WO2015139451A1 - Wireless terminal monitoring method, apparatus and system and computer storage medium - Google Patents

Wireless terminal monitoring method, apparatus and system and computer storage medium Download PDF

Info

Publication number
WO2015139451A1
WO2015139451A1 PCT/CN2014/088644 CN2014088644W WO2015139451A1 WO 2015139451 A1 WO2015139451 A1 WO 2015139451A1 CN 2014088644 W CN2014088644 W CN 2014088644W WO 2015139451 A1 WO2015139451 A1 WO 2015139451A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
monitoring
wireless
information
alarm
Prior art date
Application number
PCT/CN2014/088644
Other languages
French (fr)
Chinese (zh)
Inventor
鲁刚
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015139451A1 publication Critical patent/WO2015139451A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present invention relates to the field of monitoring technologies, and in particular, to a wireless terminal monitoring method, apparatus and system, and computer storage medium.
  • mobile terminals such as mobile phones
  • mobile terminals on the market are constantly upgrading and functioning, bringing more convenience to people's lives.
  • mobile terminals are small in size and light in weight, and high-end and valuable smart mobile terminals are easily lost. It is easy to be stolen. Once lost or stolen, it is difficult to promptly remind users when they are lost or stolen.
  • the existing mobile terminal can only be used as a monitoring terminal, or can only be used as a monitored terminal.
  • the user cannot select between the monitoring terminal and the monitored terminal according to their actual needs, and cannot meet the timely monitoring and avoidance of property. Lost demand.
  • a monitoring technology that does not increase the burden and is simple and easy to implement.
  • embodiments of the present invention are directed to a wireless terminal monitoring method, apparatus, and system, and a computer storage medium, which are capable of monitoring a wireless terminal or being monitored by a wireless terminal, and are lost or stolen in the wireless terminal.
  • a reminder is issued in time.
  • the embodiment of the present invention provides a wireless terminal monitoring method, where the monitoring method includes: the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user; The terminal establishes a wireless connection with the second terminal; the first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
  • the monitoring status includes: an access point (AP) status, a station (STA) status; and correspondingly, the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring status selected by the user, including: When the monitoring state is an AP state, the wireless terminal is initialized to a first terminal; when the monitoring state is an STA state, the wireless terminal is initialized to a second terminal; wherein the first terminal is monitored The terminal is the monitored terminal.
  • AP access point
  • STA station
  • the monitoring method before the first terminal establishes a wireless connection with the second terminal, the monitoring method further includes: generating a configuration file according to the monitoring information set by the user; wherein, when the wireless terminal is initialized to the first
  • the monitoring information includes: an AP name, an AP password, and device information of the wireless terminal that the first terminal can monitor; and when the wireless terminal is initialized to the second terminal, the monitoring information includes: an AP name.
  • the monitoring method further includes: the first terminal synchronizing the configuration file with the second terminal.
  • the alarm condition when the wireless terminal is initialized to the first terminal, the alarm condition includes: the wireless connection is disconnected, or the second alarm information of the second terminal is received;
  • the alarm signal includes: triggering the first alarm information, and driving the alarm signal;
  • the alarm condition when the wireless terminal is initialized to the second terminal, the alarm condition is: the signal value of the wireless connection is lower than a threshold; wherein the threshold
  • determining, by the configuration file of the second terminal, correspondingly, sending the alarm signal includes: triggering and sending the second alarm information, and driving the alarm signal.
  • the embodiment of the present invention further provides a wireless terminal monitoring device, where the monitoring device includes: an initialization module, a connection module, and a monitoring module; wherein the initialization module is configured to be used according to The monitoring state of the user is to initialize the wireless terminal where the monitoring device is located as the first terminal or the second terminal; the connection module is configured to establish a wireless connection between the first terminal and the second terminal; The monitoring module is configured to detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
  • the initializing module initializing the wireless terminal where the monitoring device is located to the first terminal or the second terminal includes: when the monitoring state is an AP state, initializing the wireless terminal to be the first The terminal is initialized to the second terminal when the monitoring state is the STA state; wherein the first terminal is a monitoring terminal, and the second terminal is a monitored terminal.
  • the monitoring apparatus further includes a configuration module configured to generate a configuration file according to the monitoring information set by the user; wherein, when the wireless terminal is initialized to the first terminal, the monitoring information includes: an AP name The AP password, the device information of the wireless terminal that can be monitored by the first terminal; when the wireless terminal is initialized to the second terminal, the monitoring information includes: an AP name, an AP password; and the second terminal itself Information, application scenario information, and security area range; wherein the application scenario includes: an indoor environment, an outdoor environment, or a wild environment.
  • the monitoring device further includes a synchronization module configured to synchronize the configuration file between the first terminal and the second terminal.
  • the monitoring module is configured to: when the wireless terminal is initialized to be the first terminal, when the wireless connection is disconnected, or the second alarm information of the second terminal is received, Triggering the first alarm information, and driving the alarm signal; when the wireless terminal is initialized to the second terminal, if the signal value of the wireless connection is lower than the threshold, the second alarm information is triggered and sent, and the alarm signal is sent.
  • the threshold is determined by a configuration file of the second terminal.
  • An embodiment of the present invention further provides a wireless monitoring system, including at least two of the foregoing solutions.
  • the monitoring device wherein at least one of the wireless terminals in the system is the first terminal, and the remaining wireless terminals in the monitoring device are the second terminal; or at least one of the systems
  • the wireless terminal where the monitoring device is located is the second terminal, and the wireless terminals where the other monitoring device is located are the first terminal.
  • Embodiments of the present invention also provide a computer storage medium having stored therein computer executable instructions for performing the above method.
  • the wireless terminal monitoring method, apparatus, and system, and computer storage medium provided by the embodiment of the present invention
  • the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user; the first terminal and the first terminal
  • the second terminal establishes a wireless connection; the first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met; thus, the same wireless terminal can be used for monitoring
  • the terminal can also be used as a monitored terminal, and at the same time realize the function of monitoring or being monitored. Under the premise of not adding any cost burden, the terminal can promptly remind the user according to the monitoring result when the wireless terminal is lost or stolen, and the user and the team are dispersed.
  • the method of the embodiment of the present invention is simple to implement, low in cost, and easy to promote.
  • FIG. 1 is a schematic flowchart of implementing a wireless terminal monitoring method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for monitoring a wireless terminal by a monitoring terminal according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a method for monitoring a wireless terminal by a monitored terminal according to an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of a wireless terminal monitoring apparatus according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another wireless terminal monitoring apparatus according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a wireless terminal monitoring system according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a network of a wireless terminal monitoring system according to a specific application example of the present invention.
  • the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user; the first terminal establishes a wireless connection with the second terminal; the first terminal and the first terminal The two terminals respectively detect whether the wireless connection of the terminal meets the alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
  • the first terminal is a monitoring terminal
  • the second terminal is a monitored terminal.
  • control state may include an access point (AP, Access Point) state, or a station (STA, Station) state; when the monitoring state is an AP state, the wireless terminal is initialized to a first terminal; When the monitoring state is the STA state, the wireless terminal is initialized to the second terminal.
  • AP access point
  • STA station
  • the method further includes: generating a configuration file according to the monitoring information set by the user;
  • the alarm condition includes: determining that the wireless connection is disconnected, or receiving second alarm information of the second terminal, and if the alarm condition is met, the first terminal The first alarm information is triggered and the alarm signal is sent.
  • the alarm condition includes: the signal value of the wireless connection is lower than a threshold, and if the alarm condition is met, the second terminal triggers and sends the second alarm information, and the driver sends out An alarm signal, where the threshold is determined by a configuration file of the second terminal.
  • FIG. 1 is a schematic flowchart of a method for monitoring a wireless terminal according to an embodiment of the present invention. As shown in FIG. 1 , the monitoring method includes the following steps:
  • Step 101 The wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user.
  • the first terminal is a monitoring terminal
  • the second terminal is a monitored terminal
  • the wireless terminal displays an interface for the user to select the monitoring state to the user, and initializes the wireless terminal according to the identifier corresponding to the monitoring state selected by the user;
  • the monitoring state includes the AP state and the STA state; correspondingly, when the monitoring state selected by the user is the AP state, the wireless terminal is initialized to be the first terminal as the AP terminal; when the monitoring state selected by the user is the STA state, the wireless terminal Initializing the second terminal as the STA terminal; wherein, the AP state and the STA state are respectively represented by corresponding identifiers, and the identifiers may be numerical values or different symbols, as long as different states can be distinguished.
  • Step 102 The first terminal establishes a wireless connection with the second terminal.
  • the first terminal after determining the first terminal and the second terminal, the first terminal establishes a wireless connection with the second terminal by using the wireless connection request sent by the second terminal; where the wireless connection request sent by the second terminal may be a WIFI connection request; Correspondingly, the established wireless connection is a WIFI connection.
  • the first terminal and the second terminal respectively display a monitoring information configuration interface, so that the user sets the monitoring information according to actual needs; correspondingly, the wireless terminal sets according to the user.
  • the monitoring information generates respective configuration files;
  • the monitoring information that needs to be set by the user in the monitoring information configuration interface displayed by the first terminal includes, but is not limited to, an AP name, an AP password, and device information of the wireless terminal that can be monitored by the first terminal; after the user sets the monitoring information.
  • the first terminal generates a corresponding configuration file according to the monitoring and information set by the user; where the AP name and the AP password are the AP name of the first terminal itself and the AP password corresponding to the AP name.
  • the monitoring information that needs to be set by the user includes, but is not limited to, the AP name and the AP password; the device information of the second terminal itself, the application scenario information, and the security area range; here, the AP name and the AP
  • the password is the AP name of the AP terminal that can be accessed by the second terminal, and the AP password corresponding to the AP name; the device information of the second terminal itself can be the identification code of the second terminal, and the identification code is a nickname or a user.
  • Identification card SIM
  • USIM ball user identification card
  • the security area includes but is not limited to: 1 meter, 2 meters, 2.5 meters, 10 meters, and the user can The actual monitoring needs to set the security area; the application scenario information can be selected according to the communication environment, including: indoor environment, outdoor environment, or field environment, to be applicable to wireless terminal monitoring in different communication environments.
  • the generated configuration file may be saved in the memory; when the wireless terminal is initialized to the first terminal, if the configuration file is saved in the first terminal, and the user does not update the monitoring information, when the first terminal is shut down, or ends When the monitoring function is enabled again in the previous monitoring, the saved configuration file can be used again; if the user adds or deletes the monitored terminal in the monitoring information, the configuration file is updated accordingly.
  • the first terminal After the wireless connection is established between the first terminal and the second terminal, the first terminal synchronizes the configuration file with the second terminal to verify whether the first terminal has monitoring rights to the second terminal.
  • the first terminal sends its own configuration file to the second terminal through the established wireless connection, and when the synchronization success response returned by the second terminal is received, the synchronization is completed, if the second time is not received within a certain period of time. If the synchronization success response or the returned message returned by the terminal is a synchronization failure response, it is determined that the first terminal does not have the right to monitor the second terminal;
  • the second terminal After receiving the configuration file sent by the first terminal by using the established wireless connection, the second terminal compares the received configuration file with the local configuration file; specifically, determines the wireless that the first terminal can monitor in the received configuration file.
  • the device information of the terminal includes the device information of the second terminal, and returns a synchronization success response, so that the configuration file synchronization is completed, and the first terminal has the monitoring authority for the second terminal; when the first terminal can monitor the wireless in the received configuration file If the device information of the terminal does not include the device information of the second terminal, the synchronization failure response is returned to indicate that the first terminal does not have the right to monitor the second terminal.
  • the second terminal may be a portable accessory with wireless function, and the monitoring information of the portable accessory cannot be set by the user, but has a configuration file with preset information.
  • Step 103 The first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met;
  • the detection may be real-time detection
  • the first terminal detects whether the wireless connection with the second terminal meets an alarm condition in real time: the wireless connection is disconnected, or the second alarm information of the second terminal is received; If the alarm condition is met, the first alarm information is triggered, and the alarm signal is sent to notify the user that the wireless connection with the second terminal is abnormal, or the second terminal leaves the security area; where the second alarm information is out of the security area.
  • the alarm information sent by the second terminal; the second alarm information carries the device information of the second terminal.
  • the second terminal detects whether the wireless connection with the first terminal meets the alarm condition in real time: the signal value of the wireless connection is lower than the threshold, and when the alarm condition is met, the second alarm information is triggered. And driving the alarm signal to prompt the user to leave the security area, and sending the second alarm information to the first terminal; wherein the second alarm information carries the device information of the second terminal, to inform the first terminal of the current second terminal specific information.
  • the threshold value is determined by the configuration file saved locally by the second terminal, specifically, the signal value determined according to the application scenario information and the security area range in the configuration file saved locally by the second terminal; where the signal value is the received signal strength of the second terminal.
  • the RSSI Receiveived Signal Strength Indication
  • the RSSI value of the second terminal changes correspondingly as the distance between the second terminal and the first terminal changes; when the distance increases, the RSSI value decreases; When reduced, the RSSI value increases.
  • the alert signal alerting the user may be a beep, and/or voice, and/or vibration.
  • step 103 when the AP name and the AP password of the first terminal change, the first terminal sends its own configuration file to the second terminal again, and the second terminal saves the updated AP name and the AP password. And re-establishing a wireless connection with the first terminal. After the wireless connection is established, the first terminal and the second terminal continue to perform step 103.
  • the first terminal and the second terminal simultaneously detect by the monitoring method of step 101 to step 103 a wireless connection between the first terminal and the second terminal; when the first terminal detects that the wireless connection is disconnected, triggering the first alarm information, and driving the first alarm information to send the alarm information; when the second terminal detects the received When the signal value of the wireless connection is lower than the threshold, the second alarm information is triggered, and the second alarm information is sent to the first terminal, and the second alarm information is used to generate the alarm signal. At this time, the first terminal receives the second alarm information. The first alarm information is triggered by the second alarm information, and the alarm signal is driven by the first alarm information. When the second terminal detects that the received wireless connection signal value is lower than the threshold, the first terminal and the second terminal simultaneously Send an alarm signal.
  • the wireless terminal can be a smart phone; it can also be a portable accessory that is easy to carry on the user, but the portable accessory can only be used as a second terminal.
  • the user's selection operation of the monitoring status and the setting of the monitoring information may be set by the user according to the specific security requirements of the user, or may be set by the system itself according to the default selection.
  • the wireless terminal monitoring method provided by the embodiment of the present invention can fully utilize the existing functions of the smart phone and a good system environment, and at the same time save the cost, bring a more familiar, unified and friendly use environment and experience to the user.
  • FIG. 2 is a schematic flowchart of a method for monitoring a wireless terminal by a monitoring terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes the following steps:
  • Step 201 initializing as a monitoring terminal
  • the wireless terminal initializes itself to the first terminal that is the AP terminal according to the AP state selected by the user, and monitors all the monitored terminals covered by the first terminal; where the first terminal is the monitoring terminal.
  • Step 202 Generate a configuration file according to the monitoring information set by the user.
  • the first terminal generates a configuration file of the first terminal according to the monitoring information, such as the AP name, the AP password, and the device information of the wireless terminal that can be monitored by the first terminal, and saves the generated configuration file.
  • the monitoring information such as the AP name, the AP password, and the device information of the wireless terminal that can be monitored by the first terminal.
  • the first terminal when the configuration file needs to be used, if the monitoring information is updated, the first terminal will The configuration file is updated accordingly; if the monitoring information is not updated, the first terminal directly extracts the previously saved configuration file.
  • Step 203 Establish a wireless connection with the monitored terminal.
  • the first terminal when receiving the wireless connection request of the monitored terminal, the first terminal establishes a wireless connection with the monitored terminal; here, the first terminal that is the monitoring terminal can establish a wireless connection with multiple monitored terminals at the same time.
  • Step 204 Synchronize a configuration file.
  • the first terminal sends the local configuration file to the monitored terminal; further, after receiving the synchronization success response returned by the monitored terminal, determining that the synchronization of the configuration file is completed, indicating that the first terminal To monitor the monitored terminal, go to step 205.
  • Step 205 detecting a wireless connection with the monitored terminal in real time, determining to disconnect, or receiving the second alarm information, and sending an alarm signal;
  • the first terminal detects the wireless connection between all monitored terminals and the monitored terminal in real time, and determines that the wireless connection with the monitored terminal is disconnected or the monitored terminal is received.
  • the first alarm information is triggered, and the first alarm information is used to send an alarm signal to remind the user that there is a monitored terminal that disconnects or leaves the security area.
  • FIG. 3 is a schematic flowchart of a method for monitoring a wireless terminal by a monitored terminal according to an embodiment of the present invention; as shown in FIG. 3, the method includes the following steps:
  • Step 301 initializing as a monitored terminal
  • the wireless terminal initializes itself as the second terminal of the STA terminal according to the STA state selected by the user, and is monitored by the monitoring terminal accessed by itself; here, the second terminal is the monitored terminal.
  • Step 302 Generate a configuration file according to the monitoring information set by the user.
  • the second terminal generates a configuration file of the second terminal according to the monitoring information including the AP name, the AP password, the device information of the second terminal itself, the application scenario, and the security zone range.
  • the configuration file is regenerated; when the monitoring information of the second terminal is not updated, the last saved configuration file is directly extracted.
  • Step 303 Establish a wireless connection with the monitoring terminal.
  • the second terminal searches for the currently accessible AP terminal, and when detecting the monitoring terminal according to the AP name in the local configuration file, sends a wireless connection request to the monitoring terminal, and establishes a wireless connection with the monitoring terminal.
  • Step 304 Synchronize a configuration file.
  • the second terminal receives the configuration file sent by the monitoring terminal, searches for the device information of the wireless terminal that can be monitored in the received configuration file, and determines whether the device information of the second terminal is included, if included. Then, it is determined that the monitoring terminal has the monitoring authority for monitoring the second terminal, sends a synchronization success response, and performs step 305; otherwise, sends a synchronization failure response.
  • Step 305 Determine a threshold according to the configuration file, and detect a signal value of the wireless connection between the monitoring terminal and the monitoring terminal in real time, and send an alarm signal when the detected signal value of the wireless connection is lower than the threshold value;
  • the second terminal extracts the saved local configuration file, obtains the application scenario and the security zone range in the local configuration file, and determines the threshold according to the extracted application scenario and the value of the security zone range;
  • the real-time detection and monitoring of the signal value of the wireless connection between the terminal when the signal value of the wireless connection is less than the threshold, triggering the second alarm information, and the second alarm information drives the alarm signal to remind the user to leave the safe area range,
  • the second alarm information is sent to the monitoring terminal.
  • the threshold value is calculated by using different radio wave propagation modes in the prior art in the process of determining the threshold according to the application scenario and the security zone range, and details are not described herein.
  • the embodiment of the present invention further provides a wireless monitoring device.
  • the wireless terminal monitoring device includes: an initialization module 401, a connection module 402, and a monitoring module 403;
  • the initialization module 401 is configured to initialize the wireless terminal where the monitoring device is located as the first terminal or the second terminal according to the monitoring state selected by the user;
  • the first terminal is a monitoring terminal
  • the second terminal is a monitored terminal
  • the wireless terminal displays an interface for the user to select the monitoring state to the user, and the initialization module 401 initializes the wireless terminal where the monitoring device is located according to the identifier corresponding to the monitoring state selected by the user;
  • the monitoring state includes the AP state and the STA state; correspondingly, when the monitoring state is the AP state, the initialization module 401 initializes the wireless terminal where the monitoring device is located to be the first terminal as the AP terminal, and the wireless terminal is the monitoring terminal; When the monitoring state is the STA state, the initialization module 401 initializes the wireless terminal where the monitoring device is located to be the second terminal as the STA terminal, and the wireless terminal is the monitored terminal; meanwhile, the initialization module 401 corresponds to the monitoring state set by the user.
  • the identifier is sent to the connection module 402 and the monitoring module 403.
  • the connection module 402 is configured to establish a wireless connection between the first terminal and the second terminal;
  • the monitoring state received by the connection module 402 is an AP state, and when it is determined that the wireless connection request of the second terminal is received, establishing a wireless connection with the second terminal;
  • the monitoring status received by the connection module 402 is the STA status, and the wireless connection establishment request is sent to the first terminal to establish a wireless connection with the first terminal.
  • the monitoring module 403 is configured to detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met;
  • the wireless terminal when the wireless terminal is initialized to the first terminal, the wireless established by the connection module 402 When the connection is disconnected or the second alarm information of the second terminal is received, the first alarm information is triggered, and the alarm signal is sent; when the wireless terminal is initialized to the second terminal, the signal value of the wireless connection is lower than the threshold. In the case, the second alarm information is triggered and sent, and the driver sends an alarm signal;
  • the threshold value monitoring module 403 determines according to the configuration file of the second terminal.
  • the wireless terminal monitoring apparatus may further include: a configuration module 404, a synchronization module 405;
  • the configuration module 404 and the synchronization module 405 acquire the monitoring status of the monitoring device, so as to know whether the wireless terminal where the monitoring device is located is initialized to the first terminal or the second terminal.
  • the configuration module 404 is configured to generate a configuration file according to the monitoring information set by the user;
  • the monitoring information when the wireless terminal is initialized to the first terminal, includes: an AP name, an AP password, and device information of the wireless terminal that can be monitored by the first terminal; when the wireless terminal is initialized to the second terminal, the monitoring information includes: Name, AP password; device information of the second terminal, application scenario information, and security zone range; here, the application scenario includes: indoor environment, outdoor environment, or field environment.
  • the synchronization module 405 is configured to synchronize the configuration file after the wireless connection is established.
  • the synchronization module 405 sends its own configuration file to the second terminal through the established wireless connection, and determines that when the synchronization success response is received, the synchronization is completed;
  • the synchronization module 405 receives the configuration file sent by the first terminal through the established wireless connection, compares the received configuration file with the locally saved configuration file, and determines the first terminal pair.
  • the second terminal has monitoring authority, it returns a synchronous success response; otherwise, it sends a synchronization failure response.
  • a wireless terminal monitoring network can be formed by a plurality of wireless terminals having the monitoring device provided by the embodiment of the present invention.
  • the embodiment of the present invention further provides a wireless terminal monitoring system.
  • the wireless terminal monitoring system includes at least two terminals: a first terminal 10 and a second terminal 20;
  • the first terminal 10 includes the monitoring device shown in FIG. 5 or FIG. 4, and the monitoring state of the monitoring device is an AP state; the second terminal 20 includes the monitoring device shown in FIG. 5 or FIG. 4, and the monitoring device The monitoring status of the device is the STA status.
  • At least one wireless terminal in the monitoring system is the first terminal 10, and the other wireless terminals are the second terminal 20; or at least one wireless terminal in the monitoring system is the second terminal 20, and the other wireless terminals are the first terminal 10.
  • any wireless terminal can be used as both a monitoring terminal and a monitored terminal; and one monitoring terminal can monitor multiple monitored terminals; conversely, one monitored terminal can also be performed by multiple monitoring terminals.
  • Monitoring wherein the principle of monitoring and being monitored is the same as the implementation principle when the first terminal is used as the monitoring terminal, and the implementation principle when the second terminal is used as the monitored terminal.
  • the monitoring system includes: a smart phone 30, a smart phone 40, a portable accessory 50, and a smart phone 60;
  • the smart phone 30 is specifically the first terminal 10 in FIG. 6; the smart phone 40, the portable accessory 50, and the smart phone 60, specifically the second terminal 20 in FIG.
  • the smart phone 30 establishes a WIFI connection with the smart phone 40, the portable accessory 50, and the smart phone 60 through WIFI, and simultaneously monitors the smart phone 40, the portable accessory 50, and the smart phone 60, wherein the security area monitored by the smart phone 40 is 1m, the safe area for monitoring the portable accessory 50 is 2m, and the safe area for monitoring the smart phone 60 is 5m.
  • the smartphone 40 When the distance between the smartphone 40 and the smartphone 30 is less than 1 m, the smartphone 40 sends an alarm signal and transmits the second alarm information to the smartphone 30 through the WIFI connection. After receiving the second alarm information sent by the smart phone 40, the smart phone 30 also sends an alarm signal, and can be informed. Currently the smartphone 40 is out of the safe area.
  • the portable accessory 50 When the distance between the portable accessory 50 and the smart phone 30 is less than 2 m, the portable accessory 50 sends an alarm signal, and sends a second alarm information to the smart phone 30 through the WIFI connection, and the smart phone 30 receives the alarm information sent by the portable accessory 50. An alarm signal is also issued, and it is known that the current portable accessory 50 is out of the safe area.
  • the smart phone 30 detects that the smart phone 40 disconnects the WIFI, sends an alarm signal, and can know that the smart phone 60 is disconnected from the WIFI.
  • An embodiment of the present invention further provides a computer storage medium storing computer executable instructions for performing the method described in any of the above embodiments.
  • Each of the above modules may be implemented by a central processing unit (CPU), a digital signal processor (DSP), or a field-programmable gate array (FPGA) in the electronic device.
  • CPU central processing unit
  • DSP digital signal processor
  • FPGA field-programmable gate array
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

Provided are a wireless terminal monitoring method, apparatus and system, the monitoring method comprising: a wireless terminal being initialized as a first terminal or a second terminal according to a user-selected monitor state; establishing a wireless connection between the first terminal and the second terminal; and the first terminal and the second terminal respectively detecting whether the wireless connection meets an alarm condition or not, and sending off an alarm signal in case of determining that the alarm condition is met.

Description

一种无线终端监控方法、装置及系统、计算机存储介质Wireless terminal monitoring method, device and system, and computer storage medium 技术领域Technical field
本发明涉及监控技术领域,尤其涉及一种无线终端监控方法、装置及系统、计算机存储介质。The present invention relates to the field of monitoring technologies, and in particular, to a wireless terminal monitoring method, apparatus and system, and computer storage medium.
背景技术Background technique
随着通信技术的发展,移动终端如手机的使用越来越普遍,几乎人手一部。目前市场上的移动终端虽然不断升级换代,功能越来越多,给人们的生活带来了很多的便利;但是,移动终端的体积小、重量轻,高端贵重的智能移动终端更是易遗失、易被盗,一旦遗失或被盗,很难在遗失或被盗时及时提醒用户。With the development of communication technologies, the use of mobile terminals such as mobile phones is becoming more and more common, almost one person. At present, mobile terminals on the market are constantly upgrading and functioning, bringing more convenience to people's lives. However, mobile terminals are small in size and light in weight, and high-end and valuable smart mobile terminals are easily lost. It is easy to be stolen. Once lost or stolen, it is difficult to promptly remind users when they are lost or stolen.
另外,现有的移动终端要么只能作为监控终端,要么只能作为被监控终端,用户无法根据自己的实际需要在监控终端与被监控终端之间进行选择,不能满足人们及时进行监控、避免财产损失的需求。同时,随着人们结伴出行和旅游的增多,如何避免成员的失散遇险也成为不可忽视的问题,急需一种不增加负担,简便易行的监控技术。In addition, the existing mobile terminal can only be used as a monitoring terminal, or can only be used as a monitored terminal. The user cannot select between the monitoring terminal and the monitored terminal according to their actual needs, and cannot meet the timely monitoring and avoidance of property. Lost demand. At the same time, with the increase of people traveling and traveling, how to avoid the loss and disappointment of members has become a problem that cannot be ignored. There is an urgent need for a monitoring technology that does not increase the burden and is simple and easy to implement.
发明内容Summary of the invention
为解决现有存在的技术问题,本发明实施例期望提供一种无线终端监控方法、装置及系统、计算机存储介质,能够对无线终端进行监控或被无线终端监控,并在无线终端遗失或被盗、用户与团队走散时及时发出提醒。In order to solve the existing technical problems, embodiments of the present invention are directed to a wireless terminal monitoring method, apparatus, and system, and a computer storage medium, which are capable of monitoring a wireless terminal or being monitored by a wireless terminal, and are lost or stolen in the wireless terminal. When the user and the team are separated, a reminder is issued in time.
本发明的技术方案是这样实现的:The technical solution of the present invention is implemented as follows:
本发明实施例提供一种无线终端监控方法,所述监控方法包括:无线终端根据用户选择的监控状态初始化为第一终端或第二终端;所述第一终 端与所述第二终端建立无线连接;所述第一终端与所述第二终端分别检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号。The embodiment of the present invention provides a wireless terminal monitoring method, where the monitoring method includes: the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user; The terminal establishes a wireless connection with the second terminal; the first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
在一具体实施例中,所述监控状态包括:接入点(AP)状态、站点(STA)状态;相应的,无线终端根据用户选择的监控状态初始化为第一终端或第二终端包括:当所述监控状态为AP状态时,将所述无线终端初始化为第一终端;当所述监控状态为STA状态时,将所述无线终端初始化为第二终端;其中,所述第一终端为监控终端,所述第二终端为被监控终端。In a specific embodiment, the monitoring status includes: an access point (AP) status, a station (STA) status; and correspondingly, the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring status selected by the user, including: When the monitoring state is an AP state, the wireless terminal is initialized to a first terminal; when the monitoring state is an STA state, the wireless terminal is initialized to a second terminal; wherein the first terminal is monitored The terminal is the monitored terminal.
在一具体实施例中,所述第一终端与所述第二终端建立无线连接之前,所述监控方法还包括:根据用户设置的监控信息生成配置文件;其中,当所述无线终端初始化为第一终端时,所述监控信息包括:AP名称、AP密码、所述第一终端可监控的无线终端的设备信息;当所述无线终端初始化为第二终端时,所述监控信息包括:AP名称、AP密码;所述第二终端的设备信息、应用场景信息、以及安全区域范围;其中,所述应用场景包括:室内环境、或室外环境、或野外环境。In a specific embodiment, before the first terminal establishes a wireless connection with the second terminal, the monitoring method further includes: generating a configuration file according to the monitoring information set by the user; wherein, when the wireless terminal is initialized to the first The monitoring information includes: an AP name, an AP password, and device information of the wireless terminal that the first terminal can monitor; and when the wireless terminal is initialized to the second terminal, the monitoring information includes: an AP name. The AP password, the device information of the second terminal, the application scenario information, and the security area range, where the application scenario includes: an indoor environment, an outdoor environment, or a field environment.
在一具体实施例中,所述根据用户设置的监控信息生成配置文件之后,所述监控方法还包括:所述第一终端与所述第二终端同步所述配置文件。In a specific embodiment, after the generating the configuration file according to the monitoring information set by the user, the monitoring method further includes: the first terminal synchronizing the configuration file with the second terminal.
在一具体实施例中,当所述无线终端初始化为第一终端时,所述告警条件包括:所述无线连接断开、或接收到所述第二终端的第二告警信息;相应的,发出告警信号包括:触发第一告警信息,并驱动发出告警信号;当所述无线终端初始化为第二终端时,所述告警条件为:所述无线连接的信号值低于阈值;其中,所述阈值由所述第二终端的所述配置文件确定;相应的,发出告警信号包括:触发并发送第二告警信息,驱动发出告警信号。In a specific embodiment, when the wireless terminal is initialized to the first terminal, the alarm condition includes: the wireless connection is disconnected, or the second alarm information of the second terminal is received; The alarm signal includes: triggering the first alarm information, and driving the alarm signal; when the wireless terminal is initialized to the second terminal, the alarm condition is: the signal value of the wireless connection is lower than a threshold; wherein the threshold And determining, by the configuration file of the second terminal, correspondingly, sending the alarm signal includes: triggering and sending the second alarm information, and driving the alarm signal.
本发明实施例还提供一种无线终端监控装置,所述监控装置包括:初始化模块、连接模块、监控模块;其中,所述初始化模块,配置为根据用 户选择的监控状态将所述监控装置所在的无线终端初始化为第一终端或第二终端;所述连接模块,配置为在所述第一终端与所述第二终端之间建立无线连接;所述监控模块,配置为检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号。The embodiment of the present invention further provides a wireless terminal monitoring device, where the monitoring device includes: an initialization module, a connection module, and a monitoring module; wherein the initialization module is configured to be used according to The monitoring state of the user is to initialize the wireless terminal where the monitoring device is located as the first terminal or the second terminal; the connection module is configured to establish a wireless connection between the first terminal and the second terminal; The monitoring module is configured to detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
在一具体实施例中,所述初始化模块将所述监控装置所在的无线终端初始化为第一终端或第二终端包括:当所述监控状态为AP状态时,将所述无线终端初始化为第一终端;当所述监控状态为STA状态时,将所述无线终端初始化为第二终端;其中,所述第一终端为监控终端,所述第二终端为被监控终端。In an embodiment, the initializing module initializing the wireless terminal where the monitoring device is located to the first terminal or the second terminal includes: when the monitoring state is an AP state, initializing the wireless terminal to be the first The terminal is initialized to the second terminal when the monitoring state is the STA state; wherein the first terminal is a monitoring terminal, and the second terminal is a monitored terminal.
在一具体实施例中,所述监控装置还包括配置模块,配置为根据用户设置的监控信息生成配置文件;其中,当所述无线终端初始化为第一终端时,所述监控信息包括:AP名称、AP密码、所述第一终端可监控的无线终端的设备信息;当所述无线终端初始化为第二终端时,所述监控信息包括:AP名称、AP密码;所述第二终端自身的设备信息、应用场景信息、安全区域范围;其中,所述应用场景包括:室内环境、或室外环境、或野外环境。In a specific embodiment, the monitoring apparatus further includes a configuration module configured to generate a configuration file according to the monitoring information set by the user; wherein, when the wireless terminal is initialized to the first terminal, the monitoring information includes: an AP name The AP password, the device information of the wireless terminal that can be monitored by the first terminal; when the wireless terminal is initialized to the second terminal, the monitoring information includes: an AP name, an AP password; and the second terminal itself Information, application scenario information, and security area range; wherein the application scenario includes: an indoor environment, an outdoor environment, or a wild environment.
在一具体实施例中,所述监控装置还包括同步模块,配置为在所述第一终端与所述第二终端之间同步所述配置文件。In a specific embodiment, the monitoring device further includes a synchronization module configured to synchronize the configuration file between the first terminal and the second terminal.
在一具体实施例中,所述监控模块配置为:当所述无线终端初始化为第一终端时,所述无线连接断开、或接收到所述第二终端的第二告警信息的情况下,触发第一告警信息,并驱动发出告警信号;当所述无线终端初始化为第二终端时,所述无线连接的信号值低于阈值的情况下,触发并发送第二告警信息,驱动发出告警信号;其中,所述阈值由所述第二终端的配置文件确定。In a specific embodiment, the monitoring module is configured to: when the wireless terminal is initialized to be the first terminal, when the wireless connection is disconnected, or the second alarm information of the second terminal is received, Triggering the first alarm information, and driving the alarm signal; when the wireless terminal is initialized to the second terminal, if the signal value of the wireless connection is lower than the threshold, the second alarm information is triggered and sent, and the alarm signal is sent. Wherein the threshold is determined by a configuration file of the second terminal.
本发明实施例还提供一种无线监控系统,包括至少两个上述方案中所 述的监控装置;其中,所述系统中至少一个所述监控装置所在的无线终端为第一终端,其余所述监控装置所在的无线终端为第二终端;或者,所述系统中至少一个所述监控装置所在的无线终端为第二终端,其余所述监控装置所在的无线终端为第一终端。An embodiment of the present invention further provides a wireless monitoring system, including at least two of the foregoing solutions. The monitoring device, wherein at least one of the wireless terminals in the system is the first terminal, and the remaining wireless terminals in the monitoring device are the second terminal; or at least one of the systems The wireless terminal where the monitoring device is located is the second terminal, and the wireless terminals where the other monitoring device is located are the first terminal.
本发明实施例还提供一种计算机存储介质,其中存储有计算机可执行指令,所述计算机可执行指令用于执行上述的方法。Embodiments of the present invention also provide a computer storage medium having stored therein computer executable instructions for performing the above method.
由此可见,本发明实施例提供的无线终端监控方法、装置及系统、计算机存储介质,无线终端根据用户选择的监控状态初始化为第一终端或第二终端;所述第一终端与所述第二终端建立无线连接;所述第一终端与所述第二终端分别检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号;如此,对于同一个无线终端既能作为监控终端,也能作为被监控终端,同时实现监控或被监控的功能,在不增加任何成本负担的前提下,能在无线终端遗失或被盗、用户与团队走散时及时根据监控结果提醒用户,避免无线终端的遗失、被盗或团队成员的走散;并且,本发明实施例的方法实现简单、成本低、易于推广。Thus, the wireless terminal monitoring method, apparatus, and system, and computer storage medium provided by the embodiment of the present invention, the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user; the first terminal and the first terminal The second terminal establishes a wireless connection; the first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met; thus, the same wireless terminal can be used for monitoring The terminal can also be used as a monitored terminal, and at the same time realize the function of monitoring or being monitored. Under the premise of not adding any cost burden, the terminal can promptly remind the user according to the monitoring result when the wireless terminal is lost or stolen, and the user and the team are dispersed. The method of the embodiment of the present invention is simple to implement, low in cost, and easy to promote.
附图说明DRAWINGS
图1为本发明实施例提供的无线终端监控方法的实现流程示意图;1 is a schematic flowchart of implementing a wireless terminal monitoring method according to an embodiment of the present invention;
图2为本发明实施例提供的监控终端实现无线终端监控方法的流程示意图;2 is a schematic flowchart of a method for monitoring a wireless terminal by a monitoring terminal according to an embodiment of the present invention;
图3为本发明实施例提供的被监控终端实现无线终端监控方法的流程示意图;FIG. 3 is a schematic flowchart of a method for monitoring a wireless terminal by a monitored terminal according to an embodiment of the present disclosure;
图4为本发明实施例提供的一种无线终端监控装置的组成结构示意图;4 is a schematic structural diagram of a wireless terminal monitoring apparatus according to an embodiment of the present invention;
图5为本发明实施例提供的另一种无线终端监控装置的组成结构示意图;FIG. 5 is a schematic structural diagram of another wireless terminal monitoring apparatus according to an embodiment of the present disclosure;
图6为本发明实施例的无线终端监控系统的组成示意图; 6 is a schematic structural diagram of a wireless terminal monitoring system according to an embodiment of the present invention;
图7为本发明具体应用实例中无线终端监控系统的网络示意图。FIG. 7 is a schematic diagram of a network of a wireless terminal monitoring system according to a specific application example of the present invention.
具体实施方式detailed description
在本发明实施例中,无线终端根据用户选择的监控状态初始化为第一终端、或第二终端;所述第一终端与所述第二终端建立无线连接;所述第一终端与所述第二终端分别检测自身的所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号。In the embodiment of the present invention, the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user; the first terminal establishes a wireless connection with the second terminal; the first terminal and the first terminal The two terminals respectively detect whether the wireless connection of the terminal meets the alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
其中,第一终端为监控终端,第二终端为被监控终端。The first terminal is a monitoring terminal, and the second terminal is a monitored terminal.
这里,所述控制状态可包括接入点(AP,Access Point)状态、或站点(STA,Station)状态;当所述监控状态为AP状态时,将所述无线终端初始化为第一终端;当所述监控状态为STA状态时,将所述无线终端初始化为第二终端。Here, the control state may include an access point (AP, Access Point) state, or a station (STA, Station) state; when the monitoring state is an AP state, the wireless terminal is initialized to a first terminal; When the monitoring state is the STA state, the wireless terminal is initialized to the second terminal.
所述第一终端与所述第二终端建立无线连接之前,还包括:根据用户设置的监控信息生成配置文件;Before the first terminal establishes a wireless connection with the second terminal, the method further includes: generating a configuration file according to the monitoring information set by the user;
当所述无线终端初始化为第一终端时,所述告警条件包括:确定所述无线连接断开、或接收到所述第二终端的第二告警信息,若满足所述告警条件,第一终端则触发第一告警信息,并驱动发出告警信号。When the wireless terminal is initialized to the first terminal, the alarm condition includes: determining that the wireless connection is disconnected, or receiving second alarm information of the second terminal, and if the alarm condition is met, the first terminal The first alarm information is triggered and the alarm signal is sent.
当所述无线终端初始化为第二终端时,所述告警条件包括:所述无线连接的信号值低于阈值,若满足所述告警条件,第二终端则触发并发送第二告警信息,驱动发出告警信号,这里,所述阈值由所述第二终端的配置文件确定。When the wireless terminal is initialized to the second terminal, the alarm condition includes: the signal value of the wireless connection is lower than a threshold, and if the alarm condition is met, the second terminal triggers and sends the second alarm information, and the driver sends out An alarm signal, where the threshold is determined by a configuration file of the second terminal.
下面通过附图及具体实施例对本发明再做进一步的详细说明。The invention will be further described in detail below with reference to the drawings and specific embodiments.
图1为本发明实施例提供的无线终端监控方法的实现流程示意图,如图1所示,该监控方法包括以下步骤:FIG. 1 is a schematic flowchart of a method for monitoring a wireless terminal according to an embodiment of the present invention. As shown in FIG. 1 , the monitoring method includes the following steps:
步骤101,无线终端根据用户选择的监控状态初始化为第一终端或第二终端; Step 101: The wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user.
其中,第一终端为监控终端,第二终端为被监控终端;The first terminal is a monitoring terminal, and the second terminal is a monitored terminal;
具体的,无线终端向用户显示用于用户选择监控状态的界面,根据用户选择的监控状态对应的标识将无线终端自身进行初始化;Specifically, the wireless terminal displays an interface for the user to select the monitoring state to the user, and initializes the wireless terminal according to the identifier corresponding to the monitoring state selected by the user;
这里,监控状态包括AP状态、STA状态;相应的,当用户选择的监控状态为AP状态时,无线终端初始化为作为AP终端的第一终端;当用户选择的监控状态为STA状态时,无线终端初始化为作为STA终端的第二终端;其中,其中,AP状态和STA状态分别通过对应的标识表示,所述标识可以是数值,也可以是不同的符号,只要能区分不同的状态即可。Here, the monitoring state includes the AP state and the STA state; correspondingly, when the monitoring state selected by the user is the AP state, the wireless terminal is initialized to be the first terminal as the AP terminal; when the monitoring state selected by the user is the STA state, the wireless terminal Initializing the second terminal as the STA terminal; wherein, the AP state and the STA state are respectively represented by corresponding identifiers, and the identifiers may be numerical values or different symbols, as long as different states can be distinguished.
步骤102,所述第一终端与所述第二终端建立无线连接;Step 102: The first terminal establishes a wireless connection with the second terminal.
具体的,当确定第一终端与第二终端后,第一终端通过第二终端发送的无线连接请求与第二终端建立无线连接;这里,第二终端发出的无线连接请求可为WIFI连接请求;相应的,建立的无线连接为WIFI连接。Specifically, after determining the first terminal and the second terminal, the first terminal establishes a wireless connection with the second terminal by using the wireless connection request sent by the second terminal; where the wireless connection request sent by the second terminal may be a WIFI connection request; Correspondingly, the established wireless connection is a WIFI connection.
在第一终端与第二终端建立无线连接之前,第一终端与第二终端可分别显示监控信息配置界面,以用于用户根据实际需求对监控信息进行设置;相应的,无线终端根据用户设置的监控信息生成各自的配置文件;Before the first terminal establishes a wireless connection with the second terminal, the first terminal and the second terminal respectively display a monitoring information configuration interface, so that the user sets the monitoring information according to actual needs; correspondingly, the wireless terminal sets according to the user. The monitoring information generates respective configuration files;
其中,第一终端显示的监控信息配置界面中,需要用户设置的监控信息包括但不限于:AP名称、AP密码、第一终端可监控的无线终端的设备信息;在用户将监控信息设置完成后,第一终端根据用户设置的监控和信息生成对应的配置文件;这里,AP名称与AP密码分别为第一终端自身的AP名称,以及与AP名称对应的AP密码。The monitoring information that needs to be set by the user in the monitoring information configuration interface displayed by the first terminal includes, but is not limited to, an AP name, an AP password, and device information of the wireless terminal that can be monitored by the first terminal; after the user sets the monitoring information. The first terminal generates a corresponding configuration file according to the monitoring and information set by the user; where the AP name and the AP password are the AP name of the first terminal itself and the AP password corresponding to the AP name.
第二终端显示的监控信息配置界面中,需要用户设置的监控信息包括但不限于:AP名称、AP密码;第二终端自身的设备信息、应用场景信息、安全区域范围;这里,AP名称、AP密码分别为第二终端可接入的AP终端的AP名称,以及与该AP名称对应的AP密码;第二终端自身的设备信息可为第二终端的标识码,该标识码为昵称、或用户身份识别卡(SIM)/全 球用户识别卡(USIM)号、或为代表第二终端序号等用来识别第二终端的标识码;安全区域范围包括但不限于:1米、2米、2.5米、10米,用户可根据实际监控需要对安全区域范围进行设置;应用场景信息可根据所处通信环境的不同进行选择,包括:室内环境、或室外环境、或野外环境,以适用于不同的通信环境下的无线终端监控。In the monitoring information configuration interface displayed by the second terminal, the monitoring information that needs to be set by the user includes, but is not limited to, the AP name and the AP password; the device information of the second terminal itself, the application scenario information, and the security area range; here, the AP name and the AP The password is the AP name of the AP terminal that can be accessed by the second terminal, and the AP password corresponding to the AP name; the device information of the second terminal itself can be the identification code of the second terminal, and the identification code is a nickname or a user. Identification card (SIM) / full The ball user identification card (USIM) number, or the identification code for identifying the second terminal, such as the second terminal serial number; the security area includes but is not limited to: 1 meter, 2 meters, 2.5 meters, 10 meters, and the user can The actual monitoring needs to set the security area; the application scenario information can be selected according to the communication environment, including: indoor environment, outdoor environment, or field environment, to be applicable to wireless terminal monitoring in different communication environments.
这里,生成的配置文件可保存在内存中;当无线终端初始化为第一终端后,如果第一终端中保存有配置文件,且用户未对监控信息进行更新,则当第一终端关机、或结束前次监控再次启用监控功能时,保存的配置文件可被再次使用;如果用户在监控信息中添加或删除被监控终端时,配置文件进行对应的更新。Here, the generated configuration file may be saved in the memory; when the wireless terminal is initialized to the first terminal, if the configuration file is saved in the first terminal, and the user does not update the monitoring information, when the first terminal is shut down, or ends When the monitoring function is enabled again in the previous monitoring, the saved configuration file can be used again; if the user adds or deletes the monitored terminal in the monitoring information, the configuration file is updated accordingly.
在第一终端与第二终端之间建立无线连接之后,第一终端与第二终端同步配置文件,以验证第一终端是否对第二终端具有监控权限;After the wireless connection is established between the first terminal and the second terminal, the first terminal synchronizes the configuration file with the second terminal to verify whether the first terminal has monitoring rights to the second terminal.
具体的,第一终端通过建立的无线连接将自身的配置文件发送至第二终端,当接收到第二终端返回的同步成功响应时,同步完成,如果在一定的时间段内未收到第二终端返回的同步成功响应或返回的消息为同步失败响应,则确定第一终端不具有对第二终端进行监控的权限;Specifically, the first terminal sends its own configuration file to the second terminal through the established wireless connection, and when the synchronization success response returned by the second terminal is received, the synchronization is completed, if the second time is not received within a certain period of time. If the synchronization success response or the returned message returned by the terminal is a synchronization failure response, it is determined that the first terminal does not have the right to monitor the second terminal;
第二终端通过建立的无线连接接收到第一终端发送的配置文件后,将接收到的配置文件中与本地的配置文件进行比较;具体的,确定接收的配置文件中第一终端可监控的无线终端的设备信息中包含第二终端的设备信息,返回同步成功响应,以表示配置文件同步完成,且第一终端对第二终端具有监控权限;当接收的配置文件中第一终端可监控的无线终端的设备信息不包含第二终端的设备信息,则返回同步失败响应,以表示第一终端不具有监控第二终端的权限。After receiving the configuration file sent by the first terminal by using the established wireless connection, the second terminal compares the received configuration file with the local configuration file; specifically, determines the wireless that the first terminal can monitor in the received configuration file. The device information of the terminal includes the device information of the second terminal, and returns a synchronization success response, so that the configuration file synchronization is completed, and the first terminal has the monitoring authority for the second terminal; when the first terminal can monitor the wireless in the received configuration file If the device information of the terminal does not include the device information of the second terminal, the synchronization failure response is returned to indicate that the first terminal does not have the right to monitor the second terminal.
在实际应用中,第二终端可为具有无线功能的便携式附件,该便携式附件的监控信息无法通过用户设置,而是具有预先设置信息的配置文件。 In a practical application, the second terminal may be a portable accessory with wireless function, and the monitoring information of the portable accessory cannot be set by the user, but has a configuration file with preset information.
步骤103,所述第一终端与所述第二终端分别检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号;Step 103: The first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met;
这里,所述检测可以是实时检测;Here, the detection may be real-time detection;
具体的,当无线终端初始化为第一终端时,第一终端实时检测与第二终端之间的无线连接是否满足告警条件:无线连接断开、或接收到第二终端的第二告警信息;若满足告警条件,则触发第一告警信息,并驱动发出告警信号,提醒用户与第二终端的无线连接出现异常、或第二终端离开安全区域范围;这里,第二告警信息为离开安全区域范围的第二终端发出的告警信息;所述第二告警信息携带有第二终端的设备信息。Specifically, when the wireless terminal is initialized to the first terminal, the first terminal detects whether the wireless connection with the second terminal meets an alarm condition in real time: the wireless connection is disconnected, or the second alarm information of the second terminal is received; If the alarm condition is met, the first alarm information is triggered, and the alarm signal is sent to notify the user that the wireless connection with the second terminal is abnormal, or the second terminal leaves the security area; where the second alarm information is out of the security area. The alarm information sent by the second terminal; the second alarm information carries the device information of the second terminal.
当无线终端初始化为第二终端时,第二终端实时检测与第一终端之间的无线连接是否满足告警条件:无线连接的信号值低于阈值,当满足告警条件时,触发第二告警信息,并驱动告警信号提醒用户离开安全区域范围,同时将第二告警信息发送至第一终端;其中,第二告警信息携带有第二终端的设备信息,以告知第一终端当前第二终端的具体信息;阈值由第二终端本地保存的配置文件确定,具体为根据第二终端本地保存的配置文件中的应用场景信息及安全区域范围确定的信号值;这里,信号值为第二终端的接收信号强度指示(RSSI,Received Signal Strength Indication)值,随着第二终端与第一终端之间距离的变化,第二终端的RSSI值发生相应的变化,当距离增大时,RSSI值减小;当距离减小时,RSSI值增大。When the wireless terminal is initialized to the second terminal, the second terminal detects whether the wireless connection with the first terminal meets the alarm condition in real time: the signal value of the wireless connection is lower than the threshold, and when the alarm condition is met, the second alarm information is triggered. And driving the alarm signal to prompt the user to leave the security area, and sending the second alarm information to the first terminal; wherein the second alarm information carries the device information of the second terminal, to inform the first terminal of the current second terminal specific information. The threshold value is determined by the configuration file saved locally by the second terminal, specifically, the signal value determined according to the application scenario information and the security area range in the configuration file saved locally by the second terminal; where the signal value is the received signal strength of the second terminal. The RSSI (Received Signal Strength Indication) value, the RSSI value of the second terminal changes correspondingly as the distance between the second terminal and the first terminal changes; when the distance increases, the RSSI value decreases; When reduced, the RSSI value increases.
这里,提醒用户的告警信号可为蜂鸣、和/或语音、和/或振动。Here, the alert signal alerting the user may be a beep, and/or voice, and/or vibration.
在步骤103的监控过程中,当第一终端的AP名称与AP密码发生变化时,第一终端再次将自身的配置文件发送至第二终端,第二终端将已更新的AP名称与AP密码保存,并与第一终端重新建立无线连接,无线连接建立完成之后,第一终端与第二终端继续执行步骤103。During the monitoring process of step 103, when the AP name and the AP password of the first terminal change, the first terminal sends its own configuration file to the second terminal again, and the second terminal saves the updated AP name and the AP password. And re-establishing a wireless connection with the first terminal. After the wireless connection is established, the first terminal and the second terminal continue to perform step 103.
通过步骤101至步骤103的监控方法,第一终端与第二终端同时检测 第一终端与第二终端之间的无线连接;当第一终端检测到无线连接断开时,触发第一告警信息,并由第一告警信息驱动发出告警信息;当第二终端检测到接收的无线连接的信号值低于阈值时,触发第二告警信息,将第二告警信息发送至第一终端,并由第二告警信息驱动发出告警信号,此时,第一终端接收到第二告警信息,由第二告警信息触发第一告警信息,并由第一告警信息驱动发出告警信号;对于第二终端检测到接收的无线连接的信号值低于阈值的情况,第一终端与第二终端同时发出告警信号。The first terminal and the second terminal simultaneously detect by the monitoring method of step 101 to step 103 a wireless connection between the first terminal and the second terminal; when the first terminal detects that the wireless connection is disconnected, triggering the first alarm information, and driving the first alarm information to send the alarm information; when the second terminal detects the received When the signal value of the wireless connection is lower than the threshold, the second alarm information is triggered, and the second alarm information is sent to the first terminal, and the second alarm information is used to generate the alarm signal. At this time, the first terminal receives the second alarm information. The first alarm information is triggered by the second alarm information, and the alarm signal is driven by the first alarm information. When the second terminal detects that the received wireless connection signal value is lower than the threshold, the first terminal and the second terminal simultaneously Send an alarm signal.
在实际应用中,无线终端可为智能手机;也可为易于携带在用户身上的便携式附件,但该便携式附件只能作为第二终端使用。In practical applications, the wireless terminal can be a smart phone; it can also be a portable accessory that is easy to carry on the user, but the portable accessory can only be used as a second terminal.
用户对监控状态的选择操作、监控信息的设置可根据用户的具体安全需求由用户自己设置,也可由系统本身根据默认的选择进行设置。The user's selection operation of the monitoring status and the setting of the monitoring information may be set by the user according to the specific security requirements of the user, or may be set by the system itself according to the default selection.
本发明实施例提供的无线终端监控方法可充分利用智能手机已有的功能和良好的系统环境,在节约成本同时,为用户带来更为熟悉、统一和友好的使用环境和体验。The wireless terminal monitoring method provided by the embodiment of the present invention can fully utilize the existing functions of the smart phone and a good system environment, and at the same time save the cost, bring a more familiar, unified and friendly use environment and experience to the user.
图2为本发明实施例提供的监控终端实现无线终端监控方法的流程示意图,如图2所示,包括以下步骤:2 is a schematic flowchart of a method for monitoring a wireless terminal by a monitoring terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes the following steps:
步骤201,初始化为监控终端;Step 201, initializing as a monitoring terminal;
具体的,无线终端根据用户选择的AP状态,将自身初始化为作为AP终端的第一终端,并对该第一终端覆盖下的所有被监控终端进行监控;这里,第一终端为监控终端。Specifically, the wireless terminal initializes itself to the first terminal that is the AP terminal according to the AP state selected by the user, and monitors all the monitored terminals covered by the first terminal; where the first terminal is the monitoring terminal.
步骤202,根据用户设置的监控信息生成配置文件;Step 202: Generate a configuration file according to the monitoring information set by the user.
具体的,第一终端根据用户设置的包括有AP名称、AP密码、第一终端可监控的无线终端的设备信息等监控信息,生成第一终端的配置文件,并将生成的配置文件保存;Specifically, the first terminal generates a configuration file of the first terminal according to the monitoring information, such as the AP name, the AP password, and the device information of the wireless terminal that can be monitored by the first terminal, and saves the generated configuration file.
这里,在需要使用配置文件时,若监控信息存在更新,第一终端则将 配置文件进行相应的更新;若监控信息未更新,第一终端则直接提取之前保存的配置文件使用。Here, when the configuration file needs to be used, if the monitoring information is updated, the first terminal will The configuration file is updated accordingly; if the monitoring information is not updated, the first terminal directly extracts the previously saved configuration file.
步骤203,与被监控终端建立无线连接;Step 203: Establish a wireless connection with the monitored terminal.
在本步骤中,当接收到被监控终端的无线连接请求时,第一终端与被监控终端建立无线连接;这里,作为监控终端的第一终端可同时与多个被监控终端建立无线连接。In this step, when receiving the wireless connection request of the monitored terminal, the first terminal establishes a wireless connection with the monitored terminal; here, the first terminal that is the monitoring terminal can establish a wireless connection with multiple monitored terminals at the same time.
步骤204,同步配置文件;Step 204: Synchronize a configuration file.
具体的,在无线连接建立完成之后,第一终端将本地的配置文件发送至被监控终端;进一步,当接收到被监控终端返回的同步成功响应后,确定配置文件的同步完成,表明第一终端对被监控终端具有监控权限,执行步骤205。Specifically, after the wireless connection is established, the first terminal sends the local configuration file to the monitored terminal; further, after receiving the synchronization success response returned by the monitored terminal, determining that the synchronization of the configuration file is completed, indicating that the first terminal To monitor the monitored terminal, go to step 205.
步骤205,实时检测与被监控终端之间的无线连接,确定断开连接、或收到第二告警信息时,发出告警信号;Step 205, detecting a wireless connection with the monitored terminal in real time, determining to disconnect, or receiving the second alarm information, and sending an alarm signal;
具体的,发送同步成功响应后,第一终端实时检测与自身监控的所有被监控终端之间的无线连接,当确定与被监控终端之间的无线连接断开、或接收到被监控终端的第二告警信息时,触发第一告警信息,并由第一告警信息驱动发出告警信号,提醒用户存在断开连接或离开安全区域范围的被监控终端。Specifically, after the transmission synchronization success response, the first terminal detects the wireless connection between all monitored terminals and the monitored terminal in real time, and determines that the wireless connection with the monitored terminal is disconnected or the monitored terminal is received. When the two alarms are triggered, the first alarm information is triggered, and the first alarm information is used to send an alarm signal to remind the user that there is a monitored terminal that disconnects or leaves the security area.
图3为本发明实施例提供的被监控终端实现无线终端监控方法的流程示意图;如图3所示,包括以下步骤:FIG. 3 is a schematic flowchart of a method for monitoring a wireless terminal by a monitored terminal according to an embodiment of the present invention; as shown in FIG. 3, the method includes the following steps:
步骤301,初始化为被监控终端;Step 301, initializing as a monitored terminal;
具体的,无线终端根据用户选择的STA状态,将自身初始化作为STA终端的第二终端,并被自身所接入的监控终端所监控;这里,第二终端为被监控终端。Specifically, the wireless terminal initializes itself as the second terminal of the STA terminal according to the STA state selected by the user, and is monitored by the monitoring terminal accessed by itself; here, the second terminal is the monitored terminal.
步骤302,根据用户设置的监控信息生成配置文件; Step 302: Generate a configuration file according to the monitoring information set by the user.
具体的,第二终端根据用户设置的包括有AP名称、AP密码;第二终端自身的设备信息、应用场景、以及安全区域范围等监控信息,生成第二终端的配置文件。Specifically, the second terminal generates a configuration file of the second terminal according to the monitoring information including the AP name, the AP password, the device information of the second terminal itself, the application scenario, and the security zone range.
在实际使用中,当第二终端的监控信息更新,则重新生成配置文件;当第二终端的监控信息未更新,则直接提取上次保存的配置文件使用。In actual use, when the monitoring information of the second terminal is updated, the configuration file is regenerated; when the monitoring information of the second terminal is not updated, the last saved configuration file is directly extracted.
步骤303,与监控终端建立无线连接;Step 303: Establish a wireless connection with the monitoring terminal.
在本步骤中,第二终端搜索当前可接入的AP终端,根据本地配置文件中的AP名称检测到监控终端时,向监控终端发送无线连接请求,并与监控终端建立无线连接。In this step, the second terminal searches for the currently accessible AP terminal, and when detecting the monitoring terminal according to the AP name in the local configuration file, sends a wireless connection request to the monitoring terminal, and establishes a wireless connection with the monitoring terminal.
步骤304,同步配置文件;Step 304: Synchronize a configuration file.
具体的,在无线连接建立完成之后,第二终端将接收监控终端发送的配置文件,查找接收的配置文件中可监控的无线终端的设备信息,确定是否包括第二终端的设备信息,如果包括有,则确定监控终端具有监控第二终端的监控权限,发送同步成功响应,执行步骤305;否则,发送同步失败响应。Specifically, after the wireless connection is established, the second terminal receives the configuration file sent by the monitoring terminal, searches for the device information of the wireless terminal that can be monitored in the received configuration file, and determines whether the device information of the second terminal is included, if included. Then, it is determined that the monitoring terminal has the monitoring authority for monitoring the second terminal, sends a synchronization success response, and performs step 305; otherwise, sends a synchronization failure response.
步骤305,根据配置文件确定阈值,实时检测与监控终端之间的无线连接的信号值,当检测的无线连接的信号值低于阈值时,发出告警信号;Step 305: Determine a threshold according to the configuration file, and detect a signal value of the wireless connection between the monitoring terminal and the monitoring terminal in real time, and send an alarm signal when the detected signal value of the wireless connection is lower than the threshold value;
具体的,发送同步响应完成消息后,第二终端提取保存的本地配置文件,获取本地配置文件中的应用场景和安全区域范围,根据提取的应用场景和安全区域范围的值确定阈值;确定阈值后,实时检测与监控终端之间的无线连接的信号值,当无线连接的信号值小于阈值时,触发第二告警信息,并由第二告警信息驱动发出告警信号,提醒用户离开安全区域范围,同时将第二告警信息发送至监控终端;其中,根据应用场景和安全区域范围确定阈值的过程中,可采用现有技术中不同的电波传播模式计算对应的阈值,在此不再赘述。 Specifically, after the synchronization response completion message is sent, the second terminal extracts the saved local configuration file, obtains the application scenario and the security zone range in the local configuration file, and determines the threshold according to the extracted application scenario and the value of the security zone range; The real-time detection and monitoring of the signal value of the wireless connection between the terminal, when the signal value of the wireless connection is less than the threshold, triggering the second alarm information, and the second alarm information drives the alarm signal to remind the user to leave the safe area range, The second alarm information is sent to the monitoring terminal. The threshold value is calculated by using different radio wave propagation modes in the prior art in the process of determining the threshold according to the application scenario and the security zone range, and details are not described herein.
为实现上述方法,本发明实施例还提供一种无线监控装置,如图4所示,该无线终端监控装置包括:初始化模块401、连接模块402、监控模块403;其中,In order to implement the above method, the embodiment of the present invention further provides a wireless monitoring device. As shown in FIG. 4, the wireless terminal monitoring device includes: an initialization module 401, a connection module 402, and a monitoring module 403;
初始化模块401,配置为根据用户选择的监控状态将所述监控装置所在的无线终端初始化为第一终端或第二终端;The initialization module 401 is configured to initialize the wireless terminal where the monitoring device is located as the first terminal or the second terminal according to the monitoring state selected by the user;
其中,第一终端为监控终端,第二终端为被监控终端;The first terminal is a monitoring terminal, and the second terminal is a monitored terminal;
具体的,无线终端向用户显示用于用户选择监控状态的界面,初始化模块401根据用户选择的监控状态对应的标识将监控装置所在的无线终端进行初始化;Specifically, the wireless terminal displays an interface for the user to select the monitoring state to the user, and the initialization module 401 initializes the wireless terminal where the monitoring device is located according to the identifier corresponding to the monitoring state selected by the user;
这里,监控状态包括AP状态、STA状态;相应的,当监控状态为AP状态时,初始化模块401将监控装置所在的无线终端初始化为作为AP终端的第一终端,则该无线终端为监控终端;当监控状态为STA状态时,初始化模块401将监控装置所在的无线终端初始化为作为STA终端的第二终端,则该无线终端为被监控终端;同时,初始化模块401将用户设置的监控状态对应的标识发送至连接模块402、监控模块403。Here, the monitoring state includes the AP state and the STA state; correspondingly, when the monitoring state is the AP state, the initialization module 401 initializes the wireless terminal where the monitoring device is located to be the first terminal as the AP terminal, and the wireless terminal is the monitoring terminal; When the monitoring state is the STA state, the initialization module 401 initializes the wireless terminal where the monitoring device is located to be the second terminal as the STA terminal, and the wireless terminal is the monitored terminal; meanwhile, the initialization module 401 corresponds to the monitoring state set by the user. The identifier is sent to the connection module 402 and the monitoring module 403.
连接模块402,配置为在所述第一终端与所述第二终端之间建立无线连接;The connection module 402 is configured to establish a wireless connection between the first terminal and the second terminal;
具体的,当无线终端初始化为第一终端时,连接模块402接收的监控状态为AP状态,确定接收到第二终端的无线连接请求时,与第二终端建立无线连接;Specifically, when the wireless terminal is initialized to the first terminal, the monitoring state received by the connection module 402 is an AP state, and when it is determined that the wireless connection request of the second terminal is received, establishing a wireless connection with the second terminal;
当无线终端初始化为第二终端时,连接模块402接收的监控状态为STA状态,向第一终端发送无线连接建立请求,与第一终端建立无线连接。When the wireless terminal is initialized to the second terminal, the monitoring status received by the connection module 402 is the STA status, and the wireless connection establishment request is sent to the first terminal to establish a wireless connection with the first terminal.
监控模块403,配置为检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号;The monitoring module 403 is configured to detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met;
具体的,当无线终端初始化为第一终端时,连接模块402建立的无线 连接断开、或接收到第二终端的第二告警信息的情况下,触发第一告警信息,并驱动发出告警信号;当无线终端初始化为第二终端时,无线连接的信号值低于阈值的情况下,触发并发送第二告警信息,驱动发出告警信号;Specifically, when the wireless terminal is initialized to the first terminal, the wireless established by the connection module 402 When the connection is disconnected or the second alarm information of the second terminal is received, the first alarm information is triggered, and the alarm signal is sent; when the wireless terminal is initialized to the second terminal, the signal value of the wireless connection is lower than the threshold. In the case, the second alarm information is triggered and sent, and the driver sends an alarm signal;
其中,所述阈值为监控模块403根据第二终端的配置文件确定。The threshold value monitoring module 403 determines according to the configuration file of the second terminal.
如图5所示,无线终端监控装置还可包括:配置模块404、同步模块405;As shown in FIG. 5, the wireless terminal monitoring apparatus may further include: a configuration module 404, a synchronization module 405;
这里,在初始化模块401的初始化过程中,配置模块404、同步模块405获取监控装置的监控状态,从而获知监控装置所在的无线终端初始化为第一终端还是第二终端。Here, in the initialization process of the initialization module 401, the configuration module 404 and the synchronization module 405 acquire the monitoring status of the monitoring device, so as to know whether the wireless terminal where the monitoring device is located is initialized to the first terminal or the second terminal.
配置模块404,配置为根据用户设置的监控信息生成配置文件;The configuration module 404 is configured to generate a configuration file according to the monitoring information set by the user;
具体的,当无线终端初始化为第一终端时,监控信息包括:AP名称、AP密码、第一终端可监控的无线终端的设备信息;当无线终端初始化为第二终端时,监控信息包括:AP名称、AP密码;第二终端自身的设备信息、应用场景信息、安全区域范围;这里,应用场景包括:室内环境、或室外环境、或野外环境。Specifically, when the wireless terminal is initialized to the first terminal, the monitoring information includes: an AP name, an AP password, and device information of the wireless terminal that can be monitored by the first terminal; when the wireless terminal is initialized to the second terminal, the monitoring information includes: Name, AP password; device information of the second terminal, application scenario information, and security zone range; here, the application scenario includes: indoor environment, outdoor environment, or field environment.
同步模块405,配置为无线连接建立完成后,同步配置文件;The synchronization module 405 is configured to synchronize the configuration file after the wireless connection is established.
具体的,当无线终端初始化为第一终端时,同步模块405通过建立的无线连接将自身的配置文件发送至第二终端,并确定接收到同步成功响应时,同步完成;Specifically, when the wireless terminal is initialized to the first terminal, the synchronization module 405 sends its own configuration file to the second terminal through the established wireless connection, and determines that when the synchronization success response is received, the synchronization is completed;
当无线终端初始化为第二终端时,同步模块405通过建立的无线连接接收到第一终端发送的配置文件后,将接收到的配置文件与本地保存的配置文件进行比较,确定第一终端对第二终端具有监控权限时,返回同步成功响应;否则,发送同步失败响应。When the wireless terminal is initialized to the second terminal, the synchronization module 405 receives the configuration file sent by the first terminal through the established wireless connection, compares the received configuration file with the locally saved configuration file, and determines the first terminal pair. When the second terminal has monitoring authority, it returns a synchronous success response; otherwise, it sends a synchronization failure response.
在实际应用中,通过多个具有本发明实施例提供的监控装置的无线终端,可以组成一个无线终端监控网络。 In a practical application, a wireless terminal monitoring network can be formed by a plurality of wireless terminals having the monitoring device provided by the embodiment of the present invention.
本发明实施例还提供一种无线终端监控系统,如图6所示,该无线终端监控系统至少包括两个终端:第一终端10、第二终端20;The embodiment of the present invention further provides a wireless terminal monitoring system. As shown in FIG. 6, the wireless terminal monitoring system includes at least two terminals: a first terminal 10 and a second terminal 20;
其中,第一终端10包括有图5或图4所示的监控装置,且该监控装置的监控状态为AP状态;第二终端20包括有图5或图4所示的监控装置,且该监控装置的监控状态为STA状态。The first terminal 10 includes the monitoring device shown in FIG. 5 or FIG. 4, and the monitoring state of the monitoring device is an AP state; the second terminal 20 includes the monitoring device shown in FIG. 5 or FIG. 4, and the monitoring device The monitoring status of the device is the STA status.
具体的,监控系统中至少一个无线终端为第一终端10,其它无线终端为第二终端20;或者,监控系统中至少一个无线终端为第二终端20,其它无线终端为第一终端10。Specifically, at least one wireless terminal in the monitoring system is the first terminal 10, and the other wireless terminals are the second terminal 20; or at least one wireless terminal in the monitoring system is the second terminal 20, and the other wireless terminals are the first terminal 10.
在实际应用中,任何一个无线终端,既可以作为监控终端,也可以作为被监控终端;并且,一个监控终端可以监控多个被监控终端;反之,一个被监控终端也可以由多个监控终端进行监控;其中,监控和被监控的原理与第一终端作为监控终端时的实现原理、以及第二终端作为被监控终端时的实现原理相同。In practical applications, any wireless terminal can be used as both a monitoring terminal and a monitored terminal; and one monitoring terminal can monitor multiple monitored terminals; conversely, one monitored terminal can also be performed by multiple monitoring terminals. Monitoring; wherein the principle of monitoring and being monitored is the same as the implementation principle when the first terminal is used as the monitoring terminal, and the implementation principle when the second terminal is used as the monitored terminal.
图7为本发明具体应用实例中无线终端监控系统的网络示意图,如图7所示,该监控系统包括:智能手机30、智能手机40、便携式附件50、智能手机60;7 is a schematic diagram of a network of a wireless terminal monitoring system according to a specific application example of the present invention. As shown in FIG. 7, the monitoring system includes: a smart phone 30, a smart phone 40, a portable accessory 50, and a smart phone 60;
其中,智能手机30,具体为图6中的第一终端10;智能手机40、便携式附件50、智能手机60,具体为图6中的第二终端20。The smart phone 30 is specifically the first terminal 10 in FIG. 6; the smart phone 40, the portable accessory 50, and the smart phone 60, specifically the second terminal 20 in FIG.
智能手机30机通过WIFI与智能手机40、便携式附件50、智能手机60建立WIFI连接,同时对智能手机40、便携式附件50、智能手机60进行监控,其中,对智能手机40监控的安全区域范围为1m,对便携式附件50监控的安全区域范围为2m,对智能手机60监控的安全区域范围为5m。The smart phone 30 establishes a WIFI connection with the smart phone 40, the portable accessory 50, and the smart phone 60 through WIFI, and simultaneously monitors the smart phone 40, the portable accessory 50, and the smart phone 60, wherein the security area monitored by the smart phone 40 is 1m, the safe area for monitoring the portable accessory 50 is 2m, and the safe area for monitoring the smart phone 60 is 5m.
当智能手机40与智能手机30之间的距离小于1m时,智能手机40发出告警信号,并通过WIFI连接向智能手机30发送第二告警信息。智能手机30收到智能手机40发送的第二告警信息后也发出告警信号,并可获知 当前为智能手机40超出安全区域范围。When the distance between the smartphone 40 and the smartphone 30 is less than 1 m, the smartphone 40 sends an alarm signal and transmits the second alarm information to the smartphone 30 through the WIFI connection. After receiving the second alarm information sent by the smart phone 40, the smart phone 30 also sends an alarm signal, and can be informed. Currently the smartphone 40 is out of the safe area.
当便携式附件50与智能手机30之间的距离小于2m时,便携式附件50发出告警信号,并通过WIFI连接向智能手机30发送第二告警信息,智能手机30收到便携式附件50发送的告警信息后也发出告警信号,并可获知当前为便携式附件50超出安全区域范围。When the distance between the portable accessory 50 and the smart phone 30 is less than 2 m, the portable accessory 50 sends an alarm signal, and sends a second alarm information to the smart phone 30 through the WIFI connection, and the smart phone 30 receives the alarm information sent by the portable accessory 50. An alarm signal is also issued, and it is known that the current portable accessory 50 is out of the safe area.
当智能手机60因电量不足而关机时,智能手机30检测到智能手机40断开WIFI连接,发出告警信号,并可获知当前为智能手机60断开WIFI连接。When the smart phone 60 is turned off due to insufficient power, the smart phone 30 detects that the smart phone 40 disconnects the WIFI, sends an alarm signal, and can know that the smart phone 60 is disconnected from the WIFI.
本发明实施例还提供一种计算机存储介质,其中存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一实施例所述的方法。An embodiment of the present invention further provides a computer storage medium storing computer executable instructions for performing the method described in any of the above embodiments.
上述各模块可以由电子设备中的中央处理器(Central Processing Unit,CPU)、数字信号处理器(Digital Signal Processor,DSP)或可编程逻辑阵列(Field-Programmable Gate Array,FPGA)实现。Each of the above modules may be implemented by a central processing unit (CPU), a digital signal processor (DSP), or a field-programmable gate array (FPGA) in the electronic device.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功 能的装置。The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. The work specified in one or more blocks of a flow or a flow and/or a block diagram of a flowchart Able device.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。 These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Claims (12)

  1. 一种无线终端监控方法,其中,所述监控方法包括:A wireless terminal monitoring method, wherein the monitoring method comprises:
    无线终端根据用户选择的监控状态初始化为第一终端或第二终端;The wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user;
    所述第一终端与所述第二终端建立无线连接;Establishing, by the first terminal, a wireless connection with the second terminal;
    所述第一终端与所述第二终端分别检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号。The first terminal and the second terminal respectively detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
  2. 根据权利要求1所述的监控方法,其中,所述监控状态包括:The monitoring method according to claim 1, wherein the monitoring status comprises:
    接入点(AP)状态、站点(STA)状态;Access point (AP) status, station (STA) status;
    相应的,无线终端根据用户选择的监控状态初始化为第一终端或第二终端包括:Correspondingly, the wireless terminal is initialized to the first terminal or the second terminal according to the monitoring state selected by the user, including:
    当所述监控状态为AP状态时,将所述无线终端初始化为第一终端;When the monitoring status is an AP status, initializing the wireless terminal as a first terminal;
    当所述监控状态为STA状态时,将所述无线终端初始化为第二终端;When the monitoring state is a STA state, the wireless terminal is initialized to a second terminal;
    其中,所述第一终端为监控终端,所述第二终端为被监控终端。The first terminal is a monitoring terminal, and the second terminal is a monitored terminal.
  3. 根据权利要求2所述的监控方法,其中,所述第一终端与所述第二终端建立无线连接之前,所述监控方法还包括:根据用户设置的监控信息生成配置文件;The monitoring method according to claim 2, wherein the monitoring method further comprises: generating a configuration file according to the monitoring information set by the user, before the first terminal establishes a wireless connection with the second terminal;
    其中,当所述无线终端初始化为第一终端时,所述监控信息包括:AP名称、AP密码、所述第一终端可监控的无线终端的设备信息;The monitoring information includes: an AP name, an AP password, and device information of the wireless terminal that can be monitored by the first terminal, when the wireless terminal is initialized to the first terminal;
    当所述无线终端初始化为第二终端时,所述监控信息包括:AP名称、AP密码;所述第二终端的设备信息、应用场景信息、以及安全区域范围;When the wireless terminal is initialized to the second terminal, the monitoring information includes: an AP name, an AP password; device information of the second terminal, application scenario information, and a security area range;
    其中,所述应用场景包括:室内环境、或室外环境、或野外环境。The application scenario includes: an indoor environment, an outdoor environment, or a wild environment.
  4. 根据权利要求3所述的监控方法,其中,所述根据用户设置的监控信息生成配置文件之后,所述监控方法还包括:所述第一终端与所述第二终端同步所述配置文件。The monitoring method according to claim 3, wherein after the generating the configuration file according to the monitoring information set by the user, the monitoring method further comprises: the first terminal synchronizing the configuration file with the second terminal.
  5. 根据权利要求1至4任一项所述的监控方法,其中,当所述无线终 端初始化为第一终端时,所述告警条件包括:所述无线连接断开、或接收到所述第二终端的第二告警信息;The monitoring method according to any one of claims 1 to 4, wherein when said wireless terminal When the terminal is initialized to the first terminal, the alarm condition includes: the wireless connection is disconnected, or the second alarm information of the second terminal is received;
    相应的,发出告警信号包括:触发第一告警信息,并驱动发出告警信号;Correspondingly, sending the alarm signal includes: triggering the first alarm information, and driving the alarm signal to be sent;
    当所述无线终端初始化为第二终端时,所述告警条件为:所述无线连接的信号值低于阈值;其中,所述阈值由所述第二终端的所述配置文件确定;When the wireless terminal is initialized to the second terminal, the alarm condition is: the signal value of the wireless connection is lower than a threshold; wherein the threshold is determined by the configuration file of the second terminal;
    相应的,发出告警信号包括:触发并发送第二告警信息,驱动发出告警信号。Correspondingly, sending the alarm signal includes: triggering and sending the second alarm information, and driving the alarm signal.
  6. 一种无线终端监控装置,其中,所述监控装置包括:初始化模块、连接模块、监控模块;其中,A wireless terminal monitoring device, wherein the monitoring device comprises: an initialization module, a connection module, and a monitoring module; wherein
    所述初始化模块,配置为根据用户选择的监控状态将所述监控装置所在的无线终端初始化为第一终端或第二终端;The initialization module is configured to initialize the wireless terminal where the monitoring device is located as the first terminal or the second terminal according to the monitoring state selected by the user;
    所述连接模块,配置为在所述第一终端与所述第二终端之间建立无线连接;The connection module is configured to establish a wireless connection between the first terminal and the second terminal;
    所述监控模块,配置为检测所述无线连接是否满足告警条件,确定满足所述告警条件时发出告警信号。The monitoring module is configured to detect whether the wireless connection meets an alarm condition, and determine that an alarm signal is sent when the alarm condition is met.
  7. 根据权利要求6所述的监控装置,其中,The monitoring device according to claim 6, wherein
    所述初始化模块,配置为当所述监控状态为AP状态时,将所述无线终端初始化为第一终端;当所述监控状态为STA状态时,将所述无线终端初始化为第二终端;其中,所述第一终端为监控终端,所述第二终端为被监控终端。The initialization module is configured to initialize the wireless terminal as a first terminal when the monitoring state is an AP state, and initialize the wireless terminal to a second terminal when the monitoring state is an STA state; The first terminal is a monitoring terminal, and the second terminal is a monitored terminal.
  8. 根据权利要求7所述的监控装置,其中,所述监控装置还包括配置模块,配置为根据用户设置的监控信息生成配置文件;The monitoring device according to claim 7, wherein the monitoring device further comprises a configuration module configured to generate a configuration file according to monitoring information set by the user;
    其中,当所述无线终端初始化为第一终端时,所述监控信息包括:AP 名称、AP密码、所述第一终端可监控的无线终端的设备信息;Wherein, when the wireless terminal is initialized to the first terminal, the monitoring information includes: an AP a name, an AP password, and device information of the wireless terminal that can be monitored by the first terminal;
    当所述无线终端初始化为第二终端时,所述监控信息包括:AP名称、AP密码;所述第二终端自身的设备信息、应用场景信息、安全区域范围;When the wireless terminal is initialized to the second terminal, the monitoring information includes: an AP name, an AP password; device information of the second terminal itself, application scenario information, and a security area range;
    其中,所述应用场景包括:室内环境、或室外环境、或野外环境。The application scenario includes: an indoor environment, an outdoor environment, or a wild environment.
  9. 根据权利要求8所述的监控装置,其中,所述监控装置还包括同步模块,配置为在所述第一终端与所述第二终端之间同步所述配置文件。The monitoring device of claim 8, wherein the monitoring device further comprises a synchronization module configured to synchronize the configuration file between the first terminal and the second terminal.
  10. 根据权利要求6至9任一项所述的监控装置,其中,所述监控模块配置为:The monitoring device according to any one of claims 6 to 9, wherein the monitoring module is configured to:
    当所述无线终端初始化为第一终端时,所述无线连接断开、或接收到所述第二终端的第二告警信息的情况下,触发第一告警信息,并驱动发出告警信号;When the wireless terminal is initialized to the first terminal, when the wireless connection is disconnected or the second alarm information of the second terminal is received, the first alarm information is triggered, and the alarm signal is sent;
    当所述无线终端初始化为第二终端时,所述无线连接的信号值低于阈值的情况下,触发并发送第二告警信息,驱动发出告警信号;When the wireless terminal is initialized to the second terminal, if the signal value of the wireless connection is lower than the threshold, the second alarm information is triggered and sent, and the alarm signal is sent;
    其中,所述阈值由所述第二终端的配置文件确定。The threshold is determined by a configuration file of the second terminal.
  11. 一种无线监控系统,其中,包括至少两个权利要求6至10任一项所述的监控装置;A wireless monitoring system, comprising at least two monitoring devices according to any one of claims 6 to 10;
    其中,所述系统中至少一个所述监控装置所在的无线终端为第一终端,其余所述监控装置所在的无线终端为第二终端;或者,所述系统中至少一个所述监控装置所在的无线终端为第二终端,其余所述监控装置所在的无线终端为第一终端。The wireless terminal where the monitoring device is located in the system is the first terminal, and the wireless terminal where the other monitoring device is located is the second terminal; or the wireless device where at least one of the monitoring devices is located in the system The terminal is a second terminal, and the remaining wireless terminals where the monitoring device is located are the first terminal.
  12. 一种计算机存储介质,其中存储有计算机可执行指令,所述计算机可执行指令用于执行所述权利要求1至5任一项所述的方法。 A computer storage medium having stored therein computer executable instructions for performing the method of any one of claims 1 to 5.
PCT/CN2014/088644 2014-03-21 2014-10-15 Wireless terminal monitoring method, apparatus and system and computer storage medium WO2015139451A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410109889.7A CN104936201A (en) 2014-03-21 2014-03-21 Wireless terminal monitoring method, device thereof and system thereof
CN201410109889.7 2014-03-21

Publications (1)

Publication Number Publication Date
WO2015139451A1 true WO2015139451A1 (en) 2015-09-24

Family

ID=54123104

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/088644 WO2015139451A1 (en) 2014-03-21 2014-10-15 Wireless terminal monitoring method, apparatus and system and computer storage medium

Country Status (2)

Country Link
CN (1) CN104936201A (en)
WO (1) WO2015139451A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654408A (en) * 2020-04-24 2020-09-11 平安科技(深圳)有限公司 Equipment monitoring method and device, computer equipment and storage medium

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713638B (en) * 2016-12-26 2021-05-28 上海传英信息技术有限公司 Control system based on intelligent terminal
CN107105499A (en) * 2017-04-19 2017-08-29 东软集团股份有限公司 A kind of equipment localization method and terminal device
CN108010265A (en) * 2017-10-30 2018-05-08 捷开通讯(深圳)有限公司 Displacement based reminding method, storage device under mobile terminal and its off-line mode
CN110503794A (en) * 2019-08-01 2019-11-26 杭州朗鸿科技股份有限公司 A kind of wireless supervisory control system for commodity anti-theft
CN112802319B (en) * 2020-12-31 2021-12-17 哈尔滨市科佳通用机电股份有限公司 Anti-missing code sending system and anti-missing method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247609A (en) * 2007-02-12 2008-08-20 北京三星通信技术研究有限公司 Method and system for monitoring between mobile terminals
US20100296441A1 (en) * 2006-02-22 2010-11-25 Elad Barkan Wireless internet system and method
CN202512693U (en) * 2012-02-21 2012-10-31 谷松 Intelligent bluetooth anti-thief device and anti-thief system
CN103297094A (en) * 2012-03-01 2013-09-11 宇龙计算机通信科技(深圳)有限公司 Method and system for monitoring based on short distance wireless communication technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490509B (en) * 2013-09-04 2016-08-24 广州供电局有限公司 The electric energy monitoring system of household electrical appliance

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100296441A1 (en) * 2006-02-22 2010-11-25 Elad Barkan Wireless internet system and method
CN101247609A (en) * 2007-02-12 2008-08-20 北京三星通信技术研究有限公司 Method and system for monitoring between mobile terminals
CN202512693U (en) * 2012-02-21 2012-10-31 谷松 Intelligent bluetooth anti-thief device and anti-thief system
CN103297094A (en) * 2012-03-01 2013-09-11 宇龙计算机通信科技(深圳)有限公司 Method and system for monitoring based on short distance wireless communication technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654408A (en) * 2020-04-24 2020-09-11 平安科技(深圳)有限公司 Equipment monitoring method and device, computer equipment and storage medium
CN111654408B (en) * 2020-04-24 2023-08-22 平安科技(深圳)有限公司 Device monitoring method, device, computer device and storage medium

Also Published As

Publication number Publication date
CN104936201A (en) 2015-09-23

Similar Documents

Publication Publication Date Title
WO2015139451A1 (en) Wireless terminal monitoring method, apparatus and system and computer storage medium
US11122392B2 (en) Provisioning wireless device profiles
US20180288054A1 (en) Anti-takeover systems and methods for network attached peripherals
EP2804415B1 (en) Method and device utilizing mobile terminal to remind user based on set position
WO2013175741A1 (en) Apparatus and method for transmitting messages
WO2015180158A1 (en) Method for detecting electric quantity of device, device and system
EP3179705B1 (en) Message processing method, system and related device
CN104809839A (en) Anti-theft monitoring method and system based on NFC
KR20170115085A (en) System and method for collecting and analyzing the state of a system
WO2017206318A1 (en) Mobile device, and method and apparatus for sharing location thereof
EP3069329A1 (en) Security panel with virtual sensors
TW201336287A (en) Method and system for monitoring and alarming using mobile phone
CN105100125B (en) A kind of dormancy control method of virtual desktop, apparatus and system
US9820321B2 (en) System and method of pairing wireless sensors with an access point control panel
EP3069333A1 (en) Mobile user interface for security panel
US10193704B2 (en) Device control method and apparatus in home network system
KR20210148778A (en) Electronic device and method for performing ranging through uwb
CN107770849B (en) Communication equipment and power saving control method and system thereof in Bluetooth communication
WO2015172440A1 (en) Missed call notification method and system
CN105812271A (en) Wireless router equipment with function of losing prompt and communication method
US20150081919A1 (en) Control system and method for controlling network connection of electronic devices
TWM480823U (en) A rotor machine position management system
CN110209258A (en) Repositioning method, device, server cluster, electronic equipment and storage medium
CN106153095B (en) The collaboration method and device of a kind of electronic equipment
JP2018000554A (en) Onset risk warning system, onset risk warning program, and onset risk warning method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14886104

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14886104

Country of ref document: EP

Kind code of ref document: A1