[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111953842A - Electronic equipment, safety protection method and device - Google Patents

Electronic equipment, safety protection method and device Download PDF

Info

Publication number
CN111953842A
CN111953842A CN201910409626.0A CN201910409626A CN111953842A CN 111953842 A CN111953842 A CN 111953842A CN 201910409626 A CN201910409626 A CN 201910409626A CN 111953842 A CN111953842 A CN 111953842A
Authority
CN
China
Prior art keywords
long
application program
duration
protection
emergency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910409626.0A
Other languages
Chinese (zh)
Inventor
范杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201910409626.0A priority Critical patent/CN111953842A/en
Publication of CN111953842A publication Critical patent/CN111953842A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0267Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by controlling user interface components
    • H04W52/027Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by controlling user interface components by controlling a display operation or backlight unit
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to electronic equipment, a safety protection method and a safety protection device, and belongs to the technical field of internet. The method comprises the following steps: detecting long-press operation on the appointed physical key in the interface display process of the application program; when the long-time pressing operation on the appointed physical key is detected, acquiring the time length of the long-time pressing operation; and adopting different safety protection modes to carry out safety protection according to the duration of the long press operation. The method for protecting the personal and property safety of the user when the user uses the application program is provided by detecting the long-time pressing operation on the appointed physical key and adopting the corresponding safety protection mode to carry out safety protection according to the time length of the long-time pressing operation on the appointed physical key.

Description

Electronic equipment, safety protection method and device
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an electronic device, a security protection method, and an apparatus.
Background
With the development of internet technology and the popularization of electronic devices, various application programs have been developed to meet the living needs of users. The network car booking application program is taken as a class of popular application programs, so that great convenience is brought to the user for going out, and the network car booking application program is favored by more and more users.
However, the network car booking application program has ten-thousand or even hundred-million registered user amounts, which results in insufficient supervision of the registered users by the network platform, and users using the network car booking application program lack of understanding of each other, so that personal and property safety of the users in the network car booking process is difficult to be effectively guaranteed. Therefore, it is desirable to provide a security protection method to protect the security of the user.
Disclosure of Invention
The disclosure provides an electronic device, a security protection method and a security protection device.
According to a first aspect of embodiments of the present disclosure, there is provided an electronic apparatus, including: the method comprises the following steps that a physical key, a counter and a Central Processing Unit (CPU) are appointed, wherein the input end of the counter is connected with the appointed physical key, and the output end of the counter is connected with the CPU;
the appointed physical key is used for triggering a signal at the input end of the counter to change from a high level to a low level after long pressing;
the counter is used for recording the time length of the signal at the input end changing from high level to low level, generating different interrupt signals according to different time lengths and sending the generated interrupt signals to the CPU through the output end;
the CPU is used for receiving the interrupt signal sent by the counter and determining to execute different safety protection modes according to the received interrupt signal so as to protect the safety of the user.
In another embodiment of the present disclosure, the output of the counter includes a first channel and a second channel;
the first channel is used for sending the first interrupt signal to the CPU, and the first interrupt signal is used for the CPU to determine to execute a conventional protection mode;
the second channel is used for sending the second interrupt signal to the CPU, and the second interrupt signal is used for the CPU to determine to execute an emergency protection mode.
In another embodiment of the present disclosure, when a duration in which a signal at an input terminal changes from a high level to a low level reaches a first preset duration, the counter generates the first interrupt signal and sends the first interrupt signal to the CPU through the first channel;
when the time length of the signal of the input end changing from the high level to the low level reaches a second preset time length, the counter generates a second interrupt signal and sends the second interrupt signal to the CPU through the second channel;
the first preset time length is less than the second preset time length.
In another embodiment of the present disclosure, the electronic device further includes a storage unit, the storage unit is connected to the CPU, and the storage unit is configured to store a program capable of triggering the electronic device to execute a security protection mode.
According to a second aspect of the embodiments of the present disclosure, there is provided a security protection method applied to the electronic device of the first aspect, the method including:
detecting long-press operation on the appointed physical key in the interface display process of the application program;
when the long-time pressing operation on the appointed physical key is detected, acquiring the time length of the long-time pressing operation;
and adopting different safety protection modes to carry out safety protection according to the duration of the long press operation.
In another embodiment of the present disclosure, the performing security protection in different security protection modes according to the duration of the long press operation includes:
when the long press operation duration reaches the first preset duration and the application program belongs to an unsafe application program, determining to adopt a conventional protection mode for safety protection;
and sending the positioning information of the user to the emergency contact according to a first preset frequency in a conventional protection mode.
In another embodiment of the present disclosure, the method further comprises:
acquiring the residual electric quantity of the battery in a conventional protection mode;
and when the residual electric quantity of the battery is smaller than the preset electric quantity, prompting a user to stop using the electronic equipment and closing a screen of the electronic equipment.
In another embodiment of the present disclosure, the performing security protection in different security protection modes according to the duration of the long press operation includes:
when the duration of the long press operation reaches the second preset duration, determining to adopt an emergency protection mode for safety protection;
in the emergency protection mode, sending the positioning information of the user to an emergency contact according to a second preset frequency;
wherein the second preset frequency is higher than the first preset frequency.
In another embodiment of the present disclosure, the method further comprises:
and in the emergency protection mode, closing the screen of the electronic equipment.
In another embodiment of the present disclosure, before the performing the security protection in different security protection modes according to the duration of the long press operation, the method further includes:
dividing each application program into a safe application program and an unsafe application program;
setting an emergency contact corresponding to the insecure application program, wherein the emergency contact comprises a contact in a social application, a contact in an address book or a contact in a payment application;
and setting the first preset frequency, wherein the first preset frequency is the frequency of sending the positioning information of the user to the emergency contact person in a conventional protection mode.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for security protection, the apparatus being disposed in the electronic device according to the first aspect, the apparatus including:
the detection module is used for detecting the long-time pressing operation on the specified physical key in the interface display process of the application program;
the acquisition module is used for acquiring the duration of the long-press operation when the long-press operation on the specified physical key is detected;
and the safety protection module is used for adopting different safety protection modes to carry out safety protection according to the long time of the long press operation.
In another embodiment of the present disclosure, the security protection module is configured to determine to adopt a conventional protection mode for security protection when the duration of the long press operation reaches the first preset duration and the application program belongs to an insecure application program; and sending the positioning information of the user to the emergency contact according to a first preset frequency in a conventional protection mode.
In another embodiment of the present disclosure, the apparatus further comprises:
the acquisition module is used for acquiring the residual electric quantity of the battery in a conventional protection mode;
the prompting module is used for prompting a user to stop using the electronic equipment when the residual electric quantity of the battery is smaller than a preset electric quantity;
the closing module is used for closing the screen of the electronic equipment.
In another embodiment of the present disclosure, the safety protection module is configured to determine to perform safety protection in an emergency protection mode when the duration of the long press operation reaches the second preset duration; in the emergency protection mode, sending the positioning information of the user to an emergency contact according to a second preset frequency;
wherein the second preset frequency is higher than the first preset frequency.
In another embodiment of the present disclosure, the apparatus further comprises:
and the closing module is used for closing the screen of the electronic equipment in the emergency protection mode.
In another embodiment of the present disclosure, the apparatus further comprises:
the classification module is used for classifying each application program into a safe application program and an unsafe application program;
the setting module is used for setting emergency contacts corresponding to the insecure application programs, wherein the emergency contacts comprise contacts in social application, contacts in an address book or contacts in payment application;
the setting module is configured to set the first preset frequency, where the first preset frequency is a frequency for sending the positioning information of the user to the emergency contact in a conventional protection mode.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a safety protection device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting long-press operation on the appointed physical key in the interface display process of the application program;
when the long-time pressing operation on the appointed physical key is detected, acquiring the time length of the long-time pressing operation;
and adopting different safety protection modes to carry out safety protection according to the duration of the long press operation.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the method for protecting the personal and property safety of the user when the user uses the application program is provided by detecting the long-time pressing operation on the specified physical key and adopting a corresponding safety protection mode to carry out safety protection according to the duration of the long-time pressing operation on the specified physical key.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic structural diagram of an electronic device according to an exemplary embodiment.
Fig. 2 is a schematic structural diagram of another electronic device shown in accordance with an example embodiment.
Fig. 3 is a schematic structural diagram of another electronic device shown in accordance with an example embodiment.
FIG. 4 is a flow diagram illustrating a method of security protection according to an example embodiment.
FIG. 5 is a flow diagram illustrating a method of security protection according to an example embodiment.
FIG. 6 is a flow diagram illustrating a security protection according to an example embodiment.
FIG. 7 is a block diagram illustrating a security device in accordance with an exemplary embodiment.
Fig. 8 is a block diagram illustrating an apparatus for security protection in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the present disclosure provides an electronic device, which may be a smart phone, a tablet computer, or the like, and the embodiment of the present disclosure does not specifically limit the product type of the electronic device. Referring to fig. 1, the electronic device includes: a physical key 101, a counter 102, and a CPU103 are specified. The counter 102 has an input terminal connected to the designated physical key 101 and an output terminal connected to the CPU 103.
The designated physical key 101 may be a physical key with a security protection function newly added to the electronic device, or may be a physical key with a security protection function obtained by improving an original physical key. The position of the designated physical key 101 may be located on a frame of the electronic device or below a display interface of the electronic device. The signal designating the physical key 101 for triggering the input of the counter 102 after a long press changes from high to low.
The counter 102 is configured to record a time period during which a signal at the input end changes from a high level to a low level, generate different interrupt signals according to the different time periods, and send the generated interrupt signals to the CPU103 through the output end.
The CPU103 is configured to receive an interrupt signal sent by the counter 102, and determine to execute different security protection modes according to the received interrupt signal, so as to protect the security of the user. The safety protection mode includes a normal protection mode, an emergency protection mode and the like.
In another implementation of the present disclosure, referring to fig. 2, the output of the counter 102 includes a first channel and a second channel. The first channel is used for sending a first interrupt signal to the CPU, and the first interrupt signal is used for the CPU to determine and execute a normal protection mode. The second channel is used for sending a second interrupt signal to the CPU, and the second interrupt signal is used for the CPU to determine to execute the emergency protection mode.
Specifically, when a long-press operation on a specified physical key is detected, a signal at an input end of a counter is changed from a high level to a low level, the counter records the time length of the signal at the input end changed from the high level to the low level, and when the time length of the signal at the input end changed from the high level to the low level reaches a first preset time length, the counter generates a first interrupt signal and sends the first interrupt signal to the CPU through a first channel. And after receiving the first interrupt signal, the CPU calls an internal algorithm to determine that the conventional protection mode is executed at the moment.
When the long-time pressing operation of the appointed physical key is detected, the signal of the input end of the counter is changed from a high level to a low level, the counter records the time length of the signal of the input end changed from the high level to the low level, and when the time length of the signal of the input end changed from the high level to the low level reaches a second preset time length, the counter generates a second interrupt signal and sends the second interrupt signal to the CPU through a second channel. And after receiving the second interrupt signal, the CPU calls an internal algorithm to determine that the emergency protection mode is executed at the moment.
The first preset time period may be 2 seconds, 3 seconds, and the like, and the second preset time period may be 5 seconds, 6 seconds, and the like. The CPU internal algorithm may be a correspondence between the pre-stored interrupt signal and the protection mode, including a correspondence between the first interrupt signal and the normal protection mode, and a correspondence between the second interrupt signal and the emergency protection mode.
In another embodiment of the present disclosure, referring to fig. 3, the electronic device further includes a storage unit 104. The storage unit 104 is connected to the CPU103, and the storage unit 104 is used to store a program capable of triggering the electronic device to execute the security protection mode. The memory unit 104 includes DDR (Double Data Rate), UFS (Universal Flash Storage), and the like. Specifically, when receiving the first interrupt signal, the CPU103 determines to execute the normal protection mode, and further calls the program stored in the storage unit 104 to execute the normal protection mode; upon receiving the second interrupt signal, the CPU103 determines to execute the emergency protection mode, and further calls a program stored in the storage unit 104 to execute the emergency protection mode.
Fig. 4 is a flowchart illustrating a security protection method according to an exemplary embodiment, where as shown in fig. 4, the security protection method is applied to the electronic devices of fig. 1 to 3, and includes the following steps.
In step S401, during the interface display of the application program, a long-press operation on a specified physical key is detected.
In step S402, when a long-press operation on a specified physical key is detected, a time length of the long-press operation is acquired.
In step S403, different security protection modes are adopted for security protection according to the duration of the long press operation.
According to the method provided by the embodiment of the disclosure, the long-time pressing operation on the specified physical key is detected, and the corresponding safety protection mode is adopted for safety protection according to the long-time pressing operation on the specified physical key, so that a method for protecting personal and property safety of a user when the user uses an application program is provided.
In another embodiment of the present disclosure, the performing security protection in different security protection modes according to the duration of the long press operation includes:
when the long press operation duration reaches a first preset duration and the application program belongs to an unsafe application program, determining to adopt a conventional protection mode for safety protection;
and sending the positioning information of the user to the emergency contact according to a first preset frequency in a conventional protection mode.
In another embodiment of the present disclosure, the method further comprises:
acquiring the residual electric quantity of the battery in a conventional protection mode;
when the residual electric quantity of the battery is smaller than the preset electric quantity, prompting the user to stop using the electronic equipment and closing a screen of the electronic equipment.
In another embodiment of the present disclosure, the performing security protection in different security protection modes according to the duration of the long press operation includes:
when the duration of the long press operation reaches a second preset duration, determining to adopt an emergency protection mode for safety protection;
in the emergency protection mode, sending the positioning information of the user to an emergency contact according to a second preset frequency;
the second preset frequency is higher than the first preset frequency.
In another embodiment of the present disclosure, the method further comprises:
in the emergency protection mode, the screen of the electronic device is turned off.
In another embodiment of the present disclosure, before performing security protection in different security protection modes according to the duration of the long press operation, the method further includes:
dividing each application program into a safe application program and an unsafe application program;
setting an emergency contact corresponding to the unsafe application program, wherein the emergency contact comprises a contact in the social application, a contact in the address book or a contact in the payment application;
and setting a first preset frequency, wherein the first preset frequency is the frequency of sending the positioning information of the user to the emergency contact person in the conventional protection mode.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
Fig. 5 is a flowchart illustrating a security protection method according to an exemplary embodiment, where as shown in fig. 5, the security protection method is applied to the electronic devices of fig. 1 to 3, and includes the following steps.
In step S501, the electronic device divides each application into a secure application and an insecure application.
In order to meet the use requirements, a user installs various applications in the electronic device, including a social application, a shopping application, a video playing application, a navigation application, a network appointment application, a car sharing application and the like. According to the use habit of the user and whether the personal property of the user has safety problems in the use process of the application program, the application programs can be divided into safe application programs and unsafe application programs. For example, the personal and property safety of the user may have safety problems during the usage of the online car booking application and the car sharing application, so that the online car booking application and the car sharing application can be classified into unsafe applications, and the social contact application, the shopping application, the video playing application and the navigation application can be classified into safe applications.
When the electronic device classifies the application programs, the electronic device can prompt the user to classify the installed application programs when the user downloads and installs the application programs, and can also prompt the user to classify the application programs at preset time intervals. The electronic device classifies the application programs into different categories by detecting user operations. The preset time period may be 5 days, 7 days, 10 days, and the like.
In order to determine the type of the currently running application program in the subsequent use process, the electronic equipment also sets a type identifier for the safe application program and the unsafe application program. For example, the type identifier of the secure application is set to 1, and the type identifier of the insecure application is set to 2.
In addition, after the application programs are divided into the safe application programs and the unsafe application programs and the type identifications of the safe application programs and the unsafe application programs, the electronic device further stores the corresponding relationship between the program identification of each unsafe application program and the type identification of each unsafe application program and the corresponding relationship between the program identification of each safe application program and the type identification of each safe application program.
In step S502, the electronic device sets an emergency contact corresponding to the insecure application.
After classifying each application program, the electronic device also prompts the user to bind the emergency contact corresponding to the insecure application program. The emergency contacts include contacts in a social application, contacts in an address book, or contacts in a payment application. And the electronic equipment sets the emergency contact corresponding to the unsafe application program according to the input operation of the user.
In order to ensure that barrier-free communication can be established with the emergency contact, the electronic equipment also sends a verification message to the emergency contact input by the user, if information replied by the emergency contact for the verification message is received within a specified time, the electronic equipment confirms that barrier-free communication can be established with the emergency contact, and then the emergency contact input by the user is set as the emergency contact corresponding to the unsafe application program; if the information replied by the emergency contact aiming at the verification message is not received within the specified time length, the communication between the electronic equipment and the emergency contact is obstructed, and the user is prompted to replace the emergency contact so as to ensure the safety of the user. Wherein the specified time period may be 5 minutes, 10 minutes, etc.
In step S503, the electronic device sets a first preset frequency.
The first preset frequency is a frequency of sending the positioning information of the user to the emergency contact in the normal protection mode, and the first preset frequency may be 1 minute, 5 minutes, 10 minutes, and the like. In the embodiment of the disclosure, the electronic device provides setting options corresponding to a first preset frequency, each setting option corresponds to a different frequency, the user selects a corresponding setting option according to the own requirement, and the electronic device detects the operation of the user and sets the first preset frequency according to the setting option selected by the user.
In step S504, during the interface display of the application program, the electronic device detects a long-press operation on the specified physical key.
In the embodiment of the disclosure, the electronic device is provided with the designated physical key, and the designated physical key is used for triggering the electronic device to operate the safety protection mode in the operation process of the application program so as to protect the safety of the user. In the display process of the application program interface, the electronic equipment can detect the long-time pressing operation on the appointed physical key in real time, and when the long-time pressing operation on the appointed physical key is detected and the safety protection condition is met, the electronic equipment adopts a safety protection mode to carry out safety protection on the user.
When the electronic equipment detects the long-time pressing operation on the appointed physical key, the pressure sensor can be used for detecting the pressure change of the appointed physical key, the time length of the pressure change is recorded through the timer, and when the time length of the pressure change is longer than the time length of the long-time pressing operation, the long-time pressing operation on the appointed physical key is determined to be detected.
In step S505, when a long press operation on the designated physical key is detected, the electronic apparatus acquires a time length of the long press operation.
The electronic equipment in the embodiment of the disclosure is provided with the timer, when the touch operation on the designated physical key is detected, the signal at the input end of the timer changes from high level to low level, the timer records the time length of the signal changing from high level to low level, and the time length of the signal change is used as the time length of the long-press operation.
In step S506, the electronic device performs security protection in different security protection modes according to the duration of the long press operation.
When the electronic device adopts different security protection modes to perform security protection according to the length of the long press operation, the following two situations are included but not limited:
in the first case, the electronic equipment adopts a conventional protection mode for protection according to the duration of long-press operation.
When the long press operation duration reaches a first preset duration, the electronic equipment acquires the program identifier of the application program, determines whether the application program belongs to the unsafe application program or not according to the program identifier of the application program and the corresponding relation between the program identifier of the unsafe application program and the type identifier of the unsafe application program, and determines to adopt a conventional protection mode for safety protection when determining that the application program belongs to the unsafe application program. In a conventional protection mode, the electronic equipment acquires the positioning information of the user and sends the positioning information of the user to the emergency contact according to a first preset frequency.
In order to ensure that the self-protection function can be normally used, under the conventional protection mode, the electronic equipment also acquires the residual capacity of the battery and compares the residual capacity of the battery with the preset capacity. When the residual electric quantity of the battery is less than the preset electric quantity, the electronic equipment prompts a user to stop using the electronic equipment and closes a screen of the electronic equipment so as to save electric energy; when the residual electric quantity of the battery is larger than the preset electric quantity, the residual electric quantity of the battery of the electronic equipment is enough to realize the self-protection function, and at the moment, the user can normally use the electronic equipment to execute any operation on the electronic equipment; when the remaining capacity of the battery is equal to the preset capacity, the electronic device prompts the user that the battery capacity is low, and enough capacity needs to be reserved to ensure the normal operation of the self-protection function. The preset electric quantity may be 20%, 25% or the like of the total electric quantity of the battery.
After the electronic equipment forcibly closes the screen, the electronic equipment cannot automatically light the screen, and only when the triggering operation of the user on the power key is detected, the screen can be lighted again. When the screen is lit again, the electronic device will also continue to indicate to the user that the battery is low and that the electronic device should be taken out of service.
In a conventional protection mode, the electronic equipment sends the positioning information of the user to the emergency contact person at intervals of a first preset frequency, so that the emergency contact person can know the position of the user, and an alarm is given in time when the user is in danger so as to rescue the user. And under the condition that the electric quantity of the battery is low, the electronic equipment not only saves electric energy and enables the self-protection function to normally operate, but also prevents the operation of sending the positioning information by the user from being discovered by lawbreakers by closing the screen, and the self-protection function is relatively hidden.
And in the second situation, the electronic equipment adopts an emergency protection mode for protection according to the long press operation duration.
When the duration of the long press operation reaches a second preset duration, the electronic equipment directly determines to adopt an emergency protection mode for safety protection. In this case, the electronic device may no longer determine whether the application belongs to the insecure class of application, and the electronic device may temporarily classify the application as an insecure class of application regardless of whether the application belongs to the insecure class of application. After the security protection is finished, if the application program belongs to the security application program, the electronic device can also prompt the user to set the application program as an insecure application program, so that the application program can be protected by adopting a conventional protection mode in the running process of the application program.
In the emergency protection mode, the electronic equipment sends the positioning information of the user to the emergency contact according to a second preset frequency. The second preset frequency is a frequency set by the electronic device to send the positioning information of the user to the emergency contact, and the second preset frequency is higher than the first preset frequency and can be 5 seconds, 10 seconds and the like. In the emergency protection mode, the electronic device sends the positioning information of the user to the emergency contact through high frequency, so that the position of the user is conveniently positioned, and the emergency contact is made to recognize that the current situation is critical and needs to draw attention.
In the emergency protection mode, the electronic device will force the screen of the electronic device to be turned off. After the electronic equipment forcibly closes the screen, the electronic equipment cannot automatically light the screen, and only when the triggering operation of the user on the power key is detected, the screen can be lighted again. Under the emergency protection mode, the electronic equipment can save the electric energy of the battery by closing the screen, so that the self-protection function can normally run, and the operation of sending the positioning information by the user can be prevented from being discovered by lawbreakers, so that the privacy protection function is achieved.
It should be noted that, for example, in the interface display process of the application program, the long-press operation on the specified physical key is detected, and different security protection modes are adopted for protection according to the duration of the long-press operation, and actually, when the application program runs in the background, the automatic protection function of the electronic device may also be activated. In order to avoid misjudgment of the electronic equipment on the application program running in the foreground, when the application program runs in the background, the long pressing operation time of the specified physical key is longer than a second preset time, and the electronic equipment can be triggered to adopt a conventional protection mode to carry out safety protection on the user. For example, when the application program runs in the foreground, the long-time pressing operation time of the specified physical key reaches 3 seconds, and the electronic equipment can adopt a conventional protection mode to carry out safety protection; when the application program runs in the background, the long-time pressing operation time of the specified physical key reaches 10 seconds, and the electronic equipment can adopt the conventional protection mode to carry out safety protection.
For the security protection method provided by the embodiment of the present disclosure, fig. 6 is taken as an example for convenience of understanding.
Referring to fig. 6, in the interface display process of the application program, the smart phone detects a long-press operation on a special key (i.e., an appointed physical key), and when the long-press operation is detected to be 2-3 seconds, a conventional protection mode is adopted for safety protection, and in the conventional protection mode, the smart phone sends the positioning information of the user to the emergency contact person by using a first preset frequency, and judges whether the remaining power of the battery is greater than 20%, if so, the smart phone is normally used, and if not, the screen is forcibly turned off to save electric energy. When the detected long-time pressing operation duration reaches 5 seconds, the smart phone directly enters an emergency protection mode, and then the emergency safety protection mode is adopted for safety protection.
Before safety protection is carried out by adopting a conventional protection mode or an emergency protection mode, a user is prompted to classify the installed software, bind emergency contacts and set the frequency of sending positioning information of the user in the conventional protection mode. Based on these settings, when the interface of the application program is displayed, the self-protection function can be realized by detecting the long-press operation on the special key.
According to the method provided by the embodiment of the disclosure, the long-time pressing operation on the specified physical key is detected, and the corresponding safety protection mode is adopted for safety protection according to the long-time pressing operation on the specified physical key, so that a method for protecting personal and property safety of a user when the user uses an application program is provided.
The method provided by the embodiment of the disclosure also has the following beneficial effects:
firstly, an entity physical key is adopted to trigger a protection mechanism, so that the method is safe and reliable and is simple to operate.
And secondly, the user is prompted to classify the application programs, so that the user can conveniently set a corresponding protection mechanism according to the use habit and the risk coefficient of the application programs.
Thirdly, the bound emergency contact person has various modes, the range of the contact person is greatly expanded, and the safety of a protection mechanism is further enhanced.
Fourthly, under the conventional protection mode, the residual electric quantity of the battery is detected in real time, and when the electric quantity of the battery is low, the electric energy can be saved by closing the screen, so that the protection function can normally operate.
And fifthly, sending positioning information to the emergency contact person for self rescue through high frequency in the emergency protection mode.
FIG. 7 is a schematic diagram illustrating a safety shield apparatus according to an exemplary embodiment. Referring to fig. 7, the apparatus includes: a detection module 701, an acquisition module 702, and a security protection module 703.
The detection module 701 is configured to detect a long-press operation on a specified physical key in an interface display process of an application program;
the obtaining module 702 is configured to obtain a duration of a long-press operation when the long-press operation on a specified physical key is detected;
the security protection module 703 is configured to perform security protection in different security protection modes according to the duration of the long press operation.
In another embodiment of the present disclosure, the security protection module 703 is configured to determine to adopt a conventional protection mode for security protection when the duration of the long press operation reaches a first preset duration and the application program belongs to an insecure application program; and sending the positioning information of the user to the emergency contact according to a first preset frequency in a conventional protection mode.
In another embodiment of the present disclosure, the apparatus further comprises: the device comprises a prompt module and a closing module.
The obtaining module 702 is configured to obtain the remaining capacity of the battery in a normal protection mode;
the prompting module is configured to prompt a user to stop using the electronic equipment when the residual electric quantity of the battery is smaller than a preset electric quantity;
the closing module is configured to close a screen of the electronic device.
In another embodiment of the present disclosure, the safety protection module 703 is configured to determine to perform safety protection in the emergency protection mode when the duration of the long press operation reaches a second preset duration; in the emergency protection mode, sending the positioning information of the user to an emergency contact according to a second preset frequency;
the second preset frequency is higher than the first preset frequency.
In another embodiment of the present disclosure, the apparatus further comprises: and closing the module.
The shutdown module is configured to shut down a screen of the electronic device in an emergency protection mode.
In another embodiment of the present disclosure, the apparatus further comprises: a classification module and a setting module.
The classification module is configured to classify the respective applications into a safe class application and an unsafe class application;
the setting module is configured to set emergency contacts corresponding to the insecure application, wherein the emergency contacts comprise contacts in the social application, contacts in the address book or contacts in the payment application;
the setting module is configured to set a first preset frequency, wherein the first preset frequency is a frequency of sending the positioning information of the user to the emergency contact in the conventional protection mode.
The device provided by the embodiment of the disclosure adopts the corresponding safety protection mode to carry out safety protection by detecting the long-time pressing operation on the appointed physical key and according to the duration of the long-time pressing operation on the appointed physical key, thereby providing a method for protecting the personal and property safety of a user when the user uses an application program.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 8 is a block diagram illustrating an apparatus 800 for security protection according to an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 8, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein that, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a security protection method.
The device provided by the embodiment of the disclosure adopts the corresponding safety protection mode to carry out safety protection by detecting the long-time pressing operation on the appointed physical key and according to the duration of the long-time pressing operation on the appointed physical key, thereby providing a method for protecting the personal and property safety of a user when the user uses an application program.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (17)

1. An electronic device, characterized in that the electronic device comprises: the method comprises the following steps that a physical key, a counter and a Central Processing Unit (CPU) are appointed, wherein the input end of the counter is connected with the physical key, and the output end of the counter is connected with the CPU;
the appointed physical key is used for triggering a signal at the input end of the counter to change from a high level to a low level after long pressing;
the counter is used for recording the time length of the signal at the input end changing from high level to low level, generating different interrupt signals according to different time lengths and sending the generated interrupt signals to the CPU through the output end;
the CPU is used for receiving the interrupt signal sent by the counter and determining to execute different safety protection modes according to the received interrupt signal so as to protect the safety of the user.
2. The electronic device of claim 1, wherein the output of the counter comprises a first channel and a second channel;
the first channel is used for sending the first interrupt signal to the CPU, and the first interrupt signal is used for the CPU to determine to execute a conventional protection mode;
the second channel is used for sending the second interrupt signal to the CPU, and the second interrupt signal is used for the CPU to determine to execute an emergency protection mode.
3. The electronic device according to claim 2, wherein when a duration in which the signal at the input terminal changes from high level to low level reaches a first preset duration, the counter generates the first interrupt signal and sends the first interrupt signal to the CPU through the first channel;
when the time length of the signal of the input end changing from the high level to the low level reaches a second preset time length, the counter generates a second interrupt signal and sends the second interrupt signal to the CPU through the second channel;
the first preset time length is less than the second preset time length.
4. The electronic device according to claim 1, further comprising a storage unit connected to the CPU, the storage unit being configured to store a program that can trigger the electronic device to execute a security protection mode.
5. A method of security protection, wherein the method applies the electronic device of any one of claims 1 to 4, the method comprising:
detecting long-press operation on the appointed physical key in the interface display process of the application program;
when the long-time pressing operation on the appointed physical key is detected, acquiring the time length of the long-time pressing operation;
and adopting different safety protection modes to carry out safety protection according to the duration of the long press operation.
6. The method according to claim 5, wherein the adopting different security protection modes for security protection according to the duration of the long press operation comprises:
when the long press operation duration reaches the first preset duration and the application program belongs to an unsafe application program, determining to adopt a conventional protection mode for safety protection;
and sending the positioning information of the user to the emergency contact according to a first preset frequency in a conventional protection mode.
7. The method of claim 6, further comprising:
acquiring the residual electric quantity of the battery in a conventional protection mode;
and when the residual electric quantity of the battery is smaller than the preset electric quantity, prompting a user to stop using the electronic equipment and closing a screen of the electronic equipment.
8. The method according to claim 5, wherein the adopting different security protection modes for security protection according to the duration of the long press operation comprises:
when the duration of the long press operation reaches the second preset duration, determining to adopt an emergency protection mode for safety protection;
in the emergency protection mode, sending the positioning information of the user to an emergency contact according to a second preset frequency;
wherein the second preset frequency is higher than the first preset frequency.
9. The method of claim 8, further comprising:
and in the emergency protection mode, closing the screen of the electronic equipment.
10. The method according to any one of claims 5 to 9, wherein before performing security protection in different security protection modes according to the duration of the long press operation, the method further comprises:
dividing each application program into a safe application program and an unsafe application program;
setting an emergency contact corresponding to the insecure application program, wherein the emergency contact comprises a contact in a social application, a contact in an address book or a contact in a payment application;
and setting the first preset frequency, wherein the first preset frequency is the frequency of sending the positioning information of the user to the emergency contact person in a conventional protection mode.
11. A security protection apparatus provided in the electronic device according to any one of claims 1 to 4, the apparatus comprising:
the detection module is used for detecting the long-time pressing operation on the specified physical key in the interface display process of the application program;
the acquisition module is used for acquiring the duration of the long-press operation when the long-press operation on the specified physical key is detected;
and the safety protection module is used for adopting different safety protection modes to carry out safety protection according to the long time of the long press operation.
12. The device according to claim 11, wherein the security protection module is configured to determine to adopt a conventional protection mode for security protection when the duration of the long press operation reaches the first preset duration and the application program belongs to an insecure application program; and sending the positioning information of the user to the emergency contact according to a first preset frequency in a conventional protection mode.
13. The apparatus of claim 12, further comprising:
the acquisition module is used for acquiring the residual electric quantity of the battery in a conventional protection mode;
the prompting module is used for prompting a user to stop using the electronic equipment when the residual electric quantity of the battery is smaller than a preset electric quantity;
the closing module is used for closing the screen of the electronic equipment.
14. The device according to claim 11, wherein the safety protection module is configured to determine to perform safety protection in an emergency protection mode when the duration of the long press operation reaches the second preset duration; in the emergency protection mode, sending the positioning information of the user to an emergency contact according to a second preset frequency;
wherein the second preset frequency is higher than the first preset frequency.
15. The apparatus of claim 14, further comprising:
and the closing module is used for closing the screen of the electronic equipment in the emergency protection mode.
16. The apparatus of any one of claims 11 to 15, further comprising:
the classification module is used for classifying each application program into a safe application program and an unsafe application program;
the setting module is used for setting emergency contacts corresponding to the insecure application programs, wherein the emergency contacts comprise contacts in social application, contacts in an address book or contacts in payment application;
the setting module is configured to set the first preset frequency, where the first preset frequency is a frequency for sending the positioning information of the user to the emergency contact in a conventional protection mode.
17. A safety arrangement, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting long-press operation on the appointed physical key in the interface display process of the application program;
when the long-time pressing operation on the appointed physical key is detected, acquiring the time length of the long-time pressing operation;
and adopting different safety protection modes to carry out safety protection according to the duration of the long press operation.
CN201910409626.0A 2019-05-16 2019-05-16 Electronic equipment, safety protection method and device Pending CN111953842A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910409626.0A CN111953842A (en) 2019-05-16 2019-05-16 Electronic equipment, safety protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910409626.0A CN111953842A (en) 2019-05-16 2019-05-16 Electronic equipment, safety protection method and device

Publications (1)

Publication Number Publication Date
CN111953842A true CN111953842A (en) 2020-11-17

Family

ID=73335993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910409626.0A Pending CN111953842A (en) 2019-05-16 2019-05-16 Electronic equipment, safety protection method and device

Country Status (1)

Country Link
CN (1) CN111953842A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114792461A (en) * 2021-01-25 2022-07-26 广州汽车集团股份有限公司 Method and device for sending distress signal in vehicle
CN116193018A (en) * 2022-12-08 2023-05-30 中国联合网络通信集团有限公司 Method, device, equipment and storage medium for executing security policy

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242609A (en) * 2008-02-15 2008-08-13 深圳华为通信技术有限公司 Communication device and method for transmitting emergent information
CN102073052A (en) * 2010-12-21 2011-05-25 东莞市泰斗微电子科技有限公司 Message sending method for personal positioning device
KR20150136678A (en) * 2014-05-27 2015-12-08 주식회사 엠앤엘솔루션 Apparatus and method for informing emergency of electronic device
CN106331357A (en) * 2016-08-29 2017-01-11 珠海格力电器股份有限公司 Emergency alarm method, device and terminal
CN106780240A (en) * 2016-11-22 2017-05-31 北京奇虎科技有限公司 Monitor the method and device of trip
US20170188197A1 (en) * 2015-12-28 2017-06-29 Dr. Keir Finlow-Bates Peer-to-peer geolocation system
CN107707725A (en) * 2016-08-08 2018-02-16 北京嘀嘀无限科技发展有限公司 Cried for help in stroke method and apparatus, communication processing method and the device of communication
CN109147238A (en) * 2018-09-06 2019-01-04 天津利信科技有限公司 alarm method, device, terminal and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242609A (en) * 2008-02-15 2008-08-13 深圳华为通信技术有限公司 Communication device and method for transmitting emergent information
CN102073052A (en) * 2010-12-21 2011-05-25 东莞市泰斗微电子科技有限公司 Message sending method for personal positioning device
KR20150136678A (en) * 2014-05-27 2015-12-08 주식회사 엠앤엘솔루션 Apparatus and method for informing emergency of electronic device
US20170188197A1 (en) * 2015-12-28 2017-06-29 Dr. Keir Finlow-Bates Peer-to-peer geolocation system
CN107707725A (en) * 2016-08-08 2018-02-16 北京嘀嘀无限科技发展有限公司 Cried for help in stroke method and apparatus, communication processing method and the device of communication
CN106331357A (en) * 2016-08-29 2017-01-11 珠海格力电器股份有限公司 Emergency alarm method, device and terminal
CN106780240A (en) * 2016-11-22 2017-05-31 北京奇虎科技有限公司 Monitor the method and device of trip
CN109147238A (en) * 2018-09-06 2019-01-04 天津利信科技有限公司 alarm method, device, terminal and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114792461A (en) * 2021-01-25 2022-07-26 广州汽车集团股份有限公司 Method and device for sending distress signal in vehicle
CN114792461B (en) * 2021-01-25 2024-01-16 广州汽车集团股份有限公司 Method and device for sending distress signal in vehicle
CN116193018A (en) * 2022-12-08 2023-05-30 中国联合网络通信集团有限公司 Method, device, equipment and storage medium for executing security policy

Similar Documents

Publication Publication Date Title
US9860844B2 (en) Method and apparatus of temperature control
US10123196B2 (en) Method and device for alarm triggering
US10610152B2 (en) Sleep state detection method, apparatus and system
US10218846B2 (en) Call processing method and device
CN105224349B (en) Application program deletion prompting method and device
CN110400405B (en) Method, device and medium for controlling access control
CN103871208A (en) Gas warning method and device
CN106843706B (en) Shutdown control method and device and terminal equipment
US20170034336A1 (en) Event prompting method and device
CN108121631B (en) Screen abnormal state reminding method and device
CN105708609A (en) User snore reminding method, device and system
CN105720644A (en) Charging control method and device and terminal device
CN106021077B (en) The alarming method for power and device of terminal
CN107491681B (en) Fingerprint information processing method and device
CN106412227A (en) Anti-lost alarm method and device and device for anti-lost alarm
CN107450950B (en) Method and device for processing starting instruction
CN104360875B (en) Privacy mode starts method and apparatus
CN110618783A (en) Text broadcasting method, device and medium
CN107197107B (en) Method and device for processing starting instruction
CN111953842A (en) Electronic equipment, safety protection method and device
CN105430639B (en) Information processing method and device
CN105630141A (en) Information browsing reminding method and device
CN106570381B (en) Fingerprint unlocking method and device
CN106550012B (en) Monitoring method of intelligent equipment and intelligent equipment
CN106877451B (en) Charging port short-circuit protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117