CN110505122B - Abnormal information monitoring and management method based on wireless keyboard and mouse signals - Google Patents

Abnormal information monitoring and management method based on wireless keyboard and mouse signals Download PDF

Info

Publication number
CN110505122B
CN110505122B CN201910793984.6A CN201910793984A CN110505122B CN 110505122 B CN110505122 B CN 110505122B CN 201910793984 A CN201910793984 A CN 201910793984A CN 110505122 B CN110505122 B CN 110505122B
Authority
CN
China
Prior art keywords
equipment
mouse
wireless keyboard
monitoring
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910793984.6A
Other languages
Chinese (zh)
Other versions
CN110505122A (en
Inventor
李烨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Baihong Software Technology Co ltd
Original Assignee
Wuhan Baihong Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Baihong Software Technology Co ltd filed Critical Wuhan Baihong Software Technology Co ltd
Priority to CN201910793984.6A priority Critical patent/CN110505122B/en
Publication of CN110505122A publication Critical patent/CN110505122A/en
Application granted granted Critical
Publication of CN110505122B publication Critical patent/CN110505122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Abstract

The invention relates to the technical field of electronic information, in particular to an abnormal information monitoring and management method based on wireless keyboard and mouse signals, which utilizes a wireless keyboard and mouse signal transmission technology to inform the current information of products of electronic equipment users, can carry out remote detection and monitoring management on wireless keyboard and mouse products, realizes the after-sale management of wireless keyboards and mice and provides product detection for the users in time; the wireless keyboard and mouse can be respectively managed according to different brands and production information, after-sale online monitoring of products by different manufacturers is achieved, and after-sale service efficiency and user experience are greatly improved.

Description

Abnormal information monitoring and management method based on wireless keyboard and mouse signals
Technical Field
The invention relates to the technical field of electronic information, in particular to an abnormal information monitoring and management method based on wireless keyboard and mouse signals.
Background
With the development of computer technology, wired keyboard and mouse have not been able to meet the increasing mobile office needs of users, and wireless keyboard and mouse have become the main means for operating computers, so that the current computers generally support wireless keyboard and mouse to perform wireless communication operation.
However, for users, after-sales service of the wireless keyboard and mouse product and detection of the product are particularly important, the users often cannot know the running state of the wireless keyboard and mouse device and the current device performance information, and the running state and the current device performance information are usually clear after the wireless keyboard and mouse fails, so that the experience and the working efficiency of the users are affected; in addition, the manufacturer or the sales company cannot perform after-sales monitoring management well, and cannot inform the user of the status information and performance information of the wireless keyboard and mouse currently used.
In order to solve the above problems, the present application provides a method for monitoring and managing abnormal information based on wireless keyboard and mouse signals.
Disclosure of Invention
In order to solve the above problems, the present invention provides an abnormal information monitoring and management method based on wireless keyboard and mouse signals, comprising the following steps:
s1, an administrator logs in a monitoring terminal and sends a search command to monitoring equipment;
s2, the monitoring equipment executes the search command and acquires the MAC address of the wireless keyboard and mouse equipment in a preset area;
s3, the monitoring equipment transmits the obtained MAC address of the wireless keyboard and mouse equipment to a monitoring terminal;
s4, the administrator acquires and displays the MAC address matched with the verification information in the MAC addresses in the preset area received by the monitoring terminal by inputting the verification information, and sends a confirmation command to the monitoring equipment; the verification information can be the verification of the production information characteristics of products of different manufacturers or the verification of different brands;
step S5, the monitoring equipment receives and executes the confirmation command, and sends a detection instruction to the electronic equipment connected with the wireless keyboard and mouse equipment corresponding to the MAC address matched with the verification information and acquired in the step S4;
step S6, the electronic device in step S5 receives the detection instruction and can selectively operate the detection instruction;
s7, the monitoring terminal acquires the running state of the wireless keyboard and mouse equipment and the performance information of the current equipment according to the running result of the detection instruction, and displays the MAC address of the wireless keyboard and mouse equipment with abnormal information;
step S8, the monitoring terminal sends the MAC address information of the wireless keyboard and mouse device with abnormal information acquired in the step S7 to the monitoring device;
step S9, the monitoring equipment sends a prompt instruction to the electronic equipment connected with the corresponding wireless keyboard and mouse equipment according to the MAC address in the step S8;
and step S10, the electronic equipment in the step S9 receives the prompt instruction and displays the abnormal information of the used wireless keyboard and mouse equipment on the electronic equipment.
Further, the administrator logs in the monitoring terminal to perform secure login in the form of a secret key or an electronic certificate.
Further, the predetermined area is within 1 km-3 km of a square circle with the monitoring equipment as the center.
Further, the MAC address of the wireless keyboard and mouse device transmitted to the monitoring terminal by the monitoring device generates a corresponding address list at the monitoring terminal, and the address list is displayed at the monitoring terminal for a manager to view.
Further, the monitoring device may identify the wireless keyboard and mouse device before searching for and acquiring the MAC address of the wireless keyboard and mouse device within the predetermined area.
Further, the identified information is product characteristics of the keyboard and mouse.
Further, the product characteristics of the wireless keyboard and mouse comprise brand information and production information.
Further, the verification information includes one or both of brand information and production information of the keyboard and mouse device.
Further, in step S6, if the electronic device connected to the wireless keyboard and mouse device selects to operate the detection instruction, the monitoring terminal detects the wireless keyboard and mouse device connected to the electronic device, and obtains an operation state of the wireless keyboard and mouse device and current device performance information; and if the electronic equipment connected with the wireless keyboard and mouse equipment does not operate the detection instruction, the monitoring equipment stops detecting the electronic equipment.
Furthermore, one monitoring terminal can be connected with a plurality of monitoring devices, and data among the plurality of monitoring devices can be interacted with each other.
The technical scheme of the invention has the following beneficial technical effects:
the invention can carry out remote detection and monitoring management on the wireless keyboard and mouse products, realize the after-sale management of the wireless keyboard and mouse and provide product detection for users in time;
the wireless keyboard and mouse can be respectively managed according to different brands and production information, after-sale online monitoring of products by different manufacturers is achieved, and after-sale service efficiency and user experience are greatly improved.
Drawings
FIG. 1 is a schematic flow chart of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Referring to fig. 1, the abnormal information monitoring and managing method based on wireless keyboard and mouse signals provided by the invention comprises the following steps:
s1, a manager logs in a monitoring terminal and sends a search command to monitoring equipment; the administrator logs in the monitoring terminal to perform safe login in a form of a secret key or an electronic certificate;
s2, the monitoring equipment executes the search command and acquires the MAC address of the wireless keyboard and mouse equipment within 1 km-3 km of a square circle with the monitoring equipment as the center;
s3, the monitoring equipment transmits the obtained MAC address of the wireless keyboard and mouse equipment to a monitoring terminal;
s4, the administrator acquires and displays an MAC address matched with the verification information in the MAC addresses in the preset area received by the monitoring terminal through inputting the verification information, and sends a confirmation command to the monitoring equipment;
step S5, the monitoring equipment receives and executes the confirmation command, and sends a detection instruction to the electronic equipment connected with the wireless keyboard and mouse equipment corresponding to the MAC address matched with the verification information and acquired in the step S4;
step S6, the electronic device in the step S5 receives the detection instruction and can selectively operate the detection instruction; if the electronic equipment connected with the wireless keyboard and mouse equipment selects to operate the detection instruction, the monitoring terminal detects the wireless keyboard and mouse equipment connected with the electronic equipment and acquires the operation state of the wireless keyboard and mouse equipment and the performance information of the current equipment; if the electronic equipment connected with the wireless keyboard and mouse equipment does not operate the detection instruction, the monitoring equipment stops detecting the electronic equipment;
s7, the monitoring terminal acquires the running state of the wireless keyboard and mouse equipment and the performance information of the current equipment according to the running result of the detection instruction, and displays the MAC address of the wireless keyboard and mouse equipment with abnormal information;
step S8, the monitoring terminal sends the MAC address information of the wireless keyboard and mouse equipment with abnormal information acquired in the step S7 to the monitoring equipment;
step S9, the monitoring equipment sends a prompt instruction to the electronic equipment connected with the corresponding wireless keyboard and mouse equipment according to the MAC address in the step S8;
and step S10, the electronic equipment in the step S9 receives the prompt instruction and displays the abnormal information of the used wireless keyboard and mouse equipment on the electronic equipment.
In one embodiment, the MAC address of the wireless keyboard and mouse device transmitted by the monitoring device to the monitoring terminal generates a corresponding address list at the monitoring terminal, and displays the address list at the monitoring terminal for the administrator to view;
in one embodiment, the monitoring device may identify the wireless keyboard and mouse device before searching for and acquiring the MAC address of the wireless keyboard and mouse device within 1km to 3km of a square circle centered on the monitoring device.
Further, the identified information is product characteristics of the wireless keyboard and mouse.
Further, the product characteristics of the wireless keyboard and mouse comprise brand information and production information.
Different manufacturers can log in the monitoring terminal through a special key or an electronic certificate to carry out after-sale detection and management on products of their own;
the third party can provide after-sale monitoring service for different manufacturers through the monitoring terminal.
Further, the authentication information includes one or both of brand information and production information of the keyboard and mouse device.
It should be noted that one monitoring terminal may be connected to multiple monitoring devices, and data among the multiple monitoring devices may be interacted with each other.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (1)

1. A monitoring and management method for abnormal information based on wireless keyboard and mouse signals is characterized by comprising the following steps:
s1, a manager logs in a monitoring terminal and sends a search command to monitoring equipment; the administrator logs in the monitoring terminal to perform safe login in a form of a secret key or an electronic certificate;
s2, the monitoring equipment executes the search command and acquires the MAC address of the wireless keyboard and mouse equipment in a preset area; the predetermined area is within 1 km-3 km of a square circle with the monitoring equipment as the center;
s3, the monitoring equipment transmits the acquired MAC address of the wireless keyboard and mouse equipment to a monitoring terminal; the monitoring equipment identifies the wireless keyboard and mouse equipment before searching and acquiring the MAC address of the wireless keyboard and mouse equipment in the preset area; the identified information is the product characteristics of the wireless keyboard and mouse; the product characteristics of the wireless keyboard and mouse comprise brand information and production information;
s4, the administrator acquires and displays the MAC address matched with the verification information in the MAC addresses in the preset area received by the monitoring terminal by inputting the verification information, and sends a confirmation command to the monitoring equipment; the MAC address of the wireless keyboard and mouse device transmitted to the monitoring terminal by the monitoring device generates a corresponding address list at the monitoring terminal, and the corresponding address list is displayed at the monitoring terminal for a manager to check; the verification information comprises one or two of brand information and production information of the wireless keyboard and mouse equipment;
step S5, the monitoring equipment receives and executes the confirmation command, and sends a detection instruction to the electronic equipment connected with the wireless keyboard and mouse equipment corresponding to the MAC address matched with the verification information and acquired in the step S4;
step S6, the electronic device in the step S5 receives the detection instruction and selectively operates the detection instruction; if the electronic equipment connected with the wireless keyboard and mouse equipment selects to operate the detection instruction, the monitoring terminal detects the wireless keyboard and mouse equipment connected with the electronic equipment and acquires the operation state of the wireless keyboard and mouse equipment and the performance information of the current equipment; if the electronic equipment connected with the wireless keyboard and mouse equipment does not operate the detection instruction, the monitoring equipment stops detecting the electronic equipment;
s7, the monitoring terminal acquires the running state of the wireless keyboard and mouse equipment and the performance information of the current equipment according to the running result of the detection instruction, and displays the MAC address of the wireless keyboard and mouse equipment with abnormal information;
step S8, the monitoring terminal sends the MAC address information of the wireless keyboard and mouse device with abnormal information acquired in the step S7 to the monitoring device;
step S9, the monitoring equipment sends a prompt instruction to the electronic equipment connected with the corresponding wireless keyboard and mouse equipment according to the MAC address in the step S8;
step S10, the electronic equipment in the step S9 receives the prompt instruction and displays the abnormal information of the used wireless keyboard and mouse equipment on the electronic equipment; one monitoring terminal is connected with a plurality of monitoring devices, and data among the plurality of monitoring devices are interacted with each other.
CN201910793984.6A 2019-08-27 2019-08-27 Abnormal information monitoring and management method based on wireless keyboard and mouse signals Active CN110505122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910793984.6A CN110505122B (en) 2019-08-27 2019-08-27 Abnormal information monitoring and management method based on wireless keyboard and mouse signals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910793984.6A CN110505122B (en) 2019-08-27 2019-08-27 Abnormal information monitoring and management method based on wireless keyboard and mouse signals

Publications (2)

Publication Number Publication Date
CN110505122A CN110505122A (en) 2019-11-26
CN110505122B true CN110505122B (en) 2022-12-30

Family

ID=68589902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910793984.6A Active CN110505122B (en) 2019-08-27 2019-08-27 Abnormal information monitoring and management method based on wireless keyboard and mouse signals

Country Status (1)

Country Link
CN (1) CN110505122B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109862565A (en) * 2019-02-11 2019-06-07 广东省城乡规划设计研究院 A kind of WLAN unaware control method, system and readable storage medium storing program for executing

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765243B (en) * 2009-12-16 2012-10-10 中兴通讯股份有限公司 CDMA and GSM bimodule digital mobile communication terminal
KR102039350B1 (en) * 2013-05-03 2019-11-27 삼성전자주식회사 Method for controlling abnormal condition in wireless power receiver
CN105680960B (en) * 2015-12-29 2018-08-10 深圳市金溢科技股份有限公司 A kind of Bluetooth card reader automated testing method, test host computer and test system
CN106789994A (en) * 2016-12-10 2017-05-31 武汉白虹软件科技有限公司 Near field evidence collecting method based on wireless key mouse signal
CN109861880B (en) * 2019-01-23 2021-03-12 四川虹美智能科技有限公司 Production detection method and device of wireless communication module

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109862565A (en) * 2019-02-11 2019-06-07 广东省城乡规划设计研究院 A kind of WLAN unaware control method, system and readable storage medium storing program for executing

Also Published As

Publication number Publication date
CN110505122A (en) 2019-11-26

Similar Documents

Publication Publication Date Title
US10187855B2 (en) Message processing method and apparatus
KR101328779B1 (en) Mobile terminal, server and information providing method using the same
US20150281239A1 (en) Provision of access privileges to a user
CN103701926A (en) Method, device and system for obtaining fault reason information
CN104796275A (en) Abnormal state processing method, system and device
US9852274B2 (en) Media client device setup utilizing zero-touch installation
CN106375478B (en) A kind of synchronous method of mobile terminal data, apparatus and system
CN105263142A (en) Method and device for identifying pseudo base station
CN104683301B (en) Password storage method and device
CN104993961A (en) Equipment control methods, devices and system
RU2012148695A (en) DEVICE AND METHOD FOR TRANSITION FROM A SERVICING NETWORK NODE THAT SUPPORTS AN EXTENDED SECURITY CONTEXT TO A HEREDITARY SERVICE NETWORK NODE
CN107423099B (en) Key code programming method, server, terminal, key code programming system and storage medium
JP2011203825A (en) Information processing system, information processing apparatus, and management server
CN106656985B (en) Backup account login method, device and system
CN106685948A (en) Data processing method, terminal, communication device and data processing system
CN104683290A (en) Method and device for monitoring phishing and terminal
US20180263067A1 (en) Methods And Systems For Managing Network Hotspots
CN109086595B (en) Service account switching method, system, device and server
KR20150079379A (en) Apparatus, system, and method for identifying a man-in-the-middle connection
CN110505122B (en) Abnormal information monitoring and management method based on wireless keyboard and mouse signals
CN106385415B (en) Information security control method and device and terminal
CN105490913A (en) Instant message processing method and device
CN104007725A (en) Device monitoring system and monitoring method of device monitoring system
CN104540183A (en) Control method and control device for wireless hotspots
CN107396319B (en) A kind of method of wireless network authentication, equipment, storage medium and terminal reclaimer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant