CN112511602A - NB-IOT equipment detection method, intelligent terminal and storage medium - Google Patents

NB-IOT equipment detection method, intelligent terminal and storage medium Download PDF

Info

Publication number
CN112511602A
CN112511602A CN202011279784.8A CN202011279784A CN112511602A CN 112511602 A CN112511602 A CN 112511602A CN 202011279784 A CN202011279784 A CN 202011279784A CN 112511602 A CN112511602 A CN 112511602A
Authority
CN
China
Prior art keywords
detection
iot device
expected
item
version number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011279784.8A
Other languages
Chinese (zh)
Other versions
CN112511602B (en
Inventor
谢奕成
王斌斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011279784.8A priority Critical patent/CN112511602B/en
Publication of CN112511602A publication Critical patent/CN112511602A/en
Application granted granted Critical
Publication of CN112511602B publication Critical patent/CN112511602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an NB-IOT equipment detection method, an intelligent terminal and a storage medium, wherein the method comprises the following steps: acquiring a detection item and an expected parameter corresponding to the detection item; detecting the NB-IoT equipment connected currently according to the detection items and the expected parameters to generate a detection result; and inputting the detection items and the detection results into a preset log file to generate a detection log. The invention provides an automatic detection method of NB-IOT equipment, which reduces manual intervention and improves detection efficiency and accuracy.

Description

NB-IOT equipment detection method, intelligent terminal and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to an NB-IOT equipment detection method, an intelligent terminal and a storage medium.
Background
Narrowband Internet of Things (NB-IoT) is an emerging technology in the IoT field, and supports cellular data connection of low-power-consumption equipment in a Wide Area Network (WAN), also called low-power-consumption WAN. Due to its low cost, high reliability and high security, it is becoming more and more widely used, especially in the field of devices that need security verification, such as smart locks, smart collars and the like. Compared with a general intelligent device, the NB-IoT device includes, in addition to device modules such as a conventional internal linkage mechanism, modules such as an NB-IoT module, a bluetooth module, and a Radio Frequency (RF) module. Since NB-IoT devices are highly security-related, they need to be strictly checked before shipment to ensure that each device can be stably and reliably put into service.
Currently, NB-IoT devices are mostly implemented by installing additional modules on conventional mechanical devices, which generally need to be manually detected by using corresponding tools, and have poor accuracy and low reliability. While additional modules installed by the NB-IoT devices, such as NB-IoT modules, cannot be determined by observation. Therefore, detection of general NB-IoT devices requires both manual and software integration, and lacks a convenient, fast and effective detection means.
Disclosure of Invention
The invention mainly aims to provide an NB-IOT (NB-IoT) equipment detection method, an intelligent terminal and a storage medium, and aims to solve the problem that factory detection efficiency of NB-IoT equipment in the prior art is low.
In order to achieve the above object, the present invention provides an NB-IOT device detection method, which includes the following steps:
acquiring a detection item and an expected parameter corresponding to the detection item;
detecting the NB-IoT equipment connected currently according to the detection items and the expected parameters to generate a detection result;
and inputting the detection items and the detection results into a preset log file to generate a detection log.
Optionally, in the NB-IOT device detection method, the detection item includes version number detection, and the expected parameter includes an expected version number; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is version number detection, acquiring the version number of the NB-IoT equipment and taking the version number as an actual version number;
judging whether the actual version number is equal to the expected version number;
if so, determining that the detection result corresponding to the detection of the version number is successful;
if not, determining that the detection result corresponding to the detection of the version number is detection failure.
Optionally, the NB-IOT device detection method, wherein the detection item includes signal strength detection, and the expected parameter includes a signal strength threshold; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is signal strength detection, controlling the NB-IoT equipment to collect NB signals, recording the signal strength of the NB signals and taking the signal strength as actual strength;
judging whether the actual intensity is greater than the signal intensity threshold value;
if so, determining that the detection result corresponding to the signal intensity detection is successful;
if not, determining that the detection result corresponding to the signal strength detection is detection failure.
Optionally, the NB-IOT device detection method includes detecting a key press, where the expected parameter includes an expected key press response value; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is key detection, controlling the NB-IoT equipment to simulate the use of each key, and recording the actual key response value corresponding to each key after simulated use;
judging whether the expected key response value is equal to the actual key response value or not;
if so, determining that the detection result corresponding to the key detection is successful;
if not, determining that the detection result corresponding to the key detection is detection failure.
Optionally, in the NB-IOT device detection method, the detection item includes a decryption detection, and the expected parameter includes a decryption parameter; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is decryption detection, decrypting the NB-IoT equipment according to the decryption parameter to generate a decryption result;
judging whether the decryption result is successful or not;
if so, determining that the detection result corresponding to the decryption detection is successful;
and if not, determining that the detection result corresponding to the decryption detection is detection failure.
Optionally, the NB-IOT device detection method includes the decryption parameter including a fingerprint, a password, and a card.
Optionally, the NB-IOT device detection method, wherein after detecting the currently connected NB-IOT device according to the detection item and the expected parameter and generating a detection result, the method further includes:
judging whether the detection results are all successful;
if the detection results are successful, acquiring an expected identification code and a package identification code of the NB-IoT equipment;
judging whether the package identification code is the same as the expected identification code;
if so, controlling a burning machine to burn the identification code of the NB-IoT equipment according to the expected identification code.
Optionally, the NB-IOT device detection method, wherein after determining whether the detection results are all successful, further includes:
and if the detection result has detection failure, taking the detection item with the detection result of detection failure as a detection fault result and outputting the detection fault result.
In addition, to achieve the above object, the present invention further provides an intelligent terminal, wherein the intelligent terminal includes: a memory, a processor, and an NB-IOT device detection method program stored on the memory and executable on the processor, the NB-IOT device detection method program when executed by the processor implementing the steps of the NB-IOT device detection method as described above.
Further, to achieve the above object, the present invention also provides a storage medium storing an NB-IOT device detection method program, which when executed by a processor, implements the steps of the NB-IOT device detection method described above.
According to the invention, the detection item to be detected and the expected parameter corresponding to the item are firstly obtained, and then different items of NB-IoT equipment which is currently connected are detected according to the detection item and the expected parameter, so that the detection results corresponding to different items are obtained. And writing the detection items and the corresponding detection results into a preset log file to generate a detection log. Therefore, the whole process does not need manual work, errors caused by manual detection are reduced, and automation for NB-IoT equipment detection is realized. In addition, by combining the characteristics of the NB-IoT equipment, the detection items comprise version number detection, signal strength detection, key detection and decryption detection, and the detection of keys which are manually detected in the past, signals which cannot be directly displayed and decryption is covered. In addition, the identification codes are burned according to the detection results of all the items, and when some detection is in problem, the next step cannot be performed, so that the NB-IOT equipment is qualified. And outputting the detection item failed in detection as a detection fault result so as to remind a user of detecting a specific item of the NB-IOT equipment.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the NB-IOT device detection method of the present invention;
FIG. 2 is a general flow diagram of a preferred embodiment of the NB-IOT device detection method of the present invention;
FIG. 3 is a schematic diagram of the connection between the computer and the intelligent lock in the preferred embodiment provided by the NB-IOT device detection method of the present invention;
FIG. 4 is a diagram illustrating an example of an interface for inputting detection parameters in the NB-IOT device detection method according to the present invention;
FIG. 5 is a diagram illustrating an example of an interface for selecting a detection item according to the NB-IOT device detection method of the present invention;
FIG. 6 is an exemplary diagram of an interface for acquiring expected identification codes in a preferred embodiment of the NB-IOT device detection method of the present invention;
FIG. 7 is an exemplary diagram of an interface for comparing expected identification codes with actual identification codes in a preferred embodiment provided by the NB-IOT device detection method of the present invention;
FIG. 8 is an exemplary diagram of an interface for creating a log file in a preferred embodiment of the NB-IOT device detection method of the present invention;
FIG. 9 is an exemplary diagram of an interface displaying each test item and corresponding test result in the preferred embodiment of the NB-IOT device testing method of the present invention;
fig. 10 is a schematic operating environment diagram of an intelligent terminal according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1 and 2, the NB-IOT device detection method according to the preferred embodiment of the present invention includes the following steps:
step S100, acquiring detection items and expected parameters corresponding to the detection items.
Specifically, in this embodiment, the NB-IOT device to be detected is an intelligent lock, and the main body for executing the NB-IOT device detection method is an NB-IOT device detection program installed on a computer.
As shown in fig. 3, the computer terminal and the intelligent lock are connected by a serial port tool, and the black line is grounded. An instruction to enter a production test mode is output to the NB-IOT device to be tested, which may be input in the form of a specific character string, such as the character string "123 #". At power-on, connection of NB signals is also performed once. And simultaneously starting the NB-IOT equipment detection program.
Then, the user sets the detection parameters of the NB-IOT device detection program to acquire data through the computer, as shown in fig. 4, detection includes serial number, bit rate, reception timeout time, and the like. The serial number is used to help the NB-IOT device detection program determine which serial port to transmit and retrieve information from, and the bit rate is used to limit the frequency of data transmission — this embodiment is 115200. Each detection item needs time to be performed, the NB-IOT device returns corresponding detection data after performing detection, and if the detection data returned is not received after exceeding the timeout time, the detection may be considered to be abnormal, and the timeout time is 500ms in this embodiment.
After setting the detection parameters, the user needs to input the detection items for detection and the expected parameters corresponding to the items into the NB-IOT device detection program. In this embodiment, there are various ways of inputting detection items, one of which is to select a detection name preset by the NB-IOT device detection program as shown in fig. 4, so as to determine a detection item to be performed.
After the detection item is input, an expected parameter needs to be input, corresponding detection data can be returned after the intelligent lock is detected, the NB-IOT equipment detection program needs to judge whether the detection data is equal to the expected parameter according to a certain certificate so as to judge whether the intelligent lock is normal, and the expected parameter is the certificate used for judging. The expected parameters may include an International Mobile Equipment version number (IMEI), a correct result that should be returned after the smart lock performs detection under normal conditions, and the like. The corresponding relation between a preset expected parameter and the detection items can be preset, when the detection items are input, the corresponding prediction parameters are directly selected from the preset expected parameters and input, and the expected parameters corresponding to each detection item can be manually input or input through collection according to the requirements of a user.
And step S200, detecting the NB-IoT equipment which is currently connected according to the detection items and the expected parameters, and generating a detection result.
Specifically, according to the serial number, the NB-IOT device detection program may determine an NB-IOT device currently connected and to be detected, and according to the detection item, the NB-IOT device detection program controls the NB-IOT device to perform detection.
Further, the detection items comprise version number detection, signal strength detection, key detection and decryption detection.
In this embodiment, according to the property of the smart lock, the detection items are divided into four major items, including version number detection, signal strength detection, key detection, and decryption detection. The version number detection refers to the detection of whether the version numbers such as the IMEI number and the MCU version number inside the NB-IOT equipment are correct or not. The signal strength detection is the detection of whether the NB-IOT equipment can normally collect Bluetooth and NB signals. The key detection is detection of whether the NB-IOT device can work normally. Because the safety can be improved through encryption in the actual use of the NB-IOT equipment, when the intelligent lock is detected, the detection of whether the intelligent lock can be normally opened or not by using a correct key is carried out, namely decryption detection.
When the detection item is the detection of the version number, the expected parameter is an expected version number, and the step S200 includes:
step S211, when the detection item is version number detection, acquiring a version number of the NB-IoT device and taking the version number as an actual version number.
In this embodiment, different hardware has different version types, for example, models of bluetooth modules, and before the smart lock leaves the factory, it is required to ensure that the hardware or software versions of the smart locks are uniform, and all of the versions are the expected versions or models. As shown in fig. 3, the MCU, NB module, bluetooth module, and fingerprint head module all have different version numbers. The user may preset the desired version number for each piece of hardware or software as the desired version number.
When the user colludes the version number detection and starts to detect, in this embodiment, namely MCU version station detection and NB version station detection in fig. 5, the NB-IoT device detection program issues an instruction to the smart lock through a serial port to obtain an actual version number, and the smart lock obtains the version number of each module of the smart lock and then sends the version number as the actual version number to the NB-IoT device detection program.
Step S212, determining whether the actual version number is equal to the expected version number.
Specifically, after receiving the actual version number returned by the smart lock, the NB-IoT device detection program compares the actual version number with the expected version number to determine whether the actual version number is equal to the expected version number.
Step S213, if yes, determining that the detection result corresponding to the version number detection is successful.
Specifically, a detection success flag bit and a detection failure flag bit are preset, for example, 1 and 0 are the detection success flag bit and the detection failure flag bit, respectively. If the version number and the version number are equal, the hardware or the software of the intelligent lock is expected by a user, and therefore the flag bit 1 for successful version number detection is used as a detection result of the version number detection of the intelligent lock.
Step S214, if not, determining that the detection result corresponding to the detection of the version number is detection failure.
Specifically, if not, it is stated that the version number of the hardware or software of the smart lock is different from the expectation of the user, so the detection failure flag bit 0 is used as the detection result corresponding to the detection of the current version number of the smart lock.
When the detection item is version number detection, the expected parameter is a signal strength threshold, and step S200 includes:
step S221, when the detection item is signal strength detection, controlling the NB-IoT device to collect an NB signal, and recording the signal strength of the NB signal as actual strength.
Specifically, since the NB-IoT device needs to verify whether the input to the device is correct through the NB signal when in use, whether the NB-IoT device can effectively acquire the signal is a key to whether the NB-IoT device can operate normally. When the detection item is signal strength detection, the NB-IoT equipment is controlled to collect NB signals. In order to ensure the smooth signal acquisition, when the NB-IoT device is turned on, the NB signal may be connected once, but considering the battery life problem, when entering the production mode, the NB signal may be connected again only when the signal strength is detected. And when the NB signals are collected, the signals which can be collected are lightly taken as actual strength and sent to the NB-IoT equipment detection program.
Step S222, determining whether the actual strength is greater than the signal strength threshold.
Specifically, after receiving the actual strength, the NB-IoT device detection program compares it with the signal strength threshold and determines whether the actual strength is greater than the signal strength threshold.
Step S223, if yes, determining that the detection result corresponding to the signal strength detection is successful.
Specifically, if yes, it is indicated that the capability of the smart lock for acquiring NB signals is normal, and therefore the detection success flag bit 1 is used as a detection result corresponding to the signal strength detection.
Step S223, if not, determining that the detection result corresponding to the signal strength detection is a detection failure.
Specifically, if not, it is indicated that the capability of the smart lock for acquiring NB signals has a fault, and therefore the detection failure flag bit 0 is used as a detection result corresponding to the signal strength detection.
Further, the expected parameter includes an expected key response value, and step S200 includes:
step S231, when the detection item is key detection, controlling the NB-IoT device to perform simulated use on each key, and recording an actual key response value corresponding to each key after the simulated use.
Specifically, when the detection item is key detection, the NB-IoT device is controlled to perform simulated use on each key, for example, ten keys are provided, the situation that the ten keys are pressed is sequentially simulated, and an actual key response value corresponding to each key after simulated use is recorded. The key response value corresponding to the successful response or the unsuccessful response of the key is preset, for example, the prompting lamp is lightened after a certain key is pressed, whether the prompting lamp is lightened after the simulated use is judged, and if the prompting lamp is lightened, the key response value corresponding to the successful response is recorded as the actual key response value.
Step S232, determining whether the expected key response value is equal to the actual key response value.
Specifically, all keys of the smart lock should respond normally when the smart lock leaves the factory, and therefore the expected key response value should be equal to the key response value corresponding to the success. And judging whether the expected key response value is equal to the actual key response value or not, namely judging whether each key of the intelligent lock is normal or not.
Step S233, if yes, determining that a detection result corresponding to the key detection is successful.
Specifically, if yes, each key of the intelligent lock can be used normally, so that the detection result corresponding to the key detection is determined to be successful, and the detection success flag bit 1 is recorded as the detection result.
Step S234, if not, determining that a detection result corresponding to the key detection is a detection failure.
Specifically, if not, the intelligent latch is locked in a condition that the key cannot normally correspond, so that a detection result corresponding to the key detection is determined as a detection failure, and the detection failure flag bit 0 is recorded as the detection result.
Further, the expected parameters include decryption parameters, and step S200 includes:
and step S241, when the detection item is decryption detection, decrypting the NB-IoT equipment according to the decryption parameter to generate a decryption result.
Specifically, since the smart lock is used to protect the security of a certain property, in the actual use process, when a password or other key is input, the smart lock can be unlocked according to the correct key. Therefore, when the detection item is decryption detection, the decryption parameter is used as a correct key, and the NB-IoT device is decrypted according to the decryption parameter to generate a decryption result, where the decryption result includes a decryption success and a decryption failure. Further, the decryption parameter in the decryption detection may be a password in the form of a number or a letter, a card such as an inductive card with a key, or a biometric feature such as a voiceprint or a fingerprint. And finally returning the decryption result to the NB-IoT equipment detection program.
In step S242, it is determined whether the decryption result is a successful decryption.
Specifically, after receiving the decryption result, the NB-IoT device detection program determines whether the decryption is successful.
And step S243, if yes, determining that the detection result corresponding to the decryption detection is successful.
Specifically, if yes, the intelligent lock can normally complete decryption, so that a detection result corresponding to decryption detection is determined to be successful, and the detection success flag bit 1 is recorded as the detection result.
Step S244, if not, determining that the detection result corresponding to the decryption detection is a detection failure.
Specifically, if not, it is indicated that the intelligent lock cannot normally complete the decryption operation, so that it is determined that the detection result corresponding to the decryption detection is a detection failure, and the detection failure flag bit 0 is recorded as the detection result.
Further, after step S200, the method further includes:
step S251, determining whether the detection results are all successful.
Specifically, after all the detection items are completed, whether the detection results corresponding to the detection items are all successful is judged by judging whether the flag bits are all 1.
Step S252, if the detection results are all detection success, acquiring the expected identification code and the package identification code of the NB-IoT device.
Specifically, if the detection results are all successful, it is indicated that the smart lock is a qualified smart lock, and the smart lock can be used for factory sale and use. If the current scene is for the product inspection before dispatching from the factory, the computer end is connected with one in advance and sweeps a yard rifle, sweep a yard rifle scanning the bottom plate sticker, data plate sticker, antenna sticker, the color box sticker of intelligence lock acquire the packing identification code of intelligence lock, this embodiment are the IMEI sign indicating number on the packing carton. In addition, as shown in fig. 6, after the detection before and during the detection of the smart lock, an expected identification code preset inside the smart lock is obtained, which is an IMEI code in this embodiment.
Step S253, determining whether the package identification code is the same as the expected identification code.
Specifically, as shown in fig. 7, after the expected identification code and the package identification code are collected, the user clicks the comparison button to automatically determine whether the expected identification code and the package identification code are the same.
And step S254, if yes, controlling a burning machine to burn the identification code of the NB-IoT equipment according to the expected identification code.
Specifically, if the intelligent lock is the same as the intelligent lock, the intelligent lock is indicated that not only the internal condition is detected to be over-closed, but also the package and the internal identifier are consistent, a through character can be displayed on a screen, and the intelligent lock can be sold after leaving a factory, so that a connected burning machine is controlled to burn the identification code of the intelligent lock.
In the embodiment, the burning of the identification code is performed after all detection is completed and the package identification codes on the packages are matched, when some detection items have problems, the products cannot leave the factory, and it is ensured that all the problems are detected and detected without problems
Step S300, inputting the detection items and the detection results into a preset log file to generate a detection log.
Specifically, in this embodiment, as shown in fig. 6, the NB-IoT device detection program reads the IMEI of the smart lock, and creates a log file corresponding to the IMEI for recording the detection result.
Further, in order to perform source tracing and problem tracking on the detection result in the later period, in this embodiment, as shown in fig. 8, when the log file is created, the current time is also written into the log file.
And after the detection of all the detection items input by the user is finished, writing the detection items and the detection results corresponding to the detection items into the log file to generate a detection log corresponding to the intelligent lock. Meanwhile, in order to facilitate the user to visually know the detection result of each detection item of the intelligent lock, a visual display interface of a result can be set, as shown in fig. 9, when the detection result corresponding to each detection item is obtained, the color of the detection item is expressed according to the detection result. For example, green indicates that the test was successful, red indicates that the test failed, and gray indicates that the test item was not performed.
Further, after step S251, the method further includes: and if the detection result has detection failure, taking the detection item with the detection result of detection failure as a detection fault result and outputting the detection fault result.
Specifically, if there is a detection failure in the detection result corresponding to the detection item, it is indicated that the intelligent latch is in a failure, and therefore, the detection item whose detection result is the detection failure is taken as a detection failure result and output to remind a user that there is a failure in the module corresponding to the detection item.
Further, as shown in fig. 10, based on the NB-IOT device detection method, the present invention also provides an intelligent terminal, which includes a processor 10, a memory 20, and a display 30. Fig. 10 shows only some of the components of the smart terminal, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
The memory 20 may be an internal storage unit of the intelligent terminal in some embodiments, such as a hard disk or a memory of the intelligent terminal. The memory 20 may also be an external storage device of the Smart terminal in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the Smart terminal. Further, the memory 20 may also include both an internal storage unit and an external storage device of the smart terminal. The memory 20 is used for storing application software installed in the intelligent terminal and various data, such as program codes of the installed intelligent terminal. The memory 20 may also be used to temporarily store data that has been output or is to be output. In one embodiment, the memory 20 stores NB-IOT device detection method program 40, and the NB-IOT device detection method program 40 is executable by the processor 10 to implement the NB-IOT device detection method of the present application.
The processor 10 may be, in some embodiments, a Central Processing Unit (CPU), microprocessor or other data Processing chip, and is configured to run program codes stored in the memory 20 or process data, such as executing the NB-IOT device detection method.
The display 30 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch panel, or the like in some embodiments. The display 30 is used for displaying information at the intelligent terminal and for displaying a visual user interface. The components 10-30 of the intelligent terminal communicate with each other via a system bus.
In one embodiment, when the processor 10 executes the NB-IOT device detection method program 40 in the memory 20, the following steps are implemented:
acquiring a detection item and an expected parameter corresponding to the detection item;
detecting the NB-IoT equipment connected currently according to the detection items and the expected parameters to generate a detection result;
and inputting the detection items and the detection results into a preset log file to generate a detection log.
The detection item comprises version number detection, and the expected parameter comprises an expected version number; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is version number detection, acquiring the version number of the NB-IoT equipment and taking the version number as an actual version number;
judging whether the actual version number is equal to the expected version number;
if so, determining that the detection result corresponding to the detection of the version number is successful;
if not, determining that the detection result corresponding to the detection of the version number is detection failure.
The detection item comprises a signal strength detection, and the expected parameter comprises a signal strength threshold; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is signal strength detection, controlling the NB-IoT equipment to collect NB signals, recording the signal strength of the NB signals and taking the signal strength as actual strength;
judging whether the actual intensity is greater than the signal intensity threshold value;
if so, determining that the detection result corresponding to the signal intensity detection is successful;
if not, determining that the detection result corresponding to the signal strength detection is detection failure.
The detection item comprises key detection, and the expected parameter comprises an expected key response value; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is key detection, controlling the NB-IoT equipment to simulate the use of each key, and recording the actual key response value corresponding to each key after simulated use;
judging whether the expected key response value is equal to the actual key response value or not;
if so, determining that the detection result corresponding to the key detection is successful;
if not, determining that the detection result corresponding to the key detection is detection failure.
The detection item comprises decryption detection, and the expected parameter comprises a decryption parameter; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is decryption detection, decrypting the NB-IoT equipment according to the decryption parameter to generate a decryption result;
judging whether the decryption result is successful or not;
if so, determining that the detection result corresponding to the decryption detection is successful;
and if not, determining that the detection result corresponding to the decryption detection is detection failure.
The decryption parameters include a fingerprint, a password and a card.
After the detecting the currently connected NB-IoT device according to the detection item and the expected parameter and generating a detection result, the method further includes:
judging whether the detection results are all successful;
if the detection results are successful, acquiring an expected identification code and a package identification code of the NB-IoT equipment;
judging whether the package identification code is the same as the expected identification code;
if so, controlling a burning machine to burn the identification code of the NB-IoT equipment according to the expected identification code.
After the determining whether the detection results are all detection success, the method further includes:
and if the detection result has detection failure, taking the detection item with the detection result of detection failure as a detection fault result and outputting the detection fault result.
The present invention also provides a storage medium storing a NB-IOT device detection method program, which when executed by a processor implements the steps of the NB-IOT device detection method described above.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. An NB-IOT device detection method, the NB-IOT device detection method comprising:
acquiring a detection item and an expected parameter corresponding to the detection item;
detecting the NB-IoT equipment connected currently according to the detection items and the expected parameters to generate a detection result;
and inputting the detection items and the detection results into a preset log file to generate a detection log.
2. The NB-IOT device detection method of claim 1, wherein the detection entry comprises a version number detection, and the expected parameter comprises an expected version number; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is version number detection, acquiring the version number of the NB-IoT equipment and taking the version number as an actual version number;
judging whether the actual version number is equal to the expected version number;
if so, determining that the detection result corresponding to the detection of the version number is successful;
if not, determining that the detection result corresponding to the detection of the version number is detection failure.
3. The NB-IOT device detection method of claim 1, wherein the detection items comprise signal strength detections, and the expected parameters comprise signal strength thresholds; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is signal strength detection, controlling the NB-IoT equipment to collect NB signals, recording the signal strength of the NB signals and taking the signal strength as actual strength;
judging whether the actual intensity is greater than the signal intensity threshold value;
if so, determining that the detection result corresponding to the signal intensity detection is successful;
if not, determining that the detection result corresponding to the signal strength detection is detection failure.
4. The NB-IOT device detection method of claim 1, wherein the detection items comprise key press detections, the expected parameters comprise expected key press response values; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is key detection, controlling the NB-IoT equipment to simulate the use of each key, and recording the actual key response value corresponding to each key after simulated use;
judging whether the expected key response value is equal to the actual key response value or not;
if so, determining that the detection result corresponding to the key detection is successful;
if not, determining that the detection result corresponding to the key detection is detection failure.
5. The NB-IOT device detection method of claim 1, wherein the detection items comprise decryption detections, and the expected parameters comprise decryption parameters; the detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result specifically includes:
when the detection item is decryption detection, decrypting the NB-IoT equipment according to the decryption parameter to generate a decryption result;
judging whether the decryption result is successful or not;
if so, determining that the detection result corresponding to the decryption detection is successful;
and if not, determining that the detection result corresponding to the decryption detection is detection failure.
6. The NB-IOT device detection method of claim 5, wherein the decryption parameters include a fingerprint, a password, and a card.
7. The NB-IOT device detection method according to any of claims 1-6, wherein the detecting a currently connected NB-IOT device according to the detection item and the expected parameter, and after generating a detection result, further comprises:
judging whether the detection results are all successful;
if the detection results are successful, acquiring an expected identification code and a package identification code of the NB-IoT equipment;
judging whether the package identification code is the same as the expected identification code;
if so, controlling a burning machine to burn the identification code of the NB-IoT equipment according to the expected identification code.
8. The NB-IOT device detection method according to claim 7, wherein after determining whether the detection results are all successful, the method further comprises:
and if the detection result has detection failure, taking the detection item with the detection result of detection failure as a detection fault result and outputting the detection fault result.
9. An intelligent terminal, characterized in that, intelligent terminal includes: memory, a processor and an NB-IOT device detection method program stored on the memory and executable on the processor, the NB-IOT device detection method program when executed by the processor implementing the steps of the NB-IOT device detection method according to any of claims 1-8.
10. A storage medium storing a NB-IOT device detection method program which, when executed by a processor, performs the steps of the NB-IOT device detection method of any of claims 1-8.
CN202011279784.8A 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium Active CN112511602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011279784.8A CN112511602B (en) 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011279784.8A CN112511602B (en) 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112511602A true CN112511602A (en) 2021-03-16
CN112511602B CN112511602B (en) 2023-08-04

Family

ID=74956277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011279784.8A Active CN112511602B (en) 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112511602B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116149677A (en) * 2022-11-30 2023-05-23 深圳市湘凡科技有限公司 Method, device, equipment and medium for burning serial numbers

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1641592A (en) * 2004-01-07 2005-07-20 北京北阳电子技术有限公司 Method and system for measuring functions of electronic product with keyboard
CN110262468A (en) * 2019-07-26 2019-09-20 泰华智慧产业集团股份有限公司 Smart lock test equipment and test method
CN110719359A (en) * 2019-10-09 2020-01-21 中国联合网络通信集团有限公司 Terminal performance test method and system
CN111083018A (en) * 2019-12-31 2020-04-28 厦门市美亚柏科信息股份有限公司 Production detection method and device for wireless equipment
CN111239589A (en) * 2020-01-20 2020-06-05 福建宏泰智能工业互联网有限公司 Electronic lock circuit board testing method, device and system
CN111585847A (en) * 2020-05-21 2020-08-25 四川虹美智能科技有限公司 Detection system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1641592A (en) * 2004-01-07 2005-07-20 北京北阳电子技术有限公司 Method and system for measuring functions of electronic product with keyboard
CN110262468A (en) * 2019-07-26 2019-09-20 泰华智慧产业集团股份有限公司 Smart lock test equipment and test method
CN110719359A (en) * 2019-10-09 2020-01-21 中国联合网络通信集团有限公司 Terminal performance test method and system
CN111083018A (en) * 2019-12-31 2020-04-28 厦门市美亚柏科信息股份有限公司 Production detection method and device for wireless equipment
CN111239589A (en) * 2020-01-20 2020-06-05 福建宏泰智能工业互联网有限公司 Electronic lock circuit board testing method, device and system
CN111585847A (en) * 2020-05-21 2020-08-25 四川虹美智能科技有限公司 Detection system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116149677A (en) * 2022-11-30 2023-05-23 深圳市湘凡科技有限公司 Method, device, equipment and medium for burning serial numbers

Also Published As

Publication number Publication date
CN112511602B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
EP3725569B1 (en) Tire pressure sensor activation method and device
US20200342690A1 (en) Method for establishing communicable connection with tire pressure monitoring system, apparatus thereof and electronic device
US5739766A (en) Transponder detector
CN103116914A (en) Entrance guard method, entrance guard system and handset
CN105407453A (en) Bluetooth pairing method and device
US7388489B2 (en) System and method for managing data on an RFID tag associated with a product
CN109886709B (en) Intelligent lock management method, system, computer equipment and storage medium
CN107610278A (en) Intelligent key learning method and system
CN102736615A (en) Vehicle failure diagnosis method
CN107423492B (en) Forklift diagnosis test method and system based on template
CN112511602A (en) NB-IOT equipment detection method, intelligent terminal and storage medium
CN102798833A (en) Automatic test system and method for diagnosis instrument
CN113114659A (en) Diagnostic equipment detection method and device, terminal equipment and storage medium
CN115185823A (en) Information security testing method and system for vehicle-mounted information interaction system
US20200142756A1 (en) Adapter with instrument control function, instrument control system and instrument control method
US20200057999A1 (en) Vehicle message managing device, vehicle message managing method, vehicle message managing system, method for setting tire recycling and method for setting tire storing position
CN109033804A (en) A kind of software virtual machine authorization method and device
CN110619215B (en) Code security scanning method and system
CN112416676A (en) Testing tool applied to testing chip
CN109581188B (en) Function detection method for terminal on mainboard, intelligent device and storage medium
CN117254945A (en) Vulnerability tracing method and device based on automobile attack link
CN111625795A (en) Login authentication system and method based on finger veins
CN111726247A (en) Electronic lock firmware updating method and device, electronic lock and storage medium
CN113704106B (en) Off-line detection system, method, equipment and medium for automobile digital key
CN113904955B (en) Detection method, device and system of data transmission link

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant