1. Technical Field
Embodiments of the present disclosure relate generally to security of electronic devices, and more particularly, to an electronic device and method for identifying use by unauthorized users.
2. Description of Related Art
Electronic devices, such as, notebooks, smart phones, and feature-rich mobile phones usually are fairly expensive. Most owners will go to great lengths to use software to secure their electronic devices. These precautions, while extremely necessary and effective against data theft, have no affect whatsoever in the case of physical theft or loss. In most electronic devices, there are some basic levels of security available against physical theft or loss, like SIM card locks or device locks. However, these particular obstacles are easily surmountable, and do not offer any help for recovery from theft or loss of the electronic devices.
The disclosure, including the accompanying drawings, is illustrated by way of example and not by way of limitation. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean at least one.
The modules 101-105 may include one or more computerized instructions in the form of one or more programs that are stored in the storage system 12 or a computer-readable medium of the electronic device 1, executed by the processor 11 to perform operations of the electronic device 1. In general, the word “module”, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language, such as, Java, C, or Assembly. One or more software instructions in the modules may be embedded in firmware, such as EPROM. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of computer-readable medium or other storage device.
The storage system 12 stores one or more programs, such as programs of an operating system, and other applications of the electronic device 1. In one embodiment, the storage system 12 may be random access memory (RAM) for temporary storage of information, and/or a read only memory (ROM) for permanent storage of information. In other embodiments, the storage system 12 may also be an external storage device, such as a hard disk, a storage card, or a data storage medium. The processor 11 executes computerized operations of the electronic device 1 and other applications, to provide functions of the electronic device 1.
The image capturing device 10 may be a charge coupled device (CCD), or a digital camera, and is operable to capture digital images of a user when the electronic device 1 is powered on by the user. In one example, as shown in
The capturing module 102 is operable to capture a digital image of the user using the image capturing device 10 when the user powers on the electronic device 1, and determine whether there are predefined images of authorized users of the electronic device 1 stored in the storage system 12.
In one embodiment, the predefined images of the authorized users may be collected by the setting module 101 using the image capturing device 10, and stored in the storage system 12. In the embodiment, the authorized users include an owner of the electronic device, and other people that are allowed by the owner to use the electronic device 1. Each of the predefined images of the authorized users may include a facial image of an authorized user. Furthermore, if no predefined image of the authorized users is stored in the storage system 12, a password may be preset and stored in the storage system 10 by the setting module 101. Thus, the electronic device 1 may not be operated by unauthorized users of the electronic device 1 unless a valid password is input. The password may be, for example, a fingerprint, a vocal print, or a character string set by the owner. Details of the password and the predefined images of the authorized users are provided below.
The determination module 103 is operable to compare the digital image of the user with the predefined images to determine whether the user is an authorized user of the electronic device 1, if there are predefined images stored in the storage system 10. In one embodiment, the determination module 103 may extract facial characteristics, such as nose, eyes and mouth data, from both the digital image and each of the predefined images using a facial recognition algorithm. Then the determination module 103 compares the facial characteristics of the digital image with the facial characteristics of the predefined images. If the facial characteristics of the digital image are the same as or similar to the facial characteristics of any one of the predefined images, the user may be determined as an authorized user, otherwise, the user may be determined as an unauthorized user.
The execution module 104 is operable to send a message to a preset E-mail address or a mobile phone of the owner to notify the owner that an unauthorized user is using the electronic device 1, if the user is an unauthorized user of the electronic device 1. The preset E-mail address and a phone number of the mobile phone may be preset by the owner using the setting module 101. If the user is an authorized user, the electronic device 1 can be operated normally. In one embodiment, the message may include information of the unauthorized user, such as, the digital image of the unauthorized user, time information that the digital image is captured, and an IP address used by the electronic device 1. As thus, the owner of the electronic device 1 may retrieve the electronic device 1 with the help of the information of the unauthorized user, under the condition that the electronic device 1 is stolen or lost. Additionally, when the message is sent, the electronic device 1 may be powered off, restarted, or locked according to requirements of the owner.
The verification module 105 is operable to receive a password input by the user within a predetermined period of time, such as three seconds, or five seconds, if there is no predefined image of the authorized users stored in the storage system 12, and determine whether the input password is valid.
Upon the condition that the input password is invalid, the execution module 104 is further operable to send the message to the preset E-mail address or the mobile phone. When the user inputs a valid password in the predetermined period of time, the electronic device 1 can be operated normally by the user.
In block S1, the capturing module 101 initializes the image capturing device 10 when the electronic device 1 is powered on by a user.
In block S2, the capturing module 102 captures a digital image of the user using the image capturing device 10. In block S3, the capturing module 102 determines whether there are predefined images of authorized users of the electronic device 1 stored in the storage system 12. If there are predefined images of the authorized users stored in the storage system 12, block S31 is implemented. Otherwise, if no predefined image of the authorized users is stored in the storage system 12, block S33 is implemented. The predefined images of the authorized users may be pre-collected and stored in the storage system 12 in advance using the setting module 101 as described above.
In block S31, the determination module 103 compares the digital image with each of the predefined images of the authorized users. In block S32, the determination module 103 determines whether the user is an authorized user of the electronic device 1 according to the comparison. If the user is an authorized user of the electronic device 1, block S35 is implemented. Otherwise, if the user is an unauthorized user of the electronic device 1, block S4 is implemented. Details of the comparison between the digital image and the predefined images are described in the paragraph [0013].
In block S33, the verification module 105 receives a password input by the user within a predetermined period of time, such as three seconds, or five seconds. In block S34, the verification module 105 determines whether the input password is valid. If the input password is valid, block S35 is implemented. Otherwise, if the input password is invalid, block S4 is implemented. The password may be preset by the owner of the electronic device 1 using the setting module 101 as described above. For example, the password may be, a fingerprint, a vocal print, or a character string preset by the owner.
In block S35, the electronic device 1 executes functions according to operations of the user, ends the procedure.
In block S4, the execution module 104 sends a message to a preset E-mail address or a mobile phone of the owner to notify the owner that an unauthorized user is using the electronic device 1. The preset E-mail address and a phone number of the mobile phone may be preset by the owner using the setting module 101. In one embodiment, the message may include information of the unauthorized user, such as, the captured digital image of the unauthorized user, time information that the digital image is captured, and an IP address used by the electronic device 1. As thus, the owner may retrieve the electronic device 1 with the help of the information when the electronic device 1 is stolen or lost.
Although certain embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
99135037 | Oct 2010 | TW | national |