This application claims priority to Chinese Patent Application No. 201510244708.6 filed on May 14, 2015, the contents of which are incorporated by reference herein.
The subject matter herein generally relates to controls for electronic devices, and particularly to controlling an electronic device with a camera.
Electronic devices are being configured to have smaller sizes. Additionally, electronic devices can be equipped with a camera. Some devices allow accessing a camera without inputting a password.
Implementations of the present technology will now be described, by way of example only, with reference to the attached figures.
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures, and components have not been described in detail so as not to obscure the related relevant feature being described. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features. The description is not to be considered as limiting the scope of the embodiments described herein.
Several definitions that apply throughout this disclosure will now be presented.
The term “module” refers to logic embodied in computing or firmware, or to a collection of software instructions, written in a programming language, such as, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as in an erasable programmable read only memory (EPROM). The modules described herein may be implemented as either software and/or computing modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable media include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives. The term “comprising” means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in a so-described combination, group, series and the like.
The camera 21 can be a front-facing or rear-facing camera of the electronic device 100. The camera 21 can capture images on at least one side of the electronic device 100. The display unit 22 can be a liquid crystal display (LCD), an organic light-emitting diode (OLED) display, or the like. The display unit 22 can display pictures or information. The wireless communication unit 23 can be a WI-FI module, a BLUETOOTH module, and the like. The wireless communication unit 23 can establish a wireless communication connection between the electronic device 100 and other devices.
The storage unit 24 can include various types of non-transitory computer-readable storage media. For example, the storage unit 24 can be an internal storage system, such as a flash memory, a random access memory (RAM) for temporary storage of information, and/or a read-only memory (ROM) for permanent storage of information. The storage unit 24 can also be an external storage system, such as a hard disk, a storage card, or a data storage medium. In the embodiment, the storage unit 24 can store an identification code of the electronic device 100. The identification code can be the product serial number of the electronic device 100, the hardware identification number of the electronic device 100, or the like.
The at least one control device 25 can be a central processing unit (CPU), a microcontroller, or a digital signal processor. The at least one control device 25 can execute computerized codes of the monitoring system 10 and other applications installed in the electronic device 100 to realize the functions of the electronic device 100.
The monitoring system 10 can include a plurality of function modules. The function modules can include, but are not limited to, a setting module 11, a connecting module 12, a display module 13, an obtaining module 14, a transmitting module 15, a detecting module 16, and a monitoring module 17. In the embodiment, the function modules 11-17 can include computerized codes in the form of one or more programs, which are stored in the storage unit 24 and executed by the at least one control device 25. Functions of each of the modules 11-17 are described as follows.
The setting module 11 sets a work mode of the electronic device 100 when a predetermined operation is performed. The predetermined operation can be a click operation performed on a physical button or a virtual button of the electronic device 100.
In at least one embodiment, the electronic device 100 is in a normal mode as the default mode. In the normal mode, the electronic device 100 can be freely used. The electronic device 100 also can be set as other work modes, for example, the electronic device 100 can be set as a monitoring mode when the predetermined operation is performed. In the monitoring mode, the wireless communication unit 23 of the electronic device 100 can be started, and one or more operations can be preset as illegal operations. The preset illegal operations can include, but are not limited to, an activation of the camera 21, an operation to shut down the wireless communication unit 23, an operation to close the monitoring system 10, and the like. An example of the activation of the camera 21 can be a click operation performed on an application icon of a camera application.
The connecting module 12 connects the electronic device 100 to a monitoring server 400 (see in
In at least one embodiment, as shown in
In one example, the monitoring area 600 can be, but is not limited to, a production workshop of a company, a research center of the company, or the like. The electronic device 100 can be a smart phone of a research worker of the company. When entering into the research center or the production workshop of the company, the research worker can be prevented by a guard set in the front of the research center or the production workshop, unless the research worker first sets the work mode of the smart phone as the monitoring mode. In the monitoring mode, a camera of the smart phone cannot be activated, the research worker cannot steal any confidential information that may be in the research center or the production workshop by taking photos.
When the electronic device 100 is connected to the monitoring server 400 and in the monitoring mode, the display module 13 displays an information input interface on the display unit 22 for a user of the electronic device 100 to input user identity information. In at least one embodiment, the user identity information can include, but is not limited to, the identity card number of the user, biometric data (e.g., facial features or fingerprints) of the user, a job number of the user, a phone number of the user, or the like.
The obtaining module 14 receives the user identity information input by the user and obtains an identification code of the electronic device 100 from the storage unit 24. In at least one embodiment, the identification code of the electronic device 100 can be the product serial number of the electronic device 100, the hardware identification number of the electronic device 100, or the like.
The transmitting module 15 transmits the received user identity information and the obtained identification code to the monitoring server 400 through a wireless communication connection between the electronic device 100 and the monitoring server 400. In at least one embodiment, the received user identity information and the obtained identification code can be bound together and be stored in the monitoring server 400.
The detecting module 16 detects whether a preset illegal operation is performed. In at least one embodiment, the preset illegal operation can be an operation activating the camera 21, an operation to shut down the wireless communication unit 23, an operation to close the monitoring system 10, or the like. As the example shown in the foregoing paragraphs, when the smart phone of the research worker is in the monitoring mode, the activation of the camera of the smart phone is forbidden (as the preset illegal operation). The detecting module 16 monitors the camera of the smart phone to determine whether the research worker wants to activate the camera to take photos when the research worker enters is in the research center or the production workshop.
When the preset illegal operation is detected, the monitoring module 17 displays a warning of illegal operation on the display unit 22, generates an interrupt signal to prevent the electronic device 100 from responding to the illegal operation, generates and transmits an alarm to the monitoring server 400 by the wireless communication unit 23. In at least one embodiment, the alarm is transmitted to the monitoring server 400 together with the identification code of the electronic device 100, so that the monitoring server 400 can determine the identity of the user of the electronic device 100 according to the user identity information bound together with the transmitted identification code. As the example shown in the foregoing paragraphs, if the research worker wants to activate the camera of the smart phone (e.g., clicks a camera application icon displayed) to take photos when the research worker is in the research center or the production workshop, the monitoring module 17 displays a warning “you cannot do it!” on a touch screen of the smart phone, and transmits the alarm to the monitoring server 400 to prompt security personnel in charge of the monitoring server 400 that someone wants to take photos in the research center or the production workshop.
At block 201, on a predetermined operation being performed, a setting module sets a work mode of an electronic device as a monitoring mode when the electronic device is in a normal mode. In at least one embodiment, the predetermined operation can be a click operation performed on a physical button or a virtual button of the electronic device. When the electronic device is in the monitoring mode, a wireless communication unit of the electronic device is automatically started.
At block 202, a detecting module detects whether the wireless communication unit receives a wireless signal transmitted by a monitoring server. If the wireless communication unit receives the wireless signal, block 203 is implemented. If the wireless communication unit does not receive the wireless signal, block 202 is repeated.
In at least one embodiment, as shown in
At block 203, a connecting module connects the electronic device to the monitoring server through the wireless communication unit.
At block 204, when the electronic device is connected to the monitoring server, a display module displays an information input interface on a display unit of the electronic device, whereby a user of the electronic device can input user identity information. An obtaining module obtains the user identity information input by the user and transmits the user identity information to the monitoring server. If the user identity information input by the user is validated by the monitoring server, block 205 is implemented. If the user identity information is not validated by the monitoring server, block 202 is implemented.
In at least one embodiment, the monitoring server prestores the user identity information, and the user identity information can be the identity card number of the user, biometric data of the user, a job number of the user, a phone number of the user, or the like. When the user identity information input by the user is the same as the user identity information prestored in the monitoring server, the user identity information input by the user is validated. When the user identity information input by the user is not the same as the user identity information prestored in the monitoring server, the user identity information input by the user is not validated.
At block 205, a transmitting module transmits an identification code of the electronic device to the monitoring server by the wireless communication unit. In at least one embodiment, the identification code can be the product serial number of the electronic device, the hardware identification number of the electronic device, or the like. When receiving the identification code, the monitoring server stores the identification code together with the user identity information input by the user.
At block 206, the detecting module detects whether a preset illegal operation is performed on the electronic device. If the preset illegal operation is detected, block 207 is implemented. If the preset illegal operation is not detected, block 209 is implemented. In at least one embodiment, the preset illegal operation can be the operation activating a camera of the electronic device, the operation to shut down the wireless communication unit, the operation to close a monitoring system, or the like.
At block 207, a monitoring module displays a warning of illegal operation on the display unit, and generates an interrupt signal to prevent the electronic device from responding to the illegal operation.
At block 208, the monitoring module generates an alarm and transmits the alarm to the monitoring server. In at least one embodiment, the alarm is transmitted to the monitoring server together with the identification code of the electronic device, so that the monitoring server can determine the identity of the user of the electronic device according to the user identity information stored in the monitoring server together with the transmitted identification code when the illegal operation is performed by the user.
At block 209, the detecting module detects whether the predetermined operation is performed. If the predetermined operation is detected, block 210 is implemented. If the predetermined operation is not detected, block 206 is implemented.
At block 210, the transmitting module transmits an offline request to the monitoring server. In at least one embodiment, when the electronic device leaves the monitoring area, the electronic device can be permitted to change the work mode of the electronic device from the monitoring mode. The offline request is transmitted to the monitoring server together with the identification code of the electronic device.
At block 211, when receiving the offline request transmitted by the electronic device, the monitoring server prompts security personnel in charge of the monitoring server to determine whether the electronic device is leaving or has left the monitoring area. When the electronic device leaves the monitoring area, block 212 is implemented. When the electronic device does not leave the monitoring area, block 206 is implemented.
At block 212, the setting module changes the work mode of the electronic device from the monitoring mode to another mode, and returns to implement block 201.
The embodiments shown and described above are only examples. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, including in particular the matters of shape, size and arrangement of parts within the principles of the present disclosure, up to and including the full extent established by the broad general meaning of the terms used in the claims.
Number | Date | Country | Kind |
---|---|---|---|
201510244708.6 | May 2015 | CN | national |