1. Technical Field
Embodiments of the present disclosure relate to the technique of surreptitious photograph in personal privacy domain, and more particularly to a mobile phone and method for preventing a hidden device from secretly taking a photograph or video.
2. Description of Related Art
Cameras and video camera devices are positioned in various places and may be used to capture an image or video of someone. Sometimes, these devices are positioned in hidden places and may invade a person's privacy.
Electronic devices that detect privacy invasion have been developed, but are often bulky and very expensive.
Accordingly, what is needed is a system and method for amending the above-mentioned deficiencies.
All of the processes described below may be embodied in, and fully automated via, functional code modules executed by one or more general purpose computers or processors. The code modules may be stored in any type of computer-readable medium or other computer storage system device. Some or all of the methods may alternatively be embodied in specialized computer hardware.
The alarm activating system 11 is operable to control the signal detecting unit 12 to detect the sensing signal through the processor 10. As used herein, the term “sensing signal” is defined to be a danger signal indicating that the user is in danger (“the danger state”) of the hidden device 3 taking a secret photograph or video of the user. In one embodiment, the hidden device 3 can be selected from the group of cameras, and camcorders, for example.
The alarm activating system 11 is further operable to control the alarm unit 13, to output an alarm to alert that the user of the mobile phone 1 is in a danger state of being taken a photograph or video by the hidden device 3, when the sensing signal is detected. In one embodiment, the alarm unit 13 can be a sound alarm unit to output an audible alarm, a light alarm unit to output lights, or any other suitable attention grabbing alarm unit. The sound alarm unit may be a speaker, a vibrator, or a display of the mobile phone 1.
The parameter setting module 110 is operable to set security parameters for the mobile phone 1. In one embodiment, the security parameters include a hot key of the mobile phone 1 for enabling/disabling the alarm activating system 11, frequencies of a plurality of sensing signals, and an allowable range of an alarm factor. The hot key of the mobile phone 1 may include, for example, the “*” key or any combination of keys on the mobile phone 1.
As used herein, the term “alarm factor” is defined as a criteria for determining the criticality of an alarm event. In one embodiment, the term “alarm event” refers to the danger state of being taken a photograph or video by the hidden device 3, and the term “alarm factor” refers to the duration of a sensing signal, and the set allowable range of the alarm factor is 0˜15 seconds.
In one embodiment, the set frequencies of the sensing signals include 1.1 GHz, 1.2 GHz, 1.3 GHz, 2.4 GHz, and 100-800 MHz That is, a signal detected by the signal detecting unit 12 is a sensing signal, when the frequency of the signal is one of the set frequencies.
The signal detecting module 111 is operable to control the signal detecting unit 12 to detect a sensing signal from the hidden device 3 according to the set frequencies, determine whether the sensing signal is detected, and record the alarm factor of detected sensing signal. In one embodiment, the duration of the detected sensing signal is the alarm factor recorded by the signal detecting module 111.
The data analyzing module 112 is operable to analyze whether the recorded alarm factor is beyond the set allowable range of the alarm factor. In one embodiment, the recorded alarm factor is beyond the set allowable range of the alarm factor when the recorded alarm factor is longer than 15 seconds.
The alarm sending module 113 is operable to control the alarm unit 13 to output an alarm to alert that the user of the mobile phone 1 is in a danger state of being taken a photograph or video by the hidden device 3, when the recorded alarm factor is beyond the set allowable range of the alarm factor.
In block S10, security parameters are manually or automatically configured with the mobile phone 1 via the parameter setting module 110. In one embodiment, the security parameters include a hot key of the mobile phone 1 for enabling/disabling the alarm activating system 11, frequencies of a plurality of sensing signals, and an allowable range of an alarm factor. Further details of the sensing signal and the alarm factor have been explained above.
In block S11, the signal detecting module 111 controls the signal detecting unit 12 to detect a sensing signal from the hidden device 3 according to the set hidden frequencies. In block S12, the signal detecting module 111 determines whether the sensing signal is detected.
If the sensing signal is detected, in block S13, the signal detecting module 111 records the alarm factor of the sensing signal. Otherwise, if the sensing signal is not detected, the procedure returns to block S11 described above. In one embodiment, the duration of the sensing signal is the alarm factor recorded by the signal detecting module 111.
In block S15, the data analyzing module 112 analyzes whether the recorded alarm factor is beyond the set allowable range of the alarm factor. In one embodiment, the recorded alarm factor is beyond the set allowable range of the alarm factor when the recorded alarm factor is longer than 15 seconds.
If the recorded alarm factor is beyond the set allowable range of the alarm factor, the procedure goes directly to block S16 described below. Otherwise, if the recorded alarm factor is in the set allowable range of the alarm factor, then the procedure ends.
In block S16, the alarm sending module 113 controls the alarm unit 13 to output an alarm to alert that the user of the mobile phone 1 is in a danger state of being taken a photograph or video by the hidden device 3.
Although certain inventive embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
200810304218.0 | Aug 2008 | CN | national |