CN100375103C - Monitoring method for devices with electronic tags - Google Patents
Monitoring method for devices with electronic tags Download PDFInfo
- Publication number
- CN100375103C CN100375103C CNB2005100371411A CN200510037141A CN100375103C CN 100375103 C CN100375103 C CN 100375103C CN B2005100371411 A CNB2005100371411 A CN B2005100371411A CN 200510037141 A CN200510037141 A CN 200510037141A CN 100375103 C CN100375103 C CN 100375103C
- Authority
- CN
- China
- Prior art keywords
- electronic tag
- monitor
- monitoring method
- locked
- search signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域 technical field
本发明涉及电子标签的监护方法。The invention relates to a monitoring method for an electronic tag.
背景技术 Background technique
电子标签是带有可读取的身份识别信息的存储器。现有多种电子装置(如电子钱包、电子考勤卡等)带有电子标签,可实现对用户身份识别、帐户管理、遥控等功能,其广泛应用给人们生活带来极大的方便,因而往往成为盗贼觊觎的目标。其一旦被盗,不法之徒便可利用电子标签冒充用户身份盗窃用户的资金和秘密信息,使失主蒙受巨大的损失。An electronic tag is a memory with readable identification information. There are a variety of electronic devices (such as electronic wallets, electronic attendance cards, etc.) with electronic tags, which can realize functions such as user identification, account management, and remote control. Its wide application brings great convenience to people's lives, so often Become a coveted target for thieves. Once it is stolen, criminals can use the electronic tag to pretend to be the user's identity and steal the user's funds and secret information, causing the owner to suffer huge losses.
发明内容 Contents of the invention
本发明的目的是提供一种对带电子标签的装置的监护方法,使装置在丢失后其用户信息不被盗取。The purpose of the present invention is to provide a monitoring method for a device with an electronic label, so that the user information of the device will not be stolen after the device is lost.
本发明的监护方法,所述的带电子标签的装置外设有只可与之在一定距离内进行无线通讯的监护器,执行步骤如下:In the monitoring method of the present invention, the device with the electronic label is provided with a monitor that can only communicate with it wirelessly within a certain distance, and the steps are as follows:
找寻步骤:监护器向带电子标签的装置发出找寻信号;Searching step: the monitor sends a search signal to the device with the electronic label;
检测步骤:带电子标签的装置接收找寻信号,若在设定的时间内接收不到该找寻信号,则锁定电子标签。Detection steps: The device with the electronic tag receives the search signal, if the search signal is not received within the set time, the electronic tag is locked.
由于带电子标签的装置和监护器只能在一定距离内进行无线通讯,相距太远则会失去联系。使用者把带电子标签的装置和监护器放在有效通讯距离内的不同位置,以让电子标签的装置接收监护器发出的找寻信号。一旦带电子标签的装置丢失离开有效通讯范围,便无法收到找寻信号,于是马上锁定电子标签,使电子标签无法使用,保证其中的用户信息不被窃取。Since the device with the electronic tag and the monitor can only communicate wirelessly within a certain distance, if they are too far apart, they will lose contact. The user places the device with the electronic tag and the monitor at different positions within the effective communication distance, so that the device with the electronic tag receives the search signal sent by the monitor. Once the device with the electronic tag is lost and out of the effective communication range, the search signal cannot be received, so the electronic tag is locked immediately to make the electronic tag unusable and to ensure that the user information in it will not be stolen.
附图说明 Description of drawings
图1是实施例一手机的连接结构图;Fig. 1 is the connection structural diagram of embodiment one mobile phone;
图2是实施例一监护器的连接结构图;Fig. 2 is the connection structural diagram of embodiment one monitor;
图3是实施例一的工作流程图;Fig. 3 is the work flowchart of embodiment one;
图4是实施例二手机的连接结构图;Fig. 4 is the connection structural diagram of the second mobile phone of embodiment;
图5是实施例二监护器的连接结构图;Fig. 5 is the connection structural diagram of embodiment two monitor;
图6是实施例二的工作流程图。Fig. 6 is a working flow chart of the second embodiment.
具体实施方式 Detailed ways
实施例一Embodiment one
本实施例中,带电子标签的装置为一移动电话,俗称手机,带电子标签的手机可实现身份认证、遥控、帐号管理等功能,此乃现有技术,不赘述。见图1,手机的处理单元连接接收模块,处理单元通过一锁定电路连接电子标签的锁定引脚,处理单元可通过锁定电路锁定电子标签。In this embodiment, the device with the electronic tag is a mobile phone, commonly known as a mobile phone. The mobile phone with the electronic tag can realize functions such as identity authentication, remote control, and account management. This is the prior art and will not be described in detail. As shown in Figure 1, the processing unit of the mobile phone is connected to the receiving module, and the processing unit is connected to the locking pin of the electronic tag through a locking circuit, and the processing unit can lock the electronic tag through the locking circuit.
图2为监护器的连接结构,处理单元接有发射模块,其与手机的接收模块可在5米范围内进行无线通讯,超出5米范围则无法通讯。Figure 2 shows the connection structure of the monitor. The processing unit is connected to the transmitting module, which can communicate wirelessly with the receiving module of the mobile phone within a range of 5 meters, and cannot communicate beyond the range of 5 meters.
操作方法见图3。使用者把手机和监护器带在身上的不同位置,手机和监护器相隔在5米之内。监护器每隔1秒由发射模块发出一次找寻信号,手机的处理单元每隔5秒通过接收模块接收一次信号,则收到该找寻信号,电子标签正常工作。See Figure 3 for the operation method. The user takes the mobile phone and the monitor at different positions on the body, and the distance between the mobile phone and the monitor is within 5 meters. The monitor sends out a search signal every 1 second by the transmitting module, and the processing unit of the mobile phone receives the signal through the receiving module every 5 seconds, then the search signal is received, and the electronic tag works normally.
手机一旦被盗,手机的处理单元仍每隔5秒通过接收模块接收一次信号,然而其与监护器的距离超过了5米,无法收到找寻信号,这时处理单元立即向锁定电路发送锁定信号,锁定电子标签,则电子标签中的信息无法读出,保证信息不被窃取。Once the mobile phone is stolen, the processing unit of the mobile phone still receives signals through the receiving module every 5 seconds. However, the distance between the mobile phone and the monitor exceeds 5 meters, and the search signal cannot be received. At this time, the processing unit immediately sends a locking signal to the locking circuit , to lock the electronic tag, the information in the electronic tag cannot be read out, ensuring that the information will not be stolen.
如使用者不慎损坏监护器,手机收不到监护器的信号,照样会锁定电子标签。这时使用者可在手机键盘上输入解锁密码,处理单元将此输入与设定的密码值相对照,若密码符合则解锁,且不再锁定电子标签;也可待监护器修好后,使用者将手机和监护器放在5米范围内,手机重新收到找寻信号,处理单元就解锁恢复原操作。If the user accidentally damages the monitor and the mobile phone cannot receive the signal from the monitor, the electronic tag will still be locked. At this time, the user can input the unlock password on the mobile phone keyboard, and the processing unit compares the input with the set password value, and if the password matches, it will be unlocked, and the electronic tag will not be locked again; after the monitor is repaired, the user Put the mobile phone and the monitor within 5 meters, the mobile phone will receive the search signal again, and the processing unit will be unlocked and resume the original operation.
除手机外,所述的带电子标签的装置也可以是银行卡、考勤卡等,其处理单元既可由带电子标签的装置自带,也可另设。监护器的电源可自带。In addition to the mobile phone, the device with the electronic tag can also be a bank card, time card, etc., and its processing unit can be provided by the device with the electronic tag or can be provided separately. The power supply of the monitor can be self-contained.
实施例二Embodiment two
本实施例中,带电子标签的装置仍为一手机。见图4,手机的处理单元接有发射模块和接收模块,电子标签通过一锁定电路连接处理单元,处理单元可通过锁定电路锁定电子标签。In this embodiment, the device with the electronic tag is still a mobile phone. As shown in Figure 4, the processing unit of the mobile phone is connected with a transmitting module and a receiving module, and the electronic tag is connected to the processing unit through a locking circuit, and the processing unit can lock the electronic tag through the locking circuit.
图5为监护器的连接结构,处理单元接有发射模块和接收模块,其与手机的接收模块和发射模块可在5米范围内进行无线通讯,超出5米范围则无法通讯。处理单元还接有一蜂鸣器作为报警装置。Figure 5 shows the connection structure of the monitor. The processing unit is connected with a transmitting module and a receiving module, which can communicate wirelessly with the receiving module and transmitting module of the mobile phone within a range of 5 meters, and cannot communicate beyond the range of 5 meters. The processing unit is also connected with a buzzer as an alarm device.
操作方法见图6。使用者把手机和监护器带在身上的不同位置,手机和监护器相隔在5米之内。手机的处理单元随机产生一可变码,由发射模块发送,监护器的处理单元每隔1秒通过接收模块接收可变码。手机的处理单元对可变码进行事先设定的运算,监护器的处理单元也对可变码进行相同或相应的设定运算,监护器的发射模块发送运算结果作为找寻信号。发送可变码后,手机的处理单元每隔5秒通过接收模块接收一次信号,则收到该找寻信号,处理单元将其与本机的运算结果对照,发现两者相符,则正常工作。The operation method is shown in Figure 6. The user takes the mobile phone and the monitor at different positions on the body, and the distance between the mobile phone and the monitor is within 5 meters. The processing unit of the mobile phone randomly generates a variable code, which is sent by the transmitting module, and the processing unit of the monitor receives the variable code through the receiving module every second. The processing unit of the mobile phone performs preset calculations on the variable codes, and the processing unit of the monitor also performs the same or corresponding setting calculations on the variable codes, and the transmitting module of the monitor sends the calculation results as a search signal. After sending the variable code, the processing unit of the mobile phone receives a signal through the receiving module every 5 seconds, and when it receives the search signal, the processing unit compares it with the calculation result of the machine, and if the two match, it will work normally.
手机一旦被盗,监护器的处理单元仍每隔1秒通过接收模块接收一次信号,然而其与监护器的距离超过了5米,无法收到可变码,则立即由蜂鸣器报警。同样地,手机的处理单元仍每隔5秒通过接收模块接收一次信号,然而其与监护器的距离超过了5米,无法收到找寻信号,这时处理单元立即向锁定电路发送锁定信号,锁定电子标签,则电子标签中的信息无法读出,保证信息不被窃取。处理单元也可一并锁定手机键盘、屏幕、SIM卡等其它部件,其锁定方法乃现有技术。处理单元还可同时让手机发出警报声。Once the mobile phone is stolen, the processing unit of the monitor still receives a signal through the receiving module every 1 second, but the distance between it and the monitor exceeds 5 meters, and the variable code cannot be received, and the buzzer will immediately alarm. Similarly, the processing unit of the mobile phone still receives a signal through the receiving module every 5 seconds, but the distance between it and the monitor exceeds 5 meters and cannot receive the search signal. At this time, the processing unit immediately sends a locking signal to the locking circuit to lock Electronic tags, the information in the electronic tags cannot be read out, ensuring that the information will not be stolen. The processing unit can also lock other components such as the mobile phone keyboard, screen, SIM card, etc., and its locking method is a prior art. The processing unit can also make the mobile phone sound an alarm at the same time.
即使窃贼使用另一监护器试图产生运算结果,由于其无法得知原监护器的运算方法,故无法与手机的运算结果相对应,手机即使收到另一监护器产生的运算结果,发现与本机的运算结果不符,则照样锁定电子标签,盗贼仍无法窃取电子标签中的信息。物归原主后,将手机和监护器放在5米范围内,手机重新收到相符的运算结果,处理单元就解锁恢复原操作。Even if the thief uses another monitor to try to generate the calculation result, because he cannot know the calculation method of the original monitor, it cannot correspond to the calculation result of the mobile phone. If the calculation results of the computer do not match, the electronic tag will still be locked, and thieves still cannot steal the information in the electronic tag. After the property is returned to the original owner, put the mobile phone and monitor within 5 meters, the mobile phone will receive the matching calculation result again, and the processing unit will be unlocked and resume the original operation.
其余与实施例一同。The rest are the same as the examples.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100371411A CN100375103C (en) | 2005-09-12 | 2005-09-12 | Monitoring method for devices with electronic tags |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005100371411A CN100375103C (en) | 2005-09-12 | 2005-09-12 | Monitoring method for devices with electronic tags |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1752772A CN1752772A (en) | 2006-03-29 |
CN100375103C true CN100375103C (en) | 2008-03-12 |
Family
ID=36679711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005100371411A Expired - Fee Related CN100375103C (en) | 2005-09-12 | 2005-09-12 | Monitoring method for devices with electronic tags |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100375103C (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105597630A (en) * | 2012-02-14 | 2016-05-25 | 雪佛龙美国公司 | Apparatus for preparing an ionic liquid catalyst for disposal |
TWI727522B (en) * | 2019-11-28 | 2021-05-11 | 英業達股份有限公司 | Electronic device and locking method thereof |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101099712B (en) * | 2006-07-07 | 2012-05-09 | 中兴通讯股份有限公司 | Blood packaging device and system for realizing data interaction based on radio frequency identification |
CN104573765B (en) * | 2014-12-23 | 2018-03-16 | 北京智付融汇科技有限公司 | Smart card information processing method and processing device |
CN104537326A (en) * | 2014-12-26 | 2015-04-22 | 贵阳美安心科技有限公司 | Positioning system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5478994A (en) * | 1994-07-13 | 1995-12-26 | Rahman; Sam | Secure credit card which prevents unauthorized transactions |
CN2658846Y (en) * | 2003-08-21 | 2004-11-24 | 泉茂科技股份有限公司 | Wireless identification lock |
-
2005
- 2005-09-12 CN CNB2005100371411A patent/CN100375103C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5478994A (en) * | 1994-07-13 | 1995-12-26 | Rahman; Sam | Secure credit card which prevents unauthorized transactions |
CN2658846Y (en) * | 2003-08-21 | 2004-11-24 | 泉茂科技股份有限公司 | Wireless identification lock |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105597630A (en) * | 2012-02-14 | 2016-05-25 | 雪佛龙美国公司 | Apparatus for preparing an ionic liquid catalyst for disposal |
TWI727522B (en) * | 2019-11-28 | 2021-05-11 | 英業達股份有限公司 | Electronic device and locking method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN1752772A (en) | 2006-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9800570B1 (en) | Method of persistent authentication with disablement upon removal of a wearable device | |
EP1488653B1 (en) | Apparatus, method and system for authentication | |
KR101202580B1 (en) | A system for identifying an individual in an electronic transaction | |
US8152057B2 (en) | Method of authorising a transaction between a computer and a remote server and communications system, with improved security | |
US20150006378A1 (en) | User devices, systems and methods for use in transactions | |
US20130057392A1 (en) | Method and System for Disabling an Electronic Device | |
JP2016503523A (en) | Mobile retail peripheral platform for portable devices | |
US20090251318A1 (en) | Anti-theft system of mobile device | |
KR101021250B1 (en) | User Authentication Method of Car Sharing System | |
WO2004086294A1 (en) | Authentication card and wireless authentication system for mutual authentication using the authentication card | |
KR20120074569A (en) | The door lock system of both access management and security system and the door lock operation system using thereof | |
CN106447838A (en) | Password modification method and system and lock pairing method and system | |
Govindraj et al. | Smart door using biometric NFC band and OTP based methods | |
CN101222558B (en) | Mobile phone with secret protection function and its method | |
CN105262885A (en) | Mobile terminal with card-locking anti-theft function and card-locking anti-theft method thereof | |
CN100375103C (en) | Monitoring method for devices with electronic tags | |
Jadhav et al. | Smart bank locker security system using biometric fingerprint and GSM technology | |
US20170236110A1 (en) | Methods and apparatus for non-contact radio frequency detection and automatic establishment of corresponding communication channel | |
CN105930696A (en) | Intelligent burglarproof device for notebook computer | |
CN100375114C (en) | Device with electronic label and monitoring method thereof | |
Pooja et al. | Finger print based bank locker security system | |
WO2017123098A1 (en) | A method for verifying the identity of a person | |
CN105844754A (en) | A quick response code access control system based on computer control | |
US11768298B1 (en) | Keyless GPS tracking handcuffs | |
RU2704729C2 (en) | Alarm system and method of triggering alarm signal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080312 Termination date: 20100912 |