CN110213759B - Broadcast-based anti-lost detection method, storage medium and electronic device - Google Patents

Broadcast-based anti-lost detection method, storage medium and electronic device Download PDF

Info

Publication number
CN110213759B
CN110213759B CN201910503352.1A CN201910503352A CN110213759B CN 110213759 B CN110213759 B CN 110213759B CN 201910503352 A CN201910503352 A CN 201910503352A CN 110213759 B CN110213759 B CN 110213759B
Authority
CN
China
Prior art keywords
identity
lost
target monitoring
broadcast
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910503352.1A
Other languages
Chinese (zh)
Other versions
CN110213759A (en
Inventor
厉正吉
王治平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongguancun Technology Leasing Co ltd
Original Assignee
Peach Core Technology Suzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peach Core Technology Suzhou Co ltd filed Critical Peach Core Technology Suzhou Co ltd
Priority to CN201910503352.1A priority Critical patent/CN110213759B/en
Publication of CN110213759A publication Critical patent/CN110213759A/en
Application granted granted Critical
Publication of CN110213759B publication Critical patent/CN110213759B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S11/00Systems for determining distance or velocity not using reflection or reradiation
    • G01S11/02Systems for determining distance or velocity not using reflection or reradiation using radio waves
    • G01S11/06Systems for determining distance or velocity not using reflection or reradiation using radio waves using intensity measurements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种基于广播的防丢检测方法、存储介质和电子设备。基于广播的防丢检测方法包括:启动第一告警定时器,并周期性地执行以下操作,直到第一告警定时器超时为止:发送带有本设备的第一身份标识的可扫描广播数据包;接收带有外部设备的第二身份标识的扫描请求数据包;如果根据第二身份标识和第一目标监控设备的标识信息确定外部设备为第一目标监控设备,则向外部设备发送与扫描请求数据包相应的扫描响应数据包,并且复位第一告警定时器;如果第一告警定时器超时,则生成用于指示第一目标监控设备失联的报警信息。无需在防丢器端和上位机的应用端之间建立蓝牙连接,也无需设置多种连接链路参数,同时也不会对并发连接的数目产生限制。

Figure 201910503352

Embodiments of the present invention provide a broadcast-based anti-lost detection method, a storage medium, and an electronic device. The broadcast-based anti-loss detection method includes: starting a first alarm timer, and periodically performing the following operations until the first alarm timer times out: sending a scannable broadcast data packet with the first identity of the device; Receive the scan request data packet with the second identity of the external device; if it is determined that the external device is the first target monitoring device according to the second identity and the identification information of the first target monitoring device, then send and scan request data to the external device A corresponding scan response data packet is included, and the first alarm timer is reset; if the first alarm timer times out, alarm information for indicating that the first target monitoring device is disconnected is generated. There is no need to establish a Bluetooth connection between the anti-lost device end and the application end of the host computer, and there is no need to set various connection link parameters, and there is no limit to the number of concurrent connections.

Figure 201910503352

Description

Broadcast-based anti-loss detection method, storage medium and electronic device
Technical Field
The embodiment of the invention relates to a wireless communication technology, in particular to a broadcast-based anti-lost detection method, a storage medium and electronic equipment.
Background
The low-power Bluetooth has the characteristics of low power consumption, low cost, small size and the like, and Bluetooth modules are generally arranged in equipment such as mobile phones and computers, so that the Bluetooth anti-lost device becomes possible.
The Bluetooth anti-loss system mainly comprises three parts: upper computer equipment with a built-in Bluetooth module, such as an anti-lost device, a mobile phone, a computer and the like, and a corresponding application program.
From the function, current bluetooth prevents losing technical scheme mainly divide into two kinds:
one-way anti-lost detection scheme: and when the anti-lost device exceeds a certain distance, the application program sends out alarm information.
Two-way anti-lost detection scheme: and when the anti-lost device exceeds a certain distance, the anti-lost device and the application program respectively send out alarm information.
In the existing two-way anti-lost detection scheme, an application program establishes Bluetooth connection with an anti-lost device and enters an anti-lost state; and when the application program or the anti-lost device detects that the Bluetooth connection is abnormally disconnected, sending out alarm information.
The existing bidirectional anti-lost detection scheme has at least the following problems:
1. anti-lost detection is performed based on Bluetooth connection, and the generated power consumption is high;
2. the bluetooth is connected with various link parameters, such as Connection Interval (Connection Interval), monitoring timeout value (supervisory timeout), etc., and if the Connection is improperly set, the bluetooth Connection is easily interrupted by interference, which causes false alarm and poor experience;
3. when the anti-lost function is started, operations such as opening the anti-lost device, establishing connection and the like are required, the steps are complex, and the experience is poor;
4. the number of concurrent connections supported by the bluetooth module is small (generally, only a few), so the number of anti-lost devices which can be used simultaneously is also obviously limited, and the use scene is not flexible enough.
Disclosure of Invention
The embodiment of the invention aims to provide a broadcast-based anti-loss detection scheme so as to effectively and accurately realize bidirectional anti-loss detection and save power consumption.
According to a first aspect of the embodiments of the present invention, there is provided a broadcast-based anti-lost detection method, including: starting a first alarm timer and periodically performing the following operations until the first alarm timer times out: sending a scannable broadcast packet with a first identity of the device; receiving a scanning request data packet with a second identity mark of the external equipment; if the external equipment is determined to be the first target monitoring equipment according to the second identity identification and the identification information of the first target monitoring equipment, sending a scanning response data packet corresponding to the scanning request data packet to the external equipment, and resetting the first alarm timer; and if the first alarm timer is overtime, generating alarm information for indicating that the first target monitoring equipment is lost.
Optionally, the first identity identifier is a first resolvable private address generated according to the first identity address of the device, the second identity identifier is a second resolvable private address generated according to the second identity address of the external device, and the identification information of the first target monitoring device is the first target identity address of the first target monitoring device.
Optionally, the scan response packet includes the first resolvable private address and an advertisement sequence number; the transmitting of the scan response packet corresponding to the scan request packet to the external device includes: if the second resolvable private address is not written in the scan address list, writing the second resolvable private address into the scan address list, generating a new first resolvable private address, incrementing the announcement sequence number, and sending a scan response packet including the new first resolvable private address and the incremented announcement sequence number to the external device.
Optionally, the scannable broadcast packet further includes data of a reference transmit power; the transmitting, to the external device, a scan response packet corresponding to the scan request packet, further includes: if the second resolvable private address is written in the scanning address list, the transmitting power for transmitting the subsequent scanning broadcast data packet is increased, and the value of the reference transmitting power in the scanning broadcast data packet is correspondingly adjusted.
According to a second aspect of the embodiments of the present invention, there is provided a broadcast-based anti-lost detection method, including: starting a second alarm timer and periodically performing the following operations until the second alarm timer times out: receiving a scannable broadcast packet with a third identity of an external device; if the external equipment is determined to be second target monitoring equipment according to the third identity and the identification information of the second target monitoring equipment, sending a scanning request data packet with a fourth identity of the equipment; resetting the second alarm timer if a scan response packet corresponding to the scan request packet is received; and if the second alarm timer is overtime, generating alarm information for indicating that the second target monitoring equipment is lost.
Optionally, the third identity is a third resolvable private address generated according to the third identity address of the external device, the fourth identity is a fourth resolvable private address generated according to the fourth identity address of the device, and the identification information of the second target monitoring device is a second target identity address of the second target monitoring device.
Optionally, the scan response packet includes the third resolvable private address and an advertisement sequence number; resetting the second alarm timer if the scan response packet corresponding to the scan request packet is received, including: if the value of the announcement sequence number in the scanning response data packet is smaller than the value of the announcement sequence number stored in the device, generating alarm information for indicating that the second target monitoring device is disconnected; if the value of the announcement sequence number is larger than or equal to the value of the announcement sequence number stored in the device, and the third analyzable private address is written into a scanning address list, generating alarm information for indicating that the second target monitoring device is lost; and if the value of the announcement sequence number is greater than or equal to the value of the announcement sequence number stored in the equipment and the third resolvable private address is not written into the scanning address list, writing the third resolvable private address into the scanning address list, resetting the second alarm timer, updating the value of the announcement sequence number stored in the equipment to the value of the announcement sequence number in the scanning response data packet, and generating a new fourth resolvable private address.
Optionally, the scannable broadcast packet further includes data of a reference transmit power; after receiving the scannable broadcast packet with the third identity of the external device and the reference transmit power, the method further comprises: acquiring data of received signal strength indication of a Bluetooth module; estimating the distance between the device and the external device according to the data of the received signal strength indication and the data of the reference transmitting power; and if the value of the distance exceeds a distance threshold value, generating alarm information for indicating that the second target monitoring device is lost.
Optionally, the number of the second target monitoring devices is at least two, and the timing is performed by at least two second alarm timers, so as to perform anti-lost detection processing on at least two second target monitoring devices.
According to a third aspect of embodiments of the present invention, there is provided a computer readable storage medium having stored thereon computer program instructions, wherein the program instructions, when executed by a processor, implement the steps of any of the foregoing broadcast-based anti-loss detection methods according to the first aspect.
According to a fourth aspect of embodiments of the present invention, there is provided a computer readable storage medium having stored thereon computer program instructions, wherein the program instructions, when executed by a processor, implement the steps of any of the foregoing broadcast-based anti-loss detection methods according to the second aspect.
According to a fifth aspect of embodiments of the present invention, there is provided an electronic apparatus, including: the system comprises a processor, a memory, a communication element and a communication bus, wherein the processor, the memory and the communication element are communicated with each other through the communication bus; the memory is configured to store at least one executable instruction, which causes the processor to perform operations corresponding to any of the foregoing broadcast-based anti-lost detection methods according to the first aspect.
According to a sixth aspect of the embodiments of the present invention, there is provided an electronic apparatus, including: the system comprises a processor, a memory, a communication element and a communication bus, wherein the processor, the memory and the communication element are communicated with each other through the communication bus; the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to any one of the foregoing broadcast-based anti-lost detection methods according to the second aspect.
According to the broadcast-based anti-lost detection scheme provided by the embodiment of the invention, the anti-lost device and the upper computer periodically detect the online state of the other party as target monitoring equipment in a Bluetooth scanning mode based on a Bluetooth broadcast mechanism, so that bidirectional anti-lost detection is effectively realized. The Bluetooth connection does not need to be established between the anti-lost device end and the application end of the upper computer, various connection link parameters do not need to be set, and the number of concurrent connections is not limited.
Drawings
FIG. 1 is a data interaction diagram illustrating a broadcast-based anti-loss detection method according to some embodiments of the invention;
FIG. 2 is a flow chart illustrating a broadcast-based anti-loss detection method performed by the anti-loss device of FIG. 1;
FIG. 3 is a flowchart illustrating a broadcast-based anti-loss detection method performed by the upper computer of FIG. 1;
FIG. 4 is a data interaction diagram illustrating a broadcast-based anti-loss detection method according to further embodiments of the present invention;
FIG. 5 is a flow chart illustrating a broadcast-based anti-loss detection method performed by the anti-loss device of FIG. 4;
fig. 6 is a flowchart illustrating a broadcast-based anti-loss detection method performed by the upper computer of fig. 4;
fig. 7 is a schematic configuration diagram showing a first electronic device according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention are described in detail below with reference to the accompanying drawings.
In this application, "plurality" means two or more, and "at least one" means one, two or more. Any component, data, or structure referred to in this application, unless explicitly defined as such, may be understood to mean one or more.
In order to solve the problems in the background art, an embodiment of the present invention provides a broadcast-based anti-lost detection technical solution, which can perform effective and accurate anti-lost detection based on bluetooth broadcast at an anti-lost device end and an application end of an upper computer, without establishing a bluetooth connection between the anti-lost device end and the application end of the upper computer, setting various connection link parameters, and without limiting the number of concurrent connections.
Fig. 1 is a data interaction diagram illustrating a broadcast-based anti-loss detection method according to some embodiments of the present invention.
Referring to fig. 1, the anti-lost device and the upper computer (including APP thereon) will act as a pairing device with each other, start their alarm timers, respectively, and periodically perform a broadcast-based anti-lost detection operation. Firstly, the anti-lost device sends a scannable broadcast data packet with an identity label of the anti-lost device; and after receiving the scannable broadcast data packet, the upper computer determines whether the sending equipment of the scannable broadcast data packet is an anti-lost device serving as the target monitoring equipment of the upper computer according to the identity in the scannable broadcast data packet, and if the sending equipment of the scannable broadcast data packet is determined to be the anti-lost device serving as the target monitoring equipment of the upper computer, the upper computer sends a scanning request data packet with the identity of the upper computer.
And then, after receiving the scanning request data packet, the anti-lost device determines whether the sending equipment of the scanning request data packet is the target monitoring equipment of the anti-lost device, namely the upper computer, according to the identity in the scanning request data packet. If the anti-lost device determines that the sending equipment of the scanning request data packet is the upper computer which is used as the target monitoring equipment, the anti-lost device sends a scanning response data packet corresponding to the received scanning request data packet to the upper computer, and resets the started alarm timer so as to carry out timing again.
On the other hand, after receiving the scanning response data packet, the upper computer also resets the alarm timer started by the upper computer so as to perform timing again. Therefore, the anti-lost device and the upper computer send, receive, check and reset the data packet circularly until the alarm timer of the anti-lost device and/or the alarm timer of the upper computer is overtime (such as 1 minute, 2 minutes, 3 minutes, 5 minutes and the like).
And under the condition that any alarm timer is overtime, the overtime anti-lost device and/or the upper computer generate alarm information for indicating the loss of the target monitoring equipment serving as the anti-lost detection target of the anti-lost device so as to inform the user.
The operation processing is continuously executed between the anti-lost device and the upper computer so as to continuously perform anti-lost detection.
Therefore, the anti-lost device and the upper computer periodically detect the online state of the other party as target monitoring equipment in a Bluetooth scanning mode based on a Bluetooth broadcasting mechanism so as to effectively realize bidirectional anti-lost detection. The Bluetooth connection does not need to be established between the anti-lost device end and the application end of the upper computer, various connection link parameters do not need to be set, and the number of concurrent connections is not limited.
Fig. 2 is a flowchart illustrating a broadcast-based anti-loss detection method performed by the anti-loss device in fig. 1.
Referring to fig. 2, the anti-lost device starts a first alarm timer at step S210.
Here, the duration of the first alarm timer maintained at the anti-lost device end, such as 30 seconds, 1 minute, 2 minutes, etc., may be set according to the aging requirement of the anti-lost monitoring.
Thereafter, steps S220 to S260 are periodically executed until the first alarm timer times out to determine whether the first target monitoring device as its anti-lost detection target is lost. Here, the period for performing steps S220 to S260 may be relatively short, for example, 3 seconds, 6 seconds, 10 seconds, and the like.
In step S220, the anti-lost device sends a scannable broadcast packet with the first identity of the device.
Here, the first identity identifier may be a name of the device, a physical address of the device, an identity address of a bluetooth module in the device, an encoded address of the bluetooth module, and the like.
Specifically, the anti-lost device generates a scannable broadcast packet with a first identity of the device and transmits the scannable broadcast packet in the form of a broadcast.
The external device (e.g., an upper computer that is an anti-loss detection target of the anti-loss device) may transmit a scan request packet to the anti-loss device after receiving the scannable broadcast packet.
Accordingly, the anti-lost device receives the scan request packet with the second identification of the external device at step S230.
Similarly, the second id of the external device may also be a name of the external device, a physical address of the external device, an identification address of a bluetooth module in the external device, an encoded address of a bluetooth module in the external device, or the like.
In step S240, it is determined whether the external device is the first target monitoring device according to the second identity and the identification information of the first target monitoring device.
In order to identify the first target monitoring device as the anti-lost detection target, it is necessary to preset identification information of the first target monitoring device for the anti-lost device. At this step, the anti-lost device determines whether the external device that transmitted the scan request packet and the first target monitoring device are the same device by matching or comparing the second identification with the identification information of the first target monitoring device.
Here, the first identity identifier, the second identity identifier and the identification information of the first target monitoring device may be the same identification information or different identification information. In the case that the second identity is different from the identification information of the first target monitoring device, one or both of the second identity and the identification information of the first target monitoring device may be converted to perform comparison and matching.
If the external device is determined to be the first target monitoring device according to the second identity and the identification information of the first target monitoring device at step S240, and the first target monitoring device can be determined to be in the safe working state and not to be lost, at step S250, a scan response packet corresponding to the scan request packet is sent to the external device to respond to the received scan request packet, and at step S260, the first alarm timer is reset to restart timing.
If the first alarm timer still times out after the processing of steps S220 to S260 is periodically performed, it may be determined that the first target monitoring device may be lost, and accordingly, in step S270, alarm information indicating that the first target monitoring device is lost is generated to prompt the user that the first target monitoring device is suspected to be lost.
Fig. 3 is a flowchart illustrating a broadcast-based anti-loss detection method performed by the upper computer in fig. 1.
Referring to fig. 3, the upper computer starts a second alarm timer at step S310. Similarly, the duration of the second alarm timer maintained by the upper computer end, such as 30 seconds, 1 minute, 2 minutes and the like, can be set according to the aging requirement of the anti-lost monitoring.
Thereafter, the upper computer periodically executes steps S320 to S360 until the second alarm timer times out, so as to determine whether the second target monitoring device serving as the anti-lost detection target thereof is lost.
In step S320, the upper computer receives a scannable broadcast packet with a third id of the external device.
Since the anti-lost device operating normally can periodically transmit the scannable broadcast packet (step S220), the upper computer can continuously receive the scannable broadcast packet from the anti-lost device (i.e., the external device in step S320). The scannable broadcast packet carries a third identification of the external device.
Similarly, the third identification may be a name of the external device, a physical address of the external device, an identification address of a bluetooth module in the external device, an encoded address of the bluetooth module, and the like.
In step S330, the upper computer determines whether the external device is the second target monitoring device according to the third identity and the identification information of the second target monitoring device.
Similarly, in order to identify the second target monitoring device as the anti-lost detection target, it is also necessary to set the identification information of the second target monitoring device in advance for the upper computer. In this step, the upper computer determines whether the external device that sends the scan request packet and the second target monitoring device are the same device by matching or comparing the third identifier with the identifier information of the second target monitoring device.
Similarly, the third identity identifier and the identification information of the second target monitoring device may be the same identification information or different identification information. In the case that the third identification is different from the identification information of the second target monitoring device, one or both of the third identification and the identification information of the second target monitoring device may be converted to perform comparison and matching.
If the upper computer determines that the external device is the second target monitoring device according to the third identity and the identification information of the second target monitoring device in step S330, and the second target monitoring device can be determined to be in a safe working state and not lost, in step S340, the upper computer sends a scan request packet with the fourth identity of the device to respond to the second target monitoring device.
After receiving the scan request packet, the anti-lost device performs the processing of steps S230 to S260, wherein in step S250, a scan response packet corresponding to the scan request packet received is transmitted.
Accordingly, in step S350, the upper computer receives a scan response packet corresponding to the scan request packet.
Thereafter, in step S360, the upper computer resets the second alarm timer to restart timing.
If the second alarm timer still times out after the processing of steps S320 to S360 is periodically performed, it may be determined that the second target monitoring device (e.g., the anti-lost device) may be lost or lost, and accordingly, step S370 is performed to generate alarm information indicating that the second target monitoring device is lost.
Fig. 4 is a data interaction diagram illustrating a broadcast-based anti-loss detection method according to further embodiments of the present invention.
In bluetooth low energy technology, a Bluetooth Low Energy (BLE) device is provided with an Identity Resolving Key (IRK) to generate a resolvable private address through the IRK and a random number. The IRK includes a local IRK for generating a resolvable private address for the cost device and a pairing IRK for resolving a resolvable private address for the external device. The anti-lost device and the upper computer are both provided with the identity address of the other party as the respective target monitoring equipment.
In the anti-lost device and the upper computer, respective resolvable private addresses are generated through a local IRK set for the anti-lost device and included in data packets sent by the anti-lost device (such as scannable broadcast data packets sent by the anti-lost device, scanning request data packets sent by the upper computer, scanning response data packets returned by the anti-lost device and the like), and a receiver of a corresponding data packet resolves and restores the resolvable private addresses of senders in the data packets into identity addresses of the senders (the anti-lost device or the upper computer) through a paired IRK set for the receiver of the corresponding data packet so as to perform checking processing.
In addition, according to the Bluetooth low-power protocol, the anti-lost device and the upper computer record and store the analyzable private address contained in the received data packet, and regenerate the analyzable private address of the anti-lost device and the upper computer according to the requirement.
In the interaction of the broadcast-based anti-lost detection method shown in fig. 4, first, the anti-lost device carries an analyzable private address of the anti-lost device in a scannable broadcast packet sent by the anti-lost device, and the upper computer uses the pairing IRK to resolve the analyzable private address in the received scannable broadcast packet to obtain an identity address of a sender of the scannable broadcast packet, and compares the identity address with an identity address of a second target monitoring device stored in the upper computer to determine whether the scannable broadcast packet is from the target monitoring device.
Secondly, the upper computer has the generated analyzable private address of the upper computer in the scanning request data packet sent by the upper computer, the anti-lost device receiving the scanning request data packet uses the pairing IRK to analyze the analyzable private address in the received scanning request data packet so as to obtain the identity address of the sender of the scanning request data packet, and the identity address is compared with the identity address of the first target monitoring equipment stored in the anti-lost device so as to determine whether the scanning request data packet comes from the first target monitoring equipment.
In addition, the anti-lost device also maintains a corresponding announcement sequence number corresponding to the new resolvable private address it generates. Specifically, each time the anti-lost device generates a new resolvable private address, the advertisement sequence number is also incremented accordingly, such as by adding 1 to the current advertisement sequence number, and the new resolvable private address and the incremented advertisement sequence number are included in the scan response packet sent to the upper computer. The upper computer also maintains the resolvable private address and the notice serial number of the anti-lost device received by the upper computer, determines whether the scanning response data packet contains the resolvable private address of the newly generated anti-lost device according to the notice serial number in the received scanning response data packet for updating, and generates a new resolvable private address for the upper computer so as to carry the newly generated resolvable private address in a scanning request data packet sent subsequently.
The anti-lost detection method shown in fig. 4 further improves the security of data communication in anti-lost detection by using an analyzable private address in a data packet exchanged between the anti-lost device and an upper computer and regenerating a new analyzable private address according to an exchanged announcement sequence number for subsequent use on the basis of effectively realizing bidirectional anti-lost detection by bluetooth scanning detection based on bluetooth broadcast.
Fig. 5 is a flowchart illustrating a broadcast-based anti-loss detection method performed by the anti-loss device in fig. 4.
Referring to fig. 5, the anti-lost device starts a first alarm timer at step S510. The processing of this step is similar to the aforementioned step S210, and is not described herein again.
Thereafter, steps S520 to S580 are periodically executed until the first alarm timer times out to determine whether the first target monitoring device, which is the anti-lost detection target thereof, is lost.
In step S520, the anti-lost device sends a scannable broadcast packet with a first identity of the device, where the first identity is a first resolvable private address generated according to a first identity address of the device.
Specifically, the first resolvable private address is obtained by the anti-lost device through calculation according to the first identity address of the device and a local IRK of the anti-lost device.
In step S530, the anti-lost device receives a scan request packet with a second identity of the external device, where the second identity is a second resolvable private address generated according to a second identity address of the external device.
In step S540, it is determined whether the external device is the first target monitoring device according to the second resolvable private address and the first target identity address of the first target monitoring device. That is, the identification information of the first target monitoring device is the first target identity address of the first target monitoring device.
According to an optional embodiment of the present invention, at this step, the second identity address is obtained according to the pairing IRK and the second resolvable private address; if the second identity address is the same as the first target identity address of the first target monitoring equipment, determining that the external equipment is the first target monitoring equipment; and if the second identity address is different from the first target identity address, determining that the external equipment is not the first target monitoring equipment.
If the external device is determined to be the first target monitoring device according to the second resolvable private address and the first target identity address of the first target monitoring device in step S540, and the first target monitoring device can be determined to be in the safe working state and not to be lost, the steps S550 to S580 are continuously executed.
In step S550, the first alarm timer is reset to restart timing.
In step S560, it is determined whether the second resolvable private address is written in the scan address list maintained by the device to determine whether the first target monitoring device has generated a new resolvable private address.
If it is determined in step S560 that the second resolvable private address is not written in the scan address list, steps S571 to S574 are performed.
Specifically, in step S571, the second resolvable private address is written into the scan address list; in step S572, a new first resolvable private address is generated; in step S573, increment the current announcement sequence number, such as adding 1 to the announcement sequence number; and, in step S574, a scan response packet including the new first resolvable private address and the incremented advertisement sequence number is transmitted to the external device in response to the received scan request packet.
On the other hand, if it is determined in step S560 that the second resolvable private address is written in the scan address list, step S580 is executed to increase the transmission power for transmitting the subsequent scan broadcast packet, and correspondingly adjust the value of the reference transmission power in the subsequently transmitted scannable broadcast packet, so as to transmit the value of the reference transmission power to the receiver (such as the upper computer) of the scannable broadcast packet, and then the step S520 is executed again. The upper computer receives the scannable broadcast data packet comprising the reference transmitting power value, and can estimate the distance between the second target monitoring equipment (namely the anti-lost device) and the equipment by using the reference transmitting power value so as to perform anti-lost detection by using the estimated distance value.
If the first alarm timer still times out after the processing of steps S520 to S580 is periodically performed, it may be determined that the first target monitoring device may be lost, and accordingly, in step S590, alarm information indicating that the first target monitoring device is lost is generated.
An embodiment of the present invention further provides a computer-readable storage medium storing a program for executing the steps of any of the foregoing broadcast-based anti-lost detection methods implemented by the anti-lost device.
Furthermore, an embodiment of the present invention further provides a computer program product including at least one executable instruction, when executed by a processor, for implementing any one of the foregoing broadcast-based anti-lost detection methods implemented by an anti-lost device.
Fig. 6 is a flowchart illustrating a broadcast-based anti-loss detection method performed by the upper computer in fig. 4.
Referring to fig. 6, the upper computer starts a second alarm timer at step S610. The processing of this step is similar to the aforementioned step S310, and is not described herein again.
Thereafter, the upper computer periodically executes steps S620 to S660 until the second alarm timer times out, so as to determine whether the second target monitoring device serving as the anti-lost detection target thereof is lost.
In step S620, the upper computer receives a scannable broadcast packet with a third identity of the external device, where the third identity is a third resolvable private address generated according to the third identity of the external device.
In step S630, the upper computer determines that the external device is the second target monitoring device according to the third resolvable private address and the identification information of the second target monitoring device, where the identification information of the second target monitoring device is the second target identity address of the second target monitoring device.
Specifically, in this step, the third identity address is obtained according to the pairing identity resolution key and the third resolvable private address; if the third identity address is the same as a second target identity address of the second target monitoring device, determining that the external device is the second target monitoring device; and if the third identity address is different from the second target identity address, determining that the external device is not the second target monitoring device.
If the upper computer determines that the external device is the second target monitoring device according to the third resolvable private address and the second target identity address of the second target monitoring device in step S630, and the second target monitoring device can be determined to be in a safe working state and not lost, in step S640, the upper computer sends a scan request data packet with the fourth identity of the device to respond to the second target monitoring device. Similarly, the fourth identity is a fourth resolvable private address generated according to the fourth identity address of the device.
After receiving the scan request packet, the anti-lost device sends a scan response packet corresponding to the scan request packet received by the anti-lost device. Accordingly, in step S650, the upper computer receives a scan response packet corresponding to the scan request packet.
In step S660, the upper computer determines whether the value of the advertisement sequence number in the received scan response packet is smaller than the value of the advertisement sequence number already stored in the present apparatus.
The upper computer records the value of the received announcement sequence number, and maintains a scan address list in which the received third resolvable private address is recorded, so as to determine the validity of the scan response packet newly received in step S650.
If the upper computer determines in step S660 that the value of the advertisement sequence number is greater than or equal to the value of the advertisement sequence number already stored in the present apparatus, the upper computer performs step S670 to further determine whether the third resolvable private address has been written in the scan address list.
If the upper computer determines that the value of the announcement sequence number is greater than or equal to the value of the announcement sequence number stored in the device in step S660, and determines that the third resolvable private address is written in the scan address list in step S670, the upper computer can presume that the received scan response packet carries outdated information, and generates alarm information for indicating that the second target monitoring device is lost in step S675. Thereafter, the process of the method may end or return to performing step S610.
If the upper computer determines in step S660 that the value of the announcement sequence number is greater than or equal to the value of the announcement sequence number stored in the device, and determines in step S670 that the third resolvable private address is not written in the scan address list, the upper computer may presume that the received scan response packet carries the newly generated third resolvable private address, and then execute steps S681 to S684.
At step S681, writing the third resolvable private address into the scan address list; in step S682, resetting the second alarm timer; in step S683, the value of the advertisement sequence number already stored in the local device is updated to the value of the advertisement sequence number in the scan response packet; in step S684, a fourth resolvable private address of the new upper computer is generated.
If it is determined in step S660 that the value of the advertisement sequence number in the received scan response packet is smaller than the value of the advertisement sequence number already stored in the own device, that is, the newly received scan response packet contains outdated information, step S690 is performed to generate alarm information indicating that the second target monitoring device is lost. Thereafter, the process of the method may end or return to performing step S610.
If the second alarm timer still times out after the processing of steps S620 to S690 is periodically performed, it may be determined that the second target monitoring device (e.g., the anti-lost device) may be lost or lost, and accordingly, step S700 is performed to generate alarm information indicating that the second target monitoring device is lost.
In another aspect, according to an alternative embodiment of the present invention, the scannable broadcast packet sent by the anti-lost device further includes data of a reference transmission power; accordingly, after executing step S610, the upper computer further executes the following processing: a. acquiring data of Received Signal Strength Indicator (RSSI) of a Bluetooth module of the equipment; b. estimating the distance between the device and the external device according to the RSSI data and the received reference transmission power data, wherein the distance between the device and the external device can be estimated according to any existing signal strength distance calculation method; c. if the value of the distance exceeds a distance threshold, alarm information indicating that the second target monitoring device is disconnected is generated, and the distance threshold can be determined according to the requirement of estimation accuracy. Thereafter, the process of the method may end or return to performing step S610.
In addition, two or more second target monitoring devices (anti-lost devices) can be set for the upper computer (and the application program thereof). In this case, the two or more second target monitoring devices are respectively set with their respective second alarm timers for timing, and the processes of steps S610 to S690 and step S700 are respectively performed for the respective second target monitoring devices, so as to perform the anti-lost detection process for implementing the two or more second target monitoring devices.
The embodiment of the invention also provides a computer readable storage medium for executing the steps of any broadcast-based anti-lost detection method realized by the upper computer.
Furthermore, an embodiment of the present invention further provides a computer program product including at least one executable instruction, when executed by a processor, for implementing any one of the foregoing broadcast-based anti-lost detection methods implemented by a host computer.
The embodiment of the invention also provides the first electronic equipment. Fig. 7 is a schematic configuration diagram showing a first electronic device according to an embodiment of the present invention. The first electronic device may be, for example, a mobile terminal, a Personal Computer (PC), a tablet, a server, etc. Referring now to fig. 7, a schematic diagram of a first electronic device suitable for use in implementing an image processing apparatus of an embodiment of the present invention is shown: as shown in fig. 7, the first electronic device may include a memory and a processor. In particular, the first electronic device comprises one or more processors, communication elements, etc., such as: one or more Central Processing Units (CPUs) 701, and/or one or more image processors (GPUs) 713, etc., which may perform various suitable actions and processes according to executable instructions stored in a Read Only Memory (ROM)702 or loaded from a storage section 708 into a Random Access Memory (RAM) 703. The communication element includes a communication component 712 and/or a communication interface 709. Among other things, the communication component 712 may include, but is not limited to, a network card, which may include, but is not limited to, an ib (infiniband) network card, the communication interface 709 includes a communication interface such as a network interface card of a LAN card, a modem, etc., and the communication interface 709 performs communication processing via a network such as the internet.
The processor may communicate with the read-only memory 702 and/or the random access memory 703 to execute the executable instructions, connect with the communication component 712 through the communication bus 704, and communicate with other target devices through the communication component 712, thereby completing the operations corresponding to any broadcast-based loss prevention detection method provided by the embodiment of the present invention, for example, starting the first alarm timer and periodically performing the following operations until the first alarm timer times out: sending a scannable broadcast packet with a first identity of the device; receiving a scanning request data packet with a second identity mark of the external equipment; if the external equipment is determined to be the first target monitoring equipment according to the second identity identification and the identification information of the first target monitoring equipment, sending a scanning response data packet corresponding to the scanning request data packet to the external equipment, and resetting the first alarm timer; and if the first alarm timer is overtime, generating alarm information for indicating that the first target monitoring equipment is lost.
In addition, in the RAM 703, various programs and data necessary for the operation of the device can also be stored. The CPU 701 or GPU 713, ROM 702, and RAM 703 are connected to each other by a communication bus 704. The ROM 702 is an optional module in case of the RAM 703. The RAM 703 stores or writes executable instructions into the ROM 702 at runtime, and the executable instructions cause the processor to perform operations corresponding to the above-described communication method. An input/output (I/O) interface 705 is also connected to communication bus 704. The communication component 712 may be integrated or may be configured with multiple sub-modules (e.g., IB cards) and linked over a communication bus.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication interface 709 including a network interface card such as a LAN card, modem, or the like. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
It should be noted that the architecture shown in fig. 7 is only an optional implementation manner, and in a specific practical process, the number and types of the components in fig. 7 may be selected, deleted, added or replaced according to actual needs; in different functional component settings, separate settings or integrated settings may also be used, for example, the GPU and the CPU may be separately set or the GPU may be integrated on the CPU, the communication element may be separately set, or the GPU and the CPU may be integrated, and so on. These alternative embodiments are all within the scope of the present disclosure.
The first electronic device of the embodiment of the present invention may be configured to implement the corresponding broadcast-based anti-lost detection method in the above embodiment, and each device in the electronic device may be configured to perform each step in the above method embodiment, for example, the broadcast-based anti-lost detection method described above may be implemented by a processor of the electronic device calling a related instruction stored in a memory, and for brevity, no further description is provided here.
The embodiment of the invention also provides second electronic equipment, which can be a mobile terminal, a Personal Computer (PC), a tablet computer, a server and the like. This second electronic device has a similar structure to the first electronic device shown in fig. 7 described earlier.
The processor of the second electronic device may communicate with the read-only memory and/or the random access memory to execute the executable instructions, connect with the communication component through the communication bus, and communicate with other target devices through the communication component, thereby completing the operation corresponding to the broadcast-based anti-loss detection method of any client provided by the embodiment of the present invention, for example, starting a second alarm timer, and periodically performing the following operations until the second alarm timer times out: receiving a scannable broadcast packet with a third identity of an external device; if the external equipment is determined to be second target monitoring equipment according to the third identity and the identification information of the second target monitoring equipment, sending a scanning request data packet with a fourth identity of the equipment; resetting the second alarm timer if a scan response packet corresponding to the scan request packet is received; and if the second alarm timer is overtime, generating alarm information for indicating that the second target monitoring equipment is lost.
The method and apparatus, electronic device, and storage medium of the present disclosure may be implemented in many ways. For example, the method and apparatus, the electronic device, and the storage medium of the embodiments of the present invention may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustrative purposes only, and the steps of the method of the embodiments of the present invention are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing methods according to embodiments of the present invention. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the embodiment of the present invention.
The description of the present embodiments has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed, and many modifications and variations will be apparent to those skilled in the art. The embodiment was chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (9)

1. A broadcast-based anti-lost detection method comprises the following steps:
starting a first alarm timer and periodically performing the following operations until the first alarm timer times out:
sending a scannable broadcast data packet with a first identity identifier of the device, wherein the first identity identifier is a first resolvable private address generated according to a first identity address of the device, and identifier information of a first target monitoring device is a first target identity address of the first target monitoring device;
receiving a scanning request data packet with a second identity identifier of external equipment, wherein the second identity identifier is a second resolvable private address generated according to a second identity address of the external equipment;
if the external equipment is determined to be the first target monitoring equipment according to the second identity identification and the identification information of the first target monitoring equipment, sending a scanning response data packet corresponding to the scanning request data packet to the external equipment, and resetting the first alarm timer, wherein the scanning response data packet comprises the first resolvable private address and the announcement sequence number;
generating alarm information indicating that the first target monitoring device is lost if the first alarm timer expires,
wherein the transmitting of the scan response packet corresponding to the scan request packet to the external device includes:
if the second resolvable private address is not written in the scan address list, writing the second resolvable private address into the scan address list, generating a new first resolvable private address, incrementing the announcement sequence number, and sending a scan response packet including the new first resolvable private address and the incremented announcement sequence number to the external device.
2. The method of claim 1, wherein the scannable broadcast packet further includes data of a reference transmit power;
the transmitting, to the external device, a scan response packet corresponding to the scan request packet, further includes:
if the second resolvable private address is written in the scanning address list, the transmitting power for transmitting the subsequent scanning broadcast data packet is increased, and the value of the reference transmitting power in the scanning broadcast data packet is correspondingly adjusted.
3. A broadcast-based anti-lost detection method comprises the following steps:
starting a second alarm timer and periodically performing the following operations until the second alarm timer times out:
receiving a scannable broadcast data packet with a third identity of an external device, wherein the third identity is a third resolvable private address generated according to a third identity address of the external device;
if the external equipment is determined to be second target monitoring equipment according to the third identity and the identification information of the second target monitoring equipment, sending a scanning request data packet with a fourth identity of the equipment, wherein the fourth identity is a fourth resolvable private address generated according to the fourth identity of the equipment, and the identification information of the second target monitoring equipment is a second target identity of the second target monitoring equipment;
if a scan response packet corresponding to the scan request packet is received, the scan response packet including the third resolvable private address and the advertisement sequence number, performing the following operations:
if the value of the announcement sequence number in the scanning response data packet is smaller than the value of the announcement sequence number stored in the device, generating alarm information for indicating that the second target monitoring device is disconnected;
if the value of the announcement sequence number is larger than or equal to the value of the announcement sequence number stored in the device, and the third analyzable private address is written into a scanning address list, generating alarm information for indicating that the second target monitoring device is lost;
if the value of the announcement sequence number is greater than or equal to the value of the announcement sequence number stored in the device and the third resolvable private address is not written into the scan address list, writing the third resolvable private address into the scan address list, resetting the second alarm timer, updating the value of the announcement sequence number stored in the device to the value of the announcement sequence number in the scan response data packet, and generating a new fourth resolvable private address;
and if the second alarm timer is overtime, generating alarm information for indicating that the second target monitoring equipment is lost.
4. The method of claim 3, wherein the scannable broadcast packet further includes data of a reference transmit power;
after receiving the scannable broadcast packet with the third identity of the external device and the reference transmit power, the method further comprises:
acquiring data of received signal strength indication of a Bluetooth module;
estimating the distance between the device and the external device according to the data of the received signal strength indication and the data of the reference transmitting power;
and if the value of the distance exceeds a distance threshold value, generating alarm information for indicating that the second target monitoring device is lost.
5. The method according to any one of claims 3 to 4, wherein the number of the second target monitoring devices is at least two, and the timing is performed by at least two second alarm timers, so as to perform anti-lost detection processing of at least two second target monitoring devices.
6. A computer readable storage medium having stored thereon computer program instructions, wherein the program instructions, when executed by a processor, implement the steps of the broadcast based anti-lost detection method of any of claims 1-2.
7. A computer readable storage medium having stored thereon computer program instructions, wherein the program instructions, when executed by a processor, implement the steps of the broadcast based anti-lost detection method of any of claims 3-5.
8. An electronic device, comprising: the system comprises a processor, a memory, a communication element and a communication bus, wherein the processor, the memory and the communication element are communicated with each other through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the broadcast-based anti-lost detection method according to any one of claims 1-2.
9. An electronic device, comprising: the system comprises a processor, a memory, a communication element and a communication bus, wherein the processor, the memory and the communication element are communicated with each other through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the broadcast-based anti-lost detection method according to any one of claims 3-5.
CN201910503352.1A 2019-06-11 2019-06-11 Broadcast-based anti-lost detection method, storage medium and electronic device Active CN110213759B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910503352.1A CN110213759B (en) 2019-06-11 2019-06-11 Broadcast-based anti-lost detection method, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910503352.1A CN110213759B (en) 2019-06-11 2019-06-11 Broadcast-based anti-lost detection method, storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN110213759A CN110213759A (en) 2019-09-06
CN110213759B true CN110213759B (en) 2021-12-14

Family

ID=67792081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910503352.1A Active CN110213759B (en) 2019-06-11 2019-06-11 Broadcast-based anti-lost detection method, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN110213759B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112672328A (en) * 2019-10-16 2021-04-16 阿里巴巴集团控股有限公司 Data transmission method, device and equipment and environmental data acquisition method
CN112636901B (en) * 2020-12-17 2023-09-29 拉扎斯网络科技(上海)有限公司 Identity recognition method, device, storage medium and electronic equipment
CN114697879B (en) * 2020-12-30 2023-06-02 华为技术有限公司 Bluetooth pairing method, electronic device, chip and storage medium
CN117730555A (en) * 2021-07-23 2024-03-19 华为技术有限公司 Address verification method and corresponding device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102299763A (en) * 2010-06-24 2011-12-28 美国博通公司 Communication method and system
CN102595269A (en) * 2011-12-30 2012-07-18 吴东辉 Loss prevention method based on Bluetooth device and assorted Bluetooth headset
CN103297156A (en) * 2013-04-27 2013-09-11 杭州电子科技大学 Mobile terminal anti-theft method based on Bluetooth technology
CN104881948A (en) * 2015-04-22 2015-09-02 北京童讯风联科技有限责任公司 Bluetooth anti-lost alarm method based on grouping mode
CN105303744A (en) * 2015-11-24 2016-02-03 上海摩软通讯技术有限公司 Antitheft method and system of mobile devices
WO2016173458A1 (en) * 2015-04-30 2016-11-03 成都迈奥信息技术有限公司 Anti-lost solar induction charging watchband having healthcare and recording functions
CN106204999A (en) * 2016-09-13 2016-12-07 北京信达泰科技有限公司 A kind of burglary-resisting system based on wireless network
CN108849611A (en) * 2018-06-14 2018-11-23 北京北科驿唐科技有限公司 A kind of electricity saving method and device for Pet loss preventer
CN109561417A (en) * 2018-12-29 2019-04-02 出门问问信息科技有限公司 A kind of anti-lost method and device of article

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102299763A (en) * 2010-06-24 2011-12-28 美国博通公司 Communication method and system
CN102595269A (en) * 2011-12-30 2012-07-18 吴东辉 Loss prevention method based on Bluetooth device and assorted Bluetooth headset
CN103297156A (en) * 2013-04-27 2013-09-11 杭州电子科技大学 Mobile terminal anti-theft method based on Bluetooth technology
CN104881948A (en) * 2015-04-22 2015-09-02 北京童讯风联科技有限责任公司 Bluetooth anti-lost alarm method based on grouping mode
WO2016173458A1 (en) * 2015-04-30 2016-11-03 成都迈奥信息技术有限公司 Anti-lost solar induction charging watchband having healthcare and recording functions
CN105303744A (en) * 2015-11-24 2016-02-03 上海摩软通讯技术有限公司 Antitheft method and system of mobile devices
CN106204999A (en) * 2016-09-13 2016-12-07 北京信达泰科技有限公司 A kind of burglary-resisting system based on wireless network
CN108849611A (en) * 2018-06-14 2018-11-23 北京北科驿唐科技有限公司 A kind of electricity saving method and device for Pet loss preventer
CN109561417A (en) * 2018-12-29 2019-04-02 出门问问信息科技有限公司 A kind of anti-lost method and device of article

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Android平台的智能蓝牙防丢器的设计;陈菁;《数字技术与应用》;20180705;全文 *

Also Published As

Publication number Publication date
CN110213759A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
CN110213759B (en) Broadcast-based anti-lost detection method, storage medium and electronic device
WO2017113527A1 (en) Method and device for switching virtual sim card, and terminal
CN112769651B (en) TCP connection detection method and device and electronic equipment
CN107567107B (en) Data transmission method and device
US8510421B2 (en) Server, terminal apparatus, device registering system, registering method, registering program and recording medium
US11432214B2 (en) Method for network state identification and electronic device therefor
JPWO2014199559A1 (en) Relay device and control method of relay device
CN112838980B (en) Message processing method, system, device, electronic equipment and storage medium
CN113395686B (en) Terminal device friend-making method, system, electronic device and storage medium
JP2016033692A (en) Illegal connection detection system, method, and program
JP4547210B2 (en) Client terminal, service providing apparatus, and service discovery method
US8228813B2 (en) Network quality measurement based on quality measurement packet
JP2004029936A (en) Network system, information processing device and electronic equipment
US10069671B2 (en) Method and apparatus for processing abnormality of application proxy client
EP3806403A1 (en) Apparatus and method for managing message transmission delay
CN113839828B (en) Network quality detection method, device, terminal equipment and medium
US20220100447A1 (en) Communication device and non-transitory computer-readable recording medium storing computer-readable instructions for communication device
CN111372298B (en) Wireless access method, device, equipment and storage medium
CN115348604A (en) Method and device for detecting synchronous state of terminal and network
US9467501B2 (en) Relay server system
JP7082819B2 (en) Wireless access points, wireless communication terminals, wireless communication methods, and programs
CN111245874B (en) Information pushing method, device, server and storage medium
CN110933697B (en) Network state detection method and device, storage medium and electronic equipment
JP4170838B2 (en) Relay device, communication system, and communication method
CN117082168B (en) Short message broadcasting method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20241010

Address after: 1009 Shuguang Building, No. 012 Keji South 12th Road, High tech Zone Community, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province 518000

Patentee after: Shenzhen Tongrui Technology Co.,Ltd.

Country or region after: China

Address before: Room 402-403, Building D, Zhangjiagang Economic and Technological Development Zone, Suzhou City, Jiangsu Province

Patentee before: Peach Core Technology (Suzhou) Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20241203

Address after: 100089, 5th Floor, Building 7, Courtyard A2, West Third Ring North Road, Haidian District, Beijing

Patentee after: Zhongguancun Technology Leasing Co.,Ltd.

Country or region after: China

Address before: 1009 Shuguang Building, No. 012 Keji South 12th Road, High tech Zone Community, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province 518000

Patentee before: Shenzhen Tongrui Technology Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right