CN109511089A - A kind of monitoring method and device - Google Patents

A kind of monitoring method and device Download PDF

Info

Publication number
CN109511089A
CN109511089A CN201811094072.1A CN201811094072A CN109511089A CN 109511089 A CN109511089 A CN 109511089A CN 201811094072 A CN201811094072 A CN 201811094072A CN 109511089 A CN109511089 A CN 109511089A
Authority
CN
China
Prior art keywords
fence
custodial care
care facility
monitoring
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811094072.1A
Other languages
Chinese (zh)
Inventor
任中杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Zhongxing New Software Co Ltd
Original Assignee
Xian Zhongxing New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Zhongxing New Software Co Ltd filed Critical Xian Zhongxing New Software Co Ltd
Priority to CN202210155489.4A priority Critical patent/CN114554404A/en
Priority to CN201811094072.1A priority patent/CN109511089A/en
Publication of CN109511089A publication Critical patent/CN109511089A/en
Priority to PCT/CN2019/106240 priority patent/WO2020057512A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

This application discloses a kind of monitoring method and devices, this method comprises: determining fence according to the information of multiple custodial care facilities;It is guarded to multiple by custodial care facility according to determining fence.

Description

A kind of monitoring method and device
Technical field
This application involves but be not limited to instant messaging, espespecially a kind of monitoring method and device.
Background technique
Wearable device is often referred to directly wear, or the one kind being integrated on the clothes or accessory of user is portable Equipment.Wearable device is not only a kind of hardware device, can more pass through software support and data interaction, cloud interaction etc. To realize powerful function.
With the rapid development of mobile Internet with the raising of people's quality of life, based on global positioning system (GPS, Global Positioning System) positioning, application program of mobile phone (APP) and cloud server custodial care facility got over To be more widely used in people's lives.
Summary of the invention
The application provides a kind of monitoring method and device, can flexibly be applicable in application scenarios, realizes to the true of guardianship Positive monitoring.
This application provides a kind of monitoring methods, comprising:
Fence is determined according to the information of multiple custodial care facilities;
It is guarded to multiple by custodial care facility according to determining fence.
Present invention also provides a kind of computer readable storage mediums, are stored with computer executable instructions, the calculating Machine executable instruction is for executing monitoring method described in any of the above embodiments.
The application provides a kind of electronic equipment for realizing monitoring, including processor, memory again;Wherein, on memory It is stored with the computer program that can be run on a processor: for the step of executing any of the above-described monitoring method.
Technical scheme includes at least: determining fence according to the information of multiple custodial care facilities;According to determining Fence is guarded to multiple by custodial care facility.Fence is that the electronics of a dynamic real-time change encloses in the application Column, so that the application is completely suitable for the monitoring to custodial person on the move is continued at a distance;Moreover, the monitoring in the application Object includes multiple guardianships, realize in whole team more guardianships carry out dynamic monitor, be very suitable to as The monitoring of large-scale more people's outdoor activities etc..In this way, the application has achieved the purpose that be flexibly applied to various application scenarios, real The real monitoring to monitored object is showed.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by specification, right Specifically noted structure is achieved and obtained in claim and attached drawing.
Detailed description of the invention
Attached drawing is used to provide to further understand technical scheme, and constitutes part of specification, with this The embodiment of application is used to explain the technical solution of the application together, does not constitute the limitation to technical scheme.
Fig. 1 is the flow chart of the application monitoring method;
Fig. 2 is the flow chart of the embodiment of the application monitoring method;
Fig. 3 is the flow diagram for the embodiment that the application configures monitoring group;
Fig. 4 is the flow diagram for the embodiment that fence attribute information is arranged in the application;
Fig. 5 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application cloud;
Fig. 6 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application local;
Fig. 7 is the embodiment flow diagram that the application terminates protected activity;
Fig. 8 is the schematic diagram that the application guards the rectangle real-time electronic fence embodiment that interface A PP is shown;
Fig. 9 is the schematic diagram that the application guards the round real-time electronic fence embodiment that interface A PP is shown;
Figure 10 is the schematic diagram that the application guards the irregular polygon real-time electronic fence embodiment that interface A PP is shown;
Figure 11 is the schematic diagram that the application guards the discrete type real-time electronic fence embodiment that interface A PP is shown;
Figure 12 is the schematic diagram that the application guards the undesirable embodiment of real-time electronic fence that interface A PP is shown;
Figure 13 the application guards the schematic diagram for BGT embodiment outside fence that interface A PP is shown;
Figure 14 is that the BGT that the application monitoring interface A PP is shown is implemented except real-time electronic fence but in prewarning area The schematic diagram of example;
Figure 15 is the composed structure schematic diagram of the application monitor device.
Specific embodiment
For the purposes, technical schemes and advantages of the application are more clearly understood, below in conjunction with attached drawing to the application Embodiment be described in detail.It should be noted that in the absence of conflict, in the embodiment and embodiment in the application Feature can mutual any combination.
Custodial care facility and by custodial care facility include at least have subscriber identity module (SIM, Subscriber Identity Module) card and wireless module, in this way, custodial care facility and by the accessible wireless network of custodial care facility, and can be according to prison It protects equipment and its location information is oriented by the identity information of custodial care facility.In order to which the monitoring to guardianship is better achieved, The application proposes a kind of monitoring method and monitor device, can flexibly be applicable in various application scenarios, to realize to guardianship Real monitoring.
Fig. 1 is the flow chart of the application monitoring method, as shown in Figure 1, comprising:
Step 100: fence is determined according to the information of multiple custodial care facilities.
Optionally, if the information of custodial care facility includes: location information, according to multiple custodial care facilities in this step Information determine fence, comprising:
The region that preset shape is determined according to the location information of each custodial care facility is fence.
In a kind of illustrative examples, preset shape includes but is not limited to: round, and/or rectangle, and/or polygon.
In a kind of illustrative examples, fence includes one.
In a kind of illustrative examples, fence includes multiple.
In a kind of illustrative examples, when fence includes multiple, each fence can according to one or The location informations of multiple custodial care facilities determines.
Optionally, if the information of custodial care facility includes: identification information, according to multiple custodial care facilities in this step Information determine fence, comprising:
The monitored device communicated is established according to the identification information of each custodial care facility and with the custodial care facility respectively Identification information determines multiple fences.
In a kind of illustrative examples, identification information can include but is not limited to such as number, device identification information.
In a kind of illustrative example, custodial care facility and by can be close by bluetooth, Wifi hot spot etc. between custodial care facility Distance communication mode establishes communication to each other.
Further, when monitored device is moved to another fence from a fence;Further include:
The electricity that custodial care facility and the monitored device into the mobile preceding place fence of monitored device are moved to Custodial care facility in sub- fence sends notice.
Step 101: being guarded to multiple by custodial care facility according to determining fence.
Optionally, this step includes:
According to each location information by custodial care facility, determine in the range of the fence by custodial care facility It is safe.
In a kind of illustrative examples, if determining that certain is not existed by custodial care facility according to by the location information of custodial care facility In the range of the fence, then it is assumed that this is in unsafe condition by custodial care facility, the method also includes:
The warning message by custodial care facility outside the fence is pushed to each custodial care facility.
In a kind of illustrative examples, the application monitoring method further include:
Preset the maximum allowable regional scope and/or minimum allowable regional scope of the fence;
If it is determined that fence beyond maximum allowable regional scope or within the scope of minimum allowable, then set to monitoring The alarm information of standby push fence mistake.
, can be by custodial care facility or by custodial care facility in a kind of illustrative examples, the maximum for inputting fence permits Perhaps regional scope and/or minimum allowable regional scope.
In a kind of illustrative examples, the application monitoring method further include:
Shown in custodial care facility and/or on custodial care facility the mark information of fence information and all custodial care facilities With by the mark information of custodial care facility.
In a kind of illustrative examples, the mark information of custodial care facility and can be identical by the mark information of custodial care facility, It can also be different.Mark information may include such as: pore, person of low position.
In a kind of illustrative examples, custodial care facility in the application and by custodial care facility include but is not limited to track class can Wearable device.
Fence in the application monitoring method is the fence of a dynamic real-time change, so that the application is complete The full monitoring being suitable for custodial person on the move is continued at a distance;Moreover, the guardianship in the application includes multiple prisons Object is protected, realizes and carries out dynamic monitor for more guardianships in whole team.It is particularly suited for as large-scale more people are outgoing The monitoring of activity etc..
With the rapid development of mobile Internet with the raising of people's quality of life, based on global positioning system (GPS, Global Positioning System) positioning, application program of mobile phone (APP) and cloud server tracking class wearable set Standby (referred to herein as Tracker) has been more and more widely used in people's lives.By the way that in tracking, class is wearable sets Standby middle addition subscriber identity module (SIM, Subscriber Identity Module) card and wireless module, Tracker Access wireless network.Tracker is also increasingly by the favor of operator.
Currently, the application of Tracker is usually that static electronic fence is arranged for single Tracker to realize to this What Tracker was guarded.Wherein, static electronic fence is the region of a pre-set fixation, and is for single Tracker is respectively arranged, and Tracker wearer can only be movable in this area, is no longer supervised once leaving this region It protects, can not be suitable for continuing at a distance the monitoring of Tracker wearer on the move.In other words, Tracker application not Flexibly, the scene used is also very limited, to be extremely difficult to wearer's really monitoring effect to Tracker is worn.
The present inventors have noted that currently, can all be brought to organizer in the large-scale more people's outdoor activities of tissue very big Pressure, such as travelling Youth League organization tourist go on a tour, and especially school or kindergarten organize the student carry out outdoor activity, in order to guarantee to learn Raw safety usually can allow teachers worn out mentally and physically.Even if all wearing Tracker to each member in team, also only The single member in team can be guarded respectively in a pre-set static electronic fence.That is, cannot Dynamic monitor is carried out for more Tracker in whole team, can not be suitable for as a whole setting multiple Tracker The scene of fence is set, can not be suitable for continuing at a distance the monitoring of Tracker wearer on the move.
In order to describe displaying, hereafter by custodial care facility and by custodial care facility be Tracker for the application monitoring side The specific implementation of method is described in detail.In order to which the wearer i.e. monitoring of guardianship to Tracker is worn is better achieved, It is described in detail below with reference to the monitoring method of the application.
Fig. 2 is the flow chart of the embodiment for the method that the application realizes monitoring, in the present embodiment, with custodial care facility and is supervised Shield equipment is described for constituting a monitoring group, as shown in Figure 2, comprising:
Step 200: according to pre-set trigger condition, according to the information of custodial care facility in monitoring group and pre-set Fence attribute information determines real-time electronic fence.
Optionally, trigger condition can be pre-set polling cycle, such as: 10 seconds etc.;Trigger condition is also possible to Random demand, for example click pre-set " starting to guard " key, icon or menu etc..
Before this step further include: configuration monitoring group.It specifically includes:
Role is distributed for each Tracker, i.e., set monitoring Tracker (GT) for each Tracker or is guarded Tracker(BGT);
According to the Tracker for setting role, monitoring group is set.It may include multiple GT in one monitoring group and multiple BGT, under normal circumstances, the number of BGT are much larger than the number of GT.
It is realized by step 200 and fence is determined according to the information of multiple custodial care facilities.
Optionally, monitoring group may include one or more.
After having configured monitoring group, the configuration information of monitoring group is included at least: the mark for the GT that monitoring group mark, monitoring group include Mark, the number of GT, the number of BGT of BGT etc. that knowledge, monitoring group include.
Wherein, the BGT where GT plays the role of to it in monitoring group in monitoring group is guarded;BGT is then by it The monitoring of GT in place monitoring group.Several Tracker that monitoring group includes are worn by the different members in monitoring group respectively, So, in monitoring group, the member for wearing the Tracker that role is guardian is guardian, and wearing role is custodial person's The member of Tracker is custodial person.
As long as it should be noted that wear show Tracker together with some member in monitoring group, not Restriction have to for Tracker to be worn over, on clothes etc., for example Tracker is bracelet.
In the embodiment of the present application, there are three kinds of states by Tracker: sleep state, state of activation and working condition.It is all Tracker original state is sleep state;The Tracker for setting role enters state of activation;After protected activity starts, monitoring The Tracker being activated in group enters working condition;After protected activity terminates and releases Tracker setting, Tracker is automatic Revert to sleep state.Distinction cue can be arranged to three kinds of states on Tracker, such as: pass through the instruction of different colours Lamp distinguishes different states etc..
Before this step further include: the monitoring mode of setting monitoring group.Monitoring mode includes: cloud monitoring mode or local Monitoring mode.
When monitoring group is set as cloud monitoring mode, before this step further include: for monitoring group, fence is set Type, and corresponding fence attribute information is set.
Cloud monitoring mode refers to: module communicate in fact with cloud (such as Cloud Server) Tracker by wireless communication Now guard, in this way, Tracker can receive the instruction from cloud and send cloud for the relevant information of itself, by with Monitoring is realized in the interaction in cloud.
Optionally, when the type of fence is set as discrete type, fence includes being with GT each in monitoring group Several border circular areas of the separation in the center of circle, corresponding fence attribute information include: the discrete border circular areas of corresponding each GT Radii fixus (ZFR).
Optionally, when the type of fence is set as polymerism, the shape of fence includes but is not limited to: square Shape, circle, irregular polygon etc..Specifically,
When GT number >=2 when, if fence is shaped to rectangle, corresponding fence attribute information includes: most Long length (ZMAXL), minimum length (ZMINL), maximum width (ZMAXW) and minimum widith (ZMINW);If fence shape It is provided in round, corresponding fence attribute information includes: maximum radius (ZMAXR) and least radius (ZMINR);
When GT number >=3 when, if fence is shaped to irregular polygon, corresponding fence attribute letter Breath includes: the maximum distance (ZMAXD) and minimum range (ZMIND) between any two GT.
Further, when the type of fence is set as polymerism, prewarning area can be further set, accordingly Fence attribute information further include: using each GT as the radius (ZAR) of a small border circular areas in the center of circle.
It should be noted that above-mentioned fence attribute information can be according to the number of the BGT in monitoring group and arrangement side Formula is arranged, and in actual use, as long as Tracker number meets above-mentioned condition, user can be by APP according to self-demand The desired fence pattern of selection is simultaneously configured.Specific setting can adjust according to the actual situation, for art technology For personnel, it is readily apparent which is not described herein again based on method provided by the present application.
When monitoring group is set as local monitoring mode, before this step further include: for monitoring group, fence category is set Property information.
Local monitoring mode refers to: constituting network by communication module such as wireless communication module between Tracker, and at this The monitoring of ground network implementations.Such as with Wifi hot spot building network etc., at this point, all Tracker in monitoring group can not only be used for Wifi hot spot also can be used as Wifi terminal, and each Tracker can connect the Wifi of any one Tracker in same monitoring group Hot spot.Correspondingly, fence attribute information includes: the BGT numbered list for being connected to the BGT of each GT itself in monitoring group.
Such as: it include 20 two guardians of GTA and GTB, BGT1~BGT20 custodial persons in some monitoring group, and The Wifi hot spot of BGT1~BGT10 connection GTA, the Wifi hot spot of BGT11~BGT20 connection GTB, then, the original state of GTA BGT numbered list, that is, GTA fence attribute information include: BGT1, BGT2, BGT3, BGT4, BGT5, BGT6, BGT7, BGT8,BGT9,BGT10;BGT numbered list, that is, GTB fence attribute information of the original state of GTB include: BGT11, BGT12、BGT13、BGT14、BGT15、BGT16、BGT17、BGT18、BGT19、BGT20。
Optionally, the case where being cloud monitoring mode for the monitoring mode of monitoring group, in step 200 according to monitoring group The information of middle guardian and pre-set fence attribute information determine real-time electronic fence, comprising:
By in running order Tracker according to pre-set trigger condition such as every a polling cycle (such as: Be set as 10s) report, cloud server obtain Tracker itself location information;
Cloud server according to the location information of the guardian of acquisition be used as GT Tracker location information and in advance The fence attribute information of setting determines real-time electronic fence.
The information of custodial care facility may include location information;Correspondingly, determine that fence includes: according to each custodial care facility Location information determine preset shape region be the fence.Optionally, preset shape includes but is not limited to: round, And/or rectangle, and/or polygon etc..It is described in detail below with reference to monitoring group scene.
Optionally, when fence is aggretion type, cloud server is according to the location information of Tracker and presets Fence attribute information determine that real-time electronic fence includes:
If fence is shaped to rectangle, cloud server compares each GT is reported in monitoring group location information i.e. Longitude and latitude select the latitude maximum value in the longitude minimum value and longitude maximum value and each latitude in each longitude respectively With latitude minimum value;Cloud server is according to the coordinate of longitude minimum value and the coordinate of latitude minimum value and longitude maximum value Coordinate and the coordinate of latitude maximum value form rectangular area;It is enclosed the rectangular area of formation as the real-time electronic of the monitoring group Column.
The length of the real-time electronic fence of formation is ZL, width ZW, wherein according to fence attribute information, ZL and ZW should meet: ZMAXL > ZL > ZMINL, ZMAXW > ZW > ZMINW.
Optionally, if ZL>ZMAXL or ZL<ZMINL, alternatively, ZW>ZMAXW or ZW<ZMINW, then, cloud server All GTs of the meeting into the monitoring group push fence fault alarm message, and notice GT adjusts self-position.GT has notice , the guardian for wearing GT completes to adjust by voluntarily moving position.In practical application, prison can be generated after the foundation of monitoring group Shield person's account, guardian can log in guardian's account by APP and see in current monitoring group owning by graphic interface The location status of Tracker, in this way, guardian according to interface be easy to judge itself how to carry out position adjustment with meet ZL and The size requirements of ZW.
If real-time electronic fence is shaped to circle, cloud server compares the position letter that each GT is reported in monitoring group Breath is longitude and latitude, selects latitude in the longitude minimum value and longitude maximum value and each latitude in each longitude respectively most Big value and latitude minimum value;Cloud server is maximum according to the coordinate of longitude minimum value and the coordinate and longitude of latitude minimum value The center for the rectangle that the coordinate of value and the coordinate of latitude maximum value are formed is as circular center, with the half of the long side of the rectangle Border circular areas is formed as circular radius ZR;Using the border circular areas of formation as the real-time electronic fence of the monitoring group.
According to fence attribute information, the radius of the real-time electronic fence of formation is that ZR should meet: ZMAXR > ZR > ZMINR。
Optionally, if ZR>ZMAXR or ZR<ZMINR, cloud server can push electricity to all GT in the monitoring group Sub- fence fault alarm message, notice GT adjust position.What GT had notice, the guardian for wearing GT is by voluntarily moving position To complete to adjust.In practical application, guardian's account can be generated after the foundation of monitoring group, guardian can log in prison by APP Shield person's account and the location status that all Tracker in current monitoring group are seen by graphic interface, in this way, guardian according to Interface is easy to judge itself how to carry out size requirements of the position adjustment to meet ZR.
If real-time electronic fence is shaped to irregular polygon, cloud server is reported according to GT each in monitoring group Location information, adjacent GT is separately connected and forms closed polygon;Using the polygon of formation as the monitoring group Real-time electronic fence.
According to fence attribute information, the side length ZD of each edge of the real-time electronic fence of formationiShould it meet: ZMAXD>ZDi>ZMIND.Wherein, i indicates the quantity on the side of polygon.
Optionally, if the length ZD on each side of polygoniThe case where in the presence of being greater than ZMAXD or being less than ZMIND, or A closed area (such as all stations GT are on one wire) can not be constituted after all GT connections, cloud server can be to the monitoring All GT in group push fence fault alarm message, and notice GT adjusts position.What GT had notice, wear the monitoring of GT Person completes to adjust by voluntarily moving position.In practical application, guardian's account, guardian can be generated after the foundation of monitoring group Guardian's account can be logged in by APP and the position shape of all Tracker in current monitoring group is seen by graphic interface State, in this way, guardian is easy to judge itself how to carry out position adjustment according to interface to meet ZDiSize requirements.
Optionally, when fence is discrete type, cloud server is according to the location information of Tracker and presets Fence attribute information determine that real-time electronic fence includes:
The location information that cloud server is reported according to GT each in monitoring group, using the position of each GT as the center of circle, radius is Radii fixus (ZFR) in fence attribute information, is respectively formed multiple border circular areas;
Using multiple border circular areas of formation as the real-time electronic fence of the monitoring group.
When fence includes multiple, each fence is true according to the location information of one or more custodial care facilities It is fixed.
The information of custodial care facility is also possible to include identification information;Correspondingly, determine that fence includes:
The mark of the monitored device communicated is established according to the identification information of each custodial care facility and with the custodial care facility Information determines multiple fences.It is described in detail below with reference to monitoring group scene.
Optionally, the case where being local monitoring mode for the monitoring mode of monitoring group, in step 200 according to monitoring group The information of middle guardian and pre-set fence attribute information determine real-time electronic fence, comprising:
Each GT in monitoring group is numbered using itself as the BGT of all BGT of the tree-like traversal connection itself of root node, is formed BGT numbered list as real-time electronic fence.
Such as: the BGT being presently attached on the Wifi hot spot of GTA includes: BGT1, BGT2 and BGT3, is connected to BGT1's BGT on Wifi hot spot includes BGT4 and BGT5, and the BGT being connected on the Wifi hot spot of BGT4 includes BGT6, then, currently connect Connect the i.e. GTA of BGT numbered list on the Wifi hot spot of GTA real-time electronic fence include: BGT1, BGT2, BGT3, BGT4, BGT5 and BGT6.
Optionally, when monitored device is moved to another fence from a fence;Further include:
The electronics that custodial care facility and monitored device where before notice monitored device is mobile in fence are moved to Custodial care facility in fence.
Step 201: according to determining fence to being guarded by custodial care facility in monitoring group.
It is realized by this step and is guarded to multiple by custodial care facility according to determining fence, comprising:
According to each location information by custodial care facility, determine that in the range of fence be peace by custodial care facility Complete.
Optionally, if determining certain by custodial care facility not in the fence according to by the location information of custodial care facility In the range of, then it is assumed that this is in unsafe condition by custodial care facility, further includes:
The warning message by custodial care facility outside the fence is pushed to each custodial care facility.
It is described in detail below with reference to the different situations in monitoring group.
Optionally, for the monitoring mode of monitoring group be cloud monitoring mode the case where, no matter fence type is poly- Conjunction property is still discrete type, this step includes:
For each custodial person in monitoring group, cloud server is according to the position of the custodial person in the monitoring group of acquisition Location information of the confidence breath i.e. as the Tracker of BGT, judges whether the BGT is in the model for the real-time electronic fence determined In enclosing, if in the range of the real-time electronic fence determined, then it is assumed that the custodial person is safe;If not true In the range of the real-time electronic fence made, then it is assumed that the custodial person is in unsafe condition, and cloud server is to monitoring group In warning message of all GT push BGT outside real-time electronic fence, and send the volume of the not BGT in real-time electronic fence Number and location information.
Optionally, when fence type is discrete type, this step further include:
When BGT is not in real-time electronic fence, but when in the prewarning area of some GT, cloud server only notifies the GT To pay attention to the BGT in prewarning area.
That is to say, for the case where fence type is discrete type, only when BGT is neither in real-time electronic fence, When also not in the prewarning area of some GT, all GT push BGTs of the cloud server into monitoring group where the BGT are in reality When fence outside warning message, and send the number and location information of the not BGT in real-time electronic fence.
Optionally, the case where being local monitoring mode for the monitoring mode of monitoring group, this step includes:
GT in monitoring group compares the real-time electronic fence information and fence attribute information of itself formation, judges electronics Whether the BGT number saved in fence attribute information showed the BGT numbered list currently connected in real-time electronic fence In exist;
If there is the BGT number being not present, then other GTs transmission inquiry of the GT successively into monitoring group where itself disappears Breath, with inquire not the BGT in the BGT numbered list that the GT is currently connected itself whether currently connecting in other GT In BGT numbered list, if the BGT shows not in the BGT numbered list of other GT currently connected in fence attribute The BGT in information number corresponding custodial person be it is safe, then the GT update itself preservation BGT numbered list, if The BGT shows that the BGT not in fence attribute information is compiled not in the BGT numbered list of other GT currently connected Number corresponding custodial person is in unsafe condition, then issues alarm signal.
Fence is the fence of a dynamic real-time change in the embodiment of the present application, so that the application is completely suitable For the monitoring to custodial person on the move such as Tracker wearer is continued at a distance;Moreover, the guardianship in the application Including multiple guardianships such as Tracker, realizes and carry out dynamic prison for more guardianships such as Tracker in whole team Shield is very suitable to the monitoring of such as large-scale more people's outdoor activities.In this way, the application, which has reached, is flexibly applied to various applications The purpose of scene realizes the real monitoring to guardianship.
In a kind of illustrative examples, the application method be can further include:
Preset the maximum allowable regional scope and/or minimum allowable regional scope of the fence;
If the fence determined in step 200 is beyond the maximum allowable regional scope or in minimum allowable range It is interior, then to the alarm information of custodial care facility push fence mistake.
, can be by custodial care facility or by custodial care facility in a kind of illustrative examples, the maximum for inputting fence permits Perhaps regional scope and/or minimum allowable regional scope.
Here by taking kindergarten organizes child to carry out outdoor activity to park as an example, according to monitoring side provided by the present application Method by custodial care facility or by custodial care facility, can input range that the boundary in entire park is constituted as fence most It is big to allow regional scope.As long as in this way, determining fence set in advance maximum fair by the information of multiple custodial care facilities Perhaps in regional scope, all it is allowed;As long as and monitored device is all safety in a wherein fence determined , moreover, in maximum allowable regional scope, when monitored device is moved to another fence from a fence When, also it is allowed, at this point, can be moved to custodial care facility of the monitored device before mobile in the fence of place and monitored device The custodial care facility moved in fence extremely sends notice.But if monitoring device walks out maximum allowable regional scope, that , determine that fence can then be set beyond maximum allowable regional scope to all monitoring by the information of multiple custodial care facilities The alarm information of standby push fence mistake, to further ensure that the monitoring device and follow the monitored of the monitoring device The safety of equipment.
When the method that monitoring terminates, and the application realizes monitoring further include:
All in running order Tracker enter state of activation;Release the monitoring of the Tracker of all activated state Group and role's setting, all guardian's accounts are automatically logged out at this time;All Tracker are restored to sleep state.
Optionally, two kinds of accounts: administrator's account and guardian's account can be set in the application;Administrator account can be with It logs in cloud server to be managed, guardian's account number can be logged on the GT that role is guardian and is managed.
By administrator's account, all guardianships such as Tracker and monitoring group can be managed;It is carried out in protected activity In can check the real-time status of guardianship such as Tracker in all monitoring groups;It, can will be more by APP in practical application A guardianship such as Tracker are added in administrator's account.
Guardian's account only just understands dynamic generation after having monitoring group to be arranged successfully, may only by guardian's account number Check the real-time status of all guardianships such as Tracker in monitoring group belonging to guardian's account number.When login guardian's account Number GT where monitoring group release setting after, guardian's account is automatically logged out.
It can be completed by manager's account number: the configuration of the monitoring group in the application, distribution, prison such as Tracker role The setting etc. of shield group;The setting of the monitoring mode of monitoring group in the application;It is to be set as cloud monitoring mode in the application Monitoring group setting fence type, and corresponding fence attribute information is set;End in the application, which is guarded, lives It is dynamic.
It can be completed by guardian's account number: be the monitoring group setting electronics for being set as cloud monitoring mode in the application The type of fence, and corresponding fence attribute information is set.
When the more Tracker protected activities of needs, such as: when kindergarten organizes child to carry out outdoor activity, pass through management Member's account carries out role's setting to all Tracker used, correspondence is respectively set according to the number of guardian and custodial person The GT and BGT of number.It is numbered for all GT and BGT setting, such as: GT number includes GTA, GTB...;BGT is numbered BGT1, BGT2... etc.;When Tracker after role is arranged successfully Tracker automatically into state of activation.Assuming that needing that N is arranged The Tracker being active, is assigned in each monitoring group that (unactivated Tracker cannot be assigned to by a monitoring group In monitoring group), the number of GT and BGT is both greater than 0 in each monitoring group, such as: in the Tracker of activation, there are 4 Tracker Role be arranged to GT, respectively GTA, GTB, GTC and GTD, there is the role of 40 Tracker to be arranged to BGT, number is BGT1~BGT40;If necessary to be arranged two monitoring groups, and BGT1~BGT20 is guarded by GTA and GTB, BGT21~BGT40 by GTC and GTD monitoring, then, by BGT1~BGT20, GTA and GTB, this 22 Tracker are arranged in a monitoring group, by BGT21 This 22 Tracker of~BGT40, GTC and GTD are arranged in another monitoring group.One is generated respectively for the GT in each monitoring group A guardian's account, wears GT to guardian, wears BGT to custodial person.
After starting protected activity in APP by administrator's account (protected activity can be respectively started for each monitoring group, Can also all monitoring groups be unified starts), the Tracker being active started in the monitoring group of protected activity enters work Make state.In practical applications, for example start button can be set on APP, user login management person's account simultaneously clicks starting After button, starting protected activity message can be sent to cloud server, cloud server stores all of current administrator's account The role of Tracker is arranged and grouping, and unlatching is provided with the poll timer of polling cycle to trigger the monitoring side of the application Method.
The monitoring mode of the settable each monitoring group of administrator's account, when GPS information can not obtain or cloud can not connect When, monitoring group also can be automatically into local monitoring mode, at this point, Tracker, which can issue information reminding user, carries out local mould Formula Initialize installation establishes fence attribute information.
After terminating protected activity in APP by administrator's account (protected activity can be terminated respectively for each monitoring group, Can also all monitoring groups uniformly terminate), terminate in running order Tracker in the monitoring group of protected activity automatically into Enter state of activation, monitoring group and role are arranged where cancelling all Tracker being active by administrator's account, then All Tracker are automatically restored to sleep state.In practical applications, for example conclusion button can be set on APP, log in pipe After the user of reason person's account clicks conclusion button, can send to cloud server terminates protected activity message, and cloud server closes Close poll timer.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored with computer executable instructions, described Computer executable instructions are for executing monitoring method described in any of the above embodiments.
The embodiment of the present invention also provides a kind of electronic equipment for realizing monitoring, including processor, memory;Wherein, it stores The computer program that can be run on a processor is stored on device: for the step of executing any of the above-described monitoring method.
Installing the APP for realizing monitoring in advance in different terminals, permission is different if login account difference, For example, the location status of Tracker in all monitoring groups can be seen by APP by logging in by administrator's account, and pass through monitoring Person's account logs in the location status that can only see Tracker in this monitoring group.The application is realized combined with specific embodiments below The method of monitoring is described in detail.
Fig. 3 is the flow diagram for the embodiment that the application configures monitoring group, as shown in Figure 3, comprising:
Step 300: by the Tracker in need being managed be added in administrator's account.All Tracker are initial For sleep state.
It may include multiple administrator's accounts in Cloud Server.It can be added in administrator's account such as 100 Tracker The Tracker for being managed, but using in protected activity may only have 50, other 50 Tracker not used Keep sleep state.
Step 301: by administrator's account, role is respectively set i.e. in the Tracker used to this all protected activity GT is set by several Tracker, several Tracker are set as BGT.
The GT and BGT of corresponding number are respectively set according to the number of guardian and custodial person.Tracker completes role Become state of activation after setting.
Step 302: several monitoring groups are set as needed.
Step 303: the Tracker being active being assigned in N number of monitoring group as needed.In each monitoring group Including several GT and several BGT.
Step 304: looping to determine whether GT number in each monitoring group is greater than 0, if it is greater than 0, enter step 306; Otherwise 305 are entered step.
Step 305: if GT number in some monitoring group is equal to 0, i.e., there is no GT in the monitoring group, then prompt user GT number of the monitoring group is wrong, need to reset, return again to step 304 after setting.
Step 306: if GT number in all monitoring groups of setting is both greater than 0, looping to determine in each monitoring group Whether the number of BGT is greater than 0, if it is greater than 0, enters step 308;Otherwise 307 are entered step.
Step 307: if the BGT in some monitoring group is equal to 0, i.e., there is no BGT in the monitoring group, then prompt user should BGT number of monitoring group is wrong, need to reset, return again to step 306 after setting.
Step 308: if BGT number in all monitoring groups of setting is both greater than 0, traversing all monitoring groups, inquire Whether there is unactivated Tracker in monitoring group, if there is unactivated Tracker, enters step 309;Otherwise it enters step 310。
Step 309: prompt, which logs in which monitoring group of the user of administrator's account, unactivated Tracker;
Step 310: generating guardian's account for each of all monitoring groups GT, and fence attribute is set Information.
In this way, certain GT, which logs in guardian's account by APP, can check the place GT monitoring group after monitoring group is arranged successfully In all Tracker real-time status.
Fig. 4 is the flow diagram for the embodiment that fence attribute information is arranged in the application, and the present embodiment is to guard mould Formula is is illustrated for the monitoring mode of cloud, as shown in Figure 4, comprising:
Step 400: starting setting up the type of fence and the process of shape.
Optionally, the type of fence can be discrete type or polymerism;The shape of fence may include but not It is limited to: rectangle, circle, irregular polygon.
Step 401: judging whether the number of GT in monitoring group is greater than or equal to 2, if it is carry out step 402 or step 403;If it is less than 2, then 402 are entered step.
Step 402: no matter whether the number of GT is greater than or equal to 2, and the type that fence can be arranged is discrete type, 404 are entered step later.
Step 403: only when the number of GT is greater than or equal to 2, the type that fence just can be set is aggretion type, 405 are entered step later.
Step 404: when the type of fence is discrete type, be the discrete fence setting in each monitoring group with GT is the radii fixus (ZFR) of center of circle border circular areas.
Step 405: when the type of fence is aggretion type, judge GT number in monitoring group whether more than or equal to 3, If yes then enter step 406 or step 407 or step 408;Otherwise, 406 are entered step.
Step 406: when the type of fence is aggretion type, no matter whether GT number is greater than or equal to 3, can set The shape of fence is set as circle, enters step 409 later.
Step 407: when the type of fence is aggretion type, no matter whether GT number is greater than or equal to 3, can set The shape for setting fence is rectangle, enters step 410 later.
Step 408:, just can be with only when the number of GT is greater than or equal to 3 when the type of fence is aggretion type The shape that fence is arranged is irregular polygon, enters step 411 later.
Step 409: when the type of fence is aggretion type, and the shape of fence is round, according to each monitoring The maximum radius (ZMAXR) and least radius (ZMINR) of Tracker number and arrangement mode the setting fence of group, later Enter step 312.
Step 410: when the type of fence is aggretion type, and the shape of fence is rectangle, according to each monitoring Maximum length (ZMAXL), the minimum length (ZMINL), maximum width of Tracker number and arrangement mode the setting fence of group (ZMAXW) and minimum widith (ZMINW) are spent, enters step 412 later.
Step 411: when the type of fence is aggretion type, and the shape of fence is irregular polygon, according to The maximum distance (ZMAXD) and minimum of each edge of Tracker number and arrangement mode the setting fence of each monitoring group Distance (ZMIND), enters step 412 later.
Step 412: when fence type be aggretion type when, for monitoring group be arranged prewarning area radius (ZAR) i.e. with GT is the radius of a small border circular areas in the center of circle.
Fig. 5 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application cloud, as shown in Figure 5, comprising:
Step 500: terminal user starts protected activity by administrator's account in APP.
In practical applications, for example start button can be set on APP, user login management person's account simultaneously clicks starting After button, starting protected activity message can be sent to cloud server, cloud server stores all of current administrator's account The role of Tracker is arranged and grouping, and unlatching is provided with the poll timer of polling cycle to trigger the monitoring side of the application Method.
Step 501: Tracker of the cloud server into all monitoring groups sends protected activity and starts message, so that institute There is the Tracker in monitoring group to enter the working condition of cloud monitoring mode.
Step 502: cloud server is every pre-set polling cycle, according to all in running order Tracker's reports the location information for obtaining these Tracker.
Step 503: cloud server forms real-time electronic according to the location information that all GT are reported in each monitoring group and encloses Column.
When the shape of fence is round, cloud server compares the location information that each GT is reported in monitoring group and passes through Degree and latitude, select respectively latitude maximum value in the longitude minimum value and longitude maximum value and each latitude in each longitude and Latitude minimum value;Cloud server is according to the seat of the coordinate of longitude minimum value and the coordinate of latitude minimum value and longitude maximum value The center for the rectangle that mark and the coordinate of latitude maximum value are formed is as circular center, using the half of the long side of the rectangle as circle Real-time electronic fence of one border circular areas of radius ZR dynamic formation of shape as the monitoring group;
When the shape of fence is rectangle, the position that all GT are reported in the more each monitoring group of cloud server is believed The longitude and latitude of breath, according to the coordinate and latitude of the coordinate and longitude maximum value of the coordinate of longitude minimum value and latitude minimum value The coordinate of maximum value, real-time electronic fence of one rectangular area of dynamic formation as the monitoring group, the real-time electronic fence Length is ZL, width ZW;
When the shape of fence is irregular polygon, position that cloud server is reported according to GT each in monitoring group Adjacent GT is separately connected one closed polygon region of dynamic formation as the real-time electronic of the monitoring group and enclosed by information Column, the side length of each edge of the real-time electronic fence are ZDi
And have in monitoring group 3 GT (number be respectively GTA, GTB and GTC) and 20 BGT (number respectively BGT1~ BGT20 for), rectangle, circle, irregular polygon and the discrete type real-time electronic fence formed according to this step is respectively as schemed 8, shown in Fig. 9, Figure 10 and Figure 11.As shown in Figure 8 to Figure 11, BGT all in the current monitoring group is in real-time electronic fence In.The real-time monitoring interface of monitoring group where can only see the GT in the interface APP in guardian's account, in administrator's account In the interface APP can see the real-time monitoring interfaces of all monitoring groups.It should be noted that can custodial care facility and/or by The mark information of fence information and all custodial care facilities and the mark information by custodial care facility are shown on custodial care facility.
Step 504: whether the real-time electronic fence for looping to determine each monitoring group meets the requirements, if meeting the requirements into Enter step 506;505 are entered step if it does not meet the requirements,.
When the type of fence is discrete type, step 504 is omitted.
When the type of fence is aggretion type, if the shape of fence is circle, by whether judging ZR Judge whether real-time electronic fence meets the requirements within the scope of ZMINR and ZMAXR, if ZR is in ZMINR and ZMAXR range It is interior, then show to meet the requirements, it is otherwise undesirable;If the shape of fence be rectangle, by judge ZL whether Within the scope of ZMINL and ZMAXL and whether ZW within the scope of ZMINW and ZMAXW judges whether real-time electronic fence meets the requirements, If ZL is within the scope of ZMINL and ZMAXL and ZW is within the scope of ZMINW and ZMAXW, shows to meet the requirements, otherwise not meet It is required that;If the shape of fence is irregular polygon, by judging whether all GT connections constitute an envelope later Closed region and each edge ZDiDistance whether judging whether real-time electronic fence meets within the scope of ZMIND and ZMAXD It is required that if ZDiWithin the scope of ZMIND and ZMAXD, then showing to meet the requirements, it is otherwise undesirable.
It, can be by the frame of real-time electronic fence using eye-catching in practical application when real-time electronic fence is undesirable Color such as red show, as shown in bold box in Figure 12, at this point, cloud server can be pushed away to all GT in the monitoring group The alarm information of real-time electronic fence mistake is sent, to remind GT to readjust position.
Step 505: the cloud server GT all into the monitoring group pushes fence fault alarm message, to remind GT readjusts position.
The guardian for wearing GT completes to adjust by voluntarily moving position.In practical application, the meeting after the foundation of monitoring group Guardian's account is generated, guardian can log in guardian's account by APP and see current monitoring group by graphic interface In all Tracker location status, in this way, guardian is easy to judge how itself carries out position adjustment according to interface.
Step 506: judging that BGT all in monitoring group whether in real-time electronic fence, if existed, returns to step Rapid 502;If thering is BGT in real-time electronic fence, not enter step 507 in some monitoring group.
By taking rectangle real-time electronic fence shown in Fig. 8 as an example, when there is BGT outside fence, as shown in figure 13, it is assumed that BGT19 is located at except real-time electronic fence, such as the BGT19 that diagonal line hatches are shown, can be mentioned with such as red in practical application It wakes up, has BGT in electronics at this point, cloud server can be pushed to all GT (GTA, GTB and GTC in such as Figure 13) of the monitoring group Warning message outside fence, and notify BGT number i.e. BGT19 and location information of the GT outside fence.
Step 507: judge all BGT outside fence whether where it each GT of monitoring group prewarning area In, if it was not then entering step 508;Otherwise 509 are entered step.
Step 508: cloud server pushes BGT to all GT of monitoring group described in these BGT not in prewarning area Warning message outside real-time electronic fence, and notify GT BGT number and location information outside real-time electronic fence, it returns later Step 502.
Step 509: cloud server pushes early warning information to the corresponding GT of prewarning area where BGT, and the GT is reminded to pay attention to BGT in prewarning area, later return step 502.
When having BGT outside fence but in the prewarning area of some GT, as shown in figure 14, BGT16 is real-time in rectangle Except fence, but in the prewarning area of the GTC in the monitoring group, then, it can be using such as orange in practical application To be labeled in the BGT16 in prewarning area.At this point, cloud server only pushes reminder message to GTC, it is pre- to remind GTC to pay attention to BGT16 in police region domain.
Fig. 6 is the embodiment flow diagram that monitoring is realized under the monitoring mode of the application local, as shown in Figure 6, comprising:
Step 600: protected activity is started in APP by administrator's account.
Step 601: Tracker enters the working condition of local monitoring mode in monitoring group.
Into between the Tracker of working condition network, monitoring group can be constituted by communication module such as wireless communication module In all BGT can be assigned to where each GT of monitoring group connect its hot spot such as Wifi hot spot as original state, each GT preservation The BGT for connecting the BGT of its hot spot is numbered as initial BGT numbered list.
Step 602: polling cycle arrives, and the GT of all working state is connected certainly using itself as the tree-like traversal of root node respectively All BGT of body.
Step 603: the GT of all working state more currently connects the BGT numbered list of the BGT of itself and has saved BGT numbered list.
Whether step 604:GT judgement currently connects the BGT in the BGT numbered list of itself all in the BGT number that it is saved In list, if all existed, return step 602;Otherwise 605 are entered step.
Step 605: if GT currently connects the BGT in the BGT numbered list of itself not entirely in the BGT number column that it is saved In table, then successively other GT into same monitoring group belonging to its own send query messages to the GT.
And whether other GT can traverse the BGT numbered list of the BGT currently connected of itself, look at the BGT of inquiry at this In a little BGT numbered lists, and query result message is returned to the GT for initiating inquiry.
Step 606: according to other GT return query result, judge initiate inquiry GT need inquire save BGT Numbered list but the BGT numbered list that whether the BGT in the BGT numbered list currently connected does not connect currently in other GT In, if entering step 607;If not, entering step 608.
Step 607:GT saves the BGT number currently connected, to update the BGT numbered list of the GT.
Step 608:GT issues warning message of the BGT outside real-time electronic fence.
Fig. 7 is the embodiment flow diagram that the application terminates protected activity, as shown in fig. 7, comprises:
Step 700: protected activity is terminated in APP by administrator's account.
In practical applications, for example conclusion button can be set on APP, the user for logging in administrator's account, which clicks, to terminate After button, can send to cloud server terminates protected activity message, and cloud server closes poll timer.
Step 701: all in running order Tracker enter state of activation.
Step 702: the monitoring group and role's setting where the Tracker of all activated state are released, at this point, all monitoring Person's account is automatically logged out.
Step 703: all Tracker are restored to sleep state.
The application also provides a kind of device for realizing monitoring, and Figure 15 is the composed structure schematic diagram of the application monitor device, Comprise determining that unit, processing unit, wherein
Determination unit, for determining fence according to the information of multiple custodial care facilities;
Processing unit, for being guarded to multiple by custodial care facility according to determining fence.
Optionally, the application further includes Alarm Unit, for determining certain by custodial care facility not in the range of fence It is interior, it is believed that this is in unsafe condition by custodial care facility, pushes this to each custodial care facility and is enclosed by custodial care facility in the electronics The warning message of marge.
Optionally, Alarm Unit is also used to:
If it is determined that fence exceed the maximum allowable regional scope of pre-set fence, or pre- Within the scope of the minimum allowable for the fence being first arranged, to the alarm information of custodial care facility push fence mistake.
Optionally, the application further includes display unit, for showing the mark of fence information and all custodial care facilities Remember information and the mark information by custodial care facility.
Fence is the fence of a dynamic real-time change in the application, so that the application is completely suitable for pair Continue the monitoring of custodial person on the move such as Tracker wearer at a distance;Moreover, the guardianship in the application includes more A guardianship such as Tracker is realized and is carried out dynamic monitor for more guardianships such as Tracker in whole team, non- Often it is suitble to the monitoring of such as large-scale more people's outdoor activities.In this way, the application, which has reached, is flexibly applied to various application scenarios Purpose, realize the real monitoring to guardianship.
The above, preferred embodiments only of the invention, is not intended to limit the scope of the present invention.It is all this Within the spirit and principle of invention, any modification, equivalent substitution, improvement and etc. done should be included in protection model of the invention Within enclosing.

Claims (15)

1. a kind of monitoring method, comprising:
Fence is determined according to the information of multiple custodial care facilities;
It is guarded to multiple by custodial care facility according to determining fence.
2. monitoring method according to claim 1, wherein the information of custodial care facility includes: location information;The basis is more The information of a custodial care facility determines fence, comprising:
The region that preset shape is determined according to the location information of each custodial care facility is the fence.
3. monitoring method according to claim 2, wherein the fence includes one or multiple.
4. monitoring method according to claim 3, wherein when the fence includes multiple, each described electricity Sub- fence is determined according to the location information of one or more custodial care facilities.
5. monitoring method according to claim 1, wherein the information of custodial care facility includes: identification information;The basis is more The information of a custodial care facility determines fence, comprising:
The mark of the monitored device communicated is established according to the identification information of each custodial care facility and with the custodial care facility Information determines multiple fences.
6. monitoring method according to claim 4 or 5, when the monitored device is moved to from a fence Another described fence;The method also includes:
Notify what custodial care facility and the monitored device where before the monitored device is mobile in fence were moved to Custodial care facility in fence.
7. monitoring method according to claim 2, wherein the preset shape include: round, and/or rectangle, and/or Polygon.
8. monitoring method according to claim 1, wherein it is described according to determining fence to multiple by custodial care facility It is guarded, comprising:
According to each location information by custodial care facility, determine in the range of the fence by custodial care facility It is safe.
9. monitoring method according to claim 8, if determining certain institute by the location information of custodial care facility according to described It states by custodial care facility not in the range of the fence, then it is assumed that this is in unsafe condition, the side by custodial care facility Method further include:
The warning message by custodial care facility outside the fence is pushed to each custodial care facility.
10. monitoring method according to claim 1, the method also includes:
Preset the maximum allowable regional scope and/or minimum allowable regional scope of the fence;
If the fence determined is beyond the maximum allowable regional scope or within the scope of minimum allowable, to institute State the alarm information of custodial care facility push fence mistake.
11. monitoring method according to claim 10, wherein by the custodial care facility or by custodial care facility, input institute State the maximum allowable regional scope and/or minimum allowable regional scope of fence.
12. monitoring method according to claim 1, the method also includes:
Shown in the custodial care facility and/or on custodial care facility the label of the fence information and all custodial care facilities Information and mark information by custodial care facility.
13. described in any item monitoring methods according to claim 1~12, wherein the custodial care facility and described set by monitoring Standby includes tracking class wearable device.
14. a kind of computer readable storage medium, is stored with computer executable instructions, the computer executable instructions are used for Perform claim requires the described in any item monitoring methods of 1~claim 13.
15. a kind of electronic equipment for realizing monitoring, including processor, memory;Wherein, being stored on memory can be in processor The computer program of upper operation: the step of requiring any one of 1~claim 13 monitoring method for perform claim.
CN201811094072.1A 2018-09-19 2018-09-19 A kind of monitoring method and device Pending CN109511089A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202210155489.4A CN114554404A (en) 2018-09-19 2018-09-19 Monitoring method, controller, electronic device and computer readable storage medium
CN201811094072.1A CN109511089A (en) 2018-09-19 2018-09-19 A kind of monitoring method and device
PCT/CN2019/106240 WO2020057512A1 (en) 2018-09-19 2019-09-17 Monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811094072.1A CN109511089A (en) 2018-09-19 2018-09-19 A kind of monitoring method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202210155489.4A Division CN114554404A (en) 2018-09-19 2018-09-19 Monitoring method, controller, electronic device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109511089A true CN109511089A (en) 2019-03-22

Family

ID=65745802

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202210155489.4A Pending CN114554404A (en) 2018-09-19 2018-09-19 Monitoring method, controller, electronic device and computer readable storage medium
CN201811094072.1A Pending CN109511089A (en) 2018-09-19 2018-09-19 A kind of monitoring method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202210155489.4A Pending CN114554404A (en) 2018-09-19 2018-09-19 Monitoring method, controller, electronic device and computer readable storage medium

Country Status (2)

Country Link
CN (2) CN114554404A (en)
WO (1) WO2020057512A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110580825A (en) * 2019-08-02 2019-12-17 武汉新能源研究院有限公司 Electric ship monitoring method and system
CN110753302A (en) * 2019-10-09 2020-02-04 中兴健康科技有限公司 Path perception electronic fence system for back-and-forth monitoring of students
WO2020057512A1 (en) * 2018-09-19 2020-03-26 西安中兴新软件有限责任公司 Monitoring method and device
CN110930615A (en) * 2019-12-03 2020-03-27 深圳市广联智通科技有限公司 Position control method, position control device, computer equipment and storage medium
CN110933602A (en) * 2019-12-25 2020-03-27 北斗天地股份有限公司 Method and device for setting electronic fence
CN111107322A (en) * 2019-12-27 2020-05-05 泰斗微电子科技有限公司 Monitoring method, terminal group and storage medium based on electronic fence
CN111935632A (en) * 2020-08-14 2020-11-13 英华达(南京)科技有限公司 Location tracking query system
CN112288348A (en) * 2020-09-10 2021-01-29 浙江省疾病预防控制中心 Biological safety transfer supervision method and system
CN113504789A (en) * 2021-06-29 2021-10-15 北京微纳星空科技有限公司 Out-of-bound alarm method and device for unmanned aerial vehicle, unmanned aerial vehicle and storage medium
CN113784289A (en) * 2021-07-21 2021-12-10 中南大学湘雅医院 Hospital patient auxiliary nursing method
CN115273391A (en) * 2021-04-30 2022-11-01 深圳Tcl新技术有限公司 Moving object detection method and device, electronic equipment and storage medium
WO2023236584A1 (en) * 2022-06-07 2023-12-14 中兴通讯股份有限公司 Electronic fence setting method and apparatus, and computer-readable storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112218232B (en) * 2020-09-02 2023-08-18 宇龙计算机通信科技(深圳)有限公司 Method and device for judging entrance and exit of electronic fence, storage medium and electronic equipment
CN112752216B (en) * 2020-12-23 2023-03-03 北京东土拓明科技有限公司 Monitoring method and device based on electronic fence
CN113093244B (en) * 2021-03-30 2023-09-26 深圳前海微众银行股份有限公司 Position monitoring method, device and storage medium
CN113313620B (en) * 2021-06-10 2023-04-18 平安国际智慧城市科技股份有限公司 Method, device and equipment for detecting vehicle and storage medium
CN113923436A (en) * 2021-11-03 2022-01-11 国家能源集团华北电力有限公司廊坊热电厂 Three-dimensional visual control system for thermal power plant
CN117492408B (en) * 2024-01-03 2024-04-02 建龙西林钢铁有限公司 Electronic fence safety system based on PLC and image recognition and control method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015077745A1 (en) * 2013-11-25 2015-05-28 Agco Corporation Dynamic cooperative geofence
CN104969219A (en) * 2012-12-04 2015-10-07 电子湾有限公司 Dynamic geofence based on members within
CN106981167A (en) * 2016-01-18 2017-07-25 昆山研达电脑科技有限公司 Hand-held device and tracking monitoring method with fence function
GB201710789D0 (en) * 2017-07-05 2017-08-16 Wearable Link Ltd Geofencing system
CN107547585A (en) * 2016-06-27 2018-01-05 电子科技大学中山学院 Visual child anti-lost system
CN108419210A (en) * 2012-08-22 2018-08-17 电子湾有限公司 The passive Dynamic Geographic fence of mobile device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8594921B2 (en) * 2011-11-30 2013-11-26 At&T Mobility Ii Llc Comparison of multi-dimensional datasets
CN114554404A (en) * 2018-09-19 2022-05-27 西安中兴新软件有限责任公司 Monitoring method, controller, electronic device and computer readable storage medium
CN109979165B (en) * 2019-03-28 2021-03-19 深圳市科迈爱康科技有限公司 Positioning anti-lost method, device and system using electronic fence technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108419210A (en) * 2012-08-22 2018-08-17 电子湾有限公司 The passive Dynamic Geographic fence of mobile device
CN104969219A (en) * 2012-12-04 2015-10-07 电子湾有限公司 Dynamic geofence based on members within
WO2015077745A1 (en) * 2013-11-25 2015-05-28 Agco Corporation Dynamic cooperative geofence
CN106981167A (en) * 2016-01-18 2017-07-25 昆山研达电脑科技有限公司 Hand-held device and tracking monitoring method with fence function
CN107547585A (en) * 2016-06-27 2018-01-05 电子科技大学中山学院 Visual child anti-lost system
GB201710789D0 (en) * 2017-07-05 2017-08-16 Wearable Link Ltd Geofencing system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020057512A1 (en) * 2018-09-19 2020-03-26 西安中兴新软件有限责任公司 Monitoring method and device
CN110580825A (en) * 2019-08-02 2019-12-17 武汉新能源研究院有限公司 Electric ship monitoring method and system
CN110753302A (en) * 2019-10-09 2020-02-04 中兴健康科技有限公司 Path perception electronic fence system for back-and-forth monitoring of students
CN110930615A (en) * 2019-12-03 2020-03-27 深圳市广联智通科技有限公司 Position control method, position control device, computer equipment and storage medium
CN110933602A (en) * 2019-12-25 2020-03-27 北斗天地股份有限公司 Method and device for setting electronic fence
CN111107322B (en) * 2019-12-27 2021-07-13 泰斗微电子科技有限公司 Monitoring method, terminal group and storage medium based on electronic fence
CN111107322A (en) * 2019-12-27 2020-05-05 泰斗微电子科技有限公司 Monitoring method, terminal group and storage medium based on electronic fence
CN111935632A (en) * 2020-08-14 2020-11-13 英华达(南京)科技有限公司 Location tracking query system
CN111935632B (en) * 2020-08-14 2024-02-27 英华达(南京)科技有限公司 Position tracking and inquiring system
CN112288348A (en) * 2020-09-10 2021-01-29 浙江省疾病预防控制中心 Biological safety transfer supervision method and system
CN112288348B (en) * 2020-09-10 2021-10-15 浙江省疾病预防控制中心 Biological safety transfer supervision method and system
CN115273391A (en) * 2021-04-30 2022-11-01 深圳Tcl新技术有限公司 Moving object detection method and device, electronic equipment and storage medium
CN113504789A (en) * 2021-06-29 2021-10-15 北京微纳星空科技有限公司 Out-of-bound alarm method and device for unmanned aerial vehicle, unmanned aerial vehicle and storage medium
CN113784289A (en) * 2021-07-21 2021-12-10 中南大学湘雅医院 Hospital patient auxiliary nursing method
WO2023236584A1 (en) * 2022-06-07 2023-12-14 中兴通讯股份有限公司 Electronic fence setting method and apparatus, and computer-readable storage medium

Also Published As

Publication number Publication date
WO2020057512A1 (en) 2020-03-26
CN114554404A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
CN109511089A (en) A kind of monitoring method and device
US20220377505A1 (en) Systems and methods for mobile tracking, communications and alerting
CN105228093B (en) Intelligent mobile terminal managing and control system based on low-power consumption bluetooth
US11337074B2 (en) Mobile device management method
US9621707B2 (en) System and method for discouraging inappropriate use of a mobile device
US20150111523A1 (en) Interactive emergency information and identification
DE102013014849A1 (en) Location tag for tracking items tracking
US20060181411A1 (en) System for, and method of, monitoring the movements of mobile items
CN104038952B (en) The Forecasting Methodology and forecasting system of accident
CN103957322B (en) The theft preventing method and mobile terminal of mobile terminal
CN101621816B (en) System and method for monitoring background server of mobile terminal
CA2829329A1 (en) System and apparatus for locating and surveillance of persons and/or surroundings
KR101584983B1 (en) system, method, computer program and server for finding missing object based on beacon
Gómez et al. A review on mobile applications for citizen emergency management
US20170148306A1 (en) System and method for processing emergency alerts and responses
US20200015040A1 (en) Location-based wireless tracking
CN103891257B (en) For monitoring the central processing unit of at least one sensor
CN105847561A (en) Environmental monitoring method, device and handset
CN107784810A (en) The method of air defence warning ring
CN108834040A (en) A kind of attendance information based reminding method and its equipment
CN106022572A (en) Visualization method and apparatus for emergency event processing state
Mythili et al. A comparative study of smart phone emergency applications for disaster management
CN110933602A (en) Method and device for setting electronic fence
WO2006011162A1 (en) Disaster management system using wireless technology and/or internet
CN113612887B (en) Management and control system and method for managing mobile terminal based on family and school together

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322