CN105848099A - Method and system for identifying geo-fence, server and mobile terminal - Google Patents
Method and system for identifying geo-fence, server and mobile terminal Download PDFInfo
- Publication number
- CN105848099A CN105848099A CN201510023108.7A CN201510023108A CN105848099A CN 105848099 A CN105848099 A CN 105848099A CN 201510023108 A CN201510023108 A CN 201510023108A CN 105848099 A CN105848099 A CN 105848099A
- Authority
- CN
- China
- Prior art keywords
- geo
- wireless device
- server
- mobile terminal
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 80
- 238000003379 elimination reaction Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 9
- 230000006872 improvement Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a method for identifying a geo-fence to which a mobile terminal belongs. The method comprises the steps of establishing corresponding relationships between identifiers of wireless devices and geo-fence regions by a server; by the mobile terminal, acquiring the identifier of at least one wireless device and uploading the identifier to the server; and by the server, based on the corresponding relationship between the identifiers of the wireless devices and the geo-fence regions, inquiring the geo-fence region corresponding to the uploaded identifier of the wireless device. According to the method for identifying the geo-fence to which the mobile terminal belongs, which is provided by the embodiment of the application, under the condition of not depending on a positioning device such as a GPS (Global Positioning System) and the like, the partitioned geo-fence also can be identified.
Description
Technical Field
The present application relates to the field of location based services, and in particular, to a method, a system, a server, and a mobile terminal for identifying a geo-fence.
Background
With the development of mobile communication technology and the popularization of computer technology, Location-based service (LBS) technology is moving into people's lives. By using the LBS technology, the position of the mobile terminal can be obtained by positioning the mobile terminal, and then the service related to the position of the mobile terminal is provided for the mobile terminal. For example, with LBS technology, the location of a mobile terminal can be obtained by a positioning device such as GPS, and the name and address of a hotel, theater, shopping mall, gas station, etc. are searched within a certain distance range near the location to be provided to the mobile terminal for selection.
In recent years, with the rapid development of LBS technology, new applications based on LBS technology are also emerging. Geo-fencing (Geo-fencing) technology is receiving more and more attention as a new application of LBS technology. Geofencing techniques may use a virtual fence to enclose a geofenced area. When the mobile terminal is active in or near the geo-fenced area, notifications and reminders corresponding to the geo-fenced area can be received. For example, when a mobile terminal enters a geofenced area, a merchant located in the geofenced area may send promotional, preferential, or novelty information to the mobile terminal.
In the prior art, the geo-fenced area to which the mobile terminal belongs is generally identified based on a GPS positioning device of the mobile terminal. In the prior art, a merchant can be divided into certain geo-fence areas according to the latitude and longitude of the merchant. For example, a certain latitude and longitude range of areas may be divided into a geo-fenced area. Thus, merchants with latitude and longitude within the range belong to the geofenced area. The mobile terminal can acquire the longitude and latitude of the mobile terminal through a GPS positioning device and upload the longitude and latitude to a server; further, the server may query the geo-fence area to which the uploaded latitude and longitude of the mobile terminal belongs. After the geo-fenced area where the mobile terminal is located is obtained, according to the merchants divided into the geo-fenced area, the merchant corresponding to the geo-fenced area where the mobile terminal is located can be obtained.
By using the technology, the information can be pushed. For example, the server may establish a correspondence of the geo-fenced area to a merchant and the merchant association information. Subsequently, the server can obtain the geo-fenced area to which the mobile terminal belongs, and then can push information of merchants corresponding to the geo-fenced area to the mobile terminal.
In the process of implementing the present application, the inventor finds that the prior art has at least the following problems:
in the prior art, a geo-fenced area to which a mobile terminal belongs is identified, and the mobile terminal is required to start a device capable of realizing positioning, such as a GPS. Such positioning devices consume a large amount of electric energy of the mobile terminal device during the positioning process; moreover, such positioning devices often fail to achieve positioning or have poor positioning accuracy in indoor or building environments.
Disclosure of Invention
The embodiment of the application provides a method, a system, a server and a mobile terminal for identifying a geo-fence without depending on a positioning device such as a GPS.
The method, the system, the server and the mobile terminal for identifying the geo-fence are realized as follows:
a method of identifying a geofence, comprising:
the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
the mobile terminal acquires an identifier of at least one wireless device and uploads the identifier to the server;
and the server inquires the geo-fence area corresponding to the uploaded identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fence area.
A method of identifying a geofence, comprising:
the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
the mobile terminal acquires the corresponding relation between the established identification of the wireless equipment and the geo-fence area from the server;
the mobile terminal acquires an identifier of at least one wireless device and queries a geo-fenced area corresponding to the acquired identifier of the wireless device based on the correspondence between the identifier of the wireless device and the geo-fenced area.
A method of identifying a geofence, comprising:
the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
the server receives the identification of the wireless equipment uploaded by the mobile terminal;
and the server inquires the geo-fence area corresponding to the uploaded identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fence area.
A method of identifying a geofence, comprising:
the mobile terminal acquires the established corresponding relation between the identification of the wireless equipment and the geo-fence area from the server;
the mobile terminal acquires an identifier of at least one wireless device;
and the mobile terminal inquires the geo-fenced area corresponding to the acquired identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fenced area.
A system for identifying a geofence, comprising a server and a mobile terminal, wherein:
the server is used for establishing a corresponding relation between the identification of the wireless device and the geo-fenced area; querying a geo-fenced area corresponding to the uploaded identification of the wireless device based on the correspondence between the wireless device identification and the geo-fenced area; pushing pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal;
the mobile terminal is used for acquiring the identifier of at least one wireless device and uploading the identifier to the server; receiving push information corresponding to the queried geo-fenced area.
A system for identifying a geofence, comprising a server and a mobile terminal, wherein:
the server is used for establishing a corresponding relation between the identification of the wireless device and the geo-fenced area; pushing pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal;
the mobile terminal is used for acquiring the corresponding relation between the established identifier of the wireless equipment and the geo-fenced area from the server; acquiring an identifier of at least one wireless device and inquiring a geo-fenced area corresponding to the acquired identifier of the wireless device based on the corresponding relation between the identifier of the wireless device and the geo-fenced area; sending the queried geo-fenced area to the server; receiving push information corresponding to the queried geo-fenced area.
A server that identifies a geofence, comprising:
a correspondence establishing unit for establishing a correspondence between the identifier of the wireless device and the geo-fenced area;
a geo-fence querying unit, configured to query a geo-fence area corresponding to the uploaded identification of the wireless device based on the correspondence between the wireless device identification and the geo-fence area;
and the information pushing unit is used for pushing the pre-stored pushing information corresponding to the inquired geo-fence area to the mobile terminal.
A mobile terminal that identifies a geofence, comprising:
a correspondence obtaining unit configured to obtain, from the server, a correspondence between the identifier of the wireless device and the geo-fenced area;
a wireless device identification acquisition unit for acquiring an identification of at least one wireless device;
a geo-fenced area querying unit, configured to query, based on a correspondence between the identifier of the wireless device and the geo-fenced area, a geo-fenced area corresponding to the acquired identifier of the wireless device;
a geo-fenced area sending unit operable to send the queried geo-fenced area to the server;
an information receiving unit to receive push information corresponding to the queried geo-fenced area.
The method and the device for dividing and identifying the geo-fences are based on the positions of the wireless devices, and when a mobile terminal searches or is connected to the signals of the wireless devices, the mobile terminal can be considered to be in the vicinity of the wireless devices. The embodiment of the application performs the identification of the geofence by searching the signal of the wireless device, and can also identify the divided geofences without depending on a positioning device such as a GPS.
Drawings
Fig. 1 is a flowchart of a method for identifying a geo-fence according to an embodiment of the present application;
FIG. 2 is a diagram illustrating an example of the present application for dividing geographic locations within a predetermined range according to a geohash value;
fig. 3 is a flowchart of a method for identifying a geofence according to another embodiment of the present application;
fig. 4 is a system for identifying a geofence provided by an embodiment of the present application;
fig. 5 is a server for identifying geofences provided in an embodiment of the present application;
fig. 6 is a mobile terminal for identifying a geo-fence according to an embodiment of the present application;
FIG. 7 is a server-based method for identifying geofences as provided in embodiments of the present application;
fig. 8 is a method for identifying a geo-fence based on a mobile terminal according to an embodiment of the present disclosure.
Detailed Description
The embodiment of the application provides a method, a system, a server and a mobile terminal for identifying a geo-fence. In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the popularization of intelligent mobile terminals, it is common to communicate with WIFI or bluetooth. Since the address change frequency of the WIFI device or the bluetooth device configured at the merchant for providing access is low, the location of the merchant can be reflected by the geographic location of the WIFI device or the bluetooth device. General WIFI or bluetooth signal can cover several meters to several hundred meters's scope, and when mobile terminal was in WIFI equipment or bluetooth equipment nearby, mobile terminal can search for WIFI or bluetooth signal, or was connected to WIFI equipment or bluetooth equipment.
Fig. 1 is a flowchart of a method for identifying a geo-fence according to an embodiment of the present application. The wireless device for providing access related to the embodiment of the application can be a WIFI device or a Bluetooth device or other short-range wireless communication devices which can be arranged at a merchant. Each such wireless device has a unique identification, such unique identification may be, for example, the MAC address of a WIFI device or a bluetooth device. The following embodiments of the present application describe the technical solutions of the embodiments of the present application by taking the WIFI device and the MAC address of the WIFI device as examples. Technical schemes implemented by using bluetooth devices or other wireless devices are similar to WIFI devices, and all the technical schemes should belong to the protection scope of the application. As shown in fig. 1, the method includes:
s100: the server establishes a correspondence between the identity of the wireless device and the geo-fenced area.
Wireless signals transmitted by wireless devices typically have a certain coverage area. Beyond this range, the mobile terminal cannot detect the wireless device. In an embodiment of the present application, the server may divide the coverage of the wireless device signal into a geo-fenced area corresponding to the identity of the wireless device.
For example, the server may set the wireless signal coverage of each wireless device to a separate geo-fenced area. The identity of the wireless device, such as its MAC address, may correspond to the set geo-fenced area. In this case, for example, there are M wireless signal devices, then the coverage area of each of the M different wireless signal devices can be set to a single geo-fenced area, i.e., corresponding to M different geo-fenced areas.
As another example, the server can set the total signal coverage of at least one wireless device to be a geo-fenced area. Specifically, for example, in a plurality of wireless devices located at close positions, there may be a case where wireless signals of the respective wireless devices overlap. The total range that can be covered by the wireless signals of these multiple wireless devices can be set as a geo-fenced area.
After the server divides the wireless devices into corresponding geo-fenced areas, a correspondence between the identities of the wireless devices and the corresponding geo-fenced areas can be established. In particular, the server may store the identification of the wireless device and the corresponding geofence in the form of a key-value. For example, the MAC address of the WIFI device is E0-9D-0B-9D-1C, and the MAC address of the WIFI device may be a value. Assuming that the geo-fence corresponding to the MAC address of the WIFI device is fence 1, then the fence 1 can be used as the key corresponding to the value. Through the value of the MAC address of the WIFI device, the key corresponding to the value can be found in the server, that is, the corresponding geo-fence can be found.
In another embodiment of the present application, the correspondence between the identification of the wireless device and the geo-fenced area may also be established according to the following method:
s101: the server divides the geographic position in the preset range into different geographic fence areas according to a preset rule, wherein the different geographic fence areas correspond to different geographic position codes.
The server can divide the geographic positions within the preset range into different geo-fence areas according to preset rules. Each of these divided geo-fenced areas may correspond to a unique geo-location code. According to the embodiment of the application, the geographic position in the preset range can be processed through a tail-removing algorithm or a geohash algorithm, so that the geographic position in the preset range can be divided into different geo-fence areas. The tail-elimination algorithm or the geohash algorithm may be one of the preset rules.
The following is illustrated by taking the tail-removing longitude and latitude as an example:
the latitude and longitude of a certain geographic position within a preset range are 39.928167 and 116.389550 respectively. The server may perform a tail-removing process on the longitude and latitude, for example, the second and subsequent contents after the decimal point may be all removed. The trailing latitudes and longitudes after treatment by the method are 39.9 and 116.3 respectively. Obviously, the longitude and latitude of two geographical positions close enough can be subjected to the same tailing-out longitude and latitude after tailing-out processing. For example, the longitude and latitude of the first geographic location is (39.928167, 116.389550), the longitude and latitude of the second geographic location close to the first geographic location is (39.925014, 116.3893215), and after the respective tail removal processing, the longitude and latitude of the tail removal are all (39.9, 116.3). Then, these nearby geo-locations can be demarcated into the same geo-fenced area, and the tailgating latitude and longitude of the geo-locations in the geo-fenced area are all the same. The tailed longitude and latitude in the geofenced area can be used as the geolocation code for the geofenced area. From the above description, it can be seen that the accuracy of the tail-ending process determines the extent of the finally delineated geofenced area. For example, the higher the accuracy of the tail-removed longitude and latitude (the more digits after the decimal point), the smaller the finally defined geo-fence area range will be; accordingly, the lower the accuracy of the tailgating latitude (the fewer the number of bits after the decimal point), the larger the range of the finally defined geofenced area.
The example below is further illustrated by the example of a geohash value:
the latitude and longitude of a certain geographic position within a preset range are 39.928167 and 116.389550 respectively. The server may map the latitude and longitude to a geohash value using a geohash algorithm. The calculation of the geohash value using the geohash algorithm is described as follows:
the latitude 39.928167 of the geographic location is approximately encoded by the following algorithm:
1) the latitude interval of the earth is divided into two intervals of-90, 0 and 0, 90.
Two sections into which one section is divided are referred to as left and right sections, respectively. The left interval is the interval where the smaller numerical value is located, and the right interval is the interval where the larger numerical value is located. Further, the latitude is marked by the following rule:
for those belonging to the right interval, labeled 1; for those belonging to the left interval, the label is 0.
Thus, 39.928167 belongs to the right interval [0, 90], labeled 1 according to the above rules.
2) The right interval [0, 90] of 39.928167 is divided into two intervals [0, 45 ], 45, 90. Decision 39.928167 belongs to the left interval [0, 45), labeled 0.
3) The above procedure of step 1) and step 2) was recursed as in table 1 below until the predetermined number of bits was marked.
According to the foregoing rule, the latitude 39.928167 may be marked as 1 when it belongs to the right of the two-dimensional interval and may be marked as 0 when it belongs to the left.
As the interval is narrowed down for each iteration, the median value of the interval (Mid value in table 1) approaches 39.928167 more and more;
and dividing the interval by a certain number of times, judging the relation between the latitude value and the divided interval and marking the relation, so as to obtain a serial number consisting of 0 and 1, wherein the length of the serial number is related to the number of times of dividing the interval by two. Table 1 lists the interval iterations at a latitude of 39.928167.
TABLE 1 Interval stack at 39.928167 degrees
Bit | Min | Mid | Max |
1 | -90.000 | 0.000 | 90.000 |
0 | 0.000 | 45.000 | 90.000 |
1 | 0.000 | 22.500 | 45.000 |
1 | 22.500 | 33.750 | 45.000 |
1 | 33.750 | 39.375 | 45.000 |
0 | 39.375 | 42.188 | 45.000 |
0 | 39.375 | 40.7815 | 42.188 |
0 | 39.375 | 40.07825 | 40.7815 |
1 | 39.375 | 39.726625 | 40.07825 |
1 | 39.726625 | 39.9024375 | 40.07825 |
As shown in table 1, after 10 iterations of the interval, a serial number 1011100011 (labeled values are arranged from left to right in sequence) corresponding to a latitude of 39.928167 is finally obtained, and the latitude interval has been narrowed to [39.9024375, 40.07825 ].
With the same method, through 10 iterations of the interval, a sequence number 1101001011 corresponding to a longitude of 116.389550 can be obtained, and the longitude interval has been narrowed to [116.3671875, 116.71875 ].
Further, serial numbers corresponding to the longitude and the latitude may be encoded to generate a geohash value corresponding to the longitude and the latitude. The coding method comprises the following steps: and sequentially and mutually interpolating the serial numbers corresponding to the longitude and the latitude to generate a new serial number. The first digit of the newly generated sequence number is the first digit of the sequence number corresponding to longitude. The description continues with the above example:
in the case where the serial number corresponding to latitude is 1011100011 and the serial number corresponding to longitude is 1101001011, a new serial number such as 11100111010010001111 can be formed by sequentially interpolating serial numbers corresponding to longitude and latitude with the first digit of the serial number corresponding to longitude as the first digit of the newly generated serial number. The odd-numbered digits of the newly generated serial numbers from left to right are serial numbers corresponding to longitude, and the even-numbered digits are serial numbers corresponding to latitude. Further, 32 characters 0-9, b-z (minus a, i, l, o) may be used to base32 encoding the newly generated serial number. The correspondence between the 32 characters 0 to 9, b to z and the decimal number is shown in Table 2.
TABLE 2 decimal number to Base32 code correspondence
Dec | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
B32 | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | b | c | d | e | f | g |
Dec | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 |
B32 | h | j | k | m | n | p | q | r | s | t | u | v | w | x | y | z |
Note: dec stands for Decimal, denoting Decimal; b32 represents Base32 code.
When encoding a new serial number, firstly, every five digits in 11100111010010001111 can be converted into decimal numbers, namely 28, 29, 4 and 15; the 4 decimal numbers are then encoded using the correspondence in table 2. 28 for w, 29 for x, 4 for 4, 15 for g, wx4g is obtained. Wx4g was taken as the geohash value for latitude and longitude (39.928167, 116.389550).
In the above-described process of computing a geohash value, the number of iterations determines the length of the generated sequence number, and thus the length of the finally generated geohash value. The longer the geohash value is, the more the number of times of iteration is represented, and the final interval is closer to the actual longitude and latitude. In other words, the more digits of the geohash value, the more accurate the correspondence with the latitude and longitude.
Under a certain iteration number, namely under the premise of a certain length of the geohash value, if the two geographic positions are close, the geohash values corresponding to the longitude and latitude are also the same or close. For geographic locations with the same geohash value, the geographic locations may be classified into the same geo-fenced area. The geo-hash value for the geo-fenced area can then be used as the geo-location code for the geo-fenced area. Fig. 2 is a diagram illustrating a geographical location within a preset range divided according to a geohash value in an example of the present application. As can be seen from fig. 2, the geographic locations within the preset range are divided into 9 rectangular areas, and the geographic locations in each rectangular area have a unique geohash value. These 9 rectangular areas can be used as the divided geo-fenced area.
After dividing the geographic position within the preset range into different geo-fence areas, the server can convert the geographic position of the wireless device into a geographic position code according to the preset rule. By comparing the geographic position code of the wireless device with the geographic position codes of the divided geo-fenced areas, if the geographic position code of the wireless device is the same as the geographic position code of one of the divided geo-fenced areas, the wireless device can be known to be in the geo-fenced area. The specific technical scheme is as follows:
s102: the server obtains the identification of the wireless device and the corresponding location information.
The identification of the wireless device and corresponding location information may be sent to a server by the owner of the wireless device, such as a merchant that deployed the wireless device. The identification of the wireless device and the corresponding location information may also be obtained by the server from a database. The database may be located on the server or on other entities or logics, which may be, for example, entities or logics accessible to the server. The database may be pre-stored with an identifier of the wireless device and location information of the wireless device corresponding to the identifier of the wireless device. These wireless device identifications, and their corresponding location information, may be pre-registered or entered by the merchant or server operator. The location information corresponding to the identifier of the wireless device may include longitude and latitude of the geographic location where the wireless device is located.
S103: and the server generates the geographical position code according to the position information of the wireless equipment according to the preset rule.
The server may perform the same processing procedure on the location information of the wireless device according to the tail-removing algorithm or the geohash algorithm in step S101. For example, in step S101, the server uses a tailgating algorithm to divide the geo-fences of the geographic locations within the preset range, and in this step, the server may also use the tailgating algorithm to process the location information of the wireless device to obtain a tailgating longitude and latitude of the geographic location where the wireless device is located, and the tailgating longitude and latitude may be used as a geographic location code of the geographic location where the wireless device is located.
S104: and the server establishes a corresponding relation between the identifier of the wireless device and the geo-fence area according to the corresponding geo-location code.
After the server generates the geographical position code of the wireless device according to the preset rule, the geographical position code of the wireless device can be compared with the geographical position code of the divided geo-fence area, and if the geographical position code of the wireless device is the same as the geographical position code of one divided geo-fence area, the wireless device can be known to be located in the geo-fence area. A correspondence of the identity of the wireless device to the geo-fenced area can thus be established. In particular, the server may store the identification of the wireless device and the corresponding geofence in the form of a key-value. For example, the MAC address of the WIFI device is E0-9D-0B-9D-1C, and the MAC address of the WIFI device may be a value. Assuming that the geo-fence corresponding to the MAC address of the WIFI device is fence 1, then the fence 1 can be used as the key corresponding to the value. Through the value of the MAC address of the WIFI device, the key corresponding to the value can be found in the server, that is, the corresponding geo-fence can be found.
The server establishes correspondence of the identity of the wireless device to the geo-fenced area, either in response to an instruction by the merchant owning the wireless device or in response to an instruction by the operator managing the wireless device. For example, the server may establish a correspondence between the WIFI device and the geofence in response to an instruction of a merchant owning the WIFI device or the server may establish a correspondence between the WIFI device and the geofence in response to an instruction of an operator managing the WIFI device.
S200: the mobile terminal obtains an identifier of at least one wireless device and uploads the identifier to the server.
Step S200 specifically includes:
the mobile terminal inquires the identification of at least one wireless device in the searched wireless devices through a preset means;
or,
the mobile terminal inquires the identification of at least one wireless device in the connected wireless devices through preset means.
When the mobile terminal enters or approaches the geo-fenced area divided according to step S100, a search for a WIFI signal may be performed. After the WIFI signal is searched or the WIFI device is connected, the mobile terminal may query, by using an Application Programming Interface (API) of the operating system, an MAC address of the WIFI device corresponding to the searched WIFI signal or an MAC address of the connected WIFI device. The query using the API of the operating system may be one of the preset means.
In an actual application scenario, the mobile terminal may search for signals of multiple WIFI devices at the same time or connect multiple WIFI devices in sequence. The mobile terminal can inquire the identification of at least one searched or connected WIFI device through the API of the operating system.
After the mobile terminal inquires the MAC address of the WIFI equipment, the MAC address of the WIFI equipment can be uploaded to the server. The server can inquire the corresponding geo-fence according to the MAC address of the WIFI device uploaded by the mobile terminal.
S300: and the server inquires the geo-fence area corresponding to the uploaded identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fence area.
After receiving the MAC address of the WIFI device uploaded by the mobile terminal, the server can inquire the geographic fence area to which the MAC address of the uploaded WIFI device belongs according to the established corresponding relation between the wireless device identification and the corresponding geographic fence area. For example, when the identifier of the wireless device and the corresponding geo-fence area are stored in the server in a key-value manner, the server may find the key corresponding to the value, that is, the geo-fence corresponding to the MAC address of the WIFI device, according to the value of the MAC address of the WIFI device.
When the server inquires the geo-fenced area to which the MAC address of the WIFI device belongs, the geo-fenced area where the mobile terminal is located can be obtained. Furthermore, the server can push the stored push information corresponding to the geo-fenced area to the mobile terminal. The stored push information corresponding to the geo-fenced area may be push information registered/entered in the server by the merchant in advance. The correspondence between the push information of the merchant and the geofence can be determined according to the correspondence between the identity of the merchant's wireless device and the geofence area.
In another embodiment of the present application, the mobile terminal may further synchronize the correspondence between the identification of the wireless device and the geo-fenced area established in the server into the mobile terminal. In this way, after the mobile terminal acquires the identifier of the wireless device, the geo-fence area corresponding to the acquired identifier of the wireless device can be directly queried in the mobile terminal without sending the identifier of the wireless device to a server for querying. Fig. 3 is a flowchart of a method for identifying a geo-fence according to another embodiment of the present application. As shown in fig. 3, the method includes:
s110: the server establishes a correspondence between the identity of the wireless device and the geo-fenced area.
The server may divide a coverage area of the wireless device signal into geo-fence areas corresponding to the identifier of the wireless device, or may divide a geographic position within a preset range into different geo-fence areas in advance according to a preset rule, and then generate a geographic position code from the position information of the wireless device according to the preset rule, and establish a correspondence between the identifier of the wireless device and the geo-fence areas based on the generated geographic position code. The specific implementation of this step is similar to step S100, and is not described here again.
S210: and the mobile terminal acquires the corresponding relation between the established identification of the wireless equipment and the geo-fence area from the server.
After the server establishes the correspondence between the identifier of the wireless device and the geo-fenced area, the mobile terminal may obtain the correspondence between the established identifier of the wireless device and the geo-fenced area from the server. Specifically, the mobile terminal may install a geo-fence client, and the geo-fence client may automatically synchronize the correspondence between the identifier of the wireless device and the geo-fence area from the server according to a preset time period; the geofence client may also synchronize, from the server, a correspondence of the identification of the wireless device to the geofence region in response to an operational instruction of the mobile terminal user.
S310: the mobile terminal acquires the identification of at least one wireless device and inquires the geo-fenced area corresponding to the acquired identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fenced area.
The mobile terminal may query the searched identification of at least one of the wireless devices through a preset means or query the identification of at least one of the connected wireless devices through a preset means. Specifically, when the mobile terminal enters or approaches the geo-fenced area divided according to step S110, a search for a WIFI signal may be performed. After the WIFI signal is searched or the WIFI device is connected, the mobile terminal may query, by using an API (Application programming interface) of the operating system, the MAC address of the WIFI device corresponding to the searched WIFI signal or the MAC address of the connected WIFI device. The query using the API of the operating system may be one of the preset means.
In an actual application scenario, the mobile terminal may search for signals of multiple WIFI devices at the same time or connect multiple WIFI devices in sequence. The mobile terminal can inquire the identification of at least one searched or connected WIFI device through the API of the operating system.
After the mobile terminal inquires the MAC address of the WIFI device, the geographic fence area to which the MAC address of the WIFI device belongs can be inquired through the corresponding relation between the identification of the wireless device in the mobile terminal and the geographic fence area.
When the mobile terminal inquires the geo-fenced area to which the MAC address of the WIFI device belongs, the geo-fenced area where the mobile terminal is located can be obtained. Furthermore, the mobile terminal can send the identified geo-fenced area to the server, and the server can push stored push information corresponding to the geo-fenced area to the mobile terminal. The stored push information corresponding to the geo-fenced area may be push information registered/entered in the server by the merchant in advance. The correspondence between the push information of the merchant and the geofence can be determined according to the correspondence between the identity of the merchant's wireless device and the geofence area.
The following describes embodiments of the present application that are server-based. Fig. 7 is a server-based method for identifying a geofence provided in an embodiment of the present application. As shown in fig. 7, the method includes:
s410: the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
s420: the server receives the identification of the wireless equipment uploaded by the mobile terminal;
s430: and the server inquires the geo-fence area corresponding to the uploaded identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fence area.
Further, in a preferred embodiment of the present application, the method further includes:
s440: and the server pushes the pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal.
Further, in a preferred embodiment of the present application, the server establishing correspondence between the identifier of the wireless device and the geo-fenced area includes:
s411: the server divides the coverage range of the wireless device signal into a geo-fence area corresponding to the identification of the wireless device;
or,
s412: the server divides the geographic position in the preset range into different geographic fence areas according to a preset rule, wherein the different geographic fence areas correspond to different geographic position codes;
s413: the server acquires the identification of the wireless equipment and corresponding position information;
s414: the server generates geographical position codes according to the position information of the wireless equipment according to the preset rule;
s415: and the server establishes a corresponding relation between the identifier of the wireless device and the geo-fence area according to the corresponding geo-location code.
The preset rule comprises a geohash algorithm or a tail elimination algorithm.
The following describes embodiments of the present application that are primarily directed to mobile terminals. Fig. 8 is a method for identifying a geo-fence based on a mobile terminal according to an embodiment of the present disclosure. As shown in fig. 8, the method includes:
s510: the mobile terminal acquires the established corresponding relation between the identification of the wireless equipment and the geo-fence area from the server;
s520: the mobile terminal acquires an identifier of at least one wireless device and queries a geo-fenced area corresponding to the acquired identifier of the wireless device based on the correspondence between the identifier of the wireless device and the geo-fenced area.
Further, in a preferred embodiment of the present application, the method further includes:
s530: the mobile terminal sends the inquired geo-fenced area to the server;
s540: the mobile terminal receives push information corresponding to the queried geo-fenced area.
Further, in a preferred embodiment of the present application, the acquiring, by the mobile terminal, an identifier of at least one wireless device specifically includes:
s521: the mobile terminal inquires the identification of at least one wireless device in the searched wireless devices through a preset means;
or,
s522: the mobile terminal inquires the identification of at least one wireless device in the connected wireless devices through a preset means.
The query by the preset means comprises query by using an application programming interface of an operating system.
The embodiment of the application also provides a system for identifying the geo-fence. Fig. 4 is a system for identifying a geofence according to an embodiment of the present application. As shown in fig. 4, the system includes:
a server 100 for establishing correspondence between the identity of the wireless device and the geofenced area; querying a geo-fenced area corresponding to the uploaded identification of the wireless device based on the correspondence between the wireless device identification and the geo-fenced area; pushing pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal;
a mobile terminal 200 for obtaining an identifier of at least one wireless device and uploading the identifier to the server; receiving push information corresponding to the queried geo-fenced area.
Another embodiment of the present application also provides a system for identifying a geofence, the system comprising:
a server 110 for establishing a correspondence between an identity of a wireless device and a geo-fenced area; pushing pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal;
the mobile terminal 210 is configured to obtain a correspondence between the identifier of the established wireless device and the geo-fenced area from the server; acquiring an identifier of at least one wireless device and inquiring a geo-fenced area corresponding to the acquired identifier of the wireless device based on the corresponding relation between the identifier of the wireless device and the geo-fenced area; sending the queried geo-fenced area to the server; receiving push information corresponding to the queried geo-fenced area.
Fig. 5 is a server for identifying a geofence provided in an embodiment of the present application. As shown in fig. 5, the server 100 includes:
a correspondence relationship establishing unit 101 configured to establish a correspondence relationship between an identifier of a wireless device and a geo-fenced area;
a geo-fence querying unit 102, configured to query, based on the correspondence between the wireless device identifier and the geo-fence area, a geo-fence area corresponding to the uploaded identifier of the wireless device;
an information pushing unit 103, configured to push pre-stored pushing information corresponding to the queried geo-fenced area to the mobile terminal.
Further, the correspondence relationship establishing unit 101 specifically includes:
the first correspondence establishing unit 1011 is configured to divide the coverage area of the wireless device signal into a geo-fenced area corresponding to the identifier of the wireless device.
Further, the correspondence relationship establishing unit 101 specifically includes:
a second correspondence establishing unit 1012, configured to divide geographic locations within a preset range into different geo-fence areas according to a preset rule, where the different geo-fence areas correspond to different geographic location codes; acquiring an identifier and corresponding position information of the wireless equipment; generating a geographical position code according to the position information of the wireless equipment according to the preset rule; and establishing a corresponding relation between the identification of the wireless device and the geo-fenced area according to the corresponding geo-location code of the identification of the wireless device.
Fig. 6 is a mobile terminal for identifying a geo-fence according to an embodiment of the present application. As shown in fig. 6, the mobile terminal 210 includes:
a wireless device identification obtaining unit 211, configured to obtain an identification of at least one wireless device;
a geo-fenced area querying unit 212, configured to query, based on a correspondence between the identifier of the wireless device and the geo-fenced area, a geo-fenced area corresponding to the acquired identifier of the wireless device;
a geo-fenced area transmitting unit 213 for transmitting the queried geo-fenced area to the server;
an information receiving unit 214, configured to receive push information corresponding to the queried geo-fenced area.
The method and the device for dividing and identifying the geo-fences are based on the positions of the wireless devices, and when a mobile terminal searches or is connected to the signals of the wireless devices, the mobile terminal can be considered to be in the vicinity of the wireless devices. The embodiment of the application performs the identification of the geofence by searching the signal of the wireless device, and can also identify the divided geofences without depending on a positioning device such as a GPS.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate a dedicated integrated circuit chip 2. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, jhddl (Java Hardware Description Language), langue, Lola, HDL, laspam, hardbyscript Description Language (vhigh Description Language), and vhigh-Language (Hardware Description Language), which is currently used by most popular. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, AtmelAT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
While the present application has been described with examples, those of ordinary skill in the art will appreciate that there are numerous variations and permutations of the present application without departing from the spirit of the application, and it is intended that the appended claims encompass such variations and permutations without departing from the spirit of the application.
Claims (29)
1. A method for identifying a geofence to which a mobile terminal belongs, comprising:
the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
the mobile terminal acquires an identifier of at least one wireless device and uploads the identifier to the server;
and the server inquires the geo-fence area corresponding to the uploaded identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fence area.
2. The method of claim 1, wherein the method further comprises:
and the server pushes pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal.
3. The method according to claim 1, wherein the obtaining, by the mobile terminal, the identifier of the at least one wireless device specifically includes:
the mobile terminal inquires the identification of at least one wireless device in the searched wireless devices through a preset means;
or,
the mobile terminal inquires the identification of at least one wireless device in the connected wireless devices through a preset means.
4. The method according to claim 3, wherein the querying by preset means comprises:
an application programming interface query of the operating system is utilized.
5. The method according to claim 1, wherein the server establishes correspondence between the identifier of the wireless device and the geo-fenced area, and comprises:
the server divides the coverage area of the wireless device signal into a geo-fenced area corresponding to the identification of the wireless device.
6. The method according to claim 1, wherein the server establishes correspondence between the identifier of the wireless device and the geo-fenced area, and comprises:
the server divides the geographic position in the preset range into different geographic fence areas according to a preset rule, wherein the different geographic fence areas correspond to different geographic position codes;
the server acquires the identification of the wireless equipment and corresponding position information;
the server generates geographical position codes according to the position information of the wireless equipment according to the preset rule;
and the server establishes a corresponding relation between the identifier of the wireless device and the geo-fence area according to the corresponding geo-location code.
7. The method of claim 6, wherein the predetermined rule comprises a geohash algorithm or a tail-elimination algorithm.
8. A method for identifying a geofence to which a mobile terminal belongs, comprising:
the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
the mobile terminal acquires the corresponding relation between the established identification of the wireless equipment and the geo-fence area from the server;
the mobile terminal acquires an identifier of at least one wireless device and queries a geo-fenced area corresponding to the acquired identifier of the wireless device based on the correspondence between the identifier of the wireless device and the geo-fenced area.
9. The method of claim 8, wherein the method further comprises:
the mobile terminal sends the inquired geo-fenced area to the server;
and the server pushes pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal.
10. The method according to claim 8, wherein the obtaining, by the mobile terminal, the identifier of the at least one wireless device specifically includes:
the mobile terminal inquires the identification of at least one wireless device in the searched wireless devices through a preset means;
or,
the mobile terminal inquires the identification of at least one wireless device in the connected wireless devices through a preset means.
11. The method according to claim 10, wherein the querying by preset means comprises:
an application programming interface query of the operating system is utilized.
12. The method of claim 8, wherein the server establishes correspondence between the identity of the wireless device and the geofenced area, and comprises:
the server divides the coverage area of the wireless device signal into a geo-fenced area corresponding to the identification of the wireless device.
13. The method of claim 8, wherein the server establishes correspondence between the identity of the wireless device and the geofenced area, and comprises:
the server divides the geographic position in the preset range into different geographic fence areas according to a preset rule, wherein the different geographic fence areas correspond to different geographic position codes;
the server acquires the identification of the wireless equipment and corresponding position information;
the server generates geographical position codes according to the position information of the wireless equipment according to the preset rule;
and the server establishes a corresponding relation between the identifier of the wireless device and the geo-fence area according to the corresponding geo-location code.
14. The method of claim 13, wherein the predetermined rule comprises a geohash algorithm or a tail-elimination algorithm.
15. A method for identifying a geofence to which a mobile terminal belongs, comprising:
the server establishes a corresponding relation between the identification of the wireless device and the geo-fenced area;
the server receives the identification of the wireless equipment uploaded by the mobile terminal;
and the server inquires the geo-fence area corresponding to the uploaded identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fence area.
16. The method of claim 15, wherein the method further comprises:
and the server pushes the pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal.
17. The method of claim 15, wherein the server establishing correspondence between the identity of the wireless device and the geofenced area comprises:
the server divides the coverage area of the wireless device signal into a geo-fenced area corresponding to the identification of the wireless device.
18. The method of claim 15, wherein the server establishing correspondence between the identity of the wireless device and the geofenced area comprises:
the server divides the geographic position in the preset range into different geographic fence areas according to a preset rule, wherein the different geographic fence areas correspond to different geographic position codes;
the server acquires the identification of the wireless equipment and corresponding position information;
the server generates geographical position codes according to the position information of the wireless equipment according to the preset rule;
and the server establishes a corresponding relation between the identifier of the wireless device and the geo-fence area according to the corresponding geo-location code.
19. The method of claim 18, wherein the predetermined rule comprises a geohash algorithm or a tail-biting algorithm.
20. A method for identifying a geofence to which a mobile terminal belongs, comprising:
the mobile terminal acquires the established corresponding relation between the identification of the wireless equipment and the geo-fence area from the server;
the mobile terminal acquires an identifier of at least one wireless device;
and the mobile terminal inquires the geo-fenced area corresponding to the acquired identification of the wireless device based on the corresponding relation between the identification of the wireless device and the geo-fenced area.
21. The method of claim 20, wherein the method further comprises:
the mobile terminal sends the inquired geo-fenced area to the server;
the mobile terminal receives push information corresponding to the queried geo-fenced area.
22. The method according to claim 20, wherein the obtaining, by the mobile terminal, the identifier of the at least one wireless device specifically includes:
the mobile terminal inquires the identification of at least one wireless device in the searched wireless devices through a preset means;
or,
the mobile terminal inquires the identification of at least one wireless device in the connected wireless devices through a preset means.
23. The method of claim 22, wherein the querying by preset means comprises:
an application programming interface query of the operating system is utilized.
24. A system for identifying a geofence to which a mobile terminal belongs, comprising a server and the mobile terminal, wherein:
the server is used for establishing a corresponding relation between the identification of the wireless device and the geo-fenced area; querying a geo-fenced area corresponding to the uploaded identification of the wireless device based on the correspondence between the wireless device identification and the geo-fenced area; pushing pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal;
the mobile terminal is used for acquiring the identifier of at least one wireless device and uploading the identifier to the server; receiving push information corresponding to the queried geo-fenced area.
25. A system for identifying a geofence to which a mobile terminal belongs, comprising a server and the mobile terminal, wherein:
the server is used for establishing a corresponding relation between the identification of the wireless device and the geo-fenced area; pushing pre-stored push information corresponding to the inquired geo-fence area to the mobile terminal;
the mobile terminal is used for acquiring the corresponding relation between the established identifier of the wireless equipment and the geo-fenced area from the server; acquiring an identifier of at least one wireless device and inquiring a geo-fenced area corresponding to the acquired identifier of the wireless device based on the corresponding relation between the identifier of the wireless device and the geo-fenced area; sending the queried geo-fenced area to the server; receiving push information corresponding to the queried geo-fenced area.
26. A server for identifying a geofence to which a mobile terminal belongs, comprising:
a correspondence establishing unit for establishing a correspondence between the identifier of the wireless device and the geo-fenced area;
a geo-fence querying unit, configured to query a geo-fence area corresponding to the uploaded identification of the wireless device based on the correspondence between the wireless device identification and the geo-fence area;
and the information pushing unit is used for pushing the pre-stored pushing information corresponding to the inquired geo-fence area to the mobile terminal.
27. The server for identifying the geo-fence to which the mobile terminal belongs according to claim 26, wherein the correspondence relationship establishing unit specifically includes:
the first corresponding relation establishing unit is used for dividing the coverage area of the wireless device signal into a geo-fence area corresponding to the identification of the wireless device.
28. The server for identifying the geo-fence to which the mobile terminal belongs according to claim 26, wherein the correspondence relationship establishing unit specifically includes:
the second corresponding relation establishing unit is used for dividing the geographic position in the preset range into different geographic fence areas according to a preset rule, and the different geographic fence areas correspond to different geographic position codes; acquiring an identifier and corresponding position information of the wireless equipment; generating a geographical position code according to the position information of the wireless equipment according to the preset rule; and establishing a corresponding relation between the identification of the wireless device and the geo-fenced area according to the corresponding geo-location code of the identification of the wireless device.
29. A mobile terminal for identifying a geofence to which the mobile terminal belongs, comprising:
a correspondence obtaining unit configured to obtain, from the server, a correspondence between the identifier of the wireless device and the geo-fenced area;
a wireless device identification acquisition unit for acquiring an identification of at least one wireless device;
a geo-fenced area querying unit, configured to query, based on a correspondence between the identifier of the wireless device and the geo-fenced area, a geo-fenced area corresponding to the acquired identifier of the wireless device;
a geo-fenced area sending unit operable to send the queried geo-fenced area to the server;
an information receiving unit to receive push information corresponding to the queried geo-fenced area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510023108.7A CN105848099B (en) | 2015-01-16 | 2015-01-16 | Method, system, server and mobile terminal for identifying geo-fence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510023108.7A CN105848099B (en) | 2015-01-16 | 2015-01-16 | Method, system, server and mobile terminal for identifying geo-fence |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105848099A true CN105848099A (en) | 2016-08-10 |
CN105848099B CN105848099B (en) | 2020-06-23 |
Family
ID=56580179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510023108.7A Active CN105848099B (en) | 2015-01-16 | 2015-01-16 | Method, system, server and mobile terminal for identifying geo-fence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105848099B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106412833A (en) * | 2016-10-19 | 2017-02-15 | 上海安吉星信息服务有限公司 | Intelligent household control method, apparatus and system |
CN106535129A (en) * | 2016-11-22 | 2017-03-22 | 腾云天宇科技(北京)有限公司 | Method and apparatus for counting mobile devices, and calculation device |
CN107547633A (en) * | 2017-07-27 | 2018-01-05 | 腾讯科技(深圳)有限公司 | Processing method, device and the storage medium of a kind of resident point of user |
CN107798359A (en) * | 2016-09-05 | 2018-03-13 | 阚立坤 | A kind of wireless device management control method |
CN108876440A (en) * | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Region partitioning method and server |
CN109101989A (en) * | 2018-06-29 | 2018-12-28 | 阿里巴巴集团控股有限公司 | A kind of Merchant Category model construction and Merchant Category method, device and equipment |
CN109145225A (en) * | 2017-06-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of data processing method and device |
WO2019134550A1 (en) * | 2018-01-05 | 2019-07-11 | 阿里巴巴集团控股有限公司 | Positioning method, device and apparatus |
CN110111037A (en) * | 2019-04-18 | 2019-08-09 | 顺丰科技有限公司 | Send the management-control method and device of part permission |
CN110595460A (en) * | 2019-09-25 | 2019-12-20 | 支付宝(杭州)信息技术有限公司 | Positioning method, system and equipment |
CN111010666A (en) * | 2019-12-30 | 2020-04-14 | 中科星图股份有限公司 | GeoHash-based real-time monitoring method for geo-fence event |
CN111526486A (en) * | 2020-04-10 | 2020-08-11 | 广东小天才科技有限公司 | Method, system, terminal device and storage medium for detecting departure of child from home |
CN112927452A (en) * | 2021-02-05 | 2021-06-08 | 国网宁夏电力有限公司信息通信公司 | Intelligent anti-crossing and anti-moving fence and monitoring method thereof |
CN117835357A (en) * | 2024-03-05 | 2024-04-05 | 广东世炬网络科技有限公司 | Method, device, equipment and medium for switching network-to-network (NTN) connection based on geofence |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335997A (en) * | 2007-06-27 | 2008-12-31 | 株式会社Ntt都科摩 | Position deduction system |
CN101741887A (en) * | 2008-11-13 | 2010-06-16 | 中国移动通信集团上海有限公司 | Method, system and equipment for releasing position guide information |
CN102857886A (en) * | 2012-08-24 | 2013-01-02 | 北京傲天动联技术有限公司 | Information pushing system based on hot point and method thereof |
CN103052020A (en) * | 2011-10-11 | 2013-04-17 | 北京千橡网景科技发展有限公司 | Method and device for locating terminal user |
US20130288717A1 (en) * | 2011-01-17 | 2013-10-31 | Lg Electronics Inc | Augmented reality (ar) target updating method, and terminal and server employing same |
CN103916818A (en) * | 2014-04-09 | 2014-07-09 | 北京百度网讯科技有限公司 | Positioning method based on geofence technology and mobile terminal |
WO2014130090A1 (en) * | 2013-02-22 | 2014-08-28 | Intel Corporation | Geo-fence notification management |
-
2015
- 2015-01-16 CN CN201510023108.7A patent/CN105848099B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335997A (en) * | 2007-06-27 | 2008-12-31 | 株式会社Ntt都科摩 | Position deduction system |
CN101741887A (en) * | 2008-11-13 | 2010-06-16 | 中国移动通信集团上海有限公司 | Method, system and equipment for releasing position guide information |
US20130288717A1 (en) * | 2011-01-17 | 2013-10-31 | Lg Electronics Inc | Augmented reality (ar) target updating method, and terminal and server employing same |
CN103052020A (en) * | 2011-10-11 | 2013-04-17 | 北京千橡网景科技发展有限公司 | Method and device for locating terminal user |
CN102857886A (en) * | 2012-08-24 | 2013-01-02 | 北京傲天动联技术有限公司 | Information pushing system based on hot point and method thereof |
WO2014130090A1 (en) * | 2013-02-22 | 2014-08-28 | Intel Corporation | Geo-fence notification management |
CN103916818A (en) * | 2014-04-09 | 2014-07-09 | 北京百度网讯科技有限公司 | Positioning method based on geofence technology and mobile terminal |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107798359A (en) * | 2016-09-05 | 2018-03-13 | 阚立坤 | A kind of wireless device management control method |
CN106412833A (en) * | 2016-10-19 | 2017-02-15 | 上海安吉星信息服务有限公司 | Intelligent household control method, apparatus and system |
CN106412833B (en) * | 2016-10-19 | 2020-01-31 | 上海安吉星信息服务有限公司 | Intelligent household control method, device and system |
CN106535129A (en) * | 2016-11-22 | 2017-03-22 | 腾云天宇科技(北京)有限公司 | Method and apparatus for counting mobile devices, and calculation device |
CN109145225A (en) * | 2017-06-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of data processing method and device |
CN107547633A (en) * | 2017-07-27 | 2018-01-05 | 腾讯科技(深圳)有限公司 | Processing method, device and the storage medium of a kind of resident point of user |
WO2019134550A1 (en) * | 2018-01-05 | 2019-07-11 | 阿里巴巴集团控股有限公司 | Positioning method, device and apparatus |
CN108876440A (en) * | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Region partitioning method and server |
CN108876440B (en) * | 2018-05-29 | 2021-09-03 | 创新先进技术有限公司 | Region dividing method and server |
CN109101989B (en) * | 2018-06-29 | 2021-06-29 | 创新先进技术有限公司 | Merchant classification model construction and merchant classification method, device and equipment |
CN109101989A (en) * | 2018-06-29 | 2018-12-28 | 阿里巴巴集团控股有限公司 | A kind of Merchant Category model construction and Merchant Category method, device and equipment |
CN110111037A (en) * | 2019-04-18 | 2019-08-09 | 顺丰科技有限公司 | Send the management-control method and device of part permission |
CN110595460B (en) * | 2019-09-25 | 2021-03-19 | 支付宝(杭州)信息技术有限公司 | Positioning method, system and equipment |
CN110595460A (en) * | 2019-09-25 | 2019-12-20 | 支付宝(杭州)信息技术有限公司 | Positioning method, system and equipment |
CN111010666A (en) * | 2019-12-30 | 2020-04-14 | 中科星图股份有限公司 | GeoHash-based real-time monitoring method for geo-fence event |
CN111526486A (en) * | 2020-04-10 | 2020-08-11 | 广东小天才科技有限公司 | Method, system, terminal device and storage medium for detecting departure of child from home |
CN112927452A (en) * | 2021-02-05 | 2021-06-08 | 国网宁夏电力有限公司信息通信公司 | Intelligent anti-crossing and anti-moving fence and monitoring method thereof |
CN112927452B (en) * | 2021-02-05 | 2022-10-18 | 国网宁夏电力有限公司信息通信公司 | Intelligent anti-crossing and anti-moving fence and monitoring method thereof |
CN117835357A (en) * | 2024-03-05 | 2024-04-05 | 广东世炬网络科技有限公司 | Method, device, equipment and medium for switching network-to-network (NTN) connection based on geofence |
Also Published As
Publication number | Publication date |
---|---|
CN105848099B (en) | 2020-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105848099B (en) | Method, system, server and mobile terminal for identifying geo-fence | |
CN103875260B (en) | For providing the method and apparatus of transmitting set almanac information to mobile device based on desired path | |
CN103533635A (en) | Mobile terminal positioning method and mobile terminal | |
KR102558968B1 (en) | Information recommendation method and device | |
US20090191892A1 (en) | Integrating position-determining and wi-fi functions | |
US10313964B2 (en) | WiFi access system | |
CN102170696A (en) | CUCKOO hashing to store beacon reference data | |
US8478304B1 (en) | Methods and systems for associating location information with a wireless local area network | |
CN105451188A (en) | Method for implementing information push, server, sharer client, and third-party client | |
CN105144808A (en) | Obfuscating the locations of access points and femtocells | |
CN104159197A (en) | Low-cost terminal positioning method, smart mobile terminal and system | |
CN108282843B (en) | Network query method, device and server | |
US20130143584A1 (en) | System and method for user control of location determination | |
WO2016202263A1 (en) | Method and server for saving standard format page | |
CN113709859A (en) | Positioning method, device, equipment and computer readable storage medium | |
CN102984654A (en) | Mobile terminal group tracking service method based on internet of things resource sharing platform | |
CN106162542B (en) | Electronic certificate prompting method and server | |
CN109196892B (en) | Method for remote provisioning of subscriber entities | |
Agrawal et al. | Bluetooth navigation system using wi-fi access points | |
CN104378820A (en) | Method and system for positioning wireless device | |
CN108882165B (en) | Navigation method and device | |
CN110856113A (en) | Method, device and system for searching and identifying nearby equipment | |
CN113905438B (en) | Scene identification generation method, positioning method and device and electronic equipment | |
WO2020068857A1 (en) | Reciprocal-basis authorization for proximate presence reveal with location privacy maintained | |
CN105122860B (en) | The discovery of radio clear data library |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1228153 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |