Terminal device, security guarantee method and storage medium

文档序号:7152 发布日期:2021-09-17 浏览:33次 中文

1. A terminal device, comprising: a display, a microphone, a communication component, and a processor;

the display is configured to display an interface of the terminal device during operation;

the microphone is configured to collect audio data in an environment where the terminal device is located;

the communication component is configured to connect with a server and transmit data;

the processor is configured to receive a distress mode starting instruction input by a user, start a microphone to collect audio data, and upload the audio data to a server through the communication assembly; acquiring the current position of the terminal equipment, and uploading the current position to a server through the communication assembly; performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding a data mobile network with the highest transmission rate exceeding a set rate to be connected through the communication assembly, and forbidding an operating system of the terminal equipment to send out a system prompt tone; receiving a distress mode exit instruction input by a user, and displaying a verification password interface through the display; and if the password received through the verification password interface is consistent with the set password, exiting the help seeking mode.

2. The terminal device of claim 1, wherein the terminal device further comprises a speaker; the processor is further configured to:

after a distress mode starting instruction input by a user is received, reducing the screen brightness of a display, and displaying a distress interface comprising an alarm key and a sounding alarm key through the display;

if receiving the triggering operation aiming at the alarm key, dialing an alarm telephone;

if the triggering operation aiming at the sounding alarm key is received, controlling the loudspeaker to play an alarm sound according to the set volume; and if the triggering operation aiming at the sounding alarm key is received again, controlling the loudspeaker to stop playing the alarm sound.

3. The terminal device of claim 2, wherein the processor is configured to:

when the SOS mode exits, restoring the background running of each application program according to the recorded running state of each application program;

restarting an account synchronization function, recovering a data mobile network with the highest transmission rate exceeding a set rate and connected through the communication assembly, and removing the prohibition of sending a system prompt tone aiming at an operating system;

the screen brightness of the display is increased.

4. The terminal device of claim 2, wherein the processor is further configured to:

before exiting the help-seeking mode, displaying the help-seeking interface through a display each time the operation of lightening the screen is received;

and if a call request of the incoming call number is received, the incoming call of the incoming call number is connected.

5. The terminal device of claim 1, wherein the processor is further configured to:

before exiting the SOS mode, keeping the positioning function in an open state and keeping connection with a data mobile network of which the highest transmission rate does not exceed a set rate;

if receiving a closing operation aiming at the positioning function or the data mobile network, ignoring the closing operation;

and if the power-off operation triggered by the power key is received, ignoring the power-off operation.

6. The terminal device of claim 1, wherein the processor is further configured to:

after receiving a distress mode starting instruction input by a user, sending a distress request to the server so that the server sends user information associated with the terminal equipment to a corresponding guard number and dials a call to the guard number.

7. The terminal device of any of claims 1-6, wherein the processor is further configured to:

before a distress mode starting instruction input by a user is received, if a safety mode starting instruction input by the user is received, the trip information of the user related to the terminal equipment is uploaded to a server through the communication assembly, so that the server sends the trip information of the user to a corresponding guard number;

and monitoring the current position of the terminal equipment, and if the current position of the terminal equipment deviates from the planned route corresponding to the travel information, displaying route deviation prompt information through the display.

8. The terminal device of claim 7, wherein the processor is further configured to:

after the trip information of the user associated with the terminal equipment is uploaded to a server, if a triggering operation aiming at a safety mode identifier displayed in a current display interface is received, a help-seeking mode starting key is displayed, and if the triggering operation aiming at the help-seeking mode starting key is received, a help-seeking mode starting instruction input by the user is determined; alternatively, the first and second electrodes may be,

if the situation that the pressing operation of the power key reaches the set times within the set duration is monitored, determining that a user inputs a distress mode starting instruction; alternatively, the first and second electrodes may be,

and if the audio data contains the set keyword for starting the distress mode, determining that the user inputs a distress mode starting instruction.

9. A security assurance method, comprising:

responding to a distress mode starting instruction input by a user, starting a microphone to collect audio data, and uploading the audio data to a server;

acquiring the current position of the terminal equipment, and uploading the current position to a server;

performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding to connect a data mobile network with the highest transmission rate exceeding a set rate, and forbidding an operating system to send out a system prompt tone;

responding to a distress mode exit instruction input by a user, and displaying a verification password interface;

and if the password received through the verification password interface is consistent with the set password, exiting the help seeking mode.

10. A computer-readable storage medium having a computer program stored therein, the computer program characterized by: which when executed by a processor implements the method of claim 9.

Background

With the development of urban traffic, people can take operating vehicles to bring great convenience to life of people when going out, and the number of passengers who take a car to go out is increasing day by day. However, in recent years, an accident that passengers get their cars alone and get an infringement occurs, and therefore, there are cases where a person in the white collar gets off too late to work in the evening, or a child gets off alone or an old person who is old is not safe.

By using the existing terminal function, the user cannot implement effective help seeking measures when a case occurs, so that the safety of the user in trip is difficult to ensure.

Disclosure of Invention

In order to solve the problems in the prior art, embodiments of the present application provide a terminal device, a security guarantee method, and a storage medium, which can improve the protection of personal safety of a user when the user goes out.

In a first aspect, an embodiment of the present application provides a terminal device, including: a display, a microphone, a communication component, and a processor;

the display is configured to display an interface of the terminal device during operation;

the microphone is configured to collect audio data in an environment where the terminal device is located;

the communication component is configured to connect with a server and transmit data;

the processor is configured to receive a distress mode starting instruction input by a user, start a microphone to collect audio data, and upload the audio data to a server through the communication assembly; acquiring the current position of the terminal equipment, and uploading the current position to a server through the communication assembly; performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding a data mobile network with the highest transmission rate exceeding a set rate to be connected through the communication assembly, and forbidding an operating system of the terminal equipment to send out a system prompt tone; receiving a distress mode exit instruction input by a user, and displaying a verification password interface through the display; and if the password received through the verification password interface is consistent with the set password, exiting the help seeking mode.

The terminal device provided by the embodiment of the application uploads the audio data and the current position around the microphone to the server after the help-seeking mode is started, so that the server can send the current position and the field condition of a user to a guardian or alarm in time, the user can be rescued more timely, and the personal safety of the user is guaranteed. Meanwhile, the power saving mode is started, each application program running in the background is closed, the account synchronization function is closed, and the like, so that the situation that the electric quantity of the terminal equipment is insufficient at the key moment can be reduced, and the help seeking information of the user can be continuously sent in real time.

In one possible implementation, the terminal device further includes a speaker; the processor is further configured to:

after a distress mode starting instruction input by a user is received, reducing the screen brightness of a display, and displaying a distress interface comprising an alarm key and a sounding alarm key through the display;

if receiving the triggering operation aiming at the alarm key, dialing an alarm telephone;

if the triggering operation aiming at the sounding alarm key is received, controlling the loudspeaker to play an alarm sound according to the set volume; and if the triggering operation aiming at the sounding alarm key is received again, controlling the loudspeaker to stop playing the alarm sound.

The terminal equipment provided by the embodiment of the application displays the help-seeking interface after the help-seeking mode is started, and in the help-seeking interface, the alarm telephone can be dialed through by one key, so that the alarm operation of a user is simplified, and the user can conveniently give an alarm. And a warning alarm key is also arranged in the distress interface, a user can give a warning by clicking the key, and the terminal equipment plays a warning sound with the maximum volume so as to scare gangsters and help the user.

In one possible implementation, the processor is configured to:

when the SOS mode exits, restoring the background running of each application program according to the recorded running state of each application program;

restarting an account synchronization function, recovering a data mobile network with the highest transmission rate exceeding a set rate and connected through the communication assembly, and removing the prohibition of sending a system prompt tone aiming at an operating system;

the screen brightness of the display is increased.

In one possible implementation, the processor is further configured to:

before exiting the help-seeking mode, displaying the help-seeking interface through a display each time the operation of lightening the screen is received;

and if a call request of the incoming call number is received, the incoming call of the incoming call number is connected.

The terminal equipment provided by the embodiment of the application lights the screen every time before exiting the help-seeking mode, all displays the help-seeking interface, and brings convenience to a user to carry out help-seeking operations such as one-key alarm. Before exiting the SOS mode, the incoming call is received and can be automatically connected without manual connection of a user.

In one possible implementation, the processor is further configured to:

before exiting the SOS mode, keeping the positioning function in an open state and keeping connection with a data mobile network of which the highest transmission rate does not exceed a set rate;

if receiving a closing operation aiming at the positioning function or the data mobile network, ignoring the closing operation;

and if the power-off operation triggered by the power key is received, ignoring the power-off operation.

The terminal equipment of the embodiment of the application keeps the positioning function in the starting state before exiting the help-seeking mode, keeps the network connection, and prohibits manual shutdown so as to ensure that help-seeking information of a user can be continuously sent in real time.

In one possible implementation, the processor is further configured to:

after a help-seeking mode starting instruction input by a user is received, a help-seeking request is sent to the server, so that the server sends the user information associated with the terminal equipment to a corresponding guard number.

In one possible implementation, the processor is further configured to: the processor is further configured to:

before a distress mode starting instruction input by a user is received, if a safety mode starting instruction input by the user is received, the trip information of the user related to the terminal equipment is uploaded to a server through the communication assembly, so that the server sends the trip information of the user to a corresponding guard number;

and monitoring the current position of the terminal equipment, and if the current position of the terminal equipment deviates from the planned route corresponding to the travel information, displaying route deviation prompt information through the display.

The terminal equipment provided by the embodiment of the application is provided with the safety mode, and the safety mode can be started when a user goes out at every time. In the security mode, the terminal device may transmit the travel information of the user to the server, so that the server transmits the travel information of the user to the guardian. The terminal equipment can also monitor the current position in real time, and send out route deviation reminding to prompt a user to pay attention to safety.

In one possible implementation, the processor is further configured to:

after the trip information of the user associated with the terminal equipment is uploaded to a server, if a triggering operation aiming at a safety mode identifier displayed in a current display interface is received, a help-seeking mode starting key is displayed, and if the triggering operation aiming at the help-seeking mode starting key is received, a help-seeking mode starting instruction input by the user is determined; alternatively, the first and second electrodes may be,

if the situation that the pressing operation of the power key reaches the set times within the set duration is monitored, determining that a user inputs a distress mode starting instruction; alternatively, the first and second electrodes may be,

and if the audio data contains the set keyword for starting the distress mode, determining that the user inputs a distress mode starting instruction.

The terminal equipment of this application embodiment, under the safe mode, set up the mode of multiple SOS mode of opening to make the user when meetting danger, can open SOS mode fast and ask for help.

In one possible implementation, the processor is further configured to:

and if the audio data contains the set keyword for starting the help-seeking mode, dialing the alarm telephone.

According to the terminal equipment, when the user uses the preset keywords to start the help-seeking mode, the situation is critical, the user may not be in contact with the terminal equipment, and at the moment, the terminal equipment automatically dials the alarm telephone to give an alarm, so that the user can be helped to get a help more quickly.

In a second aspect, an embodiment of the present application provides a travel safety guarantee method, including:

responding to a distress mode starting instruction input by a user, starting a microphone to collect audio data, and uploading the audio data to a server;

acquiring the current position of the terminal equipment, and uploading the current position to a server;

performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding to connect a data mobile network with the highest transmission rate exceeding a set rate, and forbidding an operating system to send out a system prompt tone;

responding to a distress mode exit instruction input by a user, and displaying a verification password interface;

and if the password received through the verification password interface is consistent with the set password, exiting the help seeking mode.

In one possible implementation, before or after the microphone is started to collect audio data, the method further includes:

the screen brightness of the display is reduced, and a help-seeking interface comprising an alarm key and a sounding alarm key is displayed;

responding to the triggering operation aiming at the alarm key, and dialing an alarm telephone;

responding to the triggering operation aiming at the sounding alarm key, and playing an alarm sound according to set volume;

and if the triggering operation aiming at the sounding alarm key is received again, stopping playing the alarm sound.

In one possible implementation, the exiting the distress mode includes:

according to the recorded running state of each application program, restoring the background running of each application program;

restarting an account synchronization function, recovering and connecting a data mobile network with the highest transmission rate exceeding a set rate, and removing the prohibition of sending a system prompt tone aiming at an operating system;

the screen brightness of the display is increased.

In one possible implementation, before exiting the distress mode, the method further includes:

displaying the help-seeking interface every time the operation of lightening the screen is received;

and if a call request of the incoming call number is received, the incoming call of the incoming call number is connected.

In one possible implementation, before exiting the distress mode, the method further includes:

keeping the positioning function in an open state and keeping the data mobile network in a connection state;

if receiving a closing operation aiming at the positioning function or the data mobile network, ignoring the closing operation;

and if the power-off operation triggered by the power key is received, ignoring the power-off operation.

In one possible implementation, before the microphone is started to collect audio data, the method further includes:

and sending a distress request to the server so that the server sends the user information associated with the terminal equipment to the corresponding guarding number.

In one possible implementation manner, before the microphone is started to collect audio data in response to a distress mode starting instruction input by a user, the method further includes:

responding to a security mode starting instruction input by a user, uploading the travel information of the user associated with the terminal equipment to a server, so that the server sends the travel information of the user to a corresponding guarding number;

and monitoring the current position of the terminal equipment, and if the current position of the terminal equipment deviates from the planned route corresponding to the travel information, displaying route deviation prompt information.

In a possible implementation manner, after the uploading, in response to a security mode starting instruction input by a user, trip information of the user associated with the terminal device to a server, the method further includes:

responding to a triggering operation aiming at a safety mode identifier displayed in a current display interface, displaying a key for starting a distress mode, and if the triggering operation aiming at the key for starting the distress mode is received, determining that a user inputs a distress mode starting instruction; alternatively, the first and second electrodes may be,

if the situation that the pressing operation of the power key reaches the set times within the set duration is monitored, determining that a user inputs a distress mode starting instruction; alternatively, the first and second electrodes may be,

and if the audio data contains the set keyword for starting the distress mode, determining that the user inputs a distress mode starting instruction.

In one possible implementation, the method further includes:

if the monitored audio data contains the set keyword for starting the help-seeking mode, the alarm telephone is dialed before or after the microphone is started to collect the audio data.

In a third aspect, an embodiment of the present application provides a security device, including:

the starting unit is used for responding to a distress mode starting instruction input by a user, starting a microphone to collect audio data and uploading the audio data to the server; acquiring the current position of the terminal equipment, and uploading the current position to a server;

an execution unit for performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding to connect a data mobile network with the highest transmission rate exceeding a set rate, and forbidding an operating system to send out a system prompt tone;

the exit unit is used for responding to a help-seeking mode exit instruction input by a user and displaying a verification password interface; and if the password received through the verification password interface is consistent with the set password, exiting the help seeking mode.

In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the steps of any one of the security assurance methods in the second aspect are implemented.

For technical effects brought by any one implementation manner in the second aspect to the fourth aspect, reference may be made to technical effects brought by a corresponding implementation manner in the first aspect, and details are not described here.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.

Fig. 1 is a schematic structural diagram of a terminal device according to an embodiment of the present application;

fig. 2 is a block diagram of a software structure of a terminal device according to an embodiment of the present disclosure;

fig. 3 is a schematic diagram of a personal information setting interface according to an embodiment of the present application;

fig. 4 is a schematic diagram of a password setting interface according to an embodiment of the present disclosure;

FIG. 5 is a schematic diagram of an application host interface according to an embodiment of the present disclosure;

FIG. 6 is a schematic diagram of another application host interface provided in an embodiment of the present application;

fig. 7 is a schematic diagram of a password verification interface according to an embodiment of the present disclosure;

fig. 8 is a schematic diagram of a travel daemon interface according to an embodiment of the present application;

fig. 9 is a schematic diagram of a safety mode operation interface provided in an embodiment of the present application;

fig. 10 is a schematic view of a distress mode operation interface provided in an embodiment of the present application;

FIG. 11 is a schematic diagram of a security setup interface provided in an embodiment of the present application;

fig. 12 is a schematic diagram of a daemon information setting interface provided in an embodiment of the present application;

fig. 13 is a schematic view of a setting interface for starting a distress mode according to an embodiment of the present application;

fig. 14 is a schematic view of a safe trip recording interface according to an embodiment of the present application;

fig. 15 is a flowchart of a security assurance method according to an embodiment of the present application;

FIG. 16 is a flow chart of another security and safety method provided by the embodiments of the present application;

fig. 17 is a block diagram of a safety device according to an embodiment of the present application.

Detailed Description

In order to make the objects, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

It should be noted that the following application scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions in the embodiments of the present application, and do not constitute limitations on the technical solutions provided in the embodiments of the present application, and it is obvious to a person skilled in the art that the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems with the occurrence of new application scenarios.

In order to guarantee the travel safety of a terminal user, the embodiment of the application provides a terminal device and an XX method. The terminal device in the embodiment of the application can be a mobile phone, a wearable device, a tablet computer and other portable devices. The following specifically describes embodiments of the present application with a mobile phone as an example.

Fig. 1 is a block diagram illustrating a hardware configuration of a terminal device. It should be understood that the terminal device 100 shown in fig. 1 is only an example, and the terminal device 100 may have more or less components than those shown in fig. 1, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.

As shown in fig. 1, the terminal device 100 includes: communication component 110, processor 120, memory 130, display 140, input component 150, audio circuitry 160, SIM card interface 170, and sensor 180.

The communication component 110 is configured to receive or send a call request, receive and send a signal during a call, connect to a server, and upload or download data. The communication component 110 may include an RF (radio frequency) circuit 110, a Wi-Fi (Wireless Fidelity) module 112.

The RF circuit 111 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink data of a base station and then send the downlink data to the processor 220 for processing; the uplink data may be transmitted to the base station. In general, RF circuit 111 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. The RF circuit 111 may receive electromagnetic waves from an antenna, filter, amplify, etc. the received electromagnetic waves, and transmit the electromagnetic waves to a modem processor for demodulation. The RF circuit 111 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves via the antenna for radiation. In some embodiments, at least some of the functional blocks of the RF circuitry 111 may be disposed in the processor 120. In some embodiments, at least some of the functional blocks of the RF circuitry 111 may be provided in the same device as at least some of the blocks of the processor 120. The RF circuitry 111 and antenna of the terminal device 100 are coupled so that the terminal device 100 can communicate with networks and other devices through wireless communication techniques.

Wi-Fi belongs to short-distance wireless transmission technology, and the terminal device 100 can help a user send and receive e-mails, browse webpages, access streaming media and the like through the Wi-Fi module 112, and provides wireless broadband Internet access for the user. The Wi-Fi module 112 may be connected to a router through which an external network is connected. The Wi-Fi module 112 may also connect to a server to upload or download data.

The memory 130 may be used for storing data or program codes used when the terminal device is running. The processor 120 performs various functions of the terminal device 100 and data processing by executing data or program codes stored in the memory 130. The memory 130 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. The memory 130 stores an operating system that enables the terminal device 100 to operate. The memory 130 may store an operating system and various application programs, and may also store codes for executing the method according to the embodiment of the present application, and trip information and historical trip records of the user.

The display 140 is used for displaying information input by or provided to the user and a Graphical User Interface (GUI) of various menus of the terminal apparatus 100. Specifically, the display 140 may include a display disposed on a front surface of the terminal device 100. The display may be configured in the form of a liquid crystal display, light emitting diodes, or the like. The display 140 may be used to display an interface when the terminal device runs, for example, to display an interface related to the terminal device running the safe trip application in the embodiment of the present application.

The input module 150 may be used to receive numeric or character information input by a user, and various operations input by the user, etc., and generate signal inputs related to user settings and function control of the terminal device 100. In particular, the input component 150 may include keys and a touch screen, which may be disposed on the front side of the terminal device 100 and may collect touch operations by the user on or near the touch screen, such as clicking a button, dragging a scroll box, and the like. For example, the user may input a password and other related information through the touch screen, and the user may also start the security mode or the distress mode through a key or the touch screen.

In some embodiments, the touch screen and the display may be integrated to realize the input and output functions of the terminal device 100, and the integration may be referred to as a touch display for short.

The terminal device 100 may further include a positioning module, such as a satellite positioning module or a mobile communication network positioning module, which may determine the geographic location of the terminal device 100 in real time.

The audio circuitry 160, speaker 161, microphone 162 may provide an audio interface between the user and the terminal device 100. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161. The terminal device 100 may also be provided with a volume button for adjusting the volume of the sound signal. On the other hand, the microphone 162 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 160, and then outputs the audio data to the RF circuit 111 to be transmitted to, for example, another terminal or outputs the audio data to the memory 130 for further processing. In the present application, the microphone 162 may acquire the voice of the user, for example, the user may start the distress mode through the voice.

The SIM card interface 170 is used to connect a SIM card. The SIM card can be brought into and out of contact with the terminal device 100 by being inserted into the SIM card interface 170 or being pulled out of the SIM card interface 170. The terminal device 100 may support 1 or N SIM card interfaces, where N is a positive integer greater than 1. The SIM card interface 170 may support a Nano SIM card, a Micro SIM card, a SIM card, etc. Multiple cards can be inserted into the same SIM card interface at the same time. The types of the plurality of cards may be the same or different. The SIM card interface may also be compatible with different types of SIM cards. The SIM card interface may also be compatible with external memory cards. The terminal device 100 interacts with the network through the SIM card to implement functions such as communication and data communication. In some embodiments, the terminal device 100 employs eSIM, namely: an embedded SIM card. The eSIM card may be embedded in the terminal device 100 and cannot be separated from the terminal device 100. The SIM card is used to identify the mobile phone number of the user.

The terminal device 100 may include a USB (universal serial bus) interface or the like in addition to the SIM card interface 170. The USB interface is used for connecting a charging line or other peripherals. For example, the terminal device 100 may connect a charging line through a USB interface. The respective components or modules in the terminal device 100 are connected by a bus.

The terminal device 100 may further comprise at least one sensor 180, such as an acceleration sensor 181, a distance sensor 182, a fingerprint sensor 183, a temperature sensor 184. The terminal device 100 may also be configured with other sensors such as a gyroscope, barometer, hygrometer, thermometer, infrared sensor, light sensor, motion sensor, and the like. For example, the fingerprint sensor 183 may be used to sense that the user clicks on an icon of the operation interface of the terminal device 100.

The terminal device 100 may further include a camera for capturing still images or video. The number of the cameras can be one or more. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing elements convert the light signals into electrical signals which are then passed to a processor 120 for conversion into digital image signals. In the embodiment of the application, after the help-seeking mode is started, the image of the surrounding environment can be captured through the camera.

The processor 120 is a control center of the terminal device 100, connects various parts of the entire terminal device using various interfaces and lines, and performs various functions of the terminal device 100 and processes data by running or executing software programs stored in the memory 130 and calling data stored in the memory 130. In some embodiments, processor 120 may include one or more processing units. In the present application, the processor 120 may run an operating system, an application program, a user interface display, a touch response, and the XX method described in the embodiments of the present application. The specific process of XX method is performed by processor 120 and will be described in detail below.

Fig. 2 is a block diagram of a software configuration of the terminal device 100 according to the embodiment of the present application.

The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android (Android) system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.

The application layer may include a series of application packages. As shown in fig. 2, the application package may include applications such as camera, gallery, calendar, phone call, map, navigation, clock, bluetooth, music, video, short message, etc. The user can set an alarm clock in the clock application. The application layer may also include third party applications installed on the terminal device.

The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.

As shown in FIG. 2, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.

The window manager is used for managing window programs. The window manager can obtain the size of the display, judge whether a status bar exists, lock the screen, intercept the screen and the like.

The content provider is used to store and retrieve data and make it accessible to applications. The data may include alarm clock data, video, images, audio, calls made and answered, browsing history and bookmarks, phone books, and the like.

The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.

The telephone manager is used for providing a communication function of the terminal equipment. Such as management of call status (including on, off, etc.). The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.

The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, text information is prompted in the status bar, a prompt tone is given, the terminal vibrates, an indicator light flashes, and the like.

The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.

The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.

The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.

The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like. Wherein, the three-dimensional graphic processing library and the 2D graphic engine both belong to a common camera resource.

The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.

The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.

The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.

The 2D graphics engine is a drawing engine for 2D drawing.

The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.

In this embodiment, the application layer may further include an application package of the safe trip application. When the safe trip application is started for the first time, the user is required to perform real-name authentication. The user fills in real-name authentication information, for example, when the safe trip application is started for the first time, the real-name authentication interface shown in fig. 3 is displayed, and the user may fill in real-name authentication information such as names, certificate numbers, contact numbers, address information, and the like in the real-name authentication interface shown in fig. 3. Before the completion of the information filling, the "start to use" control below presents a non-clickable state. After the user completes the filling of the real-name authentication information, the lower "start to use" control will assume a clickable state. The user clicks the "start to use" control, and the safe trip application uploads the information filled by the user and an International Mobile Equipment Identity (IMEI) number of the terminal device to the server, so that the server stores the information of the user, and uses information in which the user Identity can be identified, such as the name and the certificate number of the user or the IMEI number of the terminal device, as the Identity of the user.

The IMEI number is also commonly referred to as a mobile phone serial number and a mobile phone "serial number" and is used for identifying mobile communication devices such as individual mobile phones in a mobile phone network. The first six digits of the MEI number represent the model of the handset. The first six digits of the MEI number are the same as long as the mobile phone is of the same model. The 7 th and 8 th digits of the IMEI number refer to the factory where the mobile phone is finally assembled, and can also be regarded as the code number of the origin of the mobile phone. Each plant has its specific code. The 9 th to 14 th digits of the IMEI number are the factory serial number of the mobile phone. The factory serial number of the mobile phone is the same as that of other products, the mobile phone is used for internal management service of a manufacturer, and each mobile phone has different factory serial numbers. The last digit of the IMEI number is the standby number of the handset, typically zero.

Optionally, the user may also set a security password after clicking the "start use" control. For example, after receiving an operation of clicking the "start using" control by the user, the safe travel application may display a password setting interface shown in fig. 4, and the user may set a numeric password in the interface shown in fig. 4. In other embodiments, the password may be set by using letters or other characters, and may also be set by using a gesture password or a fingerprint password or other manners. This password is used to verify the user identity in the terminal device. After the setting is successful, the user can call the verification password interface when starting the safe trip application, exiting the safe mode and exiting the help seeking mode.

After the user completes authentication and password setting, the safe trip application displays an application main interface to the user. And then, the safe trip application is entered again, real-name authentication and password setting are not needed, and the application main interface can be directly entered. FIG. 5 illustratively provides a schematic diagram of an application home interface in which a real-time map and a current location of a user may be displayed, as shown in FIG. 5. And displaying the position identification and the place name of the user at the current position of the user. The application main interface can also display a viewing record entrance and a setting entrance. The user clicks the checking record entrance, the safe trip recording interface can be entered, and the interface can check the record of the user which starts the safe mode before. The user clicks the setting entrance to enter the setting interface, and the interface can modify the safety password, the user information, the guardian information, the setting safety mode and the help seeking mode.

The application main interface can also display a destination input box, a destination position, a recommended path, a vehicle license plate input box, a photographing key, a remark input box and the like. The user can input the destination to be reached in the destination input box, after the input is completed, the destination position and the destination name are displayed on the map, the recommended path is planned according to the current position and the destination position of the user, and the recommended path from the current position of the user to the destination is displayed in the real-time map, as shown in fig. 6. The user may enter the license plate of the vehicle in the license plate entry box. If the user does not want to input the license plate, the user can start the camera to shoot the license plate of the vehicle to be taken by clicking the shooting key. The safe trip application can automatically recognize the license plate number from the photographed license plate picture and display the license plate number in the vehicle license plate input frame. The user can additionally input information to be recorded in the remark input box, such as the weather of the day, the scheduled arrival time, the characteristics of the driver and the like. A safety mode starting control can be displayed in the application main interface, and a user can start the safety mode after clicking the control.

After a 'safe mode opening' control in the application main interface is clicked, the safe trip application executes the following operations:

(1) and sending a safety mode starting instruction to an operating system of the mobile phone, and sending a voice starting switch state in the setting to the operating system of the mobile phone.

(2) And sending a security mode opening instruction to the server, and uploading the current position of the user, the filled destination, the vehicle license plate or the vehicle license plate photo, the remark, the name of the guardian, the contact way and other information to the server. The server is corresponding to the safe trip application.

(3) And the 'safe mode opening' key in the application main interface is changed into a 'safe mode exiting' key. When the key for exiting the security mode is clicked, a security password verification interface shown in fig. 7 pops up, the user can exit the security mode after verification is successful, and the user recognizes that the protection is finished and generates a protection record, or called a security travel record.

(4) And detecting whether a deviation route reminding switch is turned on or not in the setting. And if the safe trip application is started, the safe trip application starts to record the current position of the user in real time, compares the current position with the recommended path and uploads the detected position to the server. As shown in fig. 8, if the position is found to be offset from the recommended route, a prompt box pops up to remind the user of the offset.

After receiving a safe mode starting instruction sent by a safe trip application, a server executes the following operations:

and editing the user name, the current position, the filled destination, the vehicle license plate and the remark into a short message, and sending the short message to the number of the guardian. Examples of content are roughly as follows:

"XXX (daemon name) is your good, XXX (user name) is currently located at XXXX (current location). A vehicle with a license plate XXXXXX (vehicle license plate) is prepared to travel to the XXXX (destination). You pay attention to the opposite side dynamics. Remarking: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. "

After receiving a safe mode starting instruction sent by a safe trip application, an operating system of the mobile phone starts a microphone, monitors an input sound signal, allows the safe trip application to know the condition that a power key is clicked, and acquires the sound signal collected by the microphone.

After the safe mode is started, the safe trip application can start the help seeking mode in any one of the following three ways:

firstly, displaying a safety mode identifier in a desktop status bar or a status bar of a safety trip application of a mobile phone. As shown in fig. 9, if the user clicks the identifier, the safe trip application pops up a reminder to confirm with the user whether to start the distress mode, and if the user clicks to start the distress mode, the distress mode is started.

And secondly, monitoring whether the power key is clicked, and if the power key is continuously clicked for 5 times within a set time length, for example, 5 times within 5s, starting a distress mode.

And thirdly, if the voice on switch is turned on, monitoring the input sound signal, if the sound signal is detected to contain the set keyword, turning on the help-seeking mode, calling up local dialing and dialing the alarm call.

After the user starts the help seeking mode, the safe trip application executes the following operations:

(1) and sending a distress call mode starting instruction to an operating system of the mobile phone, and sending switch states of 'keeping on-line', 'starting power saving mode', 'starting background recording' and 'automatically answering incoming call' in the setting menu to the operating system of the mobile phone.

(2) And sending a distress mode starting instruction to the safe trip server, and uploading and updating the position of the user in real time.

(3) And if the 'starting background recording' switch is turned on, acquiring the recording content acquired after the mobile phone starts background recording, and uploading the recording content to the server in real time.

In order to better record the help-seeking information of the user, the user or the police can take evidence conveniently. And in the help seeking mode, the identity, the travel, the activity track and the recording file of the user are automatically uploaded to a server.

After receiving a distress mode starting instruction sent by a safe trip application, an operating system of the mobile phone executes the following operations:

(1) if the on-line switch is turned on, the mobile phone turns on the positioning and data network switch and locks the switch state, and the user clicks the positioning and data network shortcut switch to be invalid and cannot turn off the switch. The mobile phone prohibits the operation of triggering shutdown or restart by long-time pressing of a power key.

(2) And if the switch of the 'power saving mode on' is turned on, the mobile phone limits the activity of other application backgrounds installed in the mobile phone, turns off system prompt tones, turns off account synchronization, turns off a 5G network, reduces the brightness of the mobile phone and weakens the visual effect.

(3) And if the switch for automatically answering the incoming call is turned on, the phone accessed by the mobile phone automatically turns on after ringing 1 sound.

In order to prevent the user or the mobile phone of the user from being controlled by a criminal and being incapable of normal conversation. The embodiment of the application designs an automatic incoming call answering function. In the help seeking mode, the incoming call is automatically connected.

(4) The mobile phone locks the screen immediately and displays the help-seeking interface, and only the interface can be displayed by the mobile phone when the screen is lightened each time. As shown in fig. 10, the following information may be displayed in the distress interface: a. basic information: including time, date, amount of power, etc. b. Current position: and displaying the current position of the user and updating in real time. c. And (4) recording prompt: and if background recording is performed, displaying the recording duration and state. d. An immediate alarm key: the alarm telephone can be directly dialed by clicking. e. Sounding an alarm key: clicking directly gives out alarm sound with maximum volume, and clicking again to stop playing the alarm sound. f. Quit the help-seeking key: and popping up an authentication password interface shown in fig. 7 after clicking, and if the user inputs the password correctly, the mobile phone can exit the help-seeking mode through authentication.

In order to ensure that the mobile phone can continuously record the evidence, the embodiment of the application designs the safety password and the online keeping function. The on-line keeping function can be used for forcibly opening the positioning and data network under the help-seeking mode, cannot be closed (the shortcut switch is clicked to be invalid), and cannot be shut down or restarted until the user inputs a safety password to exit the help-seeking mode.

After receiving a distress mode starting instruction sent by the safe trip application, the server executes the following operations:

and editing the user name, the current position, the filled destination, the vehicle license plate and the remark into a short message, and sending the short message to the number of the guardian. Examples of content are roughly as follows:

"XXX (daemon name) is good, XXX (user name) is asking you for help!

XXX is currently located at XXXX (current location).

A vehicle originally planned to be on license plate XXXXXX (vehicle license plate) goes to XXXX (destination). Remarking: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. "

The intelligent call system of the server dials the number of the guardian, and after the call is connected, the call for help voice is played to the guardian: "XXX (daemon name) is good, XXX (user name) is asking you for help! XXX is currently located at XXXX (current location). A vehicle originally planned to be on license plate XXXXXX (vehicle license plate) goes to XXXX (destination). Remarking: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. "

And the user clicks 'quit for help' on the help interface, and the mobile phone quits the help mode through password verification. In the process of exiting the help-seeking mode, the safe trip application executes the following operations:

(1) and the safe trip application confirms that the guard is finished at the place and generates a guard record.

(2) And sending an instruction of exiting the help-seeking mode to the safe travel server.

(3) And ending the background recording and storing the recording file.

(4) And stopping the departure route reminding.

In the process of exiting the help-seeking mode, the mobile phone executes the following operations:

(1) and the mobile phone can normally enter the system after exiting the help-seeking interface.

(2) And exiting the power saving mode.

(3) And stopping the automatic answering of the incoming call.

(4) And recovering the data flow and the positioning switch state.

(5) And the long-time pressing of the power key has normal function.

After receiving a distress mode exit instruction sent by the safe trip application, the server executes the following operations:

(1) and sending the user name and the current position to the number of the guardian. Examples of content are roughly as follows: "XXX (daemon name) is your good, XXX (user name) is out of danger. "

(2) The intelligent call system of the server dials the number of the guardian, and after the call is put through, the call-for-help voice is played to the guardian: "XXX (daemon name) is your good, XXX (user name) is out of danger. "

The user may enter the security setup interface by clicking the setup portal on the application home interface shown in fig. 5. As shown in fig. 11, the security setup interface includes the following:

firstly, setting personal information: clicking can enter a personal information setting interface, and the interface displays the name, the identity card, the telephone and the address information which are set by the user. The user can modify it. And clicking to store after modification, and updating the newly modified data into the server.

Setting a security password: clicking may modify the password that has been set.

Thirdly, guardians: clicking into the daemon setup interface, as shown in fig. 12, this interface can setup or modify the daemon's name, phone. And after clicking and saving, uploading to a server.

Fourthly, a route deviation reminding switch: after the switch is turned on, if the protection mode is turned on, when the vehicle deviates from the suggested route, a notification prompt is sent to the user.

And fifthly, starting a help-seeking mode: clicking the method capable of controlling the opening of the help-seeking mode. For example, clicking may open a distress mode setup interface as shown in fig. 13, where the "status bar on" and "power key on" functions are always active and not controllable. The voice opening function can be opened and closed, and a user needs to set keywords when the voice opening function is opened.

Sixthly, keeping on-line switching: after the switch is turned on, if the SOS mode is turned on, the positioning and data network cannot be closed, and the mobile phone cannot be shut down or restarted. And automatically releasing after exiting the help-seeking mode.

Seventhly, automatically answering the incoming call: after the switch is turned on, if the SOS mode is turned on, the incoming call is automatically connected.

Eighthly, starting a power saving mode: after the switch is turned on, if the help-seeking mode is turned on, the activities of other application backgrounds installed on the mobile phone are limited, system prompt tones are turned off, account synchronization is turned off, the 5G network is turned off, the brightness of the mobile phone is reduced, and the visual effect is weakened.

Ninth, starting background recording: after the switch is turned on, if the help-seeking mode is turned on, the mobile phone starts to carry out background recording, uploads the recording to the server in real time, and is finished after quitting the help-seeking mode.

The user clicks the travel record entry on the application main interface shown in fig. 5, and can enter the safe travel record interface. As shown in fig. 14, this interface displays a record that the user previously turned on the protected mode. Each record display content includes:

firstly, opening time: date the user turned on the secure mode.

II, destination: the travel destination set by the user.

Thirdly, a trip state: if the user does not trigger the help-seeking mode before exiting the safe mode, displaying the safe arrival; if the 'help seeking mode' is started, the 'help sought' is displayed.

Fourthly, path map: and displaying the recommended route for the user and the actual route for the user to travel.

Fifthly, checking a detail button: and entering a detail interface after clicking. The detail interface displays the destination, the number of the license plate, the picture and the remark which are set by the user, if the user asks for help, the recording file is also displayed, and the user can click to play the recording file.

Through the above scheme, the terminal device provided by the embodiment of the application can provide the following functions:

after a user starts a safety mode, the terminal equipment automatically records user position information, starts off route deviation reminding, sends the user travel information to a designated guardian, and provides a method for the user to quickly start for help.

After the user starts the help-seeking mode, the terminal device automatically sends the current position to a guardian, sends the position to the server in real time, keeps the device positioned and the data network started, prohibits the mobile phone from being powered off or restarted, starts the power-saving mode, carries out background recording and uploads the recording to the server in real time, the incoming call is automatically connected, the identity information of the user is uploaded to the server, and an alarm screen locking is started.

And thirdly, in the help-seeking mode, the user can exit the help-seeking mode when inputting the set security password in the equipment.

And fourthly, the user can check the records of the security mode and the distress mode which are started each time in the mobile phone, and can check the current travel, track, recorded license plate and picture of the vehicle, recorded file and other information.

Fifthly, the user can self-define the functions of starting the safe mode and calling for help in the safe trip application.

Fig. 15 is a flowchart illustrating a security assurance method according to an embodiment of the present application, where the method is executed by a terminal device. As shown in fig. 15, the method may include the steps of:

step S1501, in response to a distress mode starting instruction input by a user, starting a microphone to collect audio data, and uploading the audio data to a server.

Step S1502, obtaining a current location of the terminal device, and uploading the current location to the server.

Alternatively, after receiving a distress mode starting instruction input by the user, the terminal device may send a distress request to the server. The server receives the help-seeking request sent by the terminal equipment, sends the user information associated with the terminal equipment to the corresponding daemon number, and dials a call to the daemon number to remind a daemon that the user of the terminal equipment is possibly in danger. The user information comprises trip information set by a user, current position information of the user and audio data collected by the terminal equipment.

Step S1503, performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding to connect a data mobile network with the highest transmission rate exceeding a set rate, and forbidding an operating system to send out a system prompt tone.

The terminal equipment starts a power saving mode, records the running state of each application program running in the background, closes each application program, closes an account synchronization function, and forbids to connect a data mobile network with the highest transmission rate exceeding a set rate, for example, forbids to connect a 5G network and can connect a 3G or 4G network. The operating system is prohibited from issuing a system alert tone.

After receiving a distress mode starting instruction input by a user, the screen brightness of the display can be reduced, and a distress interface comprising an alarm key and a sounding alarm key is displayed through the display. If receiving the triggering operation aiming at the alarm key, dialing an alarm telephone; if the triggering operation aiming at the sounding alarm key is received, controlling the loudspeaker to play an alarm sound according to the set volume; and if the triggering operation aiming at the sounding alarm key is received again, controlling the loudspeaker to stop playing the alarm sound.

Before exiting the SOS mode, each time the operation of lightening the screen is received, the SOS interface is displayed through the display.

And if the call request of the incoming call number is received, the incoming call of the incoming call number is connected.

In order to ensure that the help-seeking information and the field condition of the user can be sent continuously, before exiting the help-seeking mode, the terminal equipment keeps the positioning function in an open state and keeps the connection with the data mobile network of which the highest transmission rate does not exceed the set rate. For example, the connection state of the 2G or 3G network is maintained. If receiving a closing operation aiming at the positioning function or the data mobile network, ignoring the closing operation; and if the power-off operation triggered by the power key is received, ignoring the power-off operation.

Step S1504, responding to a distress mode exit instruction input by a user, and displaying a verification password interface;

in step S1505, if the password received through the verification password interface is consistent with the set password, the distress mode is exited.

When the SOS mode exits, restoring the background running of each application program according to the recorded running state of each application program; restarting an account synchronization function, recovering and connecting a data mobile network with the highest transmission rate exceeding a set rate, and removing the prohibition of sending a system prompt tone aiming at an operating system; the screen brightness of the display is increased.

Fig. 16 is a flowchart illustrating another security and security method provided in the embodiment of the present application, where the method is performed by a terminal device. As shown in fig. 16, the method may include the steps of:

step S1601, responding to a security mode starting instruction input by a user, and uploading trip information of the user associated with the terminal device to a server.

And the server sends the trip information of the user to a mobile phone number of a guardian set by the user.

And the terminal equipment displays the safety mode identification in the current display interface.

Step S1602, monitoring a current location of the terminal device, and displaying a route deviation prompt message through a display if the current location of the terminal device deviates from a planned route corresponding to the trip information.

Step S1603, in response to a distress mode start instruction input by the user, starting a microphone to collect audio data, and uploading the audio data to a server.

If the triggering operation aiming at the safety mode identification displayed in the current display interface is received, displaying a key for starting the distress mode, and if the triggering operation aiming at the key for starting the distress mode is received, determining that a user inputs a distress mode starting instruction; or if the situation that the pressing operation aiming at the power key reaches the set times within the set duration is monitored, determining that the user inputs a distress mode starting instruction; or, if the audio data including the set keyword for starting the distress mode is monitored, determining that the user inputs a distress mode starting instruction.

If the audio data including the set keyword for starting the distress mode is monitored, dialing an alarm telephone; the keyword may be a keyword set by a user.

Specifically, in consideration of different degrees of dangerous situations of users, the embodiment of the application provides three methods for triggering the help-seeking mode for the users:

after entering the protection mode, the status bar can display a 'safe mode' icon, and if a user can normally use the terminal equipment, the distress mode can be opened by clicking the icon.

And (II) if the user is monitored by a criminal and cannot directly use the terminal equipment, the help-seeking mode can be started by pressing the power key 5 times.

And (III) if the user can not contact the terminal equipment, for example, the mobile phone is robbed by a criminal, the distress calling mode can be started by calling the set voice keywords through voice, and the alarm call can be directly dialed.

Step S1604, acquiring the current location of the terminal device, and uploading the current location to the server.

Step S1605, displaying the verification password interface in response to the distress mode exit instruction input by the user.

In step S1606, if the password received through the verification password interface is consistent with the set password, the distress mode is exited.

The security password is set, so that other people except the user, such as gangsters and the like, can be prevented from controlling the terminal equipment to exit the help seeking mode.

And step S1607, responding to the safe mode exit instruction input by the user, exiting the safe mode, and generating a safe travel record.

In some embodiments, if a security mode exit instruction input by a user is received, a verification password interface is also displayed, and if a password received through the verification password interface is consistent with a set password, the security mode is exited, and a security travel record is generated.

Based on the same inventive concept, an embodiment of the present application further provides a security device, as shown in fig. 17, the security device includes:

the starting unit 171 is configured to start a microphone to collect audio data in response to a distress mode starting instruction input by a user, and upload the audio data to a server; acquiring the current position of the terminal equipment, and uploading the current position to a server;

an execution unit 172 for performing at least one of the following operations: recording the running state of each application program running in the background, closing each application program, closing an account synchronization function, forbidding to connect a data mobile network with the highest transmission rate exceeding a set rate, and forbidding an operating system to send out a system prompt tone;

an exit unit 173 for displaying a verification password interface in response to a distress mode exit instruction input by a user; and if the password received through the verification password interface is consistent with the set password, exiting the help seeking mode.

In a possible implementation manner, the opening unit 171 is further configured to:

the screen brightness of the display is reduced, and a help-seeking interface comprising an alarm key and a sounding alarm key is displayed;

responding to the triggering operation aiming at the alarm key, and dialing an alarm telephone;

responding to the triggering operation aiming at the sounding alarm key, and playing an alarm sound according to set volume;

and if the triggering operation aiming at the sounding alarm key is received again, stopping playing the alarm sound.

In a possible implementation manner, the exit unit 173 is further configured to:

according to the recorded running state of each application program, restoring the background running of each application program;

restarting an account synchronization function, recovering and connecting a data mobile network with the highest transmission rate exceeding a set rate, and removing the prohibition of sending a system prompt tone aiming at an operating system;

the screen brightness of the display is increased.

In a possible implementation manner, the execution unit 172 is further configured to:

displaying the help-seeking interface every time the operation of lightening the screen is received;

and if a call request of the incoming call number is received, the incoming call of the incoming call number is connected.

In a possible implementation manner, the execution unit 172 is further configured to:

keeping the positioning function in an open state and keeping the data mobile network in a connection state;

if receiving a closing operation aiming at the positioning function or the data mobile network, ignoring the closing operation;

and if the power-off operation triggered by the power key is received, ignoring the power-off operation.

In a possible implementation manner, the starting unit 171 is further configured to:

and sending a distress request to the server so that the server sends the user information associated with the terminal equipment to the corresponding guarding number.

In a possible implementation manner, the starting unit 171 is further configured to: responding to a security mode starting instruction input by a user, uploading the travel information of the user associated with the terminal equipment to a server, so that the server sends the travel information of the user to a corresponding guarding number;

and monitoring the current position of the terminal equipment, and if the current position of the terminal equipment deviates from the planned route corresponding to the travel information, displaying route deviation prompt information.

In a possible implementation manner, the starting unit 171 is further configured to:

responding to a triggering operation aiming at a safety mode identifier displayed in a current display interface, displaying a key for starting a distress mode, and if the triggering operation aiming at the key for starting the distress mode is received, determining that a user inputs a distress mode starting instruction; alternatively, the first and second electrodes may be,

if the situation that the pressing operation of the power key reaches the set times within the set duration is monitored, determining that a user inputs a distress mode starting instruction; alternatively, the first and second electrodes may be,

and if the audio data contains the set keyword for starting the distress mode, determining that the user inputs a distress mode starting instruction.

In a possible implementation manner, the starting unit 171 is further configured to:

if the monitored audio data contains the set keyword for starting the help-seeking mode, the alarm telephone is dialed before or after the microphone is started to collect the audio data.

An embodiment of the present application further provides a computer-readable non-volatile storage medium, which includes a program code, and when the program code runs on a computing terminal, the program code is configured to enable the computing terminal to execute any one of the steps of the security assurance method.

As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and its equivalent technology, the present application is intended to include such modifications and variations as well.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:采用终端设备控制受控终端的方法及设备

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类