CN109511089A - A kind of monitoring method and device - Google Patents
A kind of monitoring method and device Download PDFInfo
- Publication number
- CN109511089A CN109511089A CN201811094072.1A CN201811094072A CN109511089A CN 109511089 A CN109511089 A CN 109511089A CN 201811094072 A CN201811094072 A CN 201811094072A CN 109511089 A CN109511089 A CN 109511089A
- Authority
- CN
- China
- Prior art keywords
- fence
- custodial care
- care facility
- monitoring
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 261
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000004590 computer program Methods 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 31
- 238000010586 diagram Methods 0.000 description 19
- 101100533757 Caenorhabditis elegans snf-3 gene Proteins 0.000 description 11
- 230000015572 biosynthetic process Effects 0.000 description 10
- 230000001788 irregular Effects 0.000 description 10
- 230000004913 activation Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 4
- 101150023545 gel1 gene Proteins 0.000 description 4
- 101100437239 Mus musculus B4galt5 gene Proteins 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012806 monitoring device Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000011148 porous material Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Abstract
This application discloses a kind of monitoring method and devices, this method comprises: determining fence according to the information of multiple custodial care facilities;It is guarded to multiple by custodial care facility according to determining fence.
Description
Technical field
This application involves but be not limited to instant messaging, espespecially a kind of monitoring method and device.
Background technique
Wearable device is often referred to directly wear, or the one kind being integrated on the clothes or accessory of user is portable
Equipment.Wearable device is not only a kind of hardware device, can more pass through software support and data interaction, cloud interaction etc.
To realize powerful function.
With the rapid development of mobile Internet with the raising of people's quality of life, based on global positioning system (GPS,
Global Positioning System) positioning, application program of mobile phone (APP) and cloud server custodial care facility got over
To be more widely used in people's lives.
Summary of the invention
The application provides a kind of monitoring method and device, can flexibly be applicable in application scenarios, realizes to the true of guardianship
Positive monitoring.
This application provides a kind of monitoring methods, comprising:
Fence is determined according to the information of multiple custodial care facilities;
It is guarded to multiple by custodial care facility according to determining fence.
Present invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions, the calculating
Machine executable instruction is for executing monitoring method described in any of the above embodiments.
The application provides a kind of electronic equipment for realizing monitoring, including processor, memory again;Wherein, on memory
It is stored with the computer program that can be run on a processor: for the step of executing any of the above-described monitoring method.
Technical scheme includes at least: determining fence according to the information of multiple custodial care facilities;According to determining
Fence is guarded to multiple by custodial care facility.Fence is that the electronics of a dynamic real-time change encloses in the application
Column, so that the application is completely suitable for the monitoring to custodial person on the move is continued at a distance;Moreover, the monitoring in the application
Object includes multiple guardianships, realize in whole team more guardianships carry out dynamic monitor, be very suitable to as
The monitoring of large-scale more people's outdoor activities etc..In this way, the application has achieved the purpose that be flexibly applied to various application scenarios, real
The real monitoring to monitored object is showed.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right
Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical scheme, and constitutes part of specification, with this
The embodiment of application is used to explain the technical solution of the application together, does not constitute the limitation to technical scheme.
Fig. 1 is the flow chart of the application monitoring method;
Fig. 2 is the flow chart of the embodiment of the application monitoring method;
Fig. 3 is the flow diagram for the embodiment that the application configures monitoring group;
Fig. 4 is the flow diagram for the embodiment that fence attribute information is arranged in the application;
Fig. 5 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application cloud;
Fig. 6 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application local;
Fig. 7 is the embodiment flow diagram that the application terminates protected activity;
Fig. 8 is the schematic diagram that the application guards the rectangle real-time electronic fence embodiment that interface A PP is shown;
Fig. 9 is the schematic diagram that the application guards the round real-time electronic fence embodiment that interface A PP is shown;
Figure 10 is the schematic diagram that the application guards the irregular polygon real-time electronic fence embodiment that interface A PP is shown;
Figure 11 is the schematic diagram that the application guards the discrete type real-time electronic fence embodiment that interface A PP is shown;
Figure 12 is the schematic diagram that the application guards the undesirable embodiment of real-time electronic fence that interface A PP is shown;
Figure 13 the application guards the schematic diagram for BGT embodiment outside fence that interface A PP is shown;
Figure 14 is that the BGT that the application monitoring interface A PP is shown is implemented except real-time electronic fence but in prewarning area
The schematic diagram of example;
Figure 15 is the composed structure schematic diagram of the application monitor device.
Specific embodiment
For the purposes, technical schemes and advantages of the application are more clearly understood, below in conjunction with attached drawing to the application
Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application
Feature can mutual any combination.
Custodial care facility and by custodial care facility include at least have subscriber identity module (SIM, Subscriber Identity
Module) card and wireless module, in this way, custodial care facility and by the accessible wireless network of custodial care facility, and can be according to prison
It protects equipment and its location information is oriented by the identity information of custodial care facility.In order to which the monitoring to guardianship is better achieved,
The application proposes a kind of monitoring method and monitor device, can flexibly be applicable in various application scenarios, to realize to guardianship
Real monitoring.
Fig. 1 is the flow chart of the application monitoring method, as shown in Figure 1, comprising:
Step 100: fence is determined according to the information of multiple custodial care facilities.
Optionally, if the information of custodial care facility includes: location information, according to multiple custodial care facilities in this step
Information determine fence, comprising:
The region that preset shape is determined according to the location information of each custodial care facility is fence.
In a kind of illustrative examples, preset shape includes but is not limited to: round, and/or rectangle, and/or polygon.
In a kind of illustrative examples, fence includes one.
In a kind of illustrative examples, fence includes multiple.
In a kind of illustrative examples, when fence includes multiple, each fence can according to one or
The location informations of multiple custodial care facilities determines.
Optionally, if the information of custodial care facility includes: identification information, according to multiple custodial care facilities in this step
Information determine fence, comprising:
The monitored device communicated is established according to the identification information of each custodial care facility and with the custodial care facility respectively
Identification information determines multiple fences.
In a kind of illustrative examples, identification information can include but is not limited to such as number, device identification information.
In a kind of illustrative example, custodial care facility and by can be close by bluetooth, Wifi hot spot etc. between custodial care facility
Distance communication mode establishes communication to each other.
Further, when monitored device is moved to another fence from a fence;Further include:
The electricity that custodial care facility and the monitored device into the mobile preceding place fence of monitored device are moved to
Custodial care facility in sub- fence sends notice.
Step 101: being guarded to multiple by custodial care facility according to determining fence.
Optionally, this step includes:
According to each location information by custodial care facility, determine in the range of the fence by custodial care facility
It is safe.
In a kind of illustrative examples, if determining that certain is not existed by custodial care facility according to by the location information of custodial care facility
In the range of the fence, then it is assumed that this is in unsafe condition by custodial care facility, the method also includes:
The warning message by custodial care facility outside the fence is pushed to each custodial care facility.
In a kind of illustrative examples, the application monitoring method further include:
Preset the maximum allowable regional scope and/or minimum allowable regional scope of the fence;
If it is determined that fence beyond maximum allowable regional scope or within the scope of minimum allowable, then set to monitoring
The alarm information of standby push fence mistake.
, can be by custodial care facility or by custodial care facility in a kind of illustrative examples, the maximum for inputting fence permits
Perhaps regional scope and/or minimum allowable regional scope.
In a kind of illustrative examples, the application monitoring method further include:
Shown in custodial care facility and/or on custodial care facility the mark information of fence information and all custodial care facilities
With by the mark information of custodial care facility.
In a kind of illustrative examples, the mark information of custodial care facility and can be identical by the mark information of custodial care facility,
It can also be different.Mark information may include such as: pore, person of low position.
In a kind of illustrative examples, custodial care facility in the application and by custodial care facility include but is not limited to track class can
Wearable device.
Fence in the application monitoring method is the fence of a dynamic real-time change, so that the application is complete
The full monitoring being suitable for custodial person on the move is continued at a distance;Moreover, the guardianship in the application includes multiple prisons
Object is protected, realizes and carries out dynamic monitor for more guardianships in whole team.It is particularly suited for as large-scale more people are outgoing
The monitoring of activity etc..
With the rapid development of mobile Internet with the raising of people's quality of life, based on global positioning system (GPS,
Global Positioning System) positioning, application program of mobile phone (APP) and cloud server tracking class wearable set
Standby (referred to herein as Tracker) has been more and more widely used in people's lives.By the way that in tracking, class is wearable sets
Standby middle addition subscriber identity module (SIM, Subscriber Identity Module) card and wireless module, Tracker
Access wireless network.Tracker is also increasingly by the favor of operator.
Currently, the application of Tracker is usually that static electronic fence is arranged for single Tracker to realize to this
What Tracker was guarded.Wherein, static electronic fence is the region of a pre-set fixation, and is for single
Tracker is respectively arranged, and Tracker wearer can only be movable in this area, is no longer supervised once leaving this region
It protects, can not be suitable for continuing at a distance the monitoring of Tracker wearer on the move.In other words, Tracker application not
Flexibly, the scene used is also very limited, to be extremely difficult to wearer's really monitoring effect to Tracker is worn.
The present inventors have noted that currently, can all be brought to organizer in the large-scale more people's outdoor activities of tissue very big
Pressure, such as travelling Youth League organization tourist go on a tour, and especially school or kindergarten organize the student carry out outdoor activity, in order to guarantee to learn
Raw safety usually can allow teachers worn out mentally and physically.Even if all wearing Tracker to each member in team, also only
The single member in team can be guarded respectively in a pre-set static electronic fence.That is, cannot
Dynamic monitor is carried out for more Tracker in whole team, can not be suitable for as a whole setting multiple Tracker
The scene of fence is set, can not be suitable for continuing at a distance the monitoring of Tracker wearer on the move.
In order to describe displaying, hereafter by custodial care facility and by custodial care facility be Tracker for the application monitoring side
The specific implementation of method is described in detail.In order to which the wearer i.e. monitoring of guardianship to Tracker is worn is better achieved,
It is described in detail below with reference to the monitoring method of the application.
Fig. 2 is the flow chart of the embodiment for the method that the application realizes monitoring, in the present embodiment, with custodial care facility and is supervised
Shield equipment is described for constituting a monitoring group, as shown in Figure 2, comprising:
Step 200: according to pre-set trigger condition, according to the information of custodial care facility in monitoring group and pre-set
Fence attribute information determines real-time electronic fence.
Optionally, trigger condition can be pre-set polling cycle, such as: 10 seconds etc.;Trigger condition is also possible to
Random demand, for example click pre-set " starting to guard " key, icon or menu etc..
Before this step further include: configuration monitoring group.It specifically includes:
Role is distributed for each Tracker, i.e., set monitoring Tracker (GT) for each Tracker or is guarded
Tracker(BGT);
According to the Tracker for setting role, monitoring group is set.It may include multiple GT in one monitoring group and multiple
BGT, under normal circumstances, the number of BGT are much larger than the number of GT.
It is realized by step 200 and fence is determined according to the information of multiple custodial care facilities.
Optionally, monitoring group may include one or more.
After having configured monitoring group, the configuration information of monitoring group is included at least: the mark for the GT that monitoring group mark, monitoring group include
Mark, the number of GT, the number of BGT of BGT etc. that knowledge, monitoring group include.
Wherein, the BGT where GT plays the role of to it in monitoring group in monitoring group is guarded;BGT is then by it
The monitoring of GT in place monitoring group.Several Tracker that monitoring group includes are worn by the different members in monitoring group respectively,
So, in monitoring group, the member for wearing the Tracker that role is guardian is guardian, and wearing role is custodial person's
The member of Tracker is custodial person.
As long as it should be noted that wear show Tracker together with some member in monitoring group, not
Restriction have to for Tracker to be worn over, on clothes etc., for example Tracker is bracelet.
In the embodiment of the present application, there are three kinds of states by Tracker: sleep state, state of activation and working condition.It is all
Tracker original state is sleep state;The Tracker for setting role enters state of activation;After protected activity starts, monitoring
The Tracker being activated in group enters working condition;After protected activity terminates and releases Tracker setting, Tracker is automatic
Revert to sleep state.Distinction cue can be arranged to three kinds of states on Tracker, such as: pass through the instruction of different colours
Lamp distinguishes different states etc..
Before this step further include: the monitoring mode of setting monitoring group.Monitoring mode includes: cloud monitoring mode or local
Monitoring mode.
When monitoring group is set as cloud monitoring mode, before this step further include: for monitoring group, fence is set
Type, and corresponding fence attribute information is set.
Cloud monitoring mode refers to: module communicate in fact with cloud (such as Cloud Server) Tracker by wireless communication
Now guard, in this way, Tracker can receive the instruction from cloud and send cloud for the relevant information of itself, by with
Monitoring is realized in the interaction in cloud.
Optionally, when the type of fence is set as discrete type, fence includes being with GT each in monitoring group
Several border circular areas of the separation in the center of circle, corresponding fence attribute information include: the discrete border circular areas of corresponding each GT
Radii fixus (ZFR).
Optionally, when the type of fence is set as polymerism, the shape of fence includes but is not limited to: square
Shape, circle, irregular polygon etc..Specifically,
When GT number >=2 when, if fence is shaped to rectangle, corresponding fence attribute information includes: most
Long length (ZMAXL), minimum length (ZMINL), maximum width (ZMAXW) and minimum widith (ZMINW);If fence shape
It is provided in round, corresponding fence attribute information includes: maximum radius (ZMAXR) and least radius (ZMINR);
When GT number >=3 when, if fence is shaped to irregular polygon, corresponding fence attribute letter
Breath includes: the maximum distance (ZMAXD) and minimum range (ZMIND) between any two GT.
Further, when the type of fence is set as polymerism, prewarning area can be further set, accordingly
Fence attribute information further include: using each GT as the radius (ZAR) of a small border circular areas in the center of circle.
It should be noted that above-mentioned fence attribute information can be according to the number of the BGT in monitoring group and arrangement side
Formula is arranged, and in actual use, as long as Tracker number meets above-mentioned condition, user can be by APP according to self-demand
The desired fence pattern of selection is simultaneously configured.Specific setting can adjust according to the actual situation, for art technology
For personnel, it is readily apparent which is not described herein again based on method provided by the present application.
When monitoring group is set as local monitoring mode, before this step further include: for monitoring group, fence category is set
Property information.
Local monitoring mode refers to: constituting network by communication module such as wireless communication module between Tracker, and at this
The monitoring of ground network implementations.Such as with Wifi hot spot building network etc., at this point, all Tracker in monitoring group can not only be used for
Wifi hot spot also can be used as Wifi terminal, and each Tracker can connect the Wifi of any one Tracker in same monitoring group
Hot spot.Correspondingly, fence attribute information includes: the BGT numbered list for being connected to the BGT of each GT itself in monitoring group.
Such as: it include 20 two guardians of GTA and GTB, BGT1~BGT20 custodial persons in some monitoring group, and
The Wifi hot spot of BGT1~BGT10 connection GTA, the Wifi hot spot of BGT11~BGT20 connection GTB, then, the original state of GTA
BGT numbered list, that is, GTA fence attribute information include: BGT1, BGT2, BGT3, BGT4, BGT5, BGT6, BGT7,
BGT8,BGT9,BGT10;BGT numbered list, that is, GTB fence attribute information of the original state of GTB include: BGT11,
BGT12、BGT13、BGT14、BGT15、BGT16、BGT17、BGT18、BGT19、BGT20。
Optionally, the case where being cloud monitoring mode for the monitoring mode of monitoring group, in step 200 according to monitoring group
The information of middle guardian and pre-set fence attribute information determine real-time electronic fence, comprising:
By in running order Tracker according to pre-set trigger condition such as every a polling cycle (such as:
Be set as 10s) report, cloud server obtain Tracker itself location information;
Cloud server according to the location information of the guardian of acquisition be used as GT Tracker location information and in advance
The fence attribute information of setting determines real-time electronic fence.
The information of custodial care facility may include location information;Correspondingly, determine that fence includes: according to each custodial care facility
Location information determine preset shape region be the fence.Optionally, preset shape includes but is not limited to: round,
And/or rectangle, and/or polygon etc..It is described in detail below with reference to monitoring group scene.
Optionally, when fence is aggretion type, cloud server is according to the location information of Tracker and presets
Fence attribute information determine that real-time electronic fence includes:
If fence is shaped to rectangle, cloud server compares each GT is reported in monitoring group location information i.e.
Longitude and latitude select the latitude maximum value in the longitude minimum value and longitude maximum value and each latitude in each longitude respectively
With latitude minimum value;Cloud server is according to the coordinate of longitude minimum value and the coordinate of latitude minimum value and longitude maximum value
Coordinate and the coordinate of latitude maximum value form rectangular area;It is enclosed the rectangular area of formation as the real-time electronic of the monitoring group
Column.
The length of the real-time electronic fence of formation is ZL, width ZW, wherein according to fence attribute information, ZL and
ZW should meet: ZMAXL > ZL > ZMINL, ZMAXW > ZW > ZMINW.
Optionally, if ZL>ZMAXL or ZL<ZMINL, alternatively, ZW>ZMAXW or ZW<ZMINW, then, cloud server
All GTs of the meeting into the monitoring group push fence fault alarm message, and notice GT adjusts self-position.GT has notice
, the guardian for wearing GT completes to adjust by voluntarily moving position.In practical application, prison can be generated after the foundation of monitoring group
Shield person's account, guardian can log in guardian's account by APP and see in current monitoring group owning by graphic interface
The location status of Tracker, in this way, guardian according to interface be easy to judge itself how to carry out position adjustment with meet ZL and
The size requirements of ZW.
If real-time electronic fence is shaped to circle, cloud server compares the position letter that each GT is reported in monitoring group
Breath is longitude and latitude, selects latitude in the longitude minimum value and longitude maximum value and each latitude in each longitude respectively most
Big value and latitude minimum value;Cloud server is maximum according to the coordinate of longitude minimum value and the coordinate and longitude of latitude minimum value
The center for the rectangle that the coordinate of value and the coordinate of latitude maximum value are formed is as circular center, with the half of the long side of the rectangle
Border circular areas is formed as circular radius ZR;Using the border circular areas of formation as the real-time electronic fence of the monitoring group.
According to fence attribute information, the radius of the real-time electronic fence of formation is that ZR should meet: ZMAXR > ZR >
ZMINR。
Optionally, if ZR>ZMAXR or ZR<ZMINR, cloud server can push electricity to all GT in the monitoring group
Sub- fence fault alarm message, notice GT adjust position.What GT had notice, the guardian for wearing GT is by voluntarily moving position
To complete to adjust.In practical application, guardian's account can be generated after the foundation of monitoring group, guardian can log in prison by APP
Shield person's account and the location status that all Tracker in current monitoring group are seen by graphic interface, in this way, guardian according to
Interface is easy to judge itself how to carry out size requirements of the position adjustment to meet ZR.
If real-time electronic fence is shaped to irregular polygon, cloud server is reported according to GT each in monitoring group
Location information, adjacent GT is separately connected and forms closed polygon;Using the polygon of formation as the monitoring group
Real-time electronic fence.
According to fence attribute information, the side length ZD of each edge of the real-time electronic fence of formationiShould it meet:
ZMAXD>ZDi>ZMIND.Wherein, i indicates the quantity on the side of polygon.
Optionally, if the length ZD on each side of polygoniThe case where in the presence of being greater than ZMAXD or being less than ZMIND, or
A closed area (such as all stations GT are on one wire) can not be constituted after all GT connections, cloud server can be to the monitoring
All GT in group push fence fault alarm message, and notice GT adjusts position.What GT had notice, wear the monitoring of GT
Person completes to adjust by voluntarily moving position.In practical application, guardian's account, guardian can be generated after the foundation of monitoring group
Guardian's account can be logged in by APP and the position shape of all Tracker in current monitoring group is seen by graphic interface
State, in this way, guardian is easy to judge itself how to carry out position adjustment according to interface to meet ZDiSize requirements.
Optionally, when fence is discrete type, cloud server is according to the location information of Tracker and presets
Fence attribute information determine that real-time electronic fence includes:
The location information that cloud server is reported according to GT each in monitoring group, using the position of each GT as the center of circle, radius is
Radii fixus (ZFR) in fence attribute information, is respectively formed multiple border circular areas;
Using multiple border circular areas of formation as the real-time electronic fence of the monitoring group.
When fence includes multiple, each fence is true according to the location information of one or more custodial care facilities
It is fixed.
The information of custodial care facility is also possible to include identification information;Correspondingly, determine that fence includes:
The mark of the monitored device communicated is established according to the identification information of each custodial care facility and with the custodial care facility
Information determines multiple fences.It is described in detail below with reference to monitoring group scene.
Optionally, the case where being local monitoring mode for the monitoring mode of monitoring group, in step 200 according to monitoring group
The information of middle guardian and pre-set fence attribute information determine real-time electronic fence, comprising:
Each GT in monitoring group is numbered using itself as the BGT of all BGT of the tree-like traversal connection itself of root node, is formed
BGT numbered list as real-time electronic fence.
Such as: the BGT being presently attached on the Wifi hot spot of GTA includes: BGT1, BGT2 and BGT3, is connected to BGT1's
BGT on Wifi hot spot includes BGT4 and BGT5, and the BGT being connected on the Wifi hot spot of BGT4 includes BGT6, then, currently connect
Connect the i.e. GTA of BGT numbered list on the Wifi hot spot of GTA real-time electronic fence include: BGT1, BGT2, BGT3, BGT4,
BGT5 and BGT6.
Optionally, when monitored device is moved to another fence from a fence;Further include:
The electronics that custodial care facility and monitored device where before notice monitored device is mobile in fence are moved to
Custodial care facility in fence.
Step 201: according to determining fence to being guarded by custodial care facility in monitoring group.
It is realized by this step and is guarded to multiple by custodial care facility according to determining fence, comprising:
According to each location information by custodial care facility, determine that in the range of fence be peace by custodial care facility
Complete.
Optionally, if determining certain by custodial care facility not in the fence according to by the location information of custodial care facility
In the range of, then it is assumed that this is in unsafe condition by custodial care facility, further includes:
The warning message by custodial care facility outside the fence is pushed to each custodial care facility.
It is described in detail below with reference to the different situations in monitoring group.
Optionally, for the monitoring mode of monitoring group be cloud monitoring mode the case where, no matter fence type is poly-
Conjunction property is still discrete type, this step includes:
For each custodial person in monitoring group, cloud server is according to the position of the custodial person in the monitoring group of acquisition
Location information of the confidence breath i.e. as the Tracker of BGT, judges whether the BGT is in the model for the real-time electronic fence determined
In enclosing, if in the range of the real-time electronic fence determined, then it is assumed that the custodial person is safe;If not true
In the range of the real-time electronic fence made, then it is assumed that the custodial person is in unsafe condition, and cloud server is to monitoring group
In warning message of all GT push BGT outside real-time electronic fence, and send the volume of the not BGT in real-time electronic fence
Number and location information.
Optionally, when fence type is discrete type, this step further include:
When BGT is not in real-time electronic fence, but when in the prewarning area of some GT, cloud server only notifies the GT
To pay attention to the BGT in prewarning area.
That is to say, for the case where fence type is discrete type, only when BGT is neither in real-time electronic fence,
When also not in the prewarning area of some GT, all GT push BGTs of the cloud server into monitoring group where the BGT are in reality
When fence outside warning message, and send the number and location information of the not BGT in real-time electronic fence.
Optionally, the case where being local monitoring mode for the monitoring mode of monitoring group, this step includes:
GT in monitoring group compares the real-time electronic fence information and fence attribute information of itself formation, judges electronics
Whether the BGT number saved in fence attribute information showed the BGT numbered list currently connected in real-time electronic fence
In exist;
If there is the BGT number being not present, then other GTs transmission inquiry of the GT successively into monitoring group where itself disappears
Breath, with inquire not the BGT in the BGT numbered list that the GT is currently connected itself whether currently connecting in other GT
In BGT numbered list, if the BGT shows not in the BGT numbered list of other GT currently connected in fence attribute
The BGT in information number corresponding custodial person be it is safe, then the GT update itself preservation BGT numbered list, if
The BGT shows that the BGT not in fence attribute information is compiled not in the BGT numbered list of other GT currently connected
Number corresponding custodial person is in unsafe condition, then issues alarm signal.
Fence is the fence of a dynamic real-time change in the embodiment of the present application, so that the application is completely suitable
For the monitoring to custodial person on the move such as Tracker wearer is continued at a distance;Moreover, the guardianship in the application
Including multiple guardianships such as Tracker, realizes and carry out dynamic prison for more guardianships such as Tracker in whole team
Shield is very suitable to the monitoring of such as large-scale more people's outdoor activities.In this way, the application, which has reached, is flexibly applied to various applications
The purpose of scene realizes the real monitoring to guardianship.
In a kind of illustrative examples, the application method be can further include:
Preset the maximum allowable regional scope and/or minimum allowable regional scope of the fence;
If the fence determined in step 200 is beyond the maximum allowable regional scope or in minimum allowable range
It is interior, then to the alarm information of custodial care facility push fence mistake.
, can be by custodial care facility or by custodial care facility in a kind of illustrative examples, the maximum for inputting fence permits
Perhaps regional scope and/or minimum allowable regional scope.
Here by taking kindergarten organizes child to carry out outdoor activity to park as an example, according to monitoring side provided by the present application
Method by custodial care facility or by custodial care facility, can input range that the boundary in entire park is constituted as fence most
It is big to allow regional scope.As long as in this way, determining fence set in advance maximum fair by the information of multiple custodial care facilities
Perhaps in regional scope, all it is allowed;As long as and monitored device is all safety in a wherein fence determined
, moreover, in maximum allowable regional scope, when monitored device is moved to another fence from a fence
When, also it is allowed, at this point, can be moved to custodial care facility of the monitored device before mobile in the fence of place and monitored device
The custodial care facility moved in fence extremely sends notice.But if monitoring device walks out maximum allowable regional scope, that
, determine that fence can then be set beyond maximum allowable regional scope to all monitoring by the information of multiple custodial care facilities
The alarm information of standby push fence mistake, to further ensure that the monitoring device and follow the monitored of the monitoring device
The safety of equipment.
When the method that monitoring terminates, and the application realizes monitoring further include:
All in running order Tracker enter state of activation;Release the monitoring of the Tracker of all activated state
Group and role's setting, all guardian's accounts are automatically logged out at this time;All Tracker are restored to sleep state.
Optionally, two kinds of accounts: administrator's account and guardian's account can be set in the application;Administrator account can be with
It logs in cloud server to be managed, guardian's account number can be logged on the GT that role is guardian and is managed.
By administrator's account, all guardianships such as Tracker and monitoring group can be managed;It is carried out in protected activity
In can check the real-time status of guardianship such as Tracker in all monitoring groups;It, can will be more by APP in practical application
A guardianship such as Tracker are added in administrator's account.
Guardian's account only just understands dynamic generation after having monitoring group to be arranged successfully, may only by guardian's account number
Check the real-time status of all guardianships such as Tracker in monitoring group belonging to guardian's account number.When login guardian's account
Number GT where monitoring group release setting after, guardian's account is automatically logged out.
It can be completed by manager's account number: the configuration of the monitoring group in the application, distribution, prison such as Tracker role
The setting etc. of shield group;The setting of the monitoring mode of monitoring group in the application;It is to be set as cloud monitoring mode in the application
Monitoring group setting fence type, and corresponding fence attribute information is set;End in the application, which is guarded, lives
It is dynamic.
It can be completed by guardian's account number: be the monitoring group setting electronics for being set as cloud monitoring mode in the application
The type of fence, and corresponding fence attribute information is set.
When the more Tracker protected activities of needs, such as: when kindergarten organizes child to carry out outdoor activity, pass through management
Member's account carries out role's setting to all Tracker used, correspondence is respectively set according to the number of guardian and custodial person
The GT and BGT of number.It is numbered for all GT and BGT setting, such as: GT number includes GTA, GTB...;BGT is numbered
BGT1, BGT2... etc.;When Tracker after role is arranged successfully Tracker automatically into state of activation.Assuming that needing that N is arranged
The Tracker being active, is assigned in each monitoring group that (unactivated Tracker cannot be assigned to by a monitoring group
In monitoring group), the number of GT and BGT is both greater than 0 in each monitoring group, such as: in the Tracker of activation, there are 4 Tracker
Role be arranged to GT, respectively GTA, GTB, GTC and GTD, there is the role of 40 Tracker to be arranged to BGT, number is
BGT1~BGT40;If necessary to be arranged two monitoring groups, and BGT1~BGT20 is guarded by GTA and GTB, BGT21~BGT40 by
GTC and GTD monitoring, then, by BGT1~BGT20, GTA and GTB, this 22 Tracker are arranged in a monitoring group, by BGT21
This 22 Tracker of~BGT40, GTC and GTD are arranged in another monitoring group.One is generated respectively for the GT in each monitoring group
A guardian's account, wears GT to guardian, wears BGT to custodial person.
After starting protected activity in APP by administrator's account (protected activity can be respectively started for each monitoring group,
Can also all monitoring groups be unified starts), the Tracker being active started in the monitoring group of protected activity enters work
Make state.In practical applications, for example start button can be set on APP, user login management person's account simultaneously clicks starting
After button, starting protected activity message can be sent to cloud server, cloud server stores all of current administrator's account
The role of Tracker is arranged and grouping, and unlatching is provided with the poll timer of polling cycle to trigger the monitoring side of the application
Method.
The monitoring mode of the settable each monitoring group of administrator's account, when GPS information can not obtain or cloud can not connect
When, monitoring group also can be automatically into local monitoring mode, at this point, Tracker, which can issue information reminding user, carries out local mould
Formula Initialize installation establishes fence attribute information.
After terminating protected activity in APP by administrator's account (protected activity can be terminated respectively for each monitoring group,
Can also all monitoring groups uniformly terminate), terminate in running order Tracker in the monitoring group of protected activity automatically into
Enter state of activation, monitoring group and role are arranged where cancelling all Tracker being active by administrator's account, then
All Tracker are automatically restored to sleep state.In practical applications, for example conclusion button can be set on APP, log in pipe
After the user of reason person's account clicks conclusion button, can send to cloud server terminates protected activity message, and cloud server closes
Close poll timer.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored with computer executable instructions, described
Computer executable instructions are for executing monitoring method described in any of the above embodiments.
The embodiment of the present invention also provides a kind of electronic equipment for realizing monitoring, including processor, memory;Wherein, it stores
The computer program that can be run on a processor is stored on device: for the step of executing any of the above-described monitoring method.
Installing the APP for realizing monitoring in advance in different terminals, permission is different if login account difference,
For example, the location status of Tracker in all monitoring groups can be seen by APP by logging in by administrator's account, and pass through monitoring
Person's account logs in the location status that can only see Tracker in this monitoring group.The application is realized combined with specific embodiments below
The method of monitoring is described in detail.
Fig. 3 is the flow diagram for the embodiment that the application configures monitoring group, as shown in Figure 3, comprising:
Step 300: by the Tracker in need being managed be added in administrator's account.All Tracker are initial
For sleep state.
It may include multiple administrator's accounts in Cloud Server.It can be added in administrator's account such as 100 Tracker
The Tracker for being managed, but using in protected activity may only have 50, other 50 Tracker not used
Keep sleep state.
Step 301: by administrator's account, role is respectively set i.e. in the Tracker used to this all protected activity
GT is set by several Tracker, several Tracker are set as BGT.
The GT and BGT of corresponding number are respectively set according to the number of guardian and custodial person.Tracker completes role
Become state of activation after setting.
Step 302: several monitoring groups are set as needed.
Step 303: the Tracker being active being assigned in N number of monitoring group as needed.In each monitoring group
Including several GT and several BGT.
Step 304: looping to determine whether GT number in each monitoring group is greater than 0, if it is greater than 0, enter step 306;
Otherwise 305 are entered step.
Step 305: if GT number in some monitoring group is equal to 0, i.e., there is no GT in the monitoring group, then prompt user
GT number of the monitoring group is wrong, need to reset, return again to step 304 after setting.
Step 306: if GT number in all monitoring groups of setting is both greater than 0, looping to determine in each monitoring group
Whether the number of BGT is greater than 0, if it is greater than 0, enters step 308;Otherwise 307 are entered step.
Step 307: if the BGT in some monitoring group is equal to 0, i.e., there is no BGT in the monitoring group, then prompt user should
BGT number of monitoring group is wrong, need to reset, return again to step 306 after setting.
Step 308: if BGT number in all monitoring groups of setting is both greater than 0, traversing all monitoring groups, inquire
Whether there is unactivated Tracker in monitoring group, if there is unactivated Tracker, enters step 309;Otherwise it enters step
310。
Step 309: prompt, which logs in which monitoring group of the user of administrator's account, unactivated Tracker;
Step 310: generating guardian's account for each of all monitoring groups GT, and fence attribute is set
Information.
In this way, certain GT, which logs in guardian's account by APP, can check the place GT monitoring group after monitoring group is arranged successfully
In all Tracker real-time status.
Fig. 4 is the flow diagram for the embodiment that fence attribute information is arranged in the application, and the present embodiment is to guard mould
Formula is is illustrated for the monitoring mode of cloud, as shown in Figure 4, comprising:
Step 400: starting setting up the type of fence and the process of shape.
Optionally, the type of fence can be discrete type or polymerism;The shape of fence may include but not
It is limited to: rectangle, circle, irregular polygon.
Step 401: judging whether the number of GT in monitoring group is greater than or equal to 2, if it is carry out step 402 or step
403;If it is less than 2, then 402 are entered step.
Step 402: no matter whether the number of GT is greater than or equal to 2, and the type that fence can be arranged is discrete type,
404 are entered step later.
Step 403: only when the number of GT is greater than or equal to 2, the type that fence just can be set is aggretion type,
405 are entered step later.
Step 404: when the type of fence is discrete type, be the discrete fence setting in each monitoring group with
GT is the radii fixus (ZFR) of center of circle border circular areas.
Step 405: when the type of fence is aggretion type, judge GT number in monitoring group whether more than or equal to 3,
If yes then enter step 406 or step 407 or step 408;Otherwise, 406 are entered step.
Step 406: when the type of fence is aggretion type, no matter whether GT number is greater than or equal to 3, can set
The shape of fence is set as circle, enters step 409 later.
Step 407: when the type of fence is aggretion type, no matter whether GT number is greater than or equal to 3, can set
The shape for setting fence is rectangle, enters step 410 later.
Step 408:, just can be with only when the number of GT is greater than or equal to 3 when the type of fence is aggretion type
The shape that fence is arranged is irregular polygon, enters step 411 later.
Step 409: when the type of fence is aggretion type, and the shape of fence is round, according to each monitoring
The maximum radius (ZMAXR) and least radius (ZMINR) of Tracker number and arrangement mode the setting fence of group, later
Enter step 312.
Step 410: when the type of fence is aggretion type, and the shape of fence is rectangle, according to each monitoring
Maximum length (ZMAXL), the minimum length (ZMINL), maximum width of Tracker number and arrangement mode the setting fence of group
(ZMAXW) and minimum widith (ZMINW) are spent, enters step 412 later.
Step 411: when the type of fence is aggretion type, and the shape of fence is irregular polygon, according to
The maximum distance (ZMAXD) and minimum of each edge of Tracker number and arrangement mode the setting fence of each monitoring group
Distance (ZMIND), enters step 412 later.
Step 412: when fence type be aggretion type when, for monitoring group be arranged prewarning area radius (ZAR) i.e. with
GT is the radius of a small border circular areas in the center of circle.
Fig. 5 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application cloud, as shown in Figure 5, comprising:
Step 500: terminal user starts protected activity by administrator's account in APP.
In practical applications, for example start button can be set on APP, user login management person's account simultaneously clicks starting
After button, starting protected activity message can be sent to cloud server, cloud server stores all of current administrator's account
The role of Tracker is arranged and grouping, and unlatching is provided with the poll timer of polling cycle to trigger the monitoring side of the application
Method.
Step 501: Tracker of the cloud server into all monitoring groups sends protected activity and starts message, so that institute
There is the Tracker in monitoring group to enter the working condition of cloud monitoring mode.
Step 502: cloud server is every pre-set polling cycle, according to all in running order
Tracker's reports the location information for obtaining these Tracker.
Step 503: cloud server forms real-time electronic according to the location information that all GT are reported in each monitoring group and encloses
Column.
When the shape of fence is round, cloud server compares the location information that each GT is reported in monitoring group and passes through
Degree and latitude, select respectively latitude maximum value in the longitude minimum value and longitude maximum value and each latitude in each longitude and
Latitude minimum value;Cloud server is according to the seat of the coordinate of longitude minimum value and the coordinate of latitude minimum value and longitude maximum value
The center for the rectangle that mark and the coordinate of latitude maximum value are formed is as circular center, using the half of the long side of the rectangle as circle
Real-time electronic fence of one border circular areas of radius ZR dynamic formation of shape as the monitoring group;
When the shape of fence is rectangle, the position that all GT are reported in the more each monitoring group of cloud server is believed
The longitude and latitude of breath, according to the coordinate and latitude of the coordinate and longitude maximum value of the coordinate of longitude minimum value and latitude minimum value
The coordinate of maximum value, real-time electronic fence of one rectangular area of dynamic formation as the monitoring group, the real-time electronic fence
Length is ZL, width ZW;
When the shape of fence is irregular polygon, position that cloud server is reported according to GT each in monitoring group
Adjacent GT is separately connected one closed polygon region of dynamic formation as the real-time electronic of the monitoring group and enclosed by information
Column, the side length of each edge of the real-time electronic fence are ZDi。
And have in monitoring group 3 GT (number be respectively GTA, GTB and GTC) and 20 BGT (number respectively BGT1~
BGT20 for), rectangle, circle, irregular polygon and the discrete type real-time electronic fence formed according to this step is respectively as schemed
8, shown in Fig. 9, Figure 10 and Figure 11.As shown in Figure 8 to Figure 11, BGT all in the current monitoring group is in real-time electronic fence
In.The real-time monitoring interface of monitoring group where can only see the GT in the interface APP in guardian's account, in administrator's account
In the interface APP can see the real-time monitoring interfaces of all monitoring groups.It should be noted that can custodial care facility and/or by
The mark information of fence information and all custodial care facilities and the mark information by custodial care facility are shown on custodial care facility.
Step 504: whether the real-time electronic fence for looping to determine each monitoring group meets the requirements, if meeting the requirements into
Enter step 506;505 are entered step if it does not meet the requirements,.
When the type of fence is discrete type, step 504 is omitted.
When the type of fence is aggretion type, if the shape of fence is circle, by whether judging ZR
Judge whether real-time electronic fence meets the requirements within the scope of ZMINR and ZMAXR, if ZR is in ZMINR and ZMAXR range
It is interior, then show to meet the requirements, it is otherwise undesirable;If the shape of fence be rectangle, by judge ZL whether
Within the scope of ZMINL and ZMAXL and whether ZW within the scope of ZMINW and ZMAXW judges whether real-time electronic fence meets the requirements,
If ZL is within the scope of ZMINL and ZMAXL and ZW is within the scope of ZMINW and ZMAXW, shows to meet the requirements, otherwise not meet
It is required that;If the shape of fence is irregular polygon, by judging whether all GT connections constitute an envelope later
Closed region and each edge ZDiDistance whether judging whether real-time electronic fence meets within the scope of ZMIND and ZMAXD
It is required that if ZDiWithin the scope of ZMIND and ZMAXD, then showing to meet the requirements, it is otherwise undesirable.
It, can be by the frame of real-time electronic fence using eye-catching in practical application when real-time electronic fence is undesirable
Color such as red show, as shown in bold box in Figure 12, at this point, cloud server can be pushed away to all GT in the monitoring group
The alarm information of real-time electronic fence mistake is sent, to remind GT to readjust position.
Step 505: the cloud server GT all into the monitoring group pushes fence fault alarm message, to remind
GT readjusts position.
The guardian for wearing GT completes to adjust by voluntarily moving position.In practical application, the meeting after the foundation of monitoring group
Guardian's account is generated, guardian can log in guardian's account by APP and see current monitoring group by graphic interface
In all Tracker location status, in this way, guardian is easy to judge how itself carries out position adjustment according to interface.
Step 506: judging that BGT all in monitoring group whether in real-time electronic fence, if existed, returns to step
Rapid 502;If thering is BGT in real-time electronic fence, not enter step 507 in some monitoring group.
By taking rectangle real-time electronic fence shown in Fig. 8 as an example, when there is BGT outside fence, as shown in figure 13, it is assumed that
BGT19 is located at except real-time electronic fence, such as the BGT19 that diagonal line hatches are shown, can be mentioned with such as red in practical application
It wakes up, has BGT in electronics at this point, cloud server can be pushed to all GT (GTA, GTB and GTC in such as Figure 13) of the monitoring group
Warning message outside fence, and notify BGT number i.e. BGT19 and location information of the GT outside fence.
Step 507: judge all BGT outside fence whether where it each GT of monitoring group prewarning area
In, if it was not then entering step 508;Otherwise 509 are entered step.
Step 508: cloud server pushes BGT to all GT of monitoring group described in these BGT not in prewarning area
Warning message outside real-time electronic fence, and notify GT BGT number and location information outside real-time electronic fence, it returns later
Step 502.
Step 509: cloud server pushes early warning information to the corresponding GT of prewarning area where BGT, and the GT is reminded to pay attention to
BGT in prewarning area, later return step 502.
When having BGT outside fence but in the prewarning area of some GT, as shown in figure 14, BGT16 is real-time in rectangle
Except fence, but in the prewarning area of the GTC in the monitoring group, then, it can be using such as orange in practical application
To be labeled in the BGT16 in prewarning area.At this point, cloud server only pushes reminder message to GTC, it is pre- to remind GTC to pay attention to
BGT16 in police region domain.
Fig. 6 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application local, as shown in Figure 6, comprising:
Step 600: protected activity is started in APP by administrator's account.
Step 601: Tracker enters the working condition of local monitoring mode in monitoring group.
Into between the Tracker of working condition network, monitoring group can be constituted by communication module such as wireless communication module
In all BGT can be assigned to where each GT of monitoring group connect its hot spot such as Wifi hot spot as original state, each GT preservation
The BGT for connecting the BGT of its hot spot is numbered as initial BGT numbered list.
Step 602: polling cycle arrives, and the GT of all working state is connected certainly using itself as the tree-like traversal of root node respectively
All BGT of body.
Step 603: the GT of all working state more currently connects the BGT numbered list of the BGT of itself and has saved
BGT numbered list.
Whether step 604:GT judgement currently connects the BGT in the BGT numbered list of itself all in the BGT number that it is saved
In list, if all existed, return step 602;Otherwise 605 are entered step.
Step 605: if GT currently connects the BGT in the BGT numbered list of itself not entirely in the BGT number column that it is saved
In table, then successively other GT into same monitoring group belonging to its own send query messages to the GT.
And whether other GT can traverse the BGT numbered list of the BGT currently connected of itself, look at the BGT of inquiry at this
In a little BGT numbered lists, and query result message is returned to the GT for initiating inquiry.
Step 606: according to other GT return query result, judge initiate inquiry GT need inquire save BGT
Numbered list but the BGT numbered list that whether the BGT in the BGT numbered list currently connected does not connect currently in other GT
In, if entering step 607;If not, entering step 608.
Step 607:GT saves the BGT number currently connected, to update the BGT numbered list of the GT.
Step 608:GT issues warning message of the BGT outside real-time electronic fence.
Fig. 7 is the embodiment flow diagram that the application terminates protected activity, as shown in fig. 7, comprises:
Step 700: protected activity is terminated in APP by administrator's account.
In practical applications, for example conclusion button can be set on APP, the user for logging in administrator's account, which clicks, to terminate
After button, can send to cloud server terminates protected activity message, and cloud server closes poll timer.
Step 701: all in running order Tracker enter state of activation.
Step 702: the monitoring group and role's setting where the Tracker of all activated state are released, at this point, all monitoring
Person's account is automatically logged out.
Step 703: all Tracker are restored to sleep state.
The application also provides a kind of device for realizing monitoring, and Figure 15 is the composed structure schematic diagram of the application monitor device,
Comprise determining that unit, processing unit, wherein
Determination unit, for determining fence according to the information of multiple custodial care facilities;
Processing unit, for being guarded to multiple by custodial care facility according to determining fence.
Optionally, the application further includes Alarm Unit, for determining certain by custodial care facility not in the range of fence
It is interior, it is believed that this is in unsafe condition by custodial care facility, pushes this to each custodial care facility and is enclosed by custodial care facility in the electronics
The warning message of marge.
Optionally, Alarm Unit is also used to:
If it is determined that fence exceed the maximum allowable regional scope of pre-set fence, or pre-
Within the scope of the minimum allowable for the fence being first arranged, to the alarm information of custodial care facility push fence mistake.
Optionally, the application further includes display unit, for showing the mark of fence information and all custodial care facilities
Remember information and the mark information by custodial care facility.
Fence is the fence of a dynamic real-time change in the application, so that the application is completely suitable for pair
Continue the monitoring of custodial person on the move such as Tracker wearer at a distance;Moreover, the guardianship in the application includes more
A guardianship such as Tracker is realized and is carried out dynamic monitor for more guardianships such as Tracker in whole team, non-
Often it is suitble to the monitoring of such as large-scale more people's outdoor activities.In this way, the application, which has reached, is flexibly applied to various application scenarios
Purpose, realize the real monitoring to guardianship.
The above, preferred embodiments only of the invention, is not intended to limit the scope of the present invention.It is all this
Within the spirit and principle of invention, any modification, equivalent substitution, improvement and etc. done should be included in protection model of the invention
Within enclosing.
Claims (15)
1. a kind of monitoring method, comprising:
Fence is determined according to the information of multiple custodial care facilities;
It is guarded to multiple by custodial care facility according to determining fence.
2. monitoring method according to claim 1, wherein the information of custodial care facility includes: location information;The basis is more
The information of a custodial care facility determines fence, comprising:
The region that preset shape is determined according to the location information of each custodial care facility is the fence.
3. monitoring method according to claim 2, wherein the fence includes one or multiple.
4. monitoring method according to claim 3, wherein when the fence includes multiple, each described electricity
Sub- fence is determined according to the location information of one or more custodial care facilities.
5. monitoring method according to claim 1, wherein the information of custodial care facility includes: identification information;The basis is more
The information of a custodial care facility determines fence, comprising:
The mark of the monitored device communicated is established according to the identification information of each custodial care facility and with the custodial care facility
Information determines multiple fences.
6. monitoring method according to claim 4 or 5, when the monitored device is moved to from a fence
Another described fence;The method also includes:
Notify what custodial care facility and the monitored device where before the monitored device is mobile in fence were moved to
Custodial care facility in fence.
7. monitoring method according to claim 2, wherein the preset shape include: round, and/or rectangle, and/or
Polygon.
8. monitoring method according to claim 1, wherein it is described according to determining fence to multiple by custodial care facility
It is guarded, comprising:
According to each location information by custodial care facility, determine in the range of the fence by custodial care facility
It is safe.
9. monitoring method according to claim 8, if determining certain institute by the location information of custodial care facility according to described
It states by custodial care facility not in the range of the fence, then it is assumed that this is in unsafe condition, the side by custodial care facility
Method further include:
The warning message by custodial care facility outside the fence is pushed to each custodial care facility.
10. monitoring method according to claim 1, the method also includes:
Preset the maximum allowable regional scope and/or minimum allowable regional scope of the fence;
If the fence determined is beyond the maximum allowable regional scope or within the scope of minimum allowable, to institute
State the alarm information of custodial care facility push fence mistake.
11. monitoring method according to claim 10, wherein by the custodial care facility or by custodial care facility, input institute
State the maximum allowable regional scope and/or minimum allowable regional scope of fence.
12. monitoring method according to claim 1, the method also includes:
Shown in the custodial care facility and/or on custodial care facility the label of the fence information and all custodial care facilities
Information and mark information by custodial care facility.
13. described in any item monitoring methods according to claim 1~12, wherein the custodial care facility and described set by monitoring
Standby includes tracking class wearable device.
14. a kind of computer readable storage medium, is stored with computer executable instructions, the computer executable instructions are used for
Perform claim requires the described in any item monitoring methods of 1~claim 13.
15. a kind of electronic equipment for realizing monitoring, including processor, memory;Wherein, being stored on memory can be in processor
The computer program of upper operation: the step of requiring any one of 1~claim 13 monitoring method for perform claim.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210155489.4A CN114554404A (en) | 2018-09-19 | 2018-09-19 | Monitoring method, controller, electronic device and computer readable storage medium |
CN201811094072.1A CN109511089A (en) | 2018-09-19 | 2018-09-19 | A kind of monitoring method and device |
PCT/CN2019/106240 WO2020057512A1 (en) | 2018-09-19 | 2019-09-17 | Monitoring method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811094072.1A CN109511089A (en) | 2018-09-19 | 2018-09-19 | A kind of monitoring method and device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210155489.4A Division CN114554404A (en) | 2018-09-19 | 2018-09-19 | Monitoring method, controller, electronic device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109511089A true CN109511089A (en) | 2019-03-22 |
Family
ID=65745802
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210155489.4A Pending CN114554404A (en) | 2018-09-19 | 2018-09-19 | Monitoring method, controller, electronic device and computer readable storage medium |
CN201811094072.1A Pending CN109511089A (en) | 2018-09-19 | 2018-09-19 | A kind of monitoring method and device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210155489.4A Pending CN114554404A (en) | 2018-09-19 | 2018-09-19 | Monitoring method, controller, electronic device and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN114554404A (en) |
WO (1) | WO2020057512A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110580825A (en) * | 2019-08-02 | 2019-12-17 | 武汉新能源研究院有限公司 | Electric ship monitoring method and system |
CN110753302A (en) * | 2019-10-09 | 2020-02-04 | 中兴健康科技有限公司 | Path perception electronic fence system for back-and-forth monitoring of students |
WO2020057512A1 (en) * | 2018-09-19 | 2020-03-26 | 西安中兴新软件有限责任公司 | Monitoring method and device |
CN110930615A (en) * | 2019-12-03 | 2020-03-27 | 深圳市广联智通科技有限公司 | Position control method, position control device, computer equipment and storage medium |
CN110933602A (en) * | 2019-12-25 | 2020-03-27 | 北斗天地股份有限公司 | Method and device for setting electronic fence |
CN111107322A (en) * | 2019-12-27 | 2020-05-05 | 泰斗微电子科技有限公司 | Monitoring method, terminal group and storage medium based on electronic fence |
CN111935632A (en) * | 2020-08-14 | 2020-11-13 | 英华达(南京)科技有限公司 | Location tracking query system |
CN112288348A (en) * | 2020-09-10 | 2021-01-29 | 浙江省疾病预防控制中心 | Biological safety transfer supervision method and system |
CN113504789A (en) * | 2021-06-29 | 2021-10-15 | 北京微纳星空科技有限公司 | Out-of-bound alarm method and device for unmanned aerial vehicle, unmanned aerial vehicle and storage medium |
CN113784289A (en) * | 2021-07-21 | 2021-12-10 | 中南大学湘雅医院 | Hospital patient auxiliary nursing method |
CN115273391A (en) * | 2021-04-30 | 2022-11-01 | 深圳Tcl新技术有限公司 | Moving object detection method and device, electronic equipment and storage medium |
WO2023236584A1 (en) * | 2022-06-07 | 2023-12-14 | 中兴通讯股份有限公司 | Electronic fence setting method and apparatus, and computer-readable storage medium |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112218232B (en) * | 2020-09-02 | 2023-08-18 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for judging entrance and exit of electronic fence, storage medium and electronic equipment |
CN112752216B (en) * | 2020-12-23 | 2023-03-03 | 北京东土拓明科技有限公司 | Monitoring method and device based on electronic fence |
CN113093244B (en) * | 2021-03-30 | 2023-09-26 | 深圳前海微众银行股份有限公司 | Position monitoring method, device and storage medium |
CN113313620B (en) * | 2021-06-10 | 2023-04-18 | 平安国际智慧城市科技股份有限公司 | Method, device and equipment for detecting vehicle and storage medium |
CN113923436A (en) * | 2021-11-03 | 2022-01-11 | 国家能源集团华北电力有限公司廊坊热电厂 | Three-dimensional visual control system for thermal power plant |
CN117492408B (en) * | 2024-01-03 | 2024-04-02 | 建龙西林钢铁有限公司 | Electronic fence safety system based on PLC and image recognition and control method thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015077745A1 (en) * | 2013-11-25 | 2015-05-28 | Agco Corporation | Dynamic cooperative geofence |
CN104969219A (en) * | 2012-12-04 | 2015-10-07 | 电子湾有限公司 | Dynamic geofence based on members within |
CN106981167A (en) * | 2016-01-18 | 2017-07-25 | 昆山研达电脑科技有限公司 | Hand-held device and tracking monitoring method with fence function |
GB201710789D0 (en) * | 2017-07-05 | 2017-08-16 | Wearable Link Ltd | Geofencing system |
CN107547585A (en) * | 2016-06-27 | 2018-01-05 | 电子科技大学中山学院 | Visual child anti-lost system |
CN108419210A (en) * | 2012-08-22 | 2018-08-17 | 电子湾有限公司 | The passive Dynamic Geographic fence of mobile device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8594921B2 (en) * | 2011-11-30 | 2013-11-26 | At&T Mobility Ii Llc | Comparison of multi-dimensional datasets |
CN114554404A (en) * | 2018-09-19 | 2022-05-27 | 西安中兴新软件有限责任公司 | Monitoring method, controller, electronic device and computer readable storage medium |
CN109979165B (en) * | 2019-03-28 | 2021-03-19 | 深圳市科迈爱康科技有限公司 | Positioning anti-lost method, device and system using electronic fence technology |
-
2018
- 2018-09-19 CN CN202210155489.4A patent/CN114554404A/en active Pending
- 2018-09-19 CN CN201811094072.1A patent/CN109511089A/en active Pending
-
2019
- 2019-09-17 WO PCT/CN2019/106240 patent/WO2020057512A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108419210A (en) * | 2012-08-22 | 2018-08-17 | 电子湾有限公司 | The passive Dynamic Geographic fence of mobile device |
CN104969219A (en) * | 2012-12-04 | 2015-10-07 | 电子湾有限公司 | Dynamic geofence based on members within |
WO2015077745A1 (en) * | 2013-11-25 | 2015-05-28 | Agco Corporation | Dynamic cooperative geofence |
CN106981167A (en) * | 2016-01-18 | 2017-07-25 | 昆山研达电脑科技有限公司 | Hand-held device and tracking monitoring method with fence function |
CN107547585A (en) * | 2016-06-27 | 2018-01-05 | 电子科技大学中山学院 | Visual child anti-lost system |
GB201710789D0 (en) * | 2017-07-05 | 2017-08-16 | Wearable Link Ltd | Geofencing system |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020057512A1 (en) * | 2018-09-19 | 2020-03-26 | 西安中兴新软件有限责任公司 | Monitoring method and device |
CN110580825A (en) * | 2019-08-02 | 2019-12-17 | 武汉新能源研究院有限公司 | Electric ship monitoring method and system |
CN110753302A (en) * | 2019-10-09 | 2020-02-04 | 中兴健康科技有限公司 | Path perception electronic fence system for back-and-forth monitoring of students |
CN110930615A (en) * | 2019-12-03 | 2020-03-27 | 深圳市广联智通科技有限公司 | Position control method, position control device, computer equipment and storage medium |
CN110933602A (en) * | 2019-12-25 | 2020-03-27 | 北斗天地股份有限公司 | Method and device for setting electronic fence |
CN111107322B (en) * | 2019-12-27 | 2021-07-13 | 泰斗微电子科技有限公司 | Monitoring method, terminal group and storage medium based on electronic fence |
CN111107322A (en) * | 2019-12-27 | 2020-05-05 | 泰斗微电子科技有限公司 | Monitoring method, terminal group and storage medium based on electronic fence |
CN111935632A (en) * | 2020-08-14 | 2020-11-13 | 英华达(南京)科技有限公司 | Location tracking query system |
CN111935632B (en) * | 2020-08-14 | 2024-02-27 | 英华达(南京)科技有限公司 | Position tracking and inquiring system |
CN112288348A (en) * | 2020-09-10 | 2021-01-29 | 浙江省疾病预防控制中心 | Biological safety transfer supervision method and system |
CN112288348B (en) * | 2020-09-10 | 2021-10-15 | 浙江省疾病预防控制中心 | Biological safety transfer supervision method and system |
CN115273391A (en) * | 2021-04-30 | 2022-11-01 | 深圳Tcl新技术有限公司 | Moving object detection method and device, electronic equipment and storage medium |
CN113504789A (en) * | 2021-06-29 | 2021-10-15 | 北京微纳星空科技有限公司 | Out-of-bound alarm method and device for unmanned aerial vehicle, unmanned aerial vehicle and storage medium |
CN113784289A (en) * | 2021-07-21 | 2021-12-10 | 中南大学湘雅医院 | Hospital patient auxiliary nursing method |
WO2023236584A1 (en) * | 2022-06-07 | 2023-12-14 | 中兴通讯股份有限公司 | Electronic fence setting method and apparatus, and computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2020057512A1 (en) | 2020-03-26 |
CN114554404A (en) | 2022-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109511089A (en) | A kind of monitoring method and device | |
US20220377505A1 (en) | Systems and methods for mobile tracking, communications and alerting | |
CN105228093B (en) | Intelligent mobile terminal managing and control system based on low-power consumption bluetooth | |
US11337074B2 (en) | Mobile device management method | |
US9621707B2 (en) | System and method for discouraging inappropriate use of a mobile device | |
US20150111523A1 (en) | Interactive emergency information and identification | |
DE102013014849A1 (en) | Location tag for tracking items tracking | |
US20060181411A1 (en) | System for, and method of, monitoring the movements of mobile items | |
CN104038952B (en) | The Forecasting Methodology and forecasting system of accident | |
CN103957322B (en) | The theft preventing method and mobile terminal of mobile terminal | |
CN101621816B (en) | System and method for monitoring background server of mobile terminal | |
CA2829329A1 (en) | System and apparatus for locating and surveillance of persons and/or surroundings | |
KR101584983B1 (en) | system, method, computer program and server for finding missing object based on beacon | |
Gómez et al. | A review on mobile applications for citizen emergency management | |
US20170148306A1 (en) | System and method for processing emergency alerts and responses | |
US20200015040A1 (en) | Location-based wireless tracking | |
CN103891257B (en) | For monitoring the central processing unit of at least one sensor | |
CN105847561A (en) | Environmental monitoring method, device and handset | |
CN107784810A (en) | The method of air defence warning ring | |
CN108834040A (en) | A kind of attendance information based reminding method and its equipment | |
CN106022572A (en) | Visualization method and apparatus for emergency event processing state | |
Mythili et al. | A comparative study of smart phone emergency applications for disaster management | |
CN110933602A (en) | Method and device for setting electronic fence | |
WO2006011162A1 (en) | Disaster management system using wireless technology and/or internet | |
CN113612887B (en) | Management and control system and method for managing mobile terminal based on family and school together |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190322 |