CN104717601B - Wireless monitoring equipment logs in the method and system of wireless network - Google Patents
Wireless monitoring equipment logs in the method and system of wireless network Download PDFInfo
- Publication number
- CN104717601B CN104717601B CN201410419665.6A CN201410419665A CN104717601B CN 104717601 B CN104717601 B CN 104717601B CN 201410419665 A CN201410419665 A CN 201410419665A CN 104717601 B CN104717601 B CN 104717601B
- Authority
- CN
- China
- Prior art keywords
- coding
- frequency
- network
- sound wave
- audio data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
Abstract
The present invention provides the method and systems that a kind of wireless monitoring equipment logs in wireless network, wherein the method includes:Terminal obtains network identity and network cipher, the network identity and network cipher separately include at least one character;The network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and generate audio data according to the frequency of sound wave;The audio data is converted to voice signal and sent by terminal;Wireless monitoring equipment receives the voice signal, is decoded to obtain the network identity and network cipher to the voice signal;Wireless monitoring equipment logs on to corresponding wireless network according to the network identity and network cipher.The above method and system improve the efficiency that wireless monitoring equipment logs on to wireless network.
Description
Technical field
The present invention relates to wireless communication technology fields, and the side of wireless network is logged in more particularly to a kind of wireless monitoring equipment
Method and system.
Background technology
With the development of the social economy, the security protection consciousness of people is more and more stronger, video monitoring rises in safety precaution
Highly important effect, monitoring device in the market includes wired monitoring device and wireless monitoring equipment.Wired monitoring equipment
Must connected with network cable be likely to Telnet, and wireless monitoring equipment need to only access wireless network can conveniently realize Telnet.
For wireless monitoring equipment due to not needing cumbersome network layout, installation is simple, easy to use and be greatly favored by consumers.
User equipment need to carry out following two step with the method that monitoring device establishes wireless communication and operate:1) wireless monitor is set
The standby network information carries out configuration so that wireless monitoring equipment logs on to wireless network;2) in user equipment scans wireless network
Wireless monitoring equipment and be added.
The method that traditional wireless monitoring equipment logs in wireless network is:Pass through Web broadcast mode and U mouthfuls of driving configurations
Mode configures the network information of wireless monitoring equipment so that wireless monitoring equipment logs on in corresponding wireless network.
Wherein, Web broadcast mode and U mouthfuls of driving configuration modes are required for complete by the configuration software ability of profession on a user device
At configuration process, configuration error, will usually carry out user certain training, due to needing to develop special configuration in order to prevent
Software or driving could make user equipment is established with monitoring device to wirelessly communicate, and traditional wireless monitoring equipment logs in wireless network
Excessively complexity is configured to the network information of wireless monitoring equipment in network method, wireless monitoring equipment is caused to log on to wireless network
The inefficiency of network extends the R&D cycle of wireless monitoring equipment, increases development difficulty.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of network information configuration simple wireless monitoring equipment
Log in the method and system of wireless network.
A kind of method that wireless monitoring equipment logs in wireless network, the method includes:
Terminal obtains network identity and network cipher, the network identity and network cipher separately include at least one word
Symbol;
The network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and are given birth to according to the frequency of sound wave
At audio data;
The audio data is converted to voice signal and sent by terminal;
Wireless monitoring equipment receives the voice signal, is decoded to obtain the network identity to the voice signal
And network cipher;
Wireless monitoring equipment logs on to corresponding wireless network according to the network identity and network cipher.
The frequency of sound wave corresponds to unique identification number in one of the embodiments,;The terminal is by the network mark
Know and network cipher is mapped as corresponding frequency of sound wave, and the step of generating audio data according to the frequency of sound wave, including:
According to the mapping table of preset character and coding, corresponding first coding of the network identity and net are obtained
Corresponding second coding of network password;
According to corresponding multiple first frequency of sound wave of identification number acquisition for including in first coding, and according to
The identification number for including in second coding obtains corresponding multiple second frequency of sound wave;
Audio data is generated according to first frequency of sound wave and second frequency of sound wave.
The network identity and network cipher are mapped as corresponding frequency of sound wave by terminal in one of the embodiments,
And the step of audio data is generated according to the frequency of sound wave, including:
According to the mapping table of preset character and coding, corresponding first coding of the network identity and net are obtained
Corresponding second coding of network password;
It encoded according to described first, include in the second coding, the first number of characters for including in network identity, network cipher
Second number of characters and preset marker bit generate the data of preset data form;
Corresponding multiple third frequency of sound wave are obtained according to the identification number for including in the data;
Audio data is generated according to the third frequency of sound wave.
Include start mark position, stop flag position, repeats bits in the preset data form in one of the embodiments,
Split marker bit and spaced markings position;Encoded according to described first, the second coding, the first number of characters for including in network identity,
The step of the second number of characters for including in network cipher and preset marker bit generate the data of preset data form, including:
Preset start mark number, stop flag number, repeats bits are split into label number and spaced markings number in order successively
It is inserted into start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position;First number of characters is obtained to correspond to
The first character number encoder and the corresponding second character number encoder of the second number of characters;
First character number encoder is inserted between start mark number and the first coding, the second character number encoder is inserted into and is spaced
Between marker bit and the second coding;
The first check bit is calculated by carrying out verification to the first coding, carrying out verification to the second coding is calculated the
Two check bit;
Obtain corresponding first check code of the first check bit and corresponding second check code of the second check bit;
First check code is inserted between the first coding and spaced markings number, the second check code is inserted into the second coding
Between end label number.
Described the step of audio data is generated according to the third frequency of sound wave in one of the embodiments, including:
Sample frequency and sending time are obtained, the sending time refers to sending third frequency of sound wave duration;
Sampling number is calculated by sample frequency and sending time;
The sampling time interval in unit period is calculated by the sample frequency, third frequency of sound wave;
Formula, which is generated, by preset audio data generates audio data using using points and sampling time interval.
The wireless monitoring equipment receives the voice signal in one of the embodiments, to the voice signal
The step of being decoded to obtain the network identity and network cipher, including:
The voice signal that terminal is sent is received, and voice signal is converted into audio data;
Fast Fourier Transform (FFT) is carried out to the audio data segment, and records the obtained after fast Fourier variation
Three frequency of sound wave;
The third frequency of sound wave corresponding third coding is obtained, and the first check code in being encoded according to third and the
Two check codes verify third coding;
If verification passes through, third coding is decoded to obtain the first coding and the second coding;
According to the mapping table between preset character and coding, obtain the first corresponding network identity of coding and
The corresponding network cipher of second coding.
The system that a kind of wireless monitoring equipment logs in wireless network, the system comprises terminal and wireless monitoring equipment,
Described in terminal include:
Network information acquisition module, for obtaining network identity and network cipher, the network identity and network cipher point
It Bao Han not at least one character;
Data generation module, for the network identity and the network cipher to be mapped as corresponding frequency of sound wave, and
Audio data is generated according to the frequency of sound wave;
Signal transmitting module is additionally operable to the audio data being converted to voice signal and send out for the terminal
It goes;
The wireless monitoring equipment includes:
Signal decoder module is decoded the voice signal to obtain the net for receiving the voice signal
Network identifies and network cipher;
Network entry module, for logging in corresponding wireless network according to the network identity and network cipher.
The frequency of sound wave corresponds to unique identification number in one of the embodiments,;The data generation module includes:
Acquisition module is encoded, for the mapping table according to preset character and coding, obtains the network identity pair
Corresponding second coding of the first coding and network cipher answered;
Frequency acquisition module, for obtaining corresponding multiple first according to the identification number for including in first coding
Frequency of sound wave, and corresponding multiple second frequency of sound wave are obtained according to the identification number for including in second coding;
First audio data generation module, for generating sound according to first frequency of sound wave and second frequency of sound wave
Frequency evidence.
Data generation module described in root further includes in one of the embodiments,:
Acquisition module is encoded, for the mapping table according to preset character and coding, obtains the network identity pair
Corresponding second coding of the first coding and network cipher answered;
Formatted data generation module, the first word for being encoded according to described first, including in the second coding, network identity
The second number of characters and preset marker bit for including in symbol number, network cipher generate the data of preset data form;
Frequency of sound wave acquisition module, for obtaining corresponding multiple third sound waves according to the identification number for including in the data
Frequency;
Second audio data generation module, for generating audio data according to the third frequency of sound wave.
Include start mark position, stop flag position, repeats bits in the preset data form in one of the embodiments,
Split marker bit and spaced markings position;The formatted data generation module includes:
Label number be inserted into a module, for by preset start mark number, stop flag number, repeats bits split label number and
It is sequentially inserted into start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position in order every label number;
Character number encoder acquisition module, for obtaining the corresponding first character number encoder of first number of characters and the second word
Accord with the corresponding second character number encoder of number;
Character number encoder is inserted into module, for the first character number encoder to be inserted between start mark number and the first coding,
Second character number encoder is inserted between spaced markings position and the second coding;
Check bit computing module is compiled for the first check bit to be calculated by carrying out verification to the first coding to second
Code carries out verification and the second check bit is calculated;
Check code acquisition module, it is corresponding with corresponding first check code of the first check bit of acquisition and the second check bit
Second check code;
Check code is inserted into module, for the first check code to be inserted between the first coding and spaced markings number, by the
Two check codes are inserted between the second coding and end label number.
The second audio data generation module includes in one of the embodiments,:
Data obtaining module, for obtaining sample frequency and sending time, the sending time refers to sending third sound wave
Frequency duration;
Sampling number is calculated for passing through sample frequency and sending time in sampling number computing module;
Time interval computing module, for being calculated in unit period by the sample frequency, third frequency of sound wave
Sampling time interval;
Third audio data generation module is utilized for generating formula by preset audio data using points and sampling
Time interval generates audio data.
The signal decoder module includes in one of the embodiments,:
Data conversion module, the voice signal for receiving terminal transmission, and voice signal is converted into audio data;
Frequency record module for carrying out Fast Fourier Transform (FFT) to the audio data segment, and records quick Fu
In obtained third frequency of sound wave after leaf variation;
Coding checkout module for obtaining the third frequency of sound wave corresponding third coding, and is encoded according to third
The first check code and the second check code to the third coding verify;
Coding and decoding module is decoded third coding to obtain the first coding and the second volume if for verifying passing through
Code;
Code identification module, for according to the mapping table between preset characters and coding, obtaining first coding
Corresponding network identity and the corresponding network cipher of the second coding.
Above-mentioned wireless monitoring equipment logs in the method and system of wireless network, can be by terminal by network identity and network
Password is sent to wireless monitoring equipment with voice signal, and wireless monitoring equipment can be automatically logged into pair by receiving voice signal
In the wireless network answered, the purpose of the terminal-pair wireless monitoring equipment plug and play automatic configuration network information is realized, is simplified
Operating process to the configuration of the wireless monitoring equipment network information, thus, it improves wireless monitoring equipment and logs on to wireless network
Efficiency has shortened the R&D cycle of wireless monitoring equipment, has reduced R&D costs.
Description of the drawings
Fig. 1 is the method flow schematic diagram that wireless monitoring equipment logs in wireless network in one embodiment;
Fig. 2 is the amplified display figure of one section of voice signal in one embodiment;
Fig. 3 is the corresponding oscillogram of one section of voice signal sent in one embodiment;
Fig. 4 is the flow diagram for generating audio data step in one embodiment according to the frequency of sound wave;
Fig. 5 is the schematic diagram of the mapping table of character and coding in one embodiment;
Fig. 6 is the flow diagram that another embodiment generates audio data step according to the frequency of sound wave;
Fig. 7 is the flow diagram for the data step that preset data form is generated in one embodiment;
Fig. 8 is the data mode figure that preset data form is generated in one embodiment;
Fig. 9 is the flow signal that network identity and network cipher log on to corresponding wireless network step in one embodiment
Figure;
Figure 10 is the application scenario diagram for the method that wireless monitoring equipment logs in wireless network in one embodiment;
Figure 11 is the structural schematic diagram for the system that wireless monitoring equipment logs in wireless network in one embodiment;
Figure 12 is the structural schematic diagram of data generation module in one embodiment;
Figure 13 is the structural schematic diagram of data generation module in another embodiment;
Figure 14 is the structural schematic diagram of formatted data generation module in one embodiment;
Figure 15 is the structural schematic diagram of second audio data generation module in one embodiment;
Figure 16 is the structural schematic diagram of signal decoder module in one embodiment.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
As shown in Figure 1, in one embodiment, a kind of method that wireless monitoring equipment logs in wireless network is provided, it should
Method can be applied to establish the terminal of wireless communication with wireless monitoring equipment, and terminal can control wireless monitoring equipment, simultaneously
The monitoring picture that display wireless monitoring equipment transmits, these terminals include but not limited to the portable of AF playing function
Computer, personal digital assistant, tablet computer, smart mobile phone etc..This method comprises the following steps:
Step 101, terminal obtains network identity and network cipher.
In the present embodiment, network identity (SSID, service set) and network cipher (PASSWORD) are that wireless monitor is set
The standby network information for logging on to wireless network needs.Network identity and network cipher separately include at least one character.For example, net
Network mark and network cipher can be Route Distinguisher and routing login password under wireless router respectively.Terminal and wireless monitor
Equipment is under same wireless network, and terminal could be established with wireless monitoring equipment and be wirelessly communicated, and terminal obtains wireless monitor and sets
The network identity and cipher mark of the standby wireless network that will be logged in.
Step 102, network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and are given birth to according to frequency of sound wave
At audio data.
In the present embodiment, character, the word that terminal will include in network identity and network cipher are indicated by frequency of sound wave
Symbol is converted to corresponding frequency of sound wave, further, audio data is generated according to frequency of sound wave, for example, terminal is to by a string
Numerical character " 123 " is sent to wireless monitoring equipment, can the character " 1 ", " 2 " and " 3 " in " 123 " be first respectively converted into correspondence
10HZ, 20HZ and 30HZ frequency of sound wave, then according to the frequency of sound wave of 10HZ, 20HZ and 30HZ generate audio data.
In one embodiment, according to nyquist sampling theorem, in the transfer process for carrying out analog/digital signal,
If sample frequency is more than 2 times that send signal frequency, the signal after sampling could completely retain the letter in original signal
Breath.Network identity and network cipher are mapped as corresponding frequency of sound wave and similarly follow this principle by terminal, for example, wireless prison
The frequency of sound wave for controlling equipment sampling is 8000HZ, in order to ensure that wireless monitoring equipment can accurately identify the frequency of sound wave of terminal transmission
Corresponding character, then network identity and the frequency of sound wave highest of network cipher mapping are no more than 4000HZ (8000HZ/2).
Step 103, audio data is converted to voice signal and sent by terminal.
In the present embodiment, frequency of sound wave is played out by voice signal, specifically, the sound card in terminal is by audio data
It is converted to voice signal and is played out by included loud speaker, since voice signal corresponds to network identity and network is close
Code, wireless monitoring equipment is anti-by network identity and network cipher lane in order to prevent, should first believe the corresponding sound of network identity
It number plays out, then plays the corresponding voice signal of network cipher again.
Voice signal can be interfered in communication process by ambient noise, therefore be needed during sending voice signal
Pay attention to problems with:
(1) there should be enough discriminations between frequency of sound wave, that is, when should have enough between the voice signal sent
Between be spaced, by test, it is preferred that time interval be 100 milliseconds.As shown in Fig. 2, being one section of amplified display of voice signal
Scheme, the line of the different density degree in figure represents different frequency of sound wave, has fixed width between different frequency of sound wave, should
Width is the time interval sent between voice signal.
(2) since voice signal has certain loss and superimposed noise in the air so that wireless monitoring equipment receives
Voice signal outline is less than the voice signal that terminal is sent.As shown in figure 3, for one section of voice signal pair in the voice signal of transmission
The oscillogram answered is apparent that ambient noise is influenced caused by voice signal from figure.Therefore, sending voice signal needs
(SendTime) just can guarantee that wireless monitoring equipment can be analyzed receiving voice signal for a period of time for the transmission to be stablized,
Preferential after tested, SendTime takes 50 milliseconds.
(3) in order to avoid there is voice signal aliasing, during sending voice signal, network identity has been sent
It is needed after waiting for a period of time after corresponding voice signal, just sends the corresponding voice signal of network cipher.One section of the waiting
Time is transmission time interval (SendInterTime), and after tested preferably, SendInterTime is 1 second.
Step 104, wireless monitoring equipment receives voice signal, is decoded to obtain network identity and net to voice signal
Network password.
Step 105, wireless monitoring equipment logs on to corresponding wireless network according to network identity and network cipher.
The voice signal that terminal is sent is propagated in air, and the microphone of wireless monitoring equipment collects terminal and sends over
Voice signal after, voice signal be converted to be decoded after audio data get corresponding frequency of sound wave, according to sound wave
For frequency acquisition to network identity and network cipher, wireless monitoring equipment can log on to correspondence by network identity and network cipher
Wireless network.Terminal scans under the wireless network arrives the wireless monitoring equipment so that the wireless monitoring equipment is registered automatically
Into terminal so that terminal establishes the wireless communication between wireless monitoring equipment.
The method that above-mentioned wireless monitoring equipment logs in wireless network, can by terminal by network identity and network cipher with
Voice signal is sent to wireless monitoring equipment, and wireless monitoring equipment can automatically log into corresponding nothing by receiving voice signal
In gauze network, the purpose of the terminal-pair wireless monitoring equipment plug and play automatic configuration network information is realized, is simplified to nothing
The operating process of line monitoring device network information configuration, thus, high wireless monitoring equipment logs on to the efficiency of wireless network, shortens
R&D cycle of wireless monitoring equipment, reduce R&D costs.
In one embodiment, as shown in figure 4, network identity and network cipher are mapped as corresponding by step 102, terminal
Frequency of sound wave, and audio data is generated according to frequency of sound wave and includes:
Step 401, according to the mapping table of preset character and coding, obtain corresponding first coding of network identity with
And corresponding second coding of network cipher.
Coding is made of identification number, and the character that network identity and network cipher include is made of common character on keyboard,
Each character has unique coding, and the mapping table for establishing character and coding is set in advance in terminal.According to character with
The mapping table of coding, you can get corresponding first coding of network identity and corresponding second coding of network cipher.
In one embodiment, the character that network identity and network cipher include is common character totally 90 on keyboard,
The identification number that is used as by dibit numerical character is encoded to indicate.Specifically, as shown in figure 5, corresponding with coding for 90 characters
Relation table.
Step 402, according to corresponding multiple first frequency of sound wave of identification number acquisition for including in the first coding, and according to
The identification number for including in second coding obtains corresponding multiple second frequency of sound wave.
Since frequency of sound wave corresponds to unique identification number, according to the correspondence of frequency of sound wave and identification number, obtain respectively
The corresponding frequency of sound wave of each identification number for including in first coding, i.e. the first frequency of sound wave;It obtains and is wrapped in the second coding respectively
The corresponding frequency of sound wave of each identification number contained, i.e. the second frequency of sound wave.
Step 403, audio data is generated according to the first frequency of sound wave and the second frequency of sound wave.
In the present embodiment, sample frequency and sending time are obtained;Wherein, sample frequency refers to that terminal is per second from voice signal
Middle extraction and the sampling number for forming discrete signal, sending time is the time that a frequency of sound wave is persistently sent.Pass through sampling
Sampling number is calculated in frequency and sending time;It is calculated by sample frequency, the first frequency of sound wave and the second frequency of sound wave
Sampling time interval in unit period;Formula is generated by audio data to generate using sample frequency and sampling time interval
First frequency of sound wave and the corresponding audio data of the second frequency of sound wave.
In one embodiment, the sampling time interval in the following formula unit of account period can be used:
Wherein per is sampling time interval in the unit period, and SendRate is the sample frequency that terminal is sent, SigRate
For the single frequency of sound wave in the first frequency of sound wave and the second frequency of sound wave, SendTime is sending time.In sending time
The sampling number of transmission is SendNum;Then SendNum=SendRate*SendTime/1000;
It is SIN function formula, the first frequency of sound wave and the second frequency of sound wave in sending time that audio data, which generates formula,
Generate being described with following code for audio data:
SendNum=SendRate*SendTime/1000;
* 2 π of per=(SigRate/SendRate)
D=0;
For (i=0;i<SendNum;i++)
{
out[i]=sin (d) * (215/2)+128;
D=d+per;
}
out[i]In obtained data be the first frequency of sound wave and the corresponding audio data of the second frequency of sound wave.
In another embodiment, as shown in fig. 6, network identity and network cipher are mapped as corresponding to by step 102 terminal
Frequency of sound wave, and according to frequency of sound wave generate audio data include:
Step 601, according to the mapping table of preset character and coding, obtain corresponding first coding of network identity with
And corresponding second coding of network cipher.
Step 602, it is wrapped according in the first coding, the second coding, the first number of characters for including in network identity, network cipher
The second number of characters contained and preset marker bit generate the data of preset data form.
In order to enable wireless monitoring equipment obtains network identity after capable of being decoded to voice signal and network cipher is more acurrate, eventually
End needs to pre-process the first coding and the second coding, and pretreatment refers to according to the first coding, the second coding, the first character
Number, the second number of characters and marker bit generate the data of preset data form.Wherein each marker bit has specific meaning, is used for
Assist decoding of the wireless monitoring equipment to voice signal.
Step 603, corresponding multiple third frequency of sound wave are obtained according to the identification number for including in data.
Step 604, audio data is generated according to third frequency of sound wave.
Specifically, the process for generating audio data according to third frequency of sound wave is as follows:Sample frequency and sending time are obtained,
Sending time refers to sending third frequency of sound wave duration.Sampled point is calculated by sample frequency and sending time
Number.The sampling time interval in unit period is calculated by sample frequency, third frequency of sound wave.Pass through preset audio number
According to formula is generated audio data is generated using using points and sampling time interval.
In one embodiment, as shown in fig. 7, step 602, includes according in the first coding, the second coding, network identity
The first number of characters, include in network cipher the second number of characters and preset marker bit generate the data packet of preset data form
It includes:
Step 701, preset start mark number, stop flag number, repeats bits are split into label number and spaced markings number is pressed
Sequence is sequentially inserted into start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position.
In the present embodiment, in preset data form comprising start mark position, stop flag position, repeats bits split marker bit and
Spaced markings position.Wherein, spaced markings position first coding second coding between, start mark position first encode before,
Stop flag position is after the second coding, between the two consecutive identical labels number for including in the first coding or the second coding
Marker bit is split for repeats bits.Preset start mark number, stop flag number, repeats bits are split label number to terminal and interval is marked
Mark is sequentially inserted into corresponding marker bit.
Step 702, the corresponding first character number encoder of the first number of characters and corresponding second character of the second number of characters are obtained
Number encoder.
Step 703, the first character number encoder is inserted between start mark number and the first coding, by the second character number encoder
It is inserted between spaced markings position and the second coding.
Statistics network identifies character quantity i.e. the first number of characters for including, the character quantity that network cipher includes i.e. the respectively
Two number of characters.According to the mapping table of preset character and coding, the corresponding first character number encoder of the first number of characters is obtained,
The corresponding second character number encoder of second number of characters.For example, network identity be " abc123 ", network cipher be " def45 ", first
Number of characters is 6, and the second number of characters is 5, the first number of characters obtained according to the mapping table of character and coding as shown in Figure 5
It is encoded to 06, the second number of characters is encoded to 05.Start mark number and first coding between be inserted into the first character number encoder,
It is inserted into the second character number encoder between label number and the second coding.
Step 704, the first check bit is calculated by carrying out verification to the first coding, master gage is carried out to the second coding
Calculation obtains the second check bit.
Step 705, it obtains corresponding first check code of the first check bit and corresponding second verification of the second check bit is compiled
Code.
Step 706, the first check code is inserted between the first coding and spaced markings number, the second check code is inserted into
Between second coding and end label number.
Check bit is the data by being used for checking transmission after calculating the data in the first coding and the second coding
The number whether to malfunction to the first coding and the second coding carries out that the first verification is calculated respectively according to check bit calculation formula
Position and the second check bit.First check code is inserted between the first coding and spaced markings number, the second check code is inserted into
Between second coding and end label number.
Specifically, check bit calculation formula is:Sum it up the calculation formula of mould ten:K=(a1+a2+a3+a4+……+an) %
10, wherein anFor the identification number for including in coding.Operational formula pair first by summing it up mould ten encodes corresponding number and carries out
Operation obtains the first check bit, carries out obtaining the second check bit to the corresponding number of the second coding.According to preset character and volume
The mapping table of code, obtains corresponding first check code of the first check bit and corresponding second verification of the second check bit is compiled
Code.
For example, first is encoded to (02 09 25 31), the calculating process according to above-mentioned ten operational formula of adduction mould is:(2+
9+25+31) %10=7.What is obtained is the first check bit, and according to mapping table as shown in Figure 5, character " 7 " is corresponding
It is encoded to 07, i.e. the first check code is 07.
In the present embodiment, according to the first number of characters, the network cipher for including in the first coding, the second coding, network identity
In include the second number of characters and preset marker bit generate preset data form data mode it is as shown in Figure 8.
Illustrate to be compiled according to the first coding, second in lower technical scheme of the present invention with reference to a specific embodiment
The second number of characters and preset marker bit for including in code, the first number of characters for including in network identity, network cipher generate pre-
If the process of the data of data format:1400HZ corresponds to 0 to 9 respectively to 10 frequency of sound wave of 100HZ are divided between 2600HZ
10 Digital IDs, it is specific such as following table 1-1:
Table 1-1
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
1400HZ | 1500HZ | 1600HZ | 1700HZ | 1800HZ | 1900HZ | 2000HZ | 2100HZ | 2200HZ | 2300HZ |
Tri- frequency of sound wave of 2400HZ, 2500HZ and 2600HZ correspond to start stop label number respectively, repeats bits split mark
Mark and spaced markings number identify, specific such as following table 1-2:
Table 1-2
Start stop label number | Repeats bits split label number | Spaced markings number |
2400HZ | 2500HZ | 2600HZ |
If the network identity that terminal obtains is " zmodo123 ", network cipher is " abcd ".Then pass through word as shown in Figure 5
The mapping table of symbol and coding, the first coding and the second coding such as following table 1-3 got:
Table 1-3
Network identity | zmodo123 | 35 22 24 13 24 01 02 03 |
Network cipher | abcd | 10 11 12 13 |
The first number of characters for including in network identity is 8, and corresponding first number of characters is encoded to 08;It is wrapped in network cipher
The second number of characters contained is 4, and corresponding second number of characters is encoded to 04.The calculating process of mould ten is summed up to the first coding
For:(35+22+24+13+24+01+02+03) %10=4, i.e. the first check bit are 4, and corresponding first syndrome encoded is
04;Summing up the calculating process of mould ten to the second coding is:(10+11+12+13) %10=6, i.e. the second check bit position 6,
Corresponding second check bit position 06.Therefore, the data for generating preset data form are:
▲08352●2●24132401020304★04101●1●121306▲
Wherein first ▲ be start mark number, second ▲ be stop flag number, ● for repeats bits split label number, ★
For spaced markings number.
In one embodiment, as shown in figure 9, step 104, wireless monitoring equipment receive voice signal, sound is believed
It number is decoded to obtain network identity and network cipher, and corresponding wireless network is logged on to according to network identity and network cipher
Include:
Step 901, the voice signal that terminal is sent is received, and voice signal is converted into audio data.
Step 902, Fast Fourier Transform (FFT) is carried out to audio data segment, and is obtained after recording fast Fourier variation
Third frequency of sound wave.
Step 903, third frequency of sound wave corresponding third coding is obtained, and the first check code in being encoded according to third
Third coding is verified with the second check code.
Step 904, if verification passes through, third coding is decoded to obtain the first coding and the second coding;
Step 905, according to the mapping table between preset characters and coding, the corresponding network identity of the first coding is obtained
And the second corresponding network cipher of coding.
In the present embodiment, audio data is resolved into audio data one by one by wireless monitoring equipment, and will be with frame
The audio data of unit copies extra buffer to, then copies audio data to carry out fast Fourier from extra buffer
(FFT) in the buffering area converted;If the audio data quantity in buffering area meets the data volume of a FFT transform, slow to it
The audio data for rushing area carries out FFT transform.
The data volume of FFT transform is the one third of wireless monitoring equipment sampled point number in sending time, and FFT becomes
Change the power that required sampled point number is necessary for 2.When obtained sampled point number is not 2 power, it is mended
Z-operation, then carry out FFT transform.For example, sending time is 50 milliseconds, the sample frequency RecvRate=of wireless monitoring equipment
8000HZ, then the sampled point number RecvNum=SendTime* received in wireless monitoring equipment in sending time
RecvRate/1000=400;That is data volume needed for a FFT transform is RecvNum/3=134, cannot use 2 due to 134
Power is indicated, therefore zero padding operation is carried out to it to meet 2 power.
After carrying out FFT transform, the corresponding frequency of sound wave of FFT peak values is obtained, then searches the frequency of sound wave pair in identification number
The identification number answered continues to analyze next section audio data, is successfully stored in the result of analysis if searching if searching failure
In list to be decoded.It repeats the above process until carrying out Fast Fourier Transform (FFT) completion to third audio data segment.
Wireless monitoring equipment is treated the data in decoded list according to preset data form and is decoded, specifically, root
Third coding is split to obtain the first volume according to start mark number, stop flag number, repeats bits fractionation number and spaced markings number
Code and the second coding, the first syndrome encoded pair first coding in being encoded according to third carries out verification and the second check bit is compiled
Code verifies the second check code, if verification passes through, the first coding can be obtained according to character and coding mapping table
Corresponding network identity and the corresponding network cipher of the second coding.Wireless monitoring equipment can be logged in by the wireless network password
Into corresponding wireless network.
Illustrate lower technical scheme of the present invention with reference to a specific embodiment, as shown in Figure 10, terminal includes:Intelligence
Energy mobile phone 13, tablet computer 15 and desktop computer 14, wireless network refer to the network that wireless router 12 covers, and wireless monitor is set
Standby is wireless monitor camera 11.By taking smart mobile phone 13 as an example, smart mobile phone 13 is connected to by Route Distinguisher and routing password
Wireless router 12, and Route Distinguisher and routing password are converted to voice signal and are played out by loud speaker.Wireless monitor
Camera 11 obtains Route Distinguisher by decoding after receiving voice signal and route password, and according to Route Distinguisher and route close
Code logs on in wireless router 12.Smart mobile phone 13 can establish channel radio with wireless monitor camera 11 under wireless network
Letter.
In one embodiment, as shown in figure 11, the system that a kind of wireless monitoring equipment provided logs in wireless network, should
System includes terminal 20 and wireless monitoring equipment 30, and wherein terminal 20 includes:
Network information acquisition module 21, for obtaining network identity and network cipher, network identity and network cipher difference
Including at least one character.
Data generation module 22, for network identity and network cipher to be mapped as corresponding frequency of sound wave, and according to sound
Wave frequency rate generates audio data.
Signal transmitting module 23 is additionally operable to audio data being converted to voice signal and send for terminal.
Wireless monitoring equipment 30 includes:
Signal decoder module 31 is decoded voice signal to obtain network identity and net for receiving voice signal
Network password.
Network entry module 32 logs in corresponding wireless network according to network identity and network cipher.
In one embodiment, as shown in figure 12, data generation module 22 includes:
Acquisition module 221 is encoded, for the mapping table according to preset character and coding, network identity is obtained and corresponds to
First coding and network cipher it is corresponding second coding.
Frequency acquisition module 222, for obtaining corresponding multiple first sound waves according to the identification number for including in the first coding
Frequency, and corresponding multiple second frequency of sound wave are obtained according to the identification number for including in the second coding.
First audio data generation module 223, for generating audio number according to the first frequency of sound wave and the second frequency of sound wave
According to.
In another embodiment, as shown in figure 13, data generation module 22 further includes:
Acquisition module 221 is encoded, for the mapping table according to preset character and coding, network identity is obtained and corresponds to
First coding and network cipher it is corresponding second coding.
Formatted data generation module 224, for according to the first word for including in the first coding, the second coding, network identity
The second number of characters and preset marker bit for including in symbol number, network cipher generate the data of preset data form.
Frequency of sound wave acquisition module 225, for obtaining corresponding multiple third sound waves according to the identification number for including in data
Frequency.
Second audio data generation module 226, for generating audio data according to third frequency of sound wave.
In one embodiment, as shown in figure 14, formatted data generation module 224 includes:
Label number is inserted into module 2241, for preset start mark number, stop flag number, repeats bits to be split label number
It is sequentially inserted into start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position in order with spaced markings number.
Character number encoder acquisition module 2242, for obtaining the corresponding first character number encoder of the first number of characters and the second word
Accord with the corresponding second character number encoder of number.
In the present embodiment, in preset data form comprising start mark position, stop flag position, repeats bits split marker bit and
Spaced markings position.Wherein, spaced markings position first coding second coding between, start mark position first encode before,
Stop flag position is after the second coding, between the two consecutive identical labels number for including in the first coding or the second coding
Marker bit is split for repeats bits.
Character number encoder is inserted into module 2243, for the first character number encoder to be inserted into start mark number and the first coding
Between, the second character number encoder is inserted between spaced markings position and the second coding.
Check bit computing module 2244, for the first check bit to be calculated by carrying out verification to the first coding, to the
Two codings carry out verification and the second check bit are calculated.
Check code acquisition module 2245, with corresponding first check code of the first check bit of acquisition and the second check bit pair
The second check code answered.
Check code is inserted into module 2246, for the first check code to be inserted between the first coding and spaced markings number,
Second check code is inserted between the second coding and end label number.
In one embodiment, as shown in figure 15, second audio data generation module 226 includes:
Data obtaining module 2261, for obtaining sample frequency and sending time, sending time refers to sending third sound wave
Frequency duration.
Sampling number is calculated for passing through sample frequency and sending time in sampling number computing module 2262;
Time interval computing module 2263, for passing through sample frequency, third frequency of sound wave is calculated in unit period
Sampling time interval.
Third audio data generation module 2264, for by preset audio data generate formula utilize using points and
Sampling time interval generates audio data.
In one embodiment, as shown in figure 16, signal decoder module 31 includes:
Data conversion module 311, the voice signal for receiving terminal transmission, and voice signal is converted into audio number
According to.
Frequency record module 312 for carrying out Fast Fourier Transform (FFT) to audio data segment, and is recorded in quick Fu
The third frequency of sound wave obtained after leaf variation.
Coding checkout module 313 for obtaining third frequency of sound wave corresponding third coding, and is encoded according to third
First check code and the second check code verify third coding.
Coding and decoding module 314 is decoded to obtain the first coding and second if for verifying passing through to third coding
Coding.
Code identification module 315, for according to the mapping table between preset characters and coding, obtaining the first coding pair
The network identity answered and the corresponding network cipher of the second coding.
Only several embodiments of the present invention are expressed for above example, the description thereof is more specific and detailed, but can not
Therefore it is interpreted as the limitation to the scope of the claims of the present invention.It should be pointed out that for those of ordinary skill in the art,
Without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the protection model of the present invention
It encloses.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (8)
1. a kind of method that wireless monitoring equipment logs in wireless network, the method includes:
Terminal obtains network identity and network cipher, the network identity and network cipher separately include at least one character;
The network identity and network cipher coding mapping are corresponding frequency of sound wave, and are given birth to according to the frequency of sound wave by terminal
At audio data, including:According to the mapping table of preset character and coding, obtains the network identity corresponding first and compile
Code and corresponding second coding of network cipher;The first word for being encoded according to described first, including in the second coding, network identity
The second number of characters and preset marker bit for including in symbol number, network cipher generate the data of preset data form, described default
In data format marker bit and spaced markings position are split comprising start mark position, stop flag position, repeats bits;By preset starting
Label number, stop flag number, repeats bits split label number and spaced markings number are sequentially inserted into start mark position, stop mark in order
Remember that position, repeats bits split marker bit and spaced markings position;Obtain the corresponding first character number encoder of first number of characters and
The corresponding second character number encoder of two number of characters;First character number encoder is inserted between start mark number and the first coding, it will
Second character number encoder is inserted between spaced markings position and the second coding;It is calculated first by carrying out verification to the first coding
Check bit carries out verification to the second coding and the second check bit is calculated;Obtain corresponding first check code of the first check bit
And second corresponding second check code of check bit;First check code is inserted between the first coding and spaced markings number, it will
Second check code is inserted between the second coding and end label number;It is obtained according to the identification number for including in the data corresponding
Multiple third frequency of sound wave;Audio data is generated according to the third frequency of sound wave;
The audio data is converted to voice signal and sent by terminal;
Wireless monitoring equipment receives the voice signal, is decoded to obtain the network identity and net to the voice signal
Network password;
Wireless monitoring equipment logs on to corresponding wireless network according to the network identity and network cipher.
2. according to the method described in claim 1, it is characterized in that, the frequency of sound wave corresponds to unique identification number;The end
The network identity and network cipher are mapped as corresponding frequency of sound wave by end, and generate audio data according to the frequency of sound wave
The step of, including:
According to the mapping table of preset character and coding, obtains corresponding first coding of the network identity and network is close
Corresponding second coding of code;
Corresponding multiple first frequency of sound wave are obtained according to the identification number for including in first coding, and according to described
The identification number for including in second coding obtains corresponding multiple second frequency of sound wave;
Audio data is generated according to first frequency of sound wave and second frequency of sound wave.
3. according to the method described in claim 1, it is characterized in that, described generate audio data according to the third frequency of sound wave
The step of, including:
Sample frequency and sending time are obtained, the sending time refers to sending third frequency of sound wave duration;
Sampling number is calculated by sample frequency and sending time;
The sampling time interval in unit period is calculated by the sample frequency, third frequency of sound wave;
Formula, which is generated, by preset audio data generates audio data using using points and sampling time interval.
4. according to the method described in claim 1, it is characterized in that, the wireless monitoring equipment receives the voice signal,
The step of voice signal is decoded to obtain the network identity and network cipher, including:
The voice signal that terminal is sent is received, and voice signal is converted into audio data;
Fast Fourier Transform (FFT) is carried out to the audio data segment, and records the third sound obtained after fast Fourier variation
Wave frequency rate;
The third frequency of sound wave corresponding third coding is obtained, and the first check code in being encoded according to third and the second school
Coding is tested to verify third coding;
If verification passes through, third coding is decoded to obtain the first coding and the second coding;
According to the mapping table between preset character and coding, the corresponding network identity of first coding and second are obtained
Encode corresponding network cipher.
5. the system that a kind of wireless monitoring equipment logs in wireless network, which is characterized in that the system comprises terminals and wireless prison
Equipment is controlled, wherein the terminal includes:
Network information acquisition module, for obtaining network identity and network cipher, the network identity and network cipher wrap respectively
Containing at least one character;
Data generation module, for the network identity and the network cipher to be mapped as corresponding frequency of sound wave, and according to
The frequency of sound wave generates audio data, including:Acquisition module is encoded, for the correspondence according to preset character and coding
Table obtains corresponding first coding of the network identity and corresponding second coding of network cipher;Formatted data generation module,
Include in the first number of characters, network cipher for being encoded according to described first, including in the second coding, network identity second
Number of characters and preset marker bit generate the data of preset data form, in the preset data form comprising start mark position,
Stop flag position, repeats bits split marker bit and spaced markings position;Label number is inserted into module, is used for preset start mark
Number, stop flag number, repeats bits split label number and spaced markings number be sequentially inserted into start mark position, stop flag in order
Position, repeats bits split marker bit and spaced markings position;Character number encoder acquisition module is corresponded to for obtaining first number of characters
The first character number encoder and the corresponding second character number encoder of the second number of characters;Character number encoder is inserted into module, for by the
One character number encoder is inserted between start mark number and the first coding, and the second character number encoder is inserted into spaced markings position and second
Between coding;Check bit computing module is compiled for the first check bit to be calculated by carrying out verification to the first coding to second
Code carries out verification and the second check bit is calculated;Check code acquisition module is verified with the first check bit corresponding first is obtained
Coding and corresponding second check code of the second check bit;Check code is inserted into module, for the first check code to be inserted into the
Between one coding and spaced markings number, the second check code is inserted between the second coding and end label number;Frequency of sound wave obtains
Modulus block, for obtaining corresponding multiple third frequency of sound wave according to the identification number for including in the data;Second audio data
Generation module, for generating audio data according to the third frequency of sound wave;
Signal transmitting module is additionally operable to the audio data being converted to voice signal and send for the terminal;
The wireless monitoring equipment includes:
Signal decoder module is decoded the voice signal to obtain the network mark for receiving the voice signal
Knowledge and network cipher;
Network entry module, for logging in corresponding wireless network according to the network identity and network cipher.
6. system according to claim 5, which is characterized in that the frequency of sound wave corresponds to unique identification number;The number
Include according to generation module:
Acquisition module is encoded, for the mapping table according to preset character and coding, it is corresponding to obtain the network identity
First coding and corresponding second coding of network cipher;
Frequency acquisition module, for obtaining corresponding multiple first sound waves according to the identification number for including in first coding
Frequency, and corresponding multiple second frequency of sound wave are obtained according to the identification number for including in second coding;
First audio data generation module, for generating audio number according to first frequency of sound wave and second frequency of sound wave
According to.
7. system according to claim 5, which is characterized in that the second audio data generation module includes:
Data obtaining module, for obtaining sample frequency and sending time, the sending time refers to sending third frequency of sound wave
Duration;
Sampling number is calculated for passing through sample frequency and sending time in sampling number computing module;
Time interval computing module, for adopting in unit period to be calculated by the sample frequency, third frequency of sound wave
Sample time interval;
Third audio data generation module is utilized for generating formula by preset audio data using points and sampling time
Interval generates audio data.
8. system according to claim 5, which is characterized in that the signal decoder module includes:
Data conversion module, the voice signal for receiving terminal transmission, and voice signal is converted into audio data;
Frequency record module for carrying out Fast Fourier Transform (FFT) to the audio data segment, and records fast Fourier
The third frequency of sound wave obtained after variation;
Coding checkout module, for obtaining the third frequency of sound wave corresponding third coding, and in being encoded according to third
One check code and the second check code verify third coding;
Coding and decoding module is decoded third coding to obtain the first coding and the second coding if for verifying passing through;
Code identification module, for according to the mapping table between preset characters and coding, obtaining first coding and corresponding to
Network identity and the second corresponding network cipher of coding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410419665.6A CN104717601B (en) | 2014-08-22 | 2014-08-22 | Wireless monitoring equipment logs in the method and system of wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410419665.6A CN104717601B (en) | 2014-08-22 | 2014-08-22 | Wireless monitoring equipment logs in the method and system of wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104717601A CN104717601A (en) | 2015-06-17 |
CN104717601B true CN104717601B (en) | 2018-10-23 |
Family
ID=53416469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410419665.6A Active CN104717601B (en) | 2014-08-22 | 2014-08-22 | Wireless monitoring equipment logs in the method and system of wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104717601B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106658504A (en) * | 2015-07-15 | 2017-05-10 | 贝斯科技国际有限公司 | Wireless network configuration for dwelling safety equipment based on audio information |
CN106686639A (en) * | 2017-01-16 | 2017-05-17 | 上海智臻智能网络科技股份有限公司 | Network configuration method and device for intelligent voice interaction equipment, and related equipment |
CN107977562B (en) * | 2017-11-30 | 2021-11-02 | 努比亚技术有限公司 | Identity recognition method, recognition terminal and storage medium |
CN108243481B (en) * | 2018-01-19 | 2021-02-23 | 腾讯科技(深圳)有限公司 | File transmission method and device |
CN108492831B (en) * | 2018-01-29 | 2020-10-27 | 歌尔科技有限公司 | Data transmission method, audio equipment and intelligent terminal |
CN110581791A (en) * | 2018-06-11 | 2019-12-17 | 佛山市顺德区美的电热电器制造有限公司 | Household appliance networking method, household appliance equipment, mobile terminal and computer storage medium |
CN109344283A (en) * | 2018-08-14 | 2019-02-15 | 上海箧书网络科技有限公司 | Information interacting method and device based on background music |
CN110784294B (en) * | 2019-09-20 | 2023-01-03 | 浙江大华技术股份有限公司 | Background sound self-adaptive sound wave distribution network method, system, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1642133A (en) * | 2004-01-18 | 2005-07-20 | 华为技术有限公司 | Intelligent network accessing method |
CN101282450A (en) * | 2007-04-02 | 2008-10-08 | 厦门瑞科技术有限公司 | Method capable of immediate access and management of network camera |
CN103166702A (en) * | 2013-02-05 | 2013-06-19 | 何建亿 | Method and device for configuring wireless network in voice frequency mode |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE458328T1 (en) * | 2005-12-22 | 2010-03-15 | Axis Ab | MONITORING SYSTEM AND METHOD FOR CONNECTING A MONITORING DEVICE TO A SERVICE SERVER |
-
2014
- 2014-08-22 CN CN201410419665.6A patent/CN104717601B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1642133A (en) * | 2004-01-18 | 2005-07-20 | 华为技术有限公司 | Intelligent network accessing method |
CN101282450A (en) * | 2007-04-02 | 2008-10-08 | 厦门瑞科技术有限公司 | Method capable of immediate access and management of network camera |
CN103166702A (en) * | 2013-02-05 | 2013-06-19 | 何建亿 | Method and device for configuring wireless network in voice frequency mode |
Also Published As
Publication number | Publication date |
---|---|
CN104717601A (en) | 2015-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104717601B (en) | Wireless monitoring equipment logs in the method and system of wireless network | |
CN103250205B (en) | Audio fingerprint differences for end-to-end quality of experience measurement | |
CN101816135B (en) | Ultrasound detectors | |
JP4528365B1 (en) | Transmitter | |
CN103023580B (en) | Method for achieving data transmission through voice | |
CN102722812B (en) | Method and the device that consumption certificate number realizes as seen is transmitted by sound signal | |
CN103718184A (en) | Authentication system and authentication method | |
CN101057291A (en) | Apparatus and method for sharing contents via headphone set | |
CN108289037A (en) | A kind of equipment wireless parameter configuration method based on sound wave | |
CN107005256A (en) | Inaudible signaling tone | |
CN104769965A (en) | Method for the transmission of data between devices over sound waves | |
CN104505096B (en) | A kind of method and device with music transmission hiding information | |
CN105471517B (en) | Short distance information switching method and system, information are sent and receiving device, terminal | |
CN106686639A (en) | Network configuration method and device for intelligent voice interaction equipment, and related equipment | |
CN104036788A (en) | Tone quality identification method and device for audio files | |
CN104168117B (en) | A kind of speech digit endorsement method | |
CN106411849A (en) | Network access information sharing method | |
CN104378807B (en) | A kind of quick method and electronic equipment for establishing connection | |
TW201607357A (en) | Toning control method of WiFi device setting by smart device | |
CN105636023A (en) | Smart device binding method and system | |
CN113571048B (en) | Audio data detection method, device, equipment and readable storage medium | |
KR960020123A (en) | Radio Access Communication System (WACS) type mobile communication with integrated frame configuration | |
CN103606201A (en) | Attendance checking method, system and device based on sound data transmission | |
CN106452483A (en) | Method and apparatus for information interaction | |
CN203482192U (en) | Wireless communication apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right |
Effective date of registration: 20200727 Granted publication date: 20181023 |
|
PP01 | Preservation of patent right | ||
PD01 | Discharge of preservation of patent |
Date of cancellation: 20230727 Granted publication date: 20181023 |
|
PD01 | Discharge of preservation of patent |