CN116033341B - Method and device for triggering fence event - Google Patents

Method and device for triggering fence event Download PDF

Info

Publication number
CN116033341B
CN116033341B CN202210599674.2A CN202210599674A CN116033341B CN 116033341 B CN116033341 B CN 116033341B CN 202210599674 A CN202210599674 A CN 202210599674A CN 116033341 B CN116033341 B CN 116033341B
Authority
CN
China
Prior art keywords
wireless device
target
fence
wireless
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210599674.2A
Other languages
Chinese (zh)
Other versions
CN116033341A (en
Inventor
金学奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202210599674.2A priority Critical patent/CN116033341B/en
Publication of CN116033341A publication Critical patent/CN116033341A/en
Application granted granted Critical
Publication of CN116033341B publication Critical patent/CN116033341B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Telephone Function (AREA)

Abstract

The application provides a method and a device for triggering a fence event, wherein the method comprises the following steps: receiving a first wireless signal; determining a first wireless device corresponding to the first wireless signal; determining whether the first wireless device is a target wireless device, wherein the target wireless device is a wireless device associated with a target fence, and the signal coverage range of the target wireless device comprises the target fence; a first fence event of the target fence is triggered when the first wireless device is the target wireless device. The terminal equipment can be connected with the wireless equipment (such as a base station or a router) without a bright screen or running software in the background, so that the power consumption for triggering the fence event by utilizing the signal of the wireless equipment can be reduced.

Description

Method and device for triggering fence event
Technical Field
The application relates to the field of terminals, in particular to a method and a device for triggering fence events.
Background
Geofencing (geo-fencing) is an application of location based services (location based services, LBS), i.e., enclosing a geographic area with a virtual fence. When the terminal device enters or leaves the geographic area, the terminal device triggers a fencing event, e.g., the terminal device may issue a notification or alert that alerts the user to perform the relevant service, thereby providing intelligent services to the user.
One precondition for the terminal device to trigger a fence event is to determine the current location in order to determine whether the terminal device enters or leaves the geofence based on the current location. The terminal device typically determines the current location using a chip location function, e.g., the terminal device typically determines the current location using a global positioning system (global positioning system, GPS). However, using the chip positioning function requires a bright screen to wake up the positioning chip or running positioning software in the background, which in any way causes an increase in power consumption of the terminal device.
Disclosure of Invention
The embodiment of the application provides a method and a device for triggering a fence event, which can reduce the power consumption of terminal equipment for triggering the fence event.
In a first aspect, a method of triggering a fence event is provided, comprising: receiving a first wireless signal; determining a first wireless device corresponding to the first wireless signal; determining whether the first wireless device is a target wireless device, wherein the target wireless device is a wireless device associated with a target fence, and the signal coverage range of the target wireless device comprises the target fence; a first fence event of the target fence is triggered when the first wireless device is the target wireless device.
The above method may be performed by the terminal device or a chip within the terminal device. When the terminal device receives the first wireless signal, indicating that the terminal device is located in the vicinity of the first wireless device, the terminal device can use this feature to determine the current location. The terminal device may preset a target wireless device, where a signal coverage area of the target wireless device includes a target fence, and when the terminal device determines that the first wireless device is the target wireless device, the terminal device determines that the current position is located near the target fence, and may trigger a first fence event of the target fence, where the first fence event may be an event that reminds a user to execute a related service in the target fence. The terminal equipment can be connected with the wireless equipment (such as a base station or a router) without a bright screen or running software in the background, so that the power consumption for triggering the fence event by utilizing the signal of the wireless equipment can be reduced.
In one implementation, before the determining whether the first wireless device is the target wireless device, the method further includes: receiving target fence information for the target fence from an application processor; storing the target fence information into the fence information set when the fence information in the fence information set is different from the target fence information and/or when the number of the fence information in the fence information set is less than a number threshold.
The present embodiment may be performed by an intelligent sensor in the terminal device. The storage space of the intelligent sensor is limited, when the fence information in the fence information set is different from the target fence information, the target fence information is the new fence information, and the fence information set can be stored, so that the waste of storing repeated fence information to the storage space of the intelligent sensor is avoided. When the number of the fence information in the fence information set is smaller than the number threshold, the storage space of the intelligent sensor is more free, and the storage of the target fence can not negatively affect other functions of the intelligent sensor.
In one implementation, the method further comprises: when the target fence information is successfully stored, subscribing the information of the wireless device associated with the target fence to a modem.
The present embodiment may be performed by an intelligent sensor in the terminal device. After the intelligent sensor subscribes to the information of the wireless device, the modem can actively inform the information of the first wireless device to the intelligent sensor without inquiring the information of the intelligent sensor, so that the power consumption of the intelligent sensor is reduced.
In one implementation, the first wireless device is the target wireless device, comprising: the high-order cell identifier of the first wireless device is the same as the high-order cell identifier of the target wireless device, the cell identifier of the first wireless device is the same as the cell identifier of the target wireless device, the position area code of the first wireless device is the same as the position area code of the target wireless device, the high-order cell identifier and the standard cell identifier are obtained by splitting the complete cell identifier, and the length of the standard cell identifier is the same as the bit width of a chip for processing the standard cell identifier.
Some wireless devices have excessively long cell identities, e.g., the identity of the 5G cell exceeds 32 bits, while the bit width of the sensor hub that processes the cell identity is typically only 32 bits, and a direct match of the sensor hub to the complete identity of the 5G cell may result in reduced processing efficiency. The overlong cell identifier can be split into a high-order cell identifier and a standard cell identifier, the lengths of the high-order cell identifier and the standard cell identifier are not more than 32 bits, and the processing efficiency of the sensor hub can be improved.
In one implementation, the high-order cell identity is the first-to-match parameter.
The length of the high-order cell identifier is shorter than that of the standard cell identifier and the location area code, so that the identification efficiency of identifying the first wireless device can be improved by preferentially matching the high-order cell identifier.
In one implementation, the method further comprises: receiving a second wireless signal; determining a second wireless device corresponding to the second wireless signal; triggering a second fence event for the target fence when the second wireless device fails to match the target wireless device and when the number of consecutive failed matches of the target wireless device is greater than or equal to a number threshold.
When the terminal device determines that the second wireless device is not the target wireless device, the terminal device determines that the current position is far away from the target fence, and may trigger a second fence event of the target fence, which may be an event reminding the user to perform related services outside the target fence. The terminal equipment can be connected with the wireless equipment (such as a base station or a router) without a bright screen or running software in the background, so that the power consumption for triggering the fence event by utilizing the signal of the wireless equipment can be reduced. Furthermore, since the user may move at the edge of the first wireless device, the terminal device may repeatedly enter the target fence, resulting in the first fence event and the second fence event being triggered multiple times, causing interference to the user. The target wireless device fails to match continuously for a plurality of times, which means that the terminal device is far away from the target fence, and at the moment, the second fence event of the target fence is triggered again, so that the interference of the situation on the user can be avoided.
In one implementation, the first wireless signal is a wireless signal of a currently camped cell.
The terminal device may receive multiple cellular network signals at the same time, where some cellular network signals are not signals of the network residence cells of the terminal device, which indicates that the cells corresponding to the cellular network signals (non-current network residence cells) are far away from the terminal device, and the position error determined based on the non-current network residence cells is large, so that the triggering accuracy of the fence event can be improved based on matching of the wireless signals of the current network residence cells with the target wireless device. In addition, when the terminal device matches the target wireless device based on the wireless signal of the current network-resident cell, the target network device is not matched according to the network signal of the previous network-resident cell, so that the power consumption of the matched target wireless device can be reduced, because the previous network-resident cell is matched at the previous moment, and the current matching of the previous network-resident cell again has no meaning.
In one implementation, before the determining whether the first wireless device is the target wireless device, the method further includes: learning according to behavior habits of a user, and determining positions of a plurality of wireless devices associated with the user; and determining the target wireless equipment from the plurality of wireless equipment according to the business attribute of the first fence event and the positions of the plurality of wireless equipment, wherein a preset association relationship exists between the business attribute and the positions of the target wireless equipment.
For example, when the user has a rest at night, the terminal device remains connected to the base station a for a long time, and the terminal device may determine that the location of the base station a is the home location of the user. The terminal equipment can set the base station A as target wireless equipment based on the service attribute (home position) of the express delivery and the position of the base station A; when the first wireless signal received by the terminal equipment is the signal sent by the base station A, the terminal equipment can trigger a first fence event (express taking) of a target fence (the area where the express cabinet is located), so that intelligent service can be provided for a user.
In a second aspect, there is provided an apparatus for triggering a fence event, comprising means for performing any of the methods of the first aspect. The device can be a terminal device or a chip in the terminal device. The apparatus may include an input unit and a processing unit.
When the apparatus is a terminal device, the processing unit may be a processor, and the input unit may be a communication interface; the terminal device may further comprise a memory for storing computer program code which, when executed by the processor, causes the terminal device to perform any of the methods of the first aspect.
When the device is a chip in the terminal equipment, the processing unit may be a logic processing unit inside the chip, and the input unit may be an output interface, a pin, a circuit, or the like; the chip may also include memory, which may be memory within the chip (e.g., registers, caches, etc.), or memory external to the chip (e.g., read-only memory, random access memory, etc.); the memory is for storing computer program code which, when executed by the processor, causes the chip to perform any of the methods of the first aspect.
In a third aspect, there is provided a computer readable storage medium storing computer program code which, when run by an apparatus triggering a fence event, causes the apparatus to perform any one of the methods of the first aspect.
In a fourth aspect, there is provided a computer program product comprising: computer program code which, when run by an apparatus triggering a fencing event, causes the apparatus to perform any one of the methods of the first aspect.
Drawings
FIG. 1 is a schematic diagram of a hardware configuration of an apparatus suitable for use with the present application;
FIG. 2 is a schematic diagram of a software architecture suitable for use with the apparatus of the present application;
fig. 3 and fig. 4 are schematic diagrams of an application scenario provided by the present application;
FIG. 5 is a schematic illustration of an interface for a reminder card provided by the present application;
FIG. 6 is a schematic diagram of a method of triggering a fence event provided by the present application;
FIG. 7 is a schematic diagram of a method of subscribing to wireless device information provided by the present application;
fig. 8 is a schematic diagram of another method of triggering a fence event provided by the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 shows a hardware configuration of an apparatus suitable for use in the present application. The apparatus 100 may be any of a cell phone, a foldable electronic device, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (mobile personal computer, UMPC), a netbook, a cellular phone, a personal digital assistant (personal digital assistant, PDA), an augmented reality (augmented reality, AR) device, a Virtual Reality (VR) device, an artificial intelligence (artificial intelligence, AI) device, a wearable device, a vehicle-mounted device, a smart home device, or a smart city device. The embodiment of the present application is not limited in any way to the specific type of device 100.
The apparatus 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
The configuration shown in fig. 1 does not constitute a specific limitation on the apparatus 100. In other embodiments of the application, the apparatus 100 may include more or fewer components than those shown in FIG. 1, or the apparatus 100 may include a combination of some of the components shown in FIG. 1, or the apparatus 100 may include sub-components of some of the components shown in FIG. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units. For example, the processor 110 may include at least one of the following processing units: application processors (application processor, AP), modem processors, graphics processors (graphics processing unit, GPU), image signal processors (image signal processor, ISP), controllers, video codecs, digital signal processors (digital signal processor, DSP), baseband processors, neural-Network Processors (NPU). The different processing units may be separate devices or integrated devices.
The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. For example, the processor 110 may include at least one of the following interfaces: inter-integrated circuit, I2C) interfaces, inter-integrated circuit audio (inter-integrated circuit sound, I2S) interfaces, pulse code modulation (pulse code modulation, PCM) interfaces, universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interfaces, mobile industry processor interfaces (mobile industry processor interface, MIPI), general-purpose input/output (GPIO) interfaces, SIM interfaces, USB interfaces.
The I2C interface is a bi-directional synchronous serial bus comprising a serial data line (SDA) and a serial clock line (derail clock line, SCL). In some embodiments, the processor 110 may contain multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, charger, flash, camera 193, etc., respectively, through different I2C bus interfaces. For example: the processor 110 may couple the touch sensor 180K through an I2C interface, causing the processor 110 to communicate with the touch sensor 180K through an I2C bus interface, implementing the touch functionality of the device 100.
The I2S interface may be used for audio communication. In some embodiments, the processor 110 may contain multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through the I2S interface, to implement a function of answering a call through the bluetooth headset.
PCM interfaces may also be used for audio communication to sample, quantize and encode analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface to implement a function of answering a call through the bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus for asynchronous communications. The bus may be a bi-directional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is typically used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through a UART interface, to implement a function of playing music through a bluetooth headset.
The MIPI interface may be used to connect the processor 110 with peripheral devices such as the display 194 and camera 193. The MIPI interfaces include camera serial interfaces (camera serial interface, CSI), display serial interfaces (display serial interface, DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the photographing function of apparatus 100. Processor 110 and display 194 communicate via a DSI interface to implement the display functions of apparatus 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal interface as well as a data signal interface. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, and the sensor module 180. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, or a MIPI interface.
The USB interface 130 is an interface conforming to the USB standard specification, and may be, for example, a Mini (Mini) USB interface, a Micro (Micro) USB interface, or a C-type USB (USB Type C) interface. The USB interface 130 may be used to connect a charger to charge the device 100, to transfer data between the device 100 and a peripheral device, and to connect a headset to play audio through the headset. USB interface 130 may also be used to connect other devices 100, such as AR equipment.
The connection relationships between the modules shown in fig. 1 are merely illustrative, and do not constitute a limitation on the connection relationships between the modules of the apparatus 100. Alternatively, the modules of the apparatus 100 may be combined by using a plurality of connection manners in the foregoing embodiments.
The charge management module 140 is used to receive power from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive the current of the wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive electromagnetic waves (current path shown in dashed lines) through the wireless charging coil of the device 100. The charging management module 140 may also provide power to the device 100 through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle times, and battery state of health (e.g., leakage, impedance). Alternatively, the power management module 141 may be provided in the processor 110, or the power management module 141 and the charge management module 140 may be provided in the same device.
The wireless communication function of the apparatus 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the apparatus 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication applied on the device 100, such as at least one of the following: second generation (2) th generation, 2G) mobile communication solutions, third generation (3 th generation, 3G) mobile communication solution, fourth generation (4 th generation, 5G) mobile communication solution, fifth generation (5 th generation, 5G) mobile communication solution. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering and amplifying the received electromagnetic waves, and then transmit the electromagnetic waves to a modem processor for demodulation. The mobile communication module 150 may further amplify the signal modulated by the modem processor, and the amplified signal is converted into electromagnetic waves by the antenna 1 and radiated. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through audio devices (e.g., speaker 170A, receiver 170B) or displays images or video through display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
Similar to the mobile communication module 150, the wireless communication module 160 may also provide wireless communication solutions applied on the device 100, such as at least one of the following: wireless local area network (wireless local area networks, WLAN), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication (near field communication, NFC), infrared (IR). The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, frequency-modulates and filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate and amplify it, and convert the signal into electromagnetic waves to radiate via the antenna 2.
In some embodiments, the antenna 1 of the apparatus 100 is coupled to the mobile communication module 150 and the antenna 2 of the apparatus 100 is coupled to the wireless communication module 160 so that the apparatus 100 can communicate with a network and other devices through wireless communication technology. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The device 100 may implement display functions through a GPU, a display screen 194, and an application processor. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 may be used to display images or video. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED), a flexible light-emitting diode (FLED), a Mini light-emitting diode (Mini LED), a Micro light-emitting diode (Micro LED), a Micro OLED (Micro OLED), or a quantum dot LED (quantum dot light emitting diodes, QLED). In some embodiments, the apparatus 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The apparatus 100 may implement a photographing function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. The ISP can carry out algorithm optimization on noise, brightness and color of the image, and can optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into a standard Red Green Blue (RGB), YUV, etc. format image signal. In some embodiments, the apparatus 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the apparatus 100 selects a frequency bin, a digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The apparatus 100 may support one or more video codecs. In this way, the apparatus 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, and MPEG4.
The NPU is a processor which refers to the biological neural network structure, for example, refers to the transmission mode among human brain neurons to rapidly process input information, and can also be continuously self-learned. Intelligent awareness and other functions of the device 100 may be implemented by the NPU, for example: image recognition, face recognition, speech recognition, and text understanding.
The external memory interface 120 may be used to connect an external memory card, such as a Secure Digital (SD) card, to implement the memory capability of the expansion device 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The internal memory 121 may include a storage program area and a storage data area. Wherein the storage program area may store application programs required for at least one function (e.g., a sound playing function and an image playing function) of the operating system. The storage data area may store data (e.g., audio data and phonebooks) created during use of the device 100. Further, the internal memory 121 may include a high-speed random access memory, and may also include a nonvolatile memory such as: at least one disk storage device, a flash memory device, and a universal flash memory (universal flash storage, UFS), etc. The processor 110 performs various processing methods of the apparatus 100 by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The device 100 may implement audio functions, such as music playing and recording, through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like.
The audio module 170 is used to convert digital audio information into an analog audio signal output, and may also be used to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a horn, is used to convert audio electrical signals into sound signals. The device 100 may listen to music or hands-free conversation through the speaker 170A.
A receiver 170B, also referred to as an earpiece, converts the audio electrical signal into a sound signal. When a user uses the device 100 to answer a telephone call or voice message, the user can answer the voice by placing the receiver 170B close to the ear.
Microphone 170C, also known as a microphone or microphone, is used to convert sound signals into electrical signals. When a user makes a call or transmits voice information, a sound signal may be input to the microphone 170C by sounding near the microphone 170C. The apparatus 100 may be provided with at least one microphone 170C. In other embodiments, the apparatus 100 may be provided with two microphones 170C to achieve a noise reduction function. In other embodiments, the device 100 may also be provided with three, four or more microphones 170C to perform the functions of identifying the source of sound and directing the recording. The processor 110 may process the electrical signal output by the microphone 170C, for example, the audio module 170 and the wireless communication module 160 may be coupled through a PCM interface, and after the microphone 170C converts the environmental sound into an electrical signal (such as a PCM signal), the electrical signal is transmitted to the processor 110 through the PCM interface; the electrical signal is subjected to volume analysis and frequency analysis from the processor 110 to determine the volume and frequency of the ambient sound.
The earphone interface 170D is used to connect a wired earphone. The headset interface 170D may be a USB interface 130 or a 3.5mm open mobile device 100 platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A may be of various types, such as a resistive pressure sensor, an inductive pressure sensor, or a capacitive pressure sensor. The capacitive pressure sensor may be a device comprising at least two parallel plates with conductive material, and when a force is applied to the pressure sensor 180A, the capacitance between the electrodes changes, and the device 100 determines the strength of the pressure based on the change in capacitance. When a touch operation acts on the display screen 194, the apparatus 100 detects the touch operation according to the pressure sensor 180A. The device 100 may also calculate the location of the touch based on the detection signal of the pressure sensor 180A. In some embodiments, touch operations that act on the same touch location, but at different touch operation strengths, may correspond to different operation instructions. For example: executing an instruction for checking the short message when the touch operation with the touch operation intensity smaller than the first pressure threshold acts on the short message application icon; and executing the instruction of newly creating the short message when the touch operation with the touch operation intensity being larger than or equal to the first pressure threshold acts on the short message application icon.
The gyro sensor 180B may be used to determine a motion gesture of the apparatus 100. In some embodiments, the angular velocity of device 100 about three axes (i.e., the x-axis, the y-axis, and the z-axis) may be determined by gyro sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects the angle of the shake of the apparatus 100, calculates the distance to be compensated for by the lens module according to the angle, and allows the lens to counteract the shake of the apparatus 100 by the reverse motion, thereby realizing anti-shake. The gyro sensor 180B can also be used for scenes such as navigation and motion sensing games.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, the device 100 calculates altitude from barometric pressure values measured by the barometric pressure sensor 180C, aiding in positioning and navigation.
The magnetic sensor 180D includes a hall sensor. The device 100 may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the device 100 is a flip-top machine, the device 100 may detect the opening and closing of the flip-top according to the magnetic sensor 180D. The device 100 can set the characteristics of automatic unlocking of the flip cover according to the detected opening and closing state of the leather sheath or the detected opening and closing state of the flip cover.
The acceleration sensor 180E can detect the magnitude of acceleration of the device 100 in various directions (typically the x-axis, y-axis, and z-axis). The magnitude and direction of gravity can be detected when the device 100 is stationary. The acceleration sensor 180E may also be used to recognize the gesture of the apparatus 100 as an input parameter for applications such as landscape switching and pedometer.
The distance sensor 180F is used to measure a distance. The device 100 may measure distance by infrared or laser. In some embodiments, for example, in a shooting scene, the apparatus 100 may range using the distance sensor 180F to achieve fast focusing.
The proximity light sensor 180G may include, for example, a light-emitting diode (LED) and a light detector, for example, a photodiode. The LED may be an infrared LED. The device 100 emits infrared light outwards through the LED. The device 100 uses a photodiode to detect infrared reflected light from nearby objects. When reflected light is detected, the apparatus 100 may determine that an object is present nearby. When no reflected light is detected, the apparatus 100 may determine that there is no object nearby. The device 100 can use the proximity light sensor 180G to detect whether the user is holding the device 100 close to the ear for talking, so as to automatically extinguish the screen for power saving. The proximity light sensor 180G may also be used for automatic unlocking and automatic screen locking in holster mode or pocket mode.
The ambient light sensor 180L is used to sense ambient light level. The device 100 may adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect whether device 100 is in a pocket to prevent false touches.
The fingerprint sensor 180H is used to collect a fingerprint. The device 100 can utilize the collected fingerprint characteristics to realize the functions of unlocking, accessing an application lock, photographing, answering an incoming call and the like.
The temperature sensor 180J is for detecting temperature. In some embodiments, the apparatus 100 performs a temperature processing strategy using the temperature detected by the temperature sensor 180J. For example, when the temperature reported by temperature sensor 180J exceeds a threshold, apparatus 100 performs a reduction in performance of a processor located in the vicinity of temperature sensor 180J in order to reduce power consumption to implement thermal protection. In other embodiments, when the temperature is below another threshold, the device 100 heats the battery 142 to avoid low temperatures causing the device 100 to shut down abnormally. In other embodiments, when the temperature is below a further threshold, the device 100 performs boosting of the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperatures.
The touch sensor 180K, also referred to as a touch device. The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a touch screen. The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor 180K may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the device 100 and at a different location than the display 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal. In some embodiments, bone conduction sensor 180M may also be provided in a headset, in combination with an osteoinductive headset. The audio module 170 may analyze the voice signal based on the vibration signal of the sound portion vibration bone block obtained by the bone conduction sensor 180M, so as to implement a voice function. The application processor may analyze the heart rate information based on the blood pressure beat signal acquired by the bone conduction sensor 180M, so as to implement a heart rate detection function.
The keys 190 include a power-on key and an volume key. The keys 190 may be mechanical keys or touch keys. The device 100 may receive a key input signal and implement a function associated with the case input signal.
The motor 191 may generate vibration. The motor 191 may be used for incoming call alerting as well as for touch feedback. The motor 191 may generate different vibration feedback effects for touch operations acting on different applications. The motor 191 may also produce different vibration feedback effects for touch operations acting on different areas of the display screen 194. Different application scenarios (e.g., time alert, receipt message, alarm clock, and game) may correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
The indicator 192 may be an indicator light, which may be used to indicate a change in state of charge and charge, or may be used to indicate a message, missed call, and notification.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195 to make contact with the apparatus 100, or may be removed from the SIM card interface 195 to make separation from the apparatus 100. The device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The same SIM card interface 195 may simultaneously insert multiple cards, which may be of the same type or of different types. The SIM card interface 195 may also be compatible with external memory cards. The device 100 interacts with the network through the SIM card to perform functions such as talking and data communication. In some embodiments, the device 100 employs an embedded SIM (eSIM) card, which may be embedded in the device 100 and not separable from the device 100.
The hardware system of the apparatus 100 is described in detail above, and the software system of the apparatus 100 is described below. The software system may employ a layered architecture, an event driven architecture, a microkernel architecture, a micro-service architecture, or a cloud architecture, and embodiments of the present application illustratively describe the software system of the apparatus 100.
As shown in fig. 2, the software system using the hierarchical architecture is divided into several layers, each of which has a clear role and division. The layers communicate with each other through a software interface. In some embodiments, the software system may be divided into five layers, from top to bottom, an application layer, an application framework layer, a hardware abstraction layer (hardware abstract layer, HAL), an Zhuoyun rows (Android run) and system libraries, and a kernel layer, respectively.
The application layer may include an Application (APP) for a courier service.
The express delivery service APP is configured to process a service related to express delivery, for example, after the device 100 receives a piece of short message, the express delivery service APP parses the piece of short message, parses out key information, and generates a piece of card.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer may include some predefined functions.
For example, the application framework layer includes an LBS, a resource manager, and a notification manager.
LBS is a function of acquiring the current location of a positioning device by using various types of positioning technologies, and providing information resources and basic services to the positioning device through the mobile internet. Firstly, the user can determine the space position of the user by using a positioning technology, and then the user can acquire the position-related resources and information through the mobile internet. The LBS service integrates various information technologies such as mobile communication, internet, space positioning, position information, big data and the like, and utilizes a mobile internet service platform to update and interact data, so that a user can acquire corresponding service through space positioning.
The resource manager provides various resources for the application program, such as localization character strings, icons, pictures, layout files and video files, and can facilitate the generation of the pick-up cards.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as a notification manager, is used for download completion notification and message alerting. The notification manager may also manage notifications that appear in the system top status bar in the form of charts or scroll bar text, such as notifications for applications running in the background. The notification manager may also manage notifications that appear on the screen in the form of dialog windows, such as prompting text messages in status bars, sounding prompts, vibrating electronic devices, and flashing lights.
HAL is an interface layer between the operating system kernel and the hardware circuitry that aims at abstracting the hardware. The hardware interface details of a specific platform are hidden, a virtual hardware platform is provided for an operating system, so that the operating system has hardware independence, and can be transplanted on various platforms.
The HAL includes an addellfence interface for adding a geofence.
Android run time includes a core library and virtual machines. Android run time is responsible for scheduling and management of the Android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing functions such as management of object life cycle, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules, such as: surface manager (surface manager), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES) and 2D graphics engines (e.g., SGL).
The surface manager is used to manage the display subsystem and provides a fusion of the 2D and 3D layers for the plurality of applications.
The media library supports playback and recording of multiple audio formats, playback and recording of multiple video formats, and still image files. The media library may support a variety of audio and video coding formats such as MPEG4, H.264, MP3, AAC, AMR, JPG, and PNG.
Three-dimensional graphics processing libraries may be used to implement three-dimensional graphics drawing, image rendering, compositing, and layer processing.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The kernel layer includes an addellfence interface for adding geofences. The kernel layer may also include display drivers and modem drivers.
It should be understood that the hardware structures and software architectures illustrated in fig. 1 and 2 are merely exemplary illustrations of the apparatus 100, and are not limiting on the hardware and software of the apparatus 100, and that the apparatus 100 may be implemented by other types of hardware structures and software architectures.
The software system and the workflow of the hardware system of the apparatus 100 are illustrated below in connection with a card display scenario.
After receiving the wireless signal, the apparatus 100 operates the modem to drive the wireless signal, obtains information of the wireless device transmitting the wireless signal from the wireless signal, and if the information of the wireless device triggers a preset geofence, the apparatus 100 performs a step related to the geofence. For example, the geofence is an area where the express cabinet is located, and after the geofence is triggered, the device 100 invokes a display driver, so as to control the display screen 194 to display a reminder card for taking the express.
After the user reads the reminding card, the reminding card can be deleted by deleting operation.
During the deletion operation, when the user performs a touch operation on the touch sensor 180K, a corresponding hardware interrupt is sent to the operating system layer, and the operating system layer processes the touch operation into an interaction event, which includes, for example, information such as touch coordinates and a time stamp of the touch operation; subsequently, the operating system layer identifies the control corresponding to the interaction event and notifies an Application (APP) corresponding to the control. When the touch operation is a delete operation and the control is a control of the card module, the control of the card module is displayed and driven through the API call according to the interaction event, and then the display screen 194 is controlled to close the reminding card.
An application scenario suitable for the present application will be described below with reference to fig. 3 and 4 by taking a mobile phone as an example.
The base station during operation launches radio signal, and there is an express delivery cabinet in radio signal's the signal coverage, and there is a geofence of predetermineeing the periphery of express delivery cabinet. And the express delivery cabinet stores the express delivery of the user of the mobile phone, and the service provider of the express delivery cabinet sends a delivery notification to the mobile phone.
When the mobile phone is located outside the geofence, the geofence is not triggered, and the mobile phone does not display a reminding card for taking the express. Along with the movement of the user, the mobile phone enters the geofence, as shown in fig. 4, at this time, the fence event is triggered, the mobile phone displays a reminding card for taking the express, and the interface of the reminding card is shown in fig. 5. After the user reads the reminding card, the express is taken out from the express cabinet in time.
In the application scenario shown in fig. 3 and fig. 4, the mobile phone determines whether to display the reminding card based on the triggering condition of the fence event. When the fence event (the event entering the geofence) is not triggered, the user is far away from the express cabinet, and the reminding card is not displayed at the moment, so that the user is prevented from being disturbed; when the fence event is triggered, the user is close to the express cabinet, and the reminding card is displayed at the moment, so that the user is prevented from forgetting to take the piece. Thereby providing intelligent services to the user.
One precondition for a handset to trigger a fence event is to determine the current location in order to determine whether the handset enters or exits the geofence based on the current location. The mobile phone typically uses a chip location function to determine the current location, for example, the mobile phone typically uses GPS to determine the current location. However, using the chip positioning function requires a bright screen to wake up the positioning chip or running positioning software in the background, and in either way, the power consumption of the mobile phone is increased.
The method of triggering a fence event provided by the present application will be described in detail below. As shown in fig. 6, the method includes the following.
S610, a first wireless signal is received.
The first wireless signal may be a wireless signal transmitted by a base station of a cellular network, a wireless signal transmitted by a router, or a wireless signal transmitted by a bluetooth device.
For example, the first wireless signal may be a wireless signal transmitted by a base station near the express cabinet, or may be a wireless signal transmitted by a router near the express cabinet, or may be a bluetooth signal transmitted by the express cabinet itself.
The mobile phone can receive the first wireless signal through the antenna 1 or the antenna 2, and then analyze the first wireless signal through a modem (modem) to determine information carried by the first wireless signal.
In the present application, "first", "second" are used to identify different individuals in the same type of object, e.g., a first wireless signal and a second wireless signal described below represent two different wireless signals, except that no other limitation exists.
S620, determining a first wireless device corresponding to the first wireless signal.
The mobile phone analyzes the first wireless signal through the modem, so that information carried by the first wireless signal can be determined. Typically, the wireless signal contains an Identification (ID) of the wireless device of the transmitted wireless signal.
For example, when the first wireless signal is a wireless signal transmitted by a base station, the first wireless signal typically carries a cell (cell) ID and a location area code (location area code, LAC).
The cell ID is typically used to identify the cell managed by one node (node B), and for a 5G cell, the cell ID is typically composed of 11 digits, for example 50682204292 can be used to identify one cell.
LAC is a code of one area set for paging, which can be used to identify different location areas, which may contain one or more cells.
There may be a case where the cell ID is duplicated, but the cell ID belonging to one location area is not normally duplicated, and thus the first wireless device can be accurately identified based on the cell ID and LAC.
S730, determining whether the first wireless device is a target wireless device, where the target wireless device is a wireless device associated with a target fence, and the signal coverage of the target wireless device includes the target fence.
The target fence is, for example, a courier cabinet fence (e.g., the geofence shown in fig. 3), but may also be a corporate fence or other type of fence.
When the target fence is an express cabinet fence, the target fence is used for triggering events related to the express cabinet, such as express taking and express sending. When the target fence is a corporate fence, the target fence is used to trigger a corporate-related event, such as a punch card.
Taking the case of the express cabinet fence shown in fig. 3 as an example, the express cabinet fence is included in the signal coverage area of the base station, and the base station can be set as the target wireless device. When a plurality of wireless devices exist around the express cabinet, one wireless device closest to the express cabinet among the plurality of wireless devices can be set as a target wireless device.
The mobile phone can learn according to the behavior habits of the user and determine the positions of a plurality of wireless devices associated with the user. And then, the mobile phone determines the target wireless device from the plurality of wireless devices according to the service attribute of the first fence event and the positions of the plurality of wireless devices, wherein the service attribute and the positions of the target wireless devices have a preset association relation.
For example, when the user has a rest at night, the mobile phone remains connected with the base station a for a long time, and the mobile phone can determine that the location of the base station a is the home location of the user. The mobile phone can set the base station A as the target wireless device based on the service attribute (home position) of the express delivery and the position of the base station A; when the first wireless signal received by the mobile phone is the signal sent by the base station A, the mobile phone can trigger a first fence event (express taking) of a target fence (the area where the express cabinet is located), so that intelligent service can be provided for a user.
For another example, when the user works in daytime, the mobile phone keeps connected with the base station B for a long time, and the mobile phone can determine that the location of the base station B is the location of the company of the user. The mobile phone can set the base station B as the target wireless device based on the business attribute of the card punching (the position of the company) and the position of the base station B; when the first wireless signal received by the mobile phone is the signal sent by the base station B, the mobile phone can trigger a first fence event (card punching) of a target fence (the area where the company is located), so that intelligent service can be provided for the user.
The mobile phone stores the ID of the target wireless device, the mobile phone can be matched with the ID of the first wireless device and the ID of the target wireless device, and if the two IDs are the same, the mobile phone can determine that the first wireless device is the target wireless device; if the two IDs are different, the handset may determine that the first wireless device is not the target wireless device.
For example, the first wireless device is a 5G base station, the cell ID of the first wireless device is 50682204292 (decimal), the mobile phone can directly match 50682204292 the ID of the target wireless device, and if the two IDs are different, the mobile phone determines that the first wireless device is not the target wireless device. If the two IDs are the same, the mobile phone continuously matches the LAC of the first wireless device with the LAC of the target wireless device, and if the two LACs are the same, the mobile phone determines that the first wireless device is the target wireless device; if the two LACs are different, the handset determines that the first wireless device is not the target wireless device.
Optionally, when the cell ID is too long, the mobile phone may further split the cell ID of the first wireless device to obtain a high-level cell ID (cid_high) and a standard cell ID, which are respectively matched with the high-level cell ID and the standard cell ID of the first wireless device.
For example, if the cell ID of the first wireless device is 50682204292 (the decimal 5G cell ID, converted to binary, exceeds 32 bits), the standard cell ID after the splitting is 3437564036 (converted to binary, 32 bits), and the high order cell ID after the splitting is 11 (the high four bits of the cell ID).
When the high-order cell ID of the first wireless device is the same as the high-order cell ID of the target wireless device, and when the standard cell ID of the first wireless device is the same as the standard cell ID of the target wireless device, and when the LAC of the first wireless device is the same as the LAC of the target wireless device, the mobile phone determines that the first wireless device is the target wireless device.
When the high-order cell ID, the standard cell ID and the LAC are matched, the mobile phone can be matched with the high-order cell ID first, then matched with the standard cell ID when the high-order cell ID is successfully matched, and matched with the LAC when the standard cell ID is successfully matched. The length of the higher cell ID is shorter than the lengths of the standard cell ID and LAC, and therefore, preferentially matching the higher cell ID can improve the identification efficiency of identifying the first wireless device.
S740, triggering a first fence event for the target fence when the first wireless device is the target wireless device.
The signal coverage of the target wireless device includes a target fence, thus indicating that the handset is located near the target fence when the first wireless device is the target wireless device. The handset may trigger a first fence event of the target fence, which may be an event that alerts the user to perform a related service within the target fence. For example, the first fence event is to take an express, and the mobile phone may display the reminder card shown in fig. 5.
When the first wireless device is not the target wireless device, the mobile phone is far away from the target fence, the mobile phone determines a first fence event which does not trigger the target, and interference of the first fence event to a user is avoided.
Because the mobile phone is connected with the wireless device (such as a base station or a router) without a bright screen or running software in the background, the signal of the wireless device is used for triggering the fence event, so that the power consumption for triggering the fence event can be reduced.
As an optional implementation manner, the first radio signal is a radio signal of a current resident network cell.
The mobile phone may receive a plurality of cellular network signals at the same time, wherein some cellular network signals are not signals sent by the network residence cells of the mobile phone, which indicates that the cells corresponding to the cellular network signals (non-current network residence cells) are far away from the mobile phone, and the position error determined based on the non-current network residence cells is large, so that the triggering accuracy of the fence event can be improved based on the matching of the wireless signals of the current network residence cells with the target wireless device.
In addition, when the mobile phone matches the target wireless device based on the wireless signal of the current resident network cell, the mobile phone does not match the target network device according to the network signal of the previous resident network cell any more, and the power consumption of the matched target wireless device can be reduced. The reason is that it is not meaningful that the previously camped cell has been matched at a previous time, and that the previously camped cell is currently matched again.
For example, the cell corresponding to the cell at the time a is the cell a, and after a period of time, the cell corresponding to the cell at the time B is the cell B, where the cell a and the cell B are neighboring cells. When the mobile phone is connected with the cell A, the ID of the cell A is determined based on the wireless signal of the cell A, and the ID of the cell A and the ID of the target wireless device are matched. When the mobile phone is connected with the cell B, the cell A and the cell B are adjacent cells, and the mobile phone can still receive the wireless signals transmitted by the cell A. If the wireless signal used when the mobile phone matches the target wireless device is not limited, the mobile phone still uses the wireless signal of the cell A to determine the ID of the cell A when the mobile phone is connected with the cell B, and matches the ID of the cell A with the ID of the target wireless device. In fact, it does not make sense to match the ID of the cell a with the ID of the target wireless device again at the time B, which may cause waste of power consumption.
According to the embodiment, at the time B, the current cell of the mobile phone is the cell B, the mobile phone determines the ID of the cell B only based on the wireless signal of the cell B, and then matches the ID of the cell B with the ID of the target wireless device, and does not match the ID of the cell a with the ID of the target wireless device, thereby reducing the power consumption of the matching target wireless device.
After the mobile phone receives the first wireless signal, it may also receive a second wireless signal. The mobile phone can determine a second wireless device corresponding to the second wireless signal; when the second wireless device fails to match with the target wireless device, and when the number of consecutive failed matches of the target wireless device is greater than or equal to a number threshold, a second fence event of the target fence is triggered.
When the mobile phone determines that the second wireless device is not the target wireless device and the number of continuous matching failures of the target wireless device is greater than or equal to a number threshold (e.g. 5), the mobile phone determines that the current position is far away from the target fence, and can trigger a second fence event of the target fence, wherein the second fence event can be an event for reminding a user to execute related services outside the target fence. For example, the target enclosure is an express cabinet enclosure and the second enclosure event may be a bus arrival reminder.
As the user may move at the edge of the first wireless device, the terminal device may repeatedly enter the target fence, resulting in the first fence event and the second fence event being triggered multiple times, causing interference to the user. Therefore, when the target wireless device fails to match continuously for a plurality of times, the terminal device is far away from the target fence, and the second fence event of the target fence is triggered again, so that the interference of the situation to the user can be avoided.
Next, a method for presetting a target fence provided by the present application is described with reference to fig. 7.
S710, a smart sensor (sensor) receives target fence information from an application processor (application processor, AP).
The AP is a processor running an express service APP. The target fence information includes a target fence number, information of a target wireless device associated with the target fence (e.g., standard cell ID, high order cell ID, and LAC).
S720, the sensor hub judges whether the locally cached fence information reaches a threshold value.
If the number of locally cached fence information reaches a threshold (e.g., 50), the sensor hub returns a failure to the AP; if the number of locally cached fence information does not reach the threshold, the sensor hub performs S730.
S730, analyzing the target fence number from the target fence information by the sensor hub.
S740, the sensor hub judges whether the locally cached fence information contains a target fence number.
If the locally cached fence information contains the target fence number, the sensor hub returns failure to the AP; if the locally cached fence information does not contain the target fence number, the sensor hub performs S750.
The storage space of the sensor hub is limited, when the fence information in the locally cached fence information set is different from the target fence information, the target fence information is new fence information, and the new fence information can be stored in the fence information set, so that the waste of the storage space of the sensor hub caused by storing repeated fence information is avoided. When the number of the fence information in the fence information set is smaller than the number threshold, the storage space of the sensor hub is more free, and the storage of the target fence does not negatively affect other functions of the sensor hub.
S750, analyzing the data volume of the target fence information by the sensor hub, and applying for the heap memory according to the data volume.
If the data amount of the target fence information is more, the sensor hub can apply for a larger memory space; if the data size of the target fence information is smaller, the sensor hub can apply for smaller memory space. Thereby improving the utilization rate of the memory space of the sensor hub.
S760, the sensor hub judges whether the memory application is successful.
If the application fails, the sensor hub returns failure to the AP; if the application is successful, the sensor hub performs S770.
S770, the sensor hub adds the target fence information to the to-be-matched fence linked list.
The linked list is a memory structure of the heap memory, and when the subsequent matching is performed, a dichotomy can be used to find out whether the linked list contains the same information of the target wireless device as the scanned information of the wireless device (such as the first wireless device information). After the target fence information is added to the to-be-matched fence linked list, the sensor hub performs S780.
S780, the sensor hub determines whether wireless device information is currently subscribed to.
The sensor hub needs to subscribe to the Modem to obtain the wireless device information scanned by the Modem (e.g., the complete cell ID and LAC of the wireless device currently camping on the network). If the wireless device information is subscribed currently, the sensor hub returns success to the AP; if wireless device information is not currently subscribed to, sensor hub performs S790.
S790, sensor hub subscribes to wireless device information.
The sensor hub can send a subscription message to the Modem, subscribe the wireless device information associated with the target fence, and return success to the AP after successful subscription.
The method of triggering a fence event provided by the present application is described in further detail below in connection with FIG. 8 from the perspective of module interaction.
S801, initializing.
After the mobile phone is started, the express service APP, LBS, HAL, the kernel layer, the sensor hub and the Modem are all initialized.
S802, the express service APP sends a request for connecting with the LBS to the LBS, so that the express service APP can use functions related to the fence.
The express service APP can be a single APP or a sub-module of other modules (such as YOYO suggestion). After the connection is successful, the LBS performs S803.
S803, the LBS sends a message of successful connection to the express service APP.
After the connection is established, the express service APP can communicate with the LBS through the connection.
S804, the express service APP learns to obtain information of the target wireless device.
The mobile phone can learn according to the behavior habits of the user and determine the positions of a plurality of wireless devices associated with the user. And then, the mobile phone determines the target wireless device from the plurality of wireless devices according to the service attribute of the first fence event and the positions of the plurality of wireless devices, wherein the service attribute and the positions of the target wireless devices have a preset association relation.
For example, when the user has a rest at night, the mobile phone remains connected with the base station a for a long time, and the mobile phone can determine that the location of the base station a is the home location of the user. The mobile phone can set the base station A as the target wireless device based on the service attribute (home position) of the express delivery and the position of the base station A; when the first wireless signal received by the mobile phone is the signal sent by the base station A, the mobile phone can trigger a first fence event (express taking) of a target fence (the area where the express cabinet is located), so that intelligent service can be provided for a user.
For another example, when the user works in daytime, the mobile phone keeps connected with the base station B for a long time, and the mobile phone can determine that the location of the base station B is the location of the company of the user. The mobile phone can set the base station B as the target wireless device based on the business attribute of the card punching (the position of the company) and the position of the base station B; when the first wireless signal received by the mobile phone is the signal sent by the base station B, the mobile phone can trigger a first fence event (card punching) of a target fence (the area where the company is located), so that intelligent service can be provided for the user.
The information of the target wireless device may include the full cell ID, LAC, and associated target fence ID, and may also include more information.
S805, the express service APP sends information of the target wireless device to the kernel layer through the LBS and the HAL.
The express service APP may transmit information of a base station (target wireless device) to be monitored to the LBS through an addellfence interface. The LBS invokes its own corresponding hardware abstraction layer interface (addellfence interface) to transfer the information of the target wireless device to the HAL. The HAL calls a corresponding kernel layer interface (addELLFENCE interface) in an ioctl mode, and information of the target wireless device is transferred to the kernel layer.
The kernel layer may pass information of the target wireless device to the sensor hub through both steps S806 and S807.
And S806, the kernel layer writes the information of the target wireless device into the shared memory.
Shared memory is one way to share and transfer data between two running processes. The memory shared between different processes is typically arranged as the same piece of physical memory. Processes may connect the same piece of shared memory to their own address space and all processes may access the addresses in the shared memory.
Because the data volume of the information of the target wireless device is larger, the communication rate can be improved by sharing the memory.
S807, the kernel layer sends a first notification message to the sensor hub.
The kernel layer may notify the sensor hub to add the target fence by inter-kernel communication (inter-processor communication, IPC) mode, that is, send a first notification message carrying the target fence ID to the sensor hub, and notify the sensor hub to add the target fence.
S808, after receiving the first notification message, the sensor hub reads the information of the target wireless device from the shared memory.
S809, the sensor hub subscribes to the wireless device information with the Modem in response to the first notification message.
The sensor hub may subscribe to the wireless device information from the Modem in an IPC manner, that is, request the Modem to scan the wireless signal, so as to obtain the wireless device information corresponding to the wireless signal (such as the complete cell ID and LAC of the current resident network cell).
S810, the Modem returns a response message.
The response message returned by the Modem is used for indicating that the wireless equipment information is subscribed successfully, and the response message is notified to the kernel layer after the response message is received by the sensor hub. After the kernel layer receives the response message, the response message is notified to the HAL through the netlink capability. After the HAL receives the response message, the response message is notified to the LBS by the OnCellFenceAdd method. The LBS notifies the courier service APP of a response message indicating that the target fence has been added successfully.
S811, the Modem sends the scanned wireless device information to the sensor hub.
After receiving the subscription request, the Modem periodically or aperiodically scans the current wireless signal to obtain wireless device information (such as the complete cell ID and LAC of the current resident network cell) corresponding to the wireless signal.
S812, the sensor hub runs a matching algorithm to match the target wireless device information and the scanned wireless device information.
After receiving the wireless device information sent by the Modem, the Sensorhub analyzes the wireless device information to obtain the cid and LAC of the current resident network cell. Then, the sensor hub splits the complete cell ID into a standard cell ID and a high-order cell ID, and matches the high-order cell ID, the standard cell ID and the LAC with locally cached target wireless device information in sequence.
If the high-order cell ID, the standard cell ID and the LAC are successfully matched, indicating that the target fence enters, and reporting the target fence ID and the fence state (entering state) by the sensor hub; if any one of the high-order cell ID, the standard cell ID and the LAC fails to match, the matching of the target fence is failed, and when the number of times of the matching failure of the target fence reaches a threshold (e.g. 5), the sensor hub reports the target fence ID and the fence state (leaving state).
S813, when the matching is successful, the sensor hub writes the target fence ID and the fence state into the shared memory.
S814, the sensor hub sends a second notification message to the kernel layer.
The kernel layer can inform the kernel layer that the content of the shared memory is changed in an IPC mode.
At S815, the kernel layer reads the target fence ID and fence status from the shared memory.
S816, the kernel layer transmits the target fence ID and the fence state to the express service APP through the HAL and the LBS.
After the kernel layer reads the target fence ID and the fence state, the target fence ID and the fence state are transferred to the HAL through the netlink capability. After receiving the target fence ID and fence status, the HAL transfers the target fence ID and fence status to the LBS by the oncellfence changed method. The LBS delivers the target fence ID and fence status to a client subscribing to the target fence, for example, an express service APP.
S817, the express service APP displays a reminder card.
The sensor hub successfully matches, the fence state transmitted to the express delivery service APP is an entering state, and the entering state triggers a first fence event of the target fence, namely, the user is reminded to take the express delivery. The express delivery service APP displays a reminding card containing the short message content of the piece taking on a mobile phone screen, so that intelligent service can be provided for a user.
If the sensor hub fails to match for a plurality of times, the fence state transmitted to the express delivery service APP is in an away state, and the away state triggers a second fence event of the target fence, namely, the reminding user is canceled to take the express. The express delivery service APP closes and displays the reminding card containing the content of the short message to be fetched on the mobile phone screen, so that the interference received by a user can be reduced.
The application also provides a computer program product which, when executed by a processor, implements the method of any of the method embodiments of the application.
The computer program product may be stored in a memory and eventually converted to an executable object file that can be executed by a processor through preprocessing, compiling, assembling, and linking.
The computer program product may also cure code in the chip. The application is not limited to the specific form of computer program product.
The application also provides a computer readable storage medium having stored thereon a computer program which when executed by a computer implements the method according to any of the method embodiments of the application. The computer program may be a high-level language program or an executable object program.
The computer readable storage medium may be volatile memory or nonvolatile memory, or may include both volatile memory and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and direct memory bus RAM (DR RAM).
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working processes and technical effects of the apparatus and device described above may refer to corresponding processes and technical effects in the foregoing method embodiments, which are not described in detail herein.
In the several embodiments provided by the present application, the disclosed systems, devices, and methods may be implemented in other manners. For example, some features of the method embodiments described above may be omitted, or not performed. The above-described apparatus embodiments are merely illustrative, the division of units is merely a logical function division, and there may be additional divisions in actual implementation, and multiple units or components may be combined or integrated into another system. In addition, the coupling between the elements or the coupling between the elements may be direct or indirect, including electrical, mechanical, or other forms of connection.
It should be understood that, in various embodiments of the present application, the size of the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
In addition, the terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely one association relationship describing the associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In summary, the foregoing description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (9)

1. A method of triggering a fence event, comprising:
receiving a first wireless signal;
determining a first wireless device corresponding to the first wireless signal;
determining whether the first wireless device is a target wireless device, wherein the target wireless device is a wireless device associated with a target fence, and the signal coverage range of the target wireless device comprises the target fence;
triggering a first fence event for the target fence when the first wireless device is the target wireless device;
The first wireless device is the target wireless device, comprising:
the high-order cell identifier of the first wireless device is the same as the high-order cell identifier of the target wireless device, the standard cell identifier of the first wireless device is the same as the standard cell identifier of the target wireless device, the position area code of the first wireless device is the same as the position area code of the target wireless device, the high-order cell identifier and the standard cell identifier are obtained by splitting the complete cell identifier, and the length of the standard cell identifier is the same as the bit width of a chip for processing the standard cell identifier.
2. The method of claim 1, wherein prior to determining whether the first wireless device is a target wireless device, further comprising:
receiving target fence information for the target fence from an application processor;
storing the target fence information into the fence information set when the fence information in the fence information set is different from the target fence information and/or when the number of the fence information in the fence information set is less than a number threshold.
3. The method as recited in claim 2, further comprising:
When the target fence information is successfully stored, subscribing the information of the wireless device associated with the target fence to a modem.
4. The method of claim 1, wherein the higher cell identity is a first-to-match parameter.
5. The method according to any one of claims 1 to 4, further comprising:
receiving a second wireless signal;
determining a second wireless device corresponding to the second wireless signal;
triggering a second fence event for the target fence when the second wireless device fails to match the target wireless device and when the number of consecutive failed matches of the target wireless device is greater than or equal to a number threshold.
6. The method according to any of claims 1 to 4, wherein the first radio signal is a radio signal of a currently camping cell.
7. The method of any of claims 1-4, wherein prior to the determining whether the first wireless device is a target wireless device, further comprising:
learning according to behavior habits of a user, and determining positions of a plurality of wireless devices associated with the user;
and determining the target wireless equipment from the plurality of wireless equipment according to the business attribute of the first fence event and the positions of the plurality of wireless equipment, wherein a preset association relationship exists between the business attribute and the positions of the target wireless equipment.
8. An apparatus for triggering a fence event, comprising a processor and a memory, the processor and the memory coupled, the memory for storing a computer program that, when executed by the processor, causes the apparatus to perform the method of any one of claims 1 to 7.
9. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, which when executed by a processor causes an apparatus comprising the processor to perform the method of any one of claims 1 to 7.
CN202210599674.2A 2022-05-30 2022-05-30 Method and device for triggering fence event Active CN116033341B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210599674.2A CN116033341B (en) 2022-05-30 2022-05-30 Method and device for triggering fence event

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210599674.2A CN116033341B (en) 2022-05-30 2022-05-30 Method and device for triggering fence event

Publications (2)

Publication Number Publication Date
CN116033341A CN116033341A (en) 2023-04-28
CN116033341B true CN116033341B (en) 2023-10-20

Family

ID=86078330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210599674.2A Active CN116033341B (en) 2022-05-30 2022-05-30 Method and device for triggering fence event

Country Status (1)

Country Link
CN (1) CN116033341B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803232A (en) * 2019-02-12 2019-05-24 北京百度网讯科技有限公司 Determination method and device, equipment and the storage medium of positional relationship
US10621337B1 (en) * 2016-10-18 2020-04-14 Ca, Inc. Application-to-application device ID sharing
CN113615217A (en) * 2019-03-25 2021-11-05 华为技术有限公司 Method for determining that terminal equipment is located inside geo-fence and terminal equipment
CN113779166A (en) * 2021-08-20 2021-12-10 上海瑾盛通信科技有限公司 Geo-fence control method and device, storage medium and electronic equipment
CN113794801A (en) * 2021-08-09 2021-12-14 荣耀终端有限公司 Method and device for processing geo-fence
CN114463898A (en) * 2021-07-30 2022-05-10 荣耀终端有限公司 Express delivery pickup reminding method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8396485B2 (en) * 2010-11-09 2013-03-12 Apple Inc. Beacon-based geofencing
US8948782B2 (en) * 2012-12-21 2015-02-03 Qualcomm Incorporated Proximity determination based on distance ratios
US9210727B2 (en) * 2014-04-02 2015-12-08 Bby Solutions, Inc. Wireless device pairing
EP3718337A1 (en) * 2017-11-28 2020-10-07 Telefonaktiebolaget LM Ericsson (Publ) Triggered measurement reporting for wireless communications

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10621337B1 (en) * 2016-10-18 2020-04-14 Ca, Inc. Application-to-application device ID sharing
CN109803232A (en) * 2019-02-12 2019-05-24 北京百度网讯科技有限公司 Determination method and device, equipment and the storage medium of positional relationship
CN113615217A (en) * 2019-03-25 2021-11-05 华为技术有限公司 Method for determining that terminal equipment is located inside geo-fence and terminal equipment
CN114463898A (en) * 2021-07-30 2022-05-10 荣耀终端有限公司 Express delivery pickup reminding method and device
CN113794801A (en) * 2021-08-09 2021-12-14 荣耀终端有限公司 Method and device for processing geo-fence
CN113779166A (en) * 2021-08-20 2021-12-10 上海瑾盛通信科技有限公司 Geo-fence control method and device, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
地理围栏技术发展现状及网络信息安全问题探究;鞠明山;;江西通信科技(03);全文 *

Also Published As

Publication number Publication date
CN116033341A (en) 2023-04-28

Similar Documents

Publication Publication Date Title
CN113885759B (en) Notification message processing method, device, system and computer readable storage medium
CN113704014B (en) Log acquisition system, method, electronic device and storage medium
CN113254409B (en) File sharing method, system and related equipment
CN113887264B (en) Code scanning method, system and related device
CN111316199A (en) Information processing method and electronic equipment
CN114553814B (en) Method and device for processing push message
CN113747374B (en) Message pushing method and device
CN113973398B (en) Wireless network connection method, electronic equipment and chip system
WO2023000746A1 (en) Augmented reality video processing method and electronic device
CN116033341B (en) Method and device for triggering fence event
CN117544717A (en) Risk identification method and electronic equipment
CN113950045B (en) Subscription data downloading method and electronic equipment
CN116032942A (en) Method, device, equipment and storage medium for synchronizing cross-equipment navigation tasks
CN114971107A (en) Privacy risk feedback method and device and first terminal equipment
CN116795604B (en) Processing method, device and equipment for application exception exit
CN116027933B (en) Method and device for processing service information
CN116028534B (en) Method and device for processing traffic information
CN115495716B (en) Local authentication method and electronic equipment
CN116662150B (en) Application starting time-consuming detection method and related device
CN116048629B (en) System service switching method, control device, electronic equipment and storage medium
CN116048831B (en) Target signal processing method and electronic equipment
CN116684525B (en) Event reminding method, electronic equipment and storage medium
CN115460445B (en) Screen projection method of electronic equipment and electronic equipment
CN117998004A (en) Instance management method and device, electronic equipment and storage medium
CN117251223A (en) Cloud function plug-in configuration and scheduling method, system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant