the electronic device to vibrate. Thus, vibration alarm can be realized.

The wearable device may also be, for example, a smart watch, a smart bracelet, and an Augmented Reality (AR) wearable device, among others. The embodiment of the present application does not limit the specific technology and the specific device form adopted by the wearable device.

The wearable device may include fewer components such as an air pressure sensor, a magnetic sensor, a camera, an earphone interface, and a fingerprint sensor than the terminal device, and the rest of the components are the same as the terminal device (not shown in the drawings). Specifically, reference may be made to the above description of the terminal device, which is not described herein again.

The software system of the terminal device may adopt a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture, which is not described herein again.

The embodiment of the application takes an Android system with a layered architecture as an example, and exemplarily illustrates a software structure of a terminal device. Fig. 4 is a block diagram of a software structure of a terminal device to which the embodiment of the present application is applied. The layered architecture divides the software system of the terminal device into a plurality of layers, and each layer has clear roles and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system may be divided into five layers, namely an application layer (applications), an application framework layer (application framework), an Android runtime (Android runtime), and a system library, a Hardware Abstraction Layer (HAL), and a kernel layer (kernel).

The application layer may include a series of application packages, and the application layer runs the application by calling an Application Programming Interface (API) provided by the application framework layer. As shown in fig. 3, the application package may include gallery, WeChat, phone, map, navigation, WLAN, bluetooth, alarm clock, address book, information, and other applications.

The application framework layer provides an API and programming framework for the applications of the application layer. The application framework layer includes a number of predefined functions. As shown in FIG. 4, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.

The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like. The content provider is used to store and retrieve data and make it accessible to applications. The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views.

The android runtime includes a core library and a virtual machine. The android runtime is responsible for scheduling and managing the android system. The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android. The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like. The system library may include a plurality of functional modules.

The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications. The media library supports playback and recording of various commonly used audio and video formats, still image files and the like

The hardware abstraction layer can contain a plurality of library modules, and the library modules can be camera library modules, motor library modules and the like. The Android system can load corresponding library modules for the equipment hardware, and then the purpose that the application program framework layer accesses the equipment hardware is achieved. The device hardware may include, for example, speakers, display screens, and motors in the terminal device.

The kernel layer is a layer between hardware and software. The kernel layer is used for driving hardware so that the hardware works. The inner core layer at least includes a display driver, a motor driver, a sensor driver, and the like, which is not limited in the embodiments of the present application.

In addition, the architecture of the wearable device is the same as that of the terminal device, and reference may be specifically made to the description of the architecture of the terminal device, which is not repeated herein.

The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following embodiments may be implemented independently or in combination, and details of the same or similar concepts or processes may not be repeated in some embodiments.

In the following, taking a terminal device as a mobile phone 100 and a wearable device as a smart watch 200 as an example, and referring to the interface schematic diagrams of fig. 5 to fig. 10, a warning method provided in the embodiment of the present application is described, and this example does not constitute a limitation to the embodiment of the present application. The following embodiments may be combined with each other and are not described in detail with respect to the same or similar concepts or processes.

As shown in fig. 4, the user a wearing the smart watch 200 and carrying the mobile phone 100 is taking a bus, and before putting the mobile phone 100 into a pocket, the mobile phone 100 and the smart watch 200 may be communicatively connected. The communication connection between the mobile phone 100 and the smart watch 200 may be a bluetooth connection or a WIFI connection, which is not limited herein.

Next, a procedure of establishing a communication connection between the mobile phone 100 and the smart watch 200 (not shown in the figure) will be described by taking a mode of connecting between the mobile phone 100 and the smart watch 200 through WIFI as an example.

The handset 100 displays a Wi-Fi interface. The mobile phone 100 converts the received mobile communication signal (3G or 4G or 5G signal, etc.) into a WiFi signal to be broadcast in response to the open operation of the Wi-Fi hotspot input by the Wi-Fi interface. The broadcast WiFi signal carries the identifier "HONOR 50" of the handset 100.

The smart watch 200 searches for nearby WiFi signals, and displays a list of WiFi hotspot names found on a WiFi search interface of the smart watch 200. The WiFi hotspot name list includes an identifier "HONOR 50" of the cell phone 100. The smart watch 200 may display a WiFi connection interface in response to a user a triggering operation of the identification "HONOR 50". A key input area and a join button are included in the WiFi connection interface. The smart watch 200 receives a key input by the user a in the key input area for connecting to the WiFi hotspot of the handset 100. Further, the smart watch 200 transmits a connection request to the cellular phone 100 in response to the user a's trigger operation of the join button. The connection request carries, among other things, the communication address "192.168.1.101" and the identification "HONOR-watch" of the smart watch 200.

The handset 100 receives a connection request from the smart watch 200 and displays a first prompt in the Wi-Fi interface. The first prompt message displays text information' to be connected with the following equipment: "HONOR-watch", cancel button, and confirm button. The cellular phone 100 may establish a one-to-one communication connection with the smart watch 200 according to the communication address of the smart watch 200 in response to the user a's activation operation of the confirmation button. After the connection is successful, the mobile phone 100 cancels the display of the first prompt message, but displays a second prompt message "connection is successful with" hotor-watch "to prompt the user a that the connection is successful.

After the mobile phone 100 and the smart watch 200 are successfully connected, the mobile phone 100 may enter a preset mode. It can be understood that, in the case that the mobile phone 100 is in the preset mode, the mobile phone 100 detects whether the touch screen receives a touch operation. That is, the mobile phone 100 being in the preset mode may be understood as the mobile phone 100 being in a "pocket mode", a "security mode", or a "security mode", etc. Exemplarily, the process of entering the preset mode by the mobile phone 100 is described below in six cases.

The first method comprises the following steps: as shown in fig. 5 (a) - (b), the cellular phone 100 can display the first interface 603 in response to a trigger operation on the "set" icon 602 in the system home interface 601. The first interface 603 displays a first control 604 for controlling the on/off of the preset mode. In fig. 5 (b), the first control 604 is in an off state. The internal memory 121 of the handset 100 may store therein an identifier that characterizes the mode in which it is located. In the case where the first control 604 is in the off state, it indicates that the mobile phone 100 is not in the preset mode. It will be appreciated that in some embodiments the internal memory 121 of the handset 100 stores an identification characterizing that the handset 100 is not in the preset mode: the binary number "0".

As shown in fig. 5 (c), the cell phone 100 may make the first control 604 in an open state in response to the user a triggering operation on the first control 604. The identification stored in the internal memory 121 of the handset 100 can be updated from a binary number "0" to a binary number "1", it being understood that the binary number "1" indicates that the handset 100 is in the preset mode. Thus, the mobile phone 100 completes the operation of entering the preset mode.

And the second method comprises the following steps: as shown in fig. 6 (a) - (b), the smart watch 200 displays a system home interface 701. The smart watch 200 may display the second interface 703 in response to a triggering operation of the "set" icon 702 in the system home interface 701. The second interface 703 displays a target control 704, where the target control is used to instruct to display an interface for setting a preset mode. As shown in fig. 6 (c), the smart watch 200 displays a third interface 705 in response to the target control 704. The third interface 705 displays the identifier "HONOR 50" of the connected cellular phone 100. A second control 706 for controlling the preset mode on/off is provided near the "HONOR 50". In fig. 6 (c), the second control 706 is in an off state. The internal memory 121 of the handset 100 may store therein an identifier that characterizes the mode in which it is located. In the case where the second control 706 is in the off state, it indicates that the handset 100 is not in the preset mode. The internal memory 121 of the mobile phone 100 stores an identifier indicating that the mobile phone 100 is not in the preset mode: the binary number "0".

As shown in fig. 6 (c) - (d), the smart watch 200 may cause the second control 706 to be in an on state in response to a triggering operation of the second control 706 by the user a. The smart watch 200 transmits a first control instruction for instructing entry into the preset mode to the cellular phone 100 as shown in (d) - (e) of fig. 6. The mobile phone 100 receives a control command from the smart watch 200 instructing to enter the preset mode, and enters the preset mode. Illustratively, the handset 100 may update the identification stored by the internal memory 121 from a binary "0" to a binary "1". Thus, the mobile phone 100 completes entering the default mode operation.

And the third is that: the cellular phone 100 may also display a sidebar (not illustrated in the drawings) in response to a slide operation of the user a on the system main interface 701 of the cellular phone 100. The sidebar is a display panel popped up when the edge of the system main interface 701 receives the sliding operation, and a third control for controlling the opening/closing of the preset mode is displayed in the sidebar. The mobile phone 100 may respond to the triggering operation of the third control by the user a, so that the third control is in an on state. The identification stored in the internal memory 121 of the handset 100 can be updated from a binary number "0" to a binary number "1", it being understood that the binary number "1" indicates that the handset 100 is in the preset mode. Thus, the mobile phone 100 completes the operation of entering the preset mode, which is convenient and fast.

And fourthly: the handset 100 may also recognize a voice message from user a instructing entry into a preset mode. For example, "please open the pocket mode", and "open the security mode". The identification stored in the internal memory 121 of the handset 100 can be updated from a binary number "0" to a binary number "1", it being understood that the binary number "1" indicates that the handset 100 is in the preset mode. Thus, the mobile phone 100 completes the operation of entering the preset mode, which is convenient and fast.

It is to be understood that the first-fourth cases above are all the processes in which the user a triggers the handset 100 to enter the preset mode. Next, the process of the mobile phone 100 automatically entering the preset mode will be described with reference to the fifth and sixth cases.

And a fifth mode: the mobile phone 100 enters the preset mode when detecting that the time at which the mobile phone 100 is located is in the target time period, detecting that the light intensity is switched from being greater than a preset first light intensity threshold to being smaller than a preset second light intensity threshold, and keeping the second light intensity threshold for a preset duration (e.g., 1min, 2min, etc.). Wherein the second light intensity threshold is less than the first light intensity threshold. It is understood that the target time period may be a daytime time period (e.g., 8:00-18: 00).

It will be appreciated that when the handset 100 is placed in a pocket during the day, there is a sudden drop in the detected light intensity. Therefore, the mobile phone 100 detects that the light intensity is switched from being greater than the preset first light intensity threshold to being smaller than the preset second light intensity threshold (i.e. the light intensity is detected to jump and decrease) in the daytime, and can automatically enter the preset mode without the operation of the user a under the condition of keeping the preset duration of the second light intensity threshold, so that the use experience of the user a is improved.

And a sixth mode: when the mobile phone 100 detects that the change amplitude of the attitude parameter within a preset time (e.g., 5min, 8min) is within a preset range, it enters a preset mode. For example, the mobile phone 100 may detect the three-axis acceleration of the mobile phone 100 through an acceleration sensor. When the variation amplitudes of the acceleration of the mobile phone 100 on the X axis, the Y axis, and the Z axis of the screen coordinate system are all within the preset range, it is determined that the variation amplitude of the attitude parameter of the mobile phone 100 is within the preset range. Further, the cellular phone 100 enters a preset mode. In addition, in order to enhance the reliability of entering the preset mode, the sixth case may be combined with the fifth case to jointly decide entering the preset mode. That is, the mobile phone 100 detects that the time at which the mobile phone 100 is located belongs to the daytime period, and the light intensity is switched from being greater than a preset first light intensity threshold to being smaller than a preset second light intensity threshold; and when the change amplitude of the attitude parameter within the preset time (such as 5min and 8min) is detected to be within the preset range under the condition that the light intensity is kept to be smaller than the preset second light intensity threshold, entering a preset mode.

It will be appreciated that the attitude parameters of the handset 100 change only slightly when the handset 100 is placed in the pocket. Therefore, when the mobile phone 100 detects that the change amplitude of the attitude parameter is within the preset range, the mobile phone can automatically enter the preset mode without the operation of the user a, and the use experience of the user a is improved.

It is understood that after the user a places the mobile phone 100 in a pocket, the mobile phone 100 is in the preset mode. In the case where the mobile phone 100 enters the preset mode and is put into a pocket, the user a defaults to not touch the mobile phone 100 by itself. When the thief B inserts a hand into the pocket of the user a to steal the mobile phone 100, the finger of the thief B touches the touch screen of the mobile phone 100. Furthermore, the mobile phone 100 detects that any area of the touch screen receives a touch operation and the capacitance value generated by the touch operation on the touch screen is within the capacitance range, that is, it is detected that the touch screen is touched by a finger, and then further detects whether the mobile phone 100 is in the preset mode, and if so, it is determined that the mobile phone 100 is stolen by others. As shown in fig. 7, the cell phone 100 transmits an alert notification to the smart watch 200.

In an optional case, the mobile phone 100 detects that a touch operation is received in any area of the touch screen, a capacitance value generated by the touch operation on the touch screen is within a capacitance value range, and when a fingerprint is acquired in a fingerprint acquisition area of the mobile phone 100, it is detected whether the acquired fingerprint is similar to a fingerprint previously input by the user a, and if not, it is further detected whether the mobile phone 100 is in a preset mode.

It is understood that in the case that the acquired fingerprint is not similar to the fingerprint previously entered by the user a, it can be further determined that the mobile phone 100 is not touched by the user a, but touched by another person.

Alternatively, the mobile phone 100 further detects whether the mobile phone 100 is in the preset mode when detecting that any area of the touch screen receives a touch operation and the capacitance value generated by the touch operation on the touch screen is within the capacitance range, and the mobile phone 100 detects that the signal intensity of the communication signal connected to the smart watch 200 is switched from being greater than the preset first intensity threshold to being smaller than the preset second intensity threshold.

It is to be understood that in the case where the signal strength of the communication signal connected to the smart watch 200 is switched from being greater than the preset first strength threshold to being less than the preset second strength threshold, it indicates that the mobile phone 100 is moving away from the smart watch 200, and thus, it is further determined that the mobile phone 100 may be stolen by others.

For example, the way for the handset 100 to detect that it is in the preset mode may be: the cellular phone 100 detects whether the identifier stored in the internal memory 121 is a binary number "1", and if so, determines that the cellular phone 100 is in the preset mode.

It can be understood that the touch screen of the mobile phone 100 has a larger touch area. When the thief B steals the mobile phone 100 from the pocket of the user a, the probability that the touch screen of the mobile phone 100 is touched is high. Further, the mobile phone 100 detects the theft by the thief B with high reliability. In addition, when the mobile phone 100 is stolen, the mobile phone 100 in the pocket can immediately detect that the touch screen is touched by the finger of the thief B. It can be seen that the detection of thief B by the handset 100 is in real time.

Since the smart watch 200 has established a communication connection with the cell phone 100, the smart watch 200 may receive an alert notification from the cell phone 100 after the cell phone 100 transmits the alert notification to the smart watch 200. Further, as shown in fig. 8, the smart watch 200 alarms by motor vibration. Since the smart watch 200 is worn on the wrist of the user a, the user a can accurately sense the motor vibration of the smart watch 200. Further, the user a can immediately return his/her mobile phone 100 to the thief B. In addition, the alarm mode of the smart watch 200 may also be: the "please pay attention to the security of the mobile phone" and "the mobile phone has a theft risk" are played through the speaker, and the sound alarm such as the alarm ring is played through the speaker, which is not limited herein.

Further, the mobile phone 100 may also perform an alarm, for example, the mobile phone 100 plays a sound alarm such as "please pay attention to the security of the mobile phone" and "the mobile phone has a theft risk" through a speaker, and plays an alarm ring through the speaker, which is not limited herein. In this way, the reliability of the alarm can be enhanced.

In addition, when the user a wants to take the mobile phone 100 out of the pocket for normal use, as shown in fig. 9, the smart watch 200 may respond to the triggering operation of the user a on the second control 706 in the third interface 705, so that the second control 706 is in a closed state, and send a control instruction for instructing to exit the preset mode to the mobile phone 100. The mobile phone 100 receives a control command from the smart watch 200 to instruct to exit the preset mode, and may update the binary number "1" representing that the mobile phone is in the preset mode stored in the internal memory 121 to the binary number "0" representing that the mobile phone is not in the preset mode, so as to complete the operation of exiting the preset mode by the mobile phone 100. After the mobile phone 100 successfully exits the preset mode, the user a can take out the mobile phone 100 for normal use. Since the mobile phone 100 has exited the preset mode, when the mobile phone 100 detects that the finger of the user a touches the touch screen of the mobile phone 100, an alarm notification is not sent to the smart watch 200. Thus, false alarm of the smart watch 200 cannot be caused, and the use experience of the user A is improved.

Alternatively, the above-mentioned manner of exiting the preset mode may also be replaced by: the smart watch 200 may also recognize a voice message issued by the user a to instruct to exit the preset mode. For example, "please exit the preset mode", and "turn off the security mode". And the smart watch 200 transmits a control instruction for instructing to exit the preset mode to the cellular phone 100. The mobile phone 100 receives a control command from the smart watch 200 to instruct to exit the preset mode, and may update the binary number "1" representing that the mobile phone is in the preset mode stored in the internal memory 121 to the binary number "0" representing that the mobile phone is not in the preset mode, so as to complete the operation of exiting the preset mode by the mobile phone 100.

Alternatively, the above-mentioned manner of exiting the preset mode may also be replaced by: when detecting that the change amplitude of the attitude parameter is greater than the preset threshold value, the mobile phone 100 sends a prompt message for instructing to exit the preset mode to the smart watch 200. The smart watch 200 displays a prompt message for instructing to exit the preset mode from the cell phone 100, and the smart watch 200 transmits a control instruction for instructing to exit the preset mode to the cell phone 100 in response to a confirmation operation of the prompt message for instructing to exit the preset mode. The mobile phone 100 receives a control command from the smart watch 200 to instruct to exit the preset mode, and may update the binary number "1" representing that the mobile phone is in the preset mode stored in the internal memory 121 to the binary number "0" representing that the mobile phone is not in the preset mode, so as to complete the operation of exiting the preset mode by the mobile phone 100.

To sum up, the alarm method provided in the embodiment of the present application may establish a communication connection between the mobile phone 100 and the smart watch 200 in advance. When the user a does not need to use the mobile phone 100, the mobile phone 100 enters a preset mode in response to the user a triggering operation on the first control in the first interface. After the mobile phone 100 is put into a pocket by the user a, the mobile phone 100 sends an alarm notification to the smart watch 200 when detecting that any region of the touch screen receives a touch operation and the touch operation is performed in a preset mode when a capacitance value generated by the touch screen is within a capacitance value range. The smart watch 200 receives the alarm notification from the cellular phone 100 and performs an alarm.

It can be understood that the touch screen of the mobile phone 100 has a larger touch area. When the thief B steals the mobile phone 100 from the pocket of the user a, the probability that the touch screen of the mobile phone 100 is touched is high. Further, the reliability of the detection of the theft by the handset 100 is high. In addition, when the mobile phone 100 is stolen, the mobile phone 100 in the pocket can detect that the touch screen receives a touch operation and the capacitance generated by the touch operation on the touch screen is within the capacitance range, i.e. detect that the touch screen is touched by a finger. It can be seen that the handset 100 detects theft in real time. Further, in the above-described embodiment, the alarm operation is performed not by the cellular phone 100 but by the smart watch 200 worn on the wrist of the user a. It can be understood that even if the mobile phone 100 is stolen and is far away from the user a, the user a can still sense the alarm performed by the smart watch 200, thereby further improving the reliability of the alarm. Therefore, due to the fact that the reliability of the stolen mobile phone is high, the real-time property of the stolen mobile phone is high, and the reliability of the alarm is high, the mobile phone 100 is more convenient for the user A to recover after being stolen, and the probability of property loss of the user A is reduced.

Moreover, when the user a needs to take out the mobile phone 100 for normal use, the mobile phone 100 may be triggered to exit the default mode. When the mobile phone 100 detects that the finger of the user a touches the touch screen of the mobile phone 100, the alarm notification is not sent to the smart watch 200. Thus, false alarm of the smart watch 200 cannot be caused, and the use experience of the user A is improved.

It is to be understood that the above description in conjunction with fig. 4-9 describes embodiments of the present application in terms of schematic diagrams of the interface. The following describes an alarm method provided in an embodiment of the present application with reference to flow diagrams provided in fig. 10 to fig. 11. It should be noted that the basic principle and the generated technical effect of the alarm method provided in fig. 10-11 are the same as those of the above embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the above embodiments for the part of the embodiments of the present application that is not mentioned.

Fig. 10 is a flowchart of an alarm method according to an embodiment of the present application. As shown in fig. 10, the alarm method provided in the embodiment of the present application may include:

s1101: the cell phone 100 establishes a communication connection with the smart watch 200.

The manner of establishing the communication connection between the mobile phone 100 and the smart watch 200 may refer to the description in the above embodiments, and is not described herein again.

S1102: the handset 100 displays the first interface. The first interface is provided with a first control used for controlling the opening/closing of the preset mode.

S1103: the mobile phone 100 enters a preset mode in response to the triggering operation of the first control.

It is understood that the above-mentioned S1102-S1103 is a way for the handset 100 to enter the preset mode without the help of the smart watch 200. Alternatively, the manner in which the mobile phone 100 enters the preset mode without the aid of the smart watch 200 may also include, but is not limited to, the following two:

the first method comprises the following steps: the mobile phone 100 detects that the time at which the mobile phone 100 is located belongs to the daytime period (e.g., 8:00-18:00), and detects that the light intensity is switched from being greater than a preset first light intensity threshold to being smaller than a preset second light intensity threshold, and enters the preset mode under the condition that the second light intensity threshold is kept for a preset duration (e.g., 1min, 2min, etc.). Wherein the second light intensity threshold is less than the first light intensity threshold.

And the second method comprises the following steps: when the mobile phone 100 detects that the change amplitude of the attitude parameter is within the preset range, it enters the preset mode. For example, the mobile phone 100 may detect the three-axis acceleration of the mobile phone 100 through an acceleration sensor. When the variation amplitudes of the acceleration of the mobile phone 100 on the X axis, the Y axis, and the Z axis of the screen coordinate system are all within the preset range, it is determined that the variation amplitude of the attitude parameter of the mobile phone 100 is within the preset range. Further, the cellular phone 100 enters a preset mode.

The principle of the mobile phone 100 entering the preset mode may refer to the description in the above embodiments, and is not described herein again.

S1104: the mobile phone 100 detects that any region of the touch screen receives a touch operation, and sends an alarm notification to the smart watch 200 when the touch operation is performed in a preset mode when a capacitance value generated by the touch screen is within a capacitance value range.

The specific implementation principle and effect of S1104 may refer to the description in the foregoing embodiments, and are not described herein again.

S1105: the smart watch 200 receives an alert notification from the cell phone 100.

Since in S1101 described above, the smart watch 200 has already established a communication connection with the cellular phone 100. As such, the smart watch 200 may receive an alert notification from the cell phone 100. For example, the smart watch 200 may receive an alert notification from the cell phone 100 through a bluetooth or WIFI network or the like.

S1106: the smart watch 200 performs an alarm.

The manner in which the smart watch 200 performs the alarm may refer to the description in the above embodiments, and is not described herein again.

It is to be understood that the above-mentioned S1102-S1103 describe how the mobile phone 100 enters the preset mode without the help of the smart watch 200. The following describes how the mobile phone 200 enters the default mode by means of the smart watch 200, with reference to fig. 12. As shown in fig. 11, S1102-S1103 in the above embodiment may be replaced with S1201-S1203 described below.

S1201: the smart watch 200 displays a third interface. And a second control used for controlling the opening/closing of the preset mode is displayed on the third interface.

S1202: the smart watch 200 sends a first control instruction for instructing to enter a preset mode to the cell phone 100 in response to the triggering operation of the second control.

S1203: the mobile phone 100 receives a control command from the smart watch 200 instructing to enter the preset mode, and enters the preset mode.

The specific implementation principle and effect of S1201-S1203 may refer to the description in the above embodiments, and are not described herein again.

In addition, the smart watch 200 may further send a control instruction for instructing to exit from the preset mode to the cell phone 100 in response to a triggering operation of the second control in the on state. The mobile phone 100 receives a control instruction for instructing to exit the preset mode from the smart watch 200, and exits the preset mode.

In addition, in the alarm method provided by the above-mentioned introduction embodiment of the present application, the trigger operation may include: a click operation, a long-press operation, a gesture trigger operation, and the like, which are not limited herein.

Referring to fig. 12, the present application further provides an alarm apparatus 1200 applied to an electronic device, where the apparatus 1200 provided by the present application includes: a first communication unit 1201 and a first processing unit 1202. The first communication unit 1201 is configured to establish a communication connection with the wearable device. The first processing unit 1202 is configured to detect whether a touch operation is received by a touch screen of the electronic device under a condition that the electronic device is in a preset mode. The first communication unit 1201 is further configured to send an alarm notification to the wearable device when detecting that a touch operation is received by any area of the touch screen and the capacitance value generated by the touch operation on the touch screen is within the capacitance value range.

In an alternative embodiment, the first processing unit 1202 may be further configured to obtain the first control instruction. The first control instruction may be used to instruct entering a preset mode.

Further, the apparatus 1200 provided by the present application may further include: the first display unit 1203 may be configured to display a first interface. The first interface displays a first control which can be used for controlling the opening/closing of the preset mode. The first processing unit 1202 may be specifically configured to, in response to a starting operation of the first control, acquire a first control instruction, and in response to the first control instruction, enter a preset mode.

Or, further, the apparatus 1200 provided by the present application may further include: the first display unit 1203 may be configured to display a sidebar in response to a sliding operation on the fourth interface. The sidebar is a display panel popped up when the edge of the fourth interface receives the sliding operation, and a third control capable of controlling the opening/closing of the preset mode is displayed in the sidebar. The first processing unit 1202 may be specifically configured to, in response to an opening operation on the third control, obtain a first control instruction; and responding to the first control instruction, and entering a preset mode.

In another optional embodiment, the first processing unit 1202 may be specifically configured to enter a preset mode when a preset condition is met.

Further, the first processing unit 1202 may be specifically configured to enter the preset mode when the time when the electronic device is detected to be in the target time period is detected, and the light intensity is switched from being greater than a preset first light intensity threshold to being smaller than a preset second light intensity threshold, where the second light intensity threshold is smaller than the first light intensity threshold.

Or, further, the first processing unit 1202 may be specifically configured to enter the preset mode when the variation ranges of the acceleration on the X-axis, the Y-axis, and the Z-axis of the screen coordinate system are all within the preset range.

In an alternative embodiment, the electronic device may include a fingerprint acquisition area. The first communication unit 1201 may be specifically configured to send an alarm notification to the wearable device when it is detected that a touch operation is received in any area of the touch screen and a capacitance value generated by the touch operation on the touch screen is within a tolerance range, and a similarity between a fingerprint acquired by the fingerprint acquisition area and a stored fingerprint is lower than a preset threshold.

Further, the first communication unit 1201 may be further configured to receive a second control instruction from the wearable device, where the second control instruction may be used to instruct to exit the preset mode. The first communication unit 1201 may be configured to exit the preset mode in response to the second control instruction.

Referring to fig. 13, an alarm device 1300 applied to a wearable device is further provided in the embodiments of the present application. The present application provides an alert device 1300 comprising: a second communication unit 1301 and a second processing unit 1302. The second communication unit 1301 is configured to establish a communication connection with an electronic device. The second communication unit 1301 is further configured to receive an alert notification from the electronic device. The second processing unit 1302 is configured to execute an alarm according to the alarm notification.

In an optional implementation, the apparatus 1300 provided herein may further include: the second display unit 1303 may be configured to display a second interface, where a target control is displayed on the second interface, and the target control may be used to indicate to display an interface in which a preset mode is set. The second display unit 1303 may be further configured to display a third interface in response to a trigger operation on the target control, where the third interface displays an identifier of the electronic device and a second control that may be used to control the preset mode to be turned on/off. The second communication unit 1301 may be further configured to respond to an opening operation of the second control to send a first control instruction to the electronic device. The first control instruction can be used for instructing the electronic device to enter a preset mode.

In an optional implementation manner, the second communication unit 1301 may be further configured to send a second control instruction to the electronic device. The second control instruction may be used to instruct the electronic device to exit the preset mode.

Further, the second display unit 1303 may be configured to display a second interface. And the second interface displays a target control, wherein the target control can be used for indicating and displaying an interface for setting a preset mode. The second display unit 1303 may be further configured to display a third interface in response to a trigger operation on the target control. And the third interface displays the identifier of the electronic equipment and a second control which can be used for controlling the on/off of the preset mode. The second communication unit 1301 may be further configured to send a second control instruction to the electronic device in response to a closing operation of the second control.

Or, further, the second communication unit 1301 may be further configured to send a second control instruction to the electronic device when voice information that may be used to instruct exiting the preset mode is recognized.

Or, further, the second communication unit 1301 may be further configured to receive prompt information from the electronic device, which may be used to instruct exiting the preset mode. The second display unit 1303 may also be used to display prompt information. The second communication unit 1301 may be further configured to send a second control instruction to the electronic device in response to the confirmation operation of the prompt information.

Fig. 14 is a schematic diagram of a hardware structure of an electronic device or a wearable device provided in an embodiment of the present application, and as shown in fig. 14, the electronic device or the wearable device includes a processor 1401, a communication line 1404, and at least one communication interface (an example of the communication interface 1403 in fig. 14 is described as an example).

Processor 1401 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the teachings of the present disclosure.

The communication line 1404 may include circuitry to communicate information between the above-described components.

Communication interface 1403 is implemented using any transceiver or the like for communicating with other devices or communication networks, such as ethernet, Wireless Local Area Networks (WLAN), etc.

Possibly, the electronic device or wearable device may also include a memory 1402.

The memory 1402 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these. The memory may be separate and coupled to the processor via a communication line 1404. The memory may also be integral to the processor.

The memory 1402 is used for storing computer-executable instructions for executing the present invention, and is controlled by the processor 1401 for execution. The processor 1401 is configured to execute computer executable instructions stored in the memory 1402, so as to implement the alarm method provided by the embodiment of the present application.

Possibly, the computer executed instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.

In particular implementations, processor 1401 may include one or more CPUs such as CPU0 and CPU1 in fig. 14 as an example.

In particular implementations, an electronic device or wearable device may include multiple processors, such as processor 1401 and processor 1405 in fig. 14, as an example. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).

Exemplarily, fig. 15 is a schematic structural diagram of a chip provided in an embodiment of the present application. Chip 150 includes one or more (including two) processors 1510 and a communication interface 1530.

In some embodiments, memory 1540 stores the following elements: an executable module or a data structure, or a subset thereof, or an expanded set thereof.

In this embodiment, memory 1540 can include both read-only memory and random access memory, and provides instructions and data to processor 1510. A portion of memory 1540 may also include non-volatile random access memory (NVRAM).

In the illustrated embodiment, memory 1540, communication interface 1530, and memory 1540 are coupled together via bus system 1520. The bus system 1520 may include a power bus, a control bus, a status signal bus, and the like, in addition to the data bus. For ease of description, the various buses are labeled as bus system 1520 in FIG. 15.

The method performed by the electronic device or the wearable device described in the embodiments of the present application may be applied to the processor 1510, or implemented by the processor 1510. The processor 1510 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by instructions in the form of hardware, integrated logic circuits, or software in the processor 1510. The processor 1510 may be a general-purpose processor (e.g., a microprocessor or a conventional processor), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an FPGA (field-programmable gate array) or other programmable logic device, a discrete gate, a transistor logic device, or a discrete hardware component, and the processor 1510 may implement or execute the methods, steps, and logic blocks executed by the electronic device or the wearable device disclosed in the embodiments of the present application.

The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium mature in the field, such as a random access memory, a read only memory, a programmable read only memory, or a charged erasable programmable memory (EEPROM). The storage medium is located in the memory 1540, and the processor 1510 reads information in the memory 1540, and completes the steps of the method executed by the electronic device or the wearable device in combination with hardware thereof.

In the above embodiments, the instructions stored by the memory for execution by the processor may be implemented in the form of a computer program product. The computer program product may be written in the memory in advance, or may be downloaded in the form of software and installed in the memory.

The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. Computer instructions may be stored in or transmitted from a computer-readable storage medium to another computer-readable storage medium, e.g., from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.), computer-readable storage medium may be any available medium that a computer can store or a data storage device that includes one or more available media integrated therewith, e.g., available media may include magnetic media (e.g., floppy disks, hard disks, or tapes), optical media (e.g., digital versatile discs di, DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), etc.

The embodiment of the application also provides a computer readable storage medium. The methods performed by the electronic device or wearable device described in the embodiments above may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. Computer-readable media may include computer storage media and communication media, and may include any medium that can communicate a computer program from one place to another. A storage medium may be any target medium that can be accessed by a computer.

As one possible design, the computer-readable medium may include a compact disk read-only memory (CD-ROM), RAM, ROM, EEPROM, or other optical disk storage; the computer readable medium may include a disk memory or other disk storage device. Also, any connecting line may also be properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers.

Combinations of the above should also be included within the scope of computer-readable media. The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

34页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于智能网关的电缆通道火灾预警方法和装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!