1. Technical Field
The present disclosure relates to touch-sensitive devices and, particularly, to a touch-sensitive device with protection function and a method for providing the touch-sensitive device.
2. Description of Related Art
Portable devices, for example, smart phones, are easily suffered from theft. If a portable device having important personal information is lost, a great loss may bring to the owner of the portable device. Therefore, a protection function for a mobile device to safeguard against theft of the device would be desirable.
The components of the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout several views.
Referring to
In this embodiment, the processor 30 includes a protection mode control module 31, a determining module 32, an updating module 33, a comparing module 34, and a protection control module 35.
The protection mode control module 31 switches the device 100 from a normal mode to a protection mode when a preset touch operation is exerted on the screen 10. The preset touch operation may be sliding from a left edge of the screen 10 to a right edge of the screen 10.
The determining module 32 determines whether a touch operation is exerted on the screen 10 after the device 100 enters the protection mode. When a touch operation is exerted on the screen 10, the determining module 32 further determines whether a duration of the device 100 in the protection mode exceeds a preset time interval.
The updating module 33 updates the preset size and the preset region according to a touch size and a touch region of the touch operation when the duration of the device 100 in the protection mode is less than or equal to a preset time interval. For example, the updating module 33 deletes the preset size from the storage unit 20, and regards an average of the preset size and the touch size as a new preset size.
The comparing module 34 compares the touch size and the touch region with the preset size and the preset region when the duration of the device 100 in the protection mode exceeds the preset time interval.
The protection control module 35 generates an alarm signal when the touch size is less than the preset size, or when the touch size is equal to or greater than the preset size, and the touch region is not within the preset region. The alarm signal may be a ringtone, a vibration signal, or a combination of a ringtone and a vibration signal. The protection mode control module 31 further switches the device 100 from the protection mode to the normal mode when the touch size is equal to or greater than the preset size, and the touch region is within the preset region.
When the device 100 is taken out from a pocket of an owner of the device 100 by a thief, the size and region touched on the screen 10 may be very different from the touch size and touch region when the device 100 is taken out by the owner. Thus, with such configuration, the device 100 can automatically determine whether the device 100 is taken by the owner, and generates an alarm signal when the device 100 is not taken by the owner to protect the device 100 from theft.
In step S201, the protection mode control module 31 switches the device 100 from the normal mode to enter the protection mode when the preset touch operation is exerted on the screen 10.
In step S202, the determining module 32 determines whether a touch operation is exerted on the screen 10.
In step S203, the determining module 32 determines whether a duration of the device 100 in the protection mode exceeds the preset time interval. If yes, the procedure goes to step S204, otherwise, the procedure goes to step S208.
In step S204, the comparing module 34 compares the touch size with the preset size. If the touch size is greater than or equal to the preset size, the procedure goes to step S205, otherwise, the procedure goes to step S206.
In step S205, the comparing module 34 compares the touch region with the preset region. If the touch region is not within the preset region, the procedure goes to step S206, otherwise the procedure goes to step S207.
In step S206, the protection control module 35 generates the alarm signal, and the procedure ends.
In step S207, the protection mode control module 31 switches the device 100 from the protection mode to the normal mode, and the procedure ends.
In step S208, the updating module 33 updates the preset size and region according to the touch size and touch region when the duration of the device 100 in the protection mode does not exceed the preset time interval, and the procedure returns to step S202.
Although the present disclosure has been specifically described on the basis of the exemplary embodiment thereof, the disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the embodiment without departing from the scope and spirit of the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
2011 1 0446530 | Dec 2011 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
5844325 | Waugh | Dec 1998 | A |
7231231 | Kokko | Jun 2007 | B2 |
20040027336 | Ishii | Feb 2004 | A1 |
20050052432 | Kraus | Mar 2005 | A1 |
20060199609 | Gay | Sep 2006 | A1 |
20080117171 | Kwak | May 2008 | A1 |
20080167832 | Soss | Jul 2008 | A1 |
20080172633 | Jeon | Jul 2008 | A1 |
20080191861 | Mason | Aug 2008 | A1 |
20080297469 | Drader | Dec 2008 | A1 |
20080316030 | Deng | Dec 2008 | A1 |
20090034804 | Cho | Feb 2009 | A1 |
20090166099 | Chen | Jul 2009 | A1 |
20090227232 | Matas et al. | Sep 2009 | A1 |
20100171607 | Sharma | Jul 2010 | A1 |
20100182283 | Sip | Jul 2010 | A1 |
20100222049 | Kim | Sep 2010 | A1 |
20100225607 | Kim | Sep 2010 | A1 |
20100240415 | Kim | Sep 2010 | A1 |
20100257490 | Lyon | Oct 2010 | A1 |
20100260388 | Garrett | Oct 2010 | A1 |
20100269040 | Lee | Oct 2010 | A1 |
20100289835 | Holub | Nov 2010 | A1 |
20100325721 | Bandyopadhyay | Dec 2010 | A1 |
20110018680 | Lai | Jan 2011 | A1 |
20110041102 | Kim | Feb 2011 | A1 |
20110050602 | Jeong et al. | Mar 2011 | A1 |
20110063192 | Miller | Mar 2011 | A1 |
20110080367 | Marchand | Apr 2011 | A1 |
20110087523 | Earl | Apr 2011 | A1 |
20110095988 | Singhal | Apr 2011 | A1 |
20110130170 | Han | Jun 2011 | A1 |
20110134061 | Lim | Jun 2011 | A1 |
20110148668 | Li | Jun 2011 | A1 |
20110167363 | Kinoshita | Jul 2011 | A1 |
20110239281 | Sovio | Sep 2011 | A1 |
20110241973 | Manning | Oct 2011 | A1 |
20110246951 | Chen | Oct 2011 | A1 |
20110249006 | Wallace | Oct 2011 | A1 |
20110256848 | Bok et al. | Oct 2011 | A1 |
20110260829 | Lee | Oct 2011 | A1 |
20110265045 | Hsieh | Oct 2011 | A1 |
20110279169 | Salaverry | Nov 2011 | A1 |
20110291944 | Simmons | Dec 2011 | A1 |
20110302649 | Foster | Dec 2011 | A1 |
20120033140 | Xu | Feb 2012 | A1 |
20120062488 | Lin | Mar 2012 | A1 |
20120075212 | Park | Mar 2012 | A1 |
20120105358 | Momeyer | May 2012 | A1 |
20120110662 | Brosnan | May 2012 | A1 |
20120127105 | Kim | May 2012 | A1 |
20120154301 | Kang | Jun 2012 | A1 |
20120167202 | Kim | Jun 2012 | A1 |
20120182253 | Brosnan | Jul 2012 | A1 |
20120191993 | Drader et al. | Jul 2012 | A1 |
20120194452 | Cho | Aug 2012 | A1 |
20120200515 | Yamada | Aug 2012 | A1 |
20120223906 | Zhou | Sep 2012 | A1 |
20120225697 | Lee | Sep 2012 | A1 |
20120229406 | Wu | Sep 2012 | A1 |
20120235790 | Zhao | Sep 2012 | A1 |
20120258773 | Alvarez Rivera | Oct 2012 | A1 |
20120280917 | Toksvig | Nov 2012 | A1 |
20120293523 | Miyashita | Nov 2012 | A1 |
20120299856 | Hasui | Nov 2012 | A1 |
20120306927 | Lee | Dec 2012 | A1 |
20130067554 | Alessio | Mar 2013 | A1 |
20130069897 | Liu | Mar 2013 | A1 |
20130278524 | Wang | Oct 2013 | A1 |
20130347099 | Smith | Dec 2013 | A1 |
Number | Date | Country | |
---|---|---|---|
20130169572 A1 | Jul 2013 | US |