CN103533537B - Wireless connection security monitoring device for mobile communication terminal - Google Patents
Wireless connection security monitoring device for mobile communication terminal Download PDFInfo
- Publication number
- CN103533537B CN103533537B CN201310480993.2A CN201310480993A CN103533537B CN 103533537 B CN103533537 B CN 103533537B CN 201310480993 A CN201310480993 A CN 201310480993A CN 103533537 B CN103533537 B CN 103533537B
- Authority
- CN
- China
- Prior art keywords
- distance
- wireless connection
- mobile communication
- communication terminal
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本发明涉及移动通信终端无线连接安全监控方法,该方法通过建立功能模块构架,由计算机程序指令控制计算机系统来完成,这些计算机程序指令存储在计算机可读存储介质中。The invention relates to a safety monitoring method for wireless connection of a mobile communication terminal. The method is completed by establishing a functional module framework and controlling a computer system by computer program instructions, and these computer program instructions are stored in a computer-readable storage medium.
背景技术Background technique
现有两台移动通信终端通过无线连接互相绑定,监控相互安全的技术,其一般采用短距离无线连接,例如蓝牙连接。两机靠近是为安全状态,当两机相互远离至检测到蓝牙连接失效时,意味着两机相互远离,进入不安全状态,两机就各自在本机上报警提示,但此时通过本机并不能得知邻机的状态(例如所处地理位置),也不能对邻机进行控制。在人们结伴出游的场合,如果有人失散,就期望得知失散者的地理位置;在其中一台机被盗的情况下,机主会期望通过另一台机来控制被盗机,让盗贼不能自由使用被盗机。在上述结伴出游的场合和被盗的情况下,采用上述监控相互安全的技术显然无法满足用户的期望。Currently, two mobile communication terminals are bound to each other through a wireless connection to monitor mutual security technology, which generally adopts a short-distance wireless connection, such as a Bluetooth connection. It is a safe state for two machines to be close to each other. When the two machines are far away from each other until the Bluetooth connection failure is detected, it means that the two machines are far away from each other and enter an unsafe state. The state of the neighboring machine (such as the geographic location) cannot be known, and the neighboring machine cannot be controlled. On occasions where people travel together, if someone is separated, it is expected to know the geographic location of the lost person; in the case of one of the computers being stolen, the owner expects to control the stolen computer through the other computer, so that the thief cannot Freedom to use the stolen machine. In the above-mentioned occasion of going out together and under the stolen situation, adopting the technology of monitoring mutual security mentioned above obviously cannot satisfy user's expectation.
为了在两机远离,即开始进入不安全状态时,两机之间仍保持连接,需要采用长距离无线连接,而长距离无线连接资源消耗比较大。因为安全状态是常态,不安全状态只会偶然出现,所以采用长距离无线连接在安全状态下会造成不必要的资源浪费,但若采用短距离连接,则当两机远离,即处于不安全状态时就无法保持连接,只能各自在本机上报警提示。In order to maintain the connection between the two machines when they are far away from each other, that is, when they start to enter an unsafe state, a long-distance wireless connection needs to be used, and the resource consumption of the long-distance wireless connection is relatively large. Because the safe state is normal, the unsafe state will only appear occasionally, so the use of long-distance wireless connection will cause unnecessary waste of resources in the safe state, but if the short-distance connection is used, when the two machines are far away, they will be in an unsafe state When the connection cannot be maintained, they can only alarm and prompt on their own machines.
发明内容Contents of the invention
本发明希望以较少的资源消耗让两台移动通信终端通过无线连接监控相互安全。The present invention hopes to allow two mobile communication terminals to monitor mutual security through wireless connection with less resource consumption.
于是,本发明给出移动通信终端无线连接安全监控方法1,与作为邻机的另一台移动通信终端建立无线连接,然后如果检测到邻机远离至达到预设距离,就触发安全操作,其特征是,与邻机建立无线连接具体地,先建立短距离无线连接,如果检测到邻机远离至达到该短距离无线连接的极限距离,就自动与邻机建立长距离无线连接。Therefore, the present invention provides a mobile communication terminal wireless connection security monitoring method 1, establish a wireless connection with another mobile communication terminal as a neighbor, and then if it is detected that the neighbor is far away to reach a preset distance, a security operation is triggered. The feature is that to establish a wireless connection with a neighboring machine, specifically, a short-distance wireless connection is established first, and if it is detected that the neighboring machine is far away to reach the limit distance of the short-distance wireless connection, a long-distance wireless connection is automatically established with the neighboring machine.
本发明先建立短距离无线连接,在安全状态下资源消耗就比较少,待邻机远离至达到该短距离无线连接的极限距离,即该短距离无线连接即将失效或刚刚失效时,再建立长距离无线连接。因为安全状态是常态,不安全状态只会偶然出现,所以本发明让移动通信终端在平时运行时节约了大量资源。The present invention establishes a short-distance wireless connection first, and the resource consumption is relatively small in a safe state. When the neighboring machines are far away to reach the limit distance of the short-distance wireless connection, that is, when the short-distance wireless connection is about to fail or has just failed, a long-distance wireless connection is established. distance wireless connection. Because the safe state is normal, and the unsafe state will only appear occasionally, so the present invention allows the mobile communication terminal to save a lot of resources during normal operation.
给出移动通信终端无线连接安全监控方法2,在方法1的基础上,取短距离无线连接的极限距离为所述的预设距离。A method 2 of wireless connection security monitoring of mobile communication terminals is given. On the basis of method 1, the limit distance of the short-distance wireless connection is taken as the preset distance.
给出移动通信终端无线连接安全监控方法3,在方法1或2的基础上,所述短距离无线连接是蓝牙连接。A method 3 for monitoring security of a wireless connection of a mobile communication terminal is given. On the basis of method 1 or 2, the short-distance wireless connection is a Bluetooth connection.
给出移动通信终端无线连接安全监控方法4,在方法1的基础上,所述短距离无线连接基于NFC触发建立和/或解除。A method 4 for monitoring security of a wireless connection of a mobile communication terminal is given. On the basis of method 1, the short-distance wireless connection is triggered to be established and/or released based on NFC.
给出移动通信终端无线连接安全监控方法5,在方法2的基础上,所述安全操作通过所述长距离无线连接实现。A method 5 for security monitoring of a wireless connection of a mobile communication terminal is given. On the basis of method 2, the security operation is realized through the long-distance wireless connection.
给出移动通信终端无线连接安全监控方法6,在方法1的基础上,所述长距离无线连接是WIFI连接。A method 6 for monitoring security of a wireless connection of a mobile communication terminal is given. On the basis of method 1, the long-distance wireless connection is a WIFI connection.
具体实施方式detailed description
结合以下实施例对本发明作进一步描述。The present invention is further described in conjunction with the following examples.
甲和乙是朋友,相约一同出游,并各持有一台移动通信终端,分别为甲机和乙机。为免失散,今利用本发明移动通信终端无线连接安全监控方法。A and B are friends, they meet to travel together, and each holds a mobile communication terminal, respectively A and B. In order to avoid being lost, the mobile communication terminal wireless connection safety monitoring method of the present invention is used.
甲机与乙机相互碰触,通过NFC触发建立绑定关系,首先两机相互建立蓝牙连接,两机互以对方为邻机,然后两机持续检测该蓝牙连接的信号。只要甲、乙在一起,两机仍在蓝牙连接的有效距离内,蓝牙连接就不会失效。Machine A and machine B touch each other and establish a binding relationship through NFC triggers. First, the two machines establish a Bluetooth connection with each other. The two machines regard each other as neighbors, and then the two machines continue to detect the signal of the Bluetooth connection. As long as A and B are together and the two machines are still within the effective distance of the Bluetooth connection, the Bluetooth connection will not fail.
假设该蓝牙连接的极限距离是10米,如果甲、乙相互远离达到10米,两机就均会检测到蓝牙连接失效,即知对方已远离至10米,此事件触发一系列安全操作:两机均发出警报以分别提示甲和乙,两机自动相互建立WIFI连接,建立WIFI连接后进行后续安全操作,例如WIFI连接一建立,两机就相互把本机的地理位置信息和本机的其它状态信息发送给对方,并各自在本机上弹出操作界面供用户操作。在该操作界面,用户可以查看邻机的各种状态信息尤其是邻机的地理位置信息,从而得知同伴的位置,也可以向邻机发送控制信息以对邻机进行控制,邻机收到本机传来的控制信息,就根据此控制信息接受本机的控制。控制信息例如是声音报警命令,以便循声寻人/寻机;又例如是锁机命令,在邻机被盗的情况下,可以锁定邻机,令盗贼无法使用。Assuming that the limit distance of the Bluetooth connection is 10 meters, if A and B are 10 meters away from each other, both machines will detect that the Bluetooth connection is invalid, that is, they know that the other party has been far away to 10 meters, and this event triggers a series of security operations: two Both machines send out an alarm to remind A and B respectively, and the two machines automatically establish a WIFI connection with each other, and carry out subsequent security operations after the WIFI connection is established. The status information is sent to the other party, and each pops up an operation interface on the machine for the user to operate. In this operation interface, the user can view various status information of the neighboring machine, especially the geographical location information of the neighboring machine, so as to know the position of the neighboring machine, and can also send control information to the neighboring machine to control the neighboring machine. The control information sent by this machine is just accepted the control of this machine according to this control information. The control information is, for example, a sound alarm command, so as to track people/machines by sound; another example is a lock command, which can lock the neighboring machine if the neighboring machine is stolen, so that the thief cannot use it.
上面提到的状态信息、控制信息等,涉及用户/移动通信终端的安全,属于安全信息。对安全信息的操作属于安全操作,尤其是步骤C.输出从邻机传来的安全信息中的邻机状态信息和步骤D.向邻机发送控制信息,必须是有此权限的用户才能进行这些操作,故限定这些操作需用户被提示(见上段)后输入验证信息(例如输入预设的密码、在触摸屏上进行预设的滑动等操作),验证通过才能触发。由此,如果乙机被盗,用户就可以在甲机上验证通过后查看乙机的位置信息,控制乙机发出声音报警并锁定乙机,而盗贼因为无法通过验证,所以不能在乙机上进行相关操作。The status information, control information, etc. mentioned above relate to the security of the user/mobile communication terminal and belong to security information. The operation of security information is a security operation, especially step C. output the status information of the neighboring machine in the security information transmitted from the neighboring machine and step D. send control information to the neighboring machine. Only users with this authority can perform these operations. Therefore, these operations are limited to the user being prompted (see the previous paragraph) to enter verification information (such as entering a preset password, performing preset sliding operations on the touch screen, etc.), and the verification can only be triggered. Thus, if the machine B is stolen, the user can check the location information of the machine B after the verification on the machine A, control the sound alarm of the machine B and lock the machine B, and the thieves cannot do related work on the machine B because they cannot pass the verification. operate.
在蓝牙连接有效的情况下,甲机与乙机相互碰触,通过NFC触发解除此蓝牙连接,两机从此解除绑定关系。When the Bluetooth connection is valid, machine A and machine B touch each other, and the Bluetooth connection is released through NFC trigger, and the two machines are released from the binding relationship.
因为两机靠近是常态,远离事件只会偶然出现,所以先建立短距离无线连接,待远离时再建立长距离连接,让移动通信终端在平时运行时节约大量资源。本实施例以蓝牙连接作为短距离无线连接,功耗小,资源消耗少。本实施例取蓝牙连接的极限距离为预设距离,如果检测到邻机远离至达到预设距离,蓝牙连接就会失效,便于触发两机之间改用长距离无线连接,使两机之间的无线连接得以保持,并自动触发例如提示等安全操作。本实施例以WIFI连接作为长距离无线连接,具有带宽优势,使安全操作得以快速进行。Because it is normal for two machines to be close to each other, the event of being far away will only happen occasionally, so a short-distance wireless connection is established first, and a long-distance connection is established when they are far away, so that the mobile communication terminal can save a lot of resources during normal operation. In this embodiment, the Bluetooth connection is used as the short-distance wireless connection, which has low power consumption and resource consumption. In this embodiment, the limit distance of the Bluetooth connection is taken as the preset distance. If it is detected that the neighboring machine is far away to reach the preset distance, the Bluetooth connection will become invalid, which is convenient to trigger the use of long-distance wireless connection between the two machines, so that the distance between the two machines The wireless connection is maintained and security actions such as reminders are automatically triggered. In this embodiment, the WIFI connection is used as the long-distance wireless connection, which has an advantage in bandwidth and enables fast security operations.
本文给出的方法,其中的全部或部分步骤可以通过建立功能模块构架,由计算机程序指令控制计算机系统来完成,这些计算机程序指令存储在计算机可读存储介质中。In the method presented herein, all or part of the steps can be completed by establishing a functional module framework and controlling the computer system by computer program instructions, and these computer program instructions are stored in a computer-readable storage medium.
最后应当说明的是,以上实施例仅用以说明本发明的技术方案,而非对本发明保护范围的限制,尽管参照较佳实施例对本发明作了详细地说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或者等同替换,而不脱离本发明技术方案的实质和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention, rather than limiting the protection scope of the present invention, although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand , the technical solution of the present invention may be modified or equivalently replaced without departing from the spirit and scope of the technical solution of the present invention.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310480993.2A CN103533537B (en) | 2013-10-15 | 2013-10-15 | Wireless connection security monitoring device for mobile communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310480993.2A CN103533537B (en) | 2013-10-15 | 2013-10-15 | Wireless connection security monitoring device for mobile communication terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103533537A CN103533537A (en) | 2014-01-22 |
CN103533537B true CN103533537B (en) | 2017-01-25 |
Family
ID=49935130
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310480993.2A Expired - Fee Related CN103533537B (en) | 2013-10-15 | 2013-10-15 | Wireless connection security monitoring device for mobile communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103533537B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101835098A (en) * | 2010-03-26 | 2010-09-15 | 清华大学 | A Wireless Network Reconfiguration Communication Method for Dense User Areas |
CN102842197A (en) * | 2011-06-24 | 2012-12-26 | 深圳中兴力维技术有限公司 | Alarming method, device and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE602004006598T2 (en) * | 2004-02-25 | 2008-01-31 | Sony Deutschland Gmbh | Method for wireless data transmission |
KR101645461B1 (en) * | 2010-01-12 | 2016-08-12 | 삼성전자주식회사 | Apparatus and method for auto conntecting wlan in portable terminal |
-
2013
- 2013-10-15 CN CN201310480993.2A patent/CN103533537B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101835098A (en) * | 2010-03-26 | 2010-09-15 | 清华大学 | A Wireless Network Reconfiguration Communication Method for Dense User Areas |
CN102842197A (en) * | 2011-06-24 | 2012-12-26 | 深圳中兴力维技术有限公司 | Alarming method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN103533537A (en) | 2014-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6338775B2 (en) | Distributing biometric authentication among devices in ad hoc networks | |
US20190340348A1 (en) | Security verification method and device | |
WO2015026775A1 (en) | Accessing a primary device using a wearable device and a wireless link | |
WO2016184195A1 (en) | Door lock control method, apparatus and terminal | |
JP2019012337A (en) | Car sharing system and car sharing program | |
CN104092817A (en) | Method and system for automatic short-distance unlocking of mobile terminal | |
JP2017529470A (en) | Key module | |
CN104320479B (en) | The control method of controlled plant and the control system of controlled plant | |
US20160070287A1 (en) | Intelligent power monitor system and implementing method thereof | |
TW201512029A (en) | Electric vehicles and method for managing electric vehicles | |
JP2017101533A5 (en) | ||
CN103457977B (en) | Information processing method, security of vehicle method, car-mounted terminal, terminal and server | |
CN104091115A (en) | Method and device for monitoring safety of terminals | |
JP6355170B2 (en) | Vehicle control system | |
CN105512524A (en) | Method and device for controlling access right on terminal device | |
US9349271B2 (en) | Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device | |
TW201339892A (en) | Wireless locking and unlocking system and method thereof | |
WO2015139451A1 (en) | Wireless terminal monitoring method, apparatus and system and computer storage medium | |
KR101729692B1 (en) | System and method for computer security and energy saving using mobile device | |
KR101628865B1 (en) | System For Protecting Bluetooth Decive To be Lost And Stolen | |
CN103546863B (en) | Mobile communication terminal wireless connection security monitoring device | |
CN103533537B (en) | Wireless connection security monitoring device for mobile communication terminal | |
KR102087361B1 (en) | Digital door lock and Digital door lock system | |
KR101390704B1 (en) | Usb memory safety management system using smartphones | |
TWI641748B (en) | Electronic lock control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170125 |