CN112511602B - NB-IOT equipment detection method, intelligent terminal and storage medium - Google Patents

NB-IOT equipment detection method, intelligent terminal and storage medium Download PDF

Info

Publication number
CN112511602B
CN112511602B CN202011279784.8A CN202011279784A CN112511602B CN 112511602 B CN112511602 B CN 112511602B CN 202011279784 A CN202011279784 A CN 202011279784A CN 112511602 B CN112511602 B CN 112511602B
Authority
CN
China
Prior art keywords
detection
iot device
item
expected
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011279784.8A
Other languages
Chinese (zh)
Other versions
CN112511602A (en
Inventor
谢奕成
王斌斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011279784.8A priority Critical patent/CN112511602B/en
Publication of CN112511602A publication Critical patent/CN112511602A/en
Application granted granted Critical
Publication of CN112511602B publication Critical patent/CN112511602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a detection method of NB-IOT equipment, an intelligent terminal and a storage medium, wherein the method comprises the following steps: acquiring a detection item and an expected parameter corresponding to the detection item; detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result; and inputting the detection items and the detection results into a preset log file to generate a detection log. The invention provides an automatic detection method for NB-IOT equipment, which reduces manual intervention and improves detection efficiency and accuracy.

Description

NB-IOT equipment detection method, intelligent terminal and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a NB-IOT device detection method, an intelligent terminal, and a storage medium.
Background
Narrowband internet of things (Narrow Band Internet of Things, NB-IoT) is an emerging technology in the IoT field that supports cellular data connectivity of low power devices over wide area networks, also known as low power wide area networks. Due to its low cost, high reliability and high security, it is becoming increasingly widely used, especially in devices requiring security verification, such as smart locks, smart collars, etc. The NB-IoT device includes, in addition to the conventional internal linkage mechanism and other device modules, modules such as an NB-IoT module, a bluetooth and Radio Frequency (RF) module, as compared to a general smart device. Because NB-IoT devices are extremely security-related, they need to be rigorously inspected before shipment to ensure that each device can be put into service stably and reliably.
At present, NB-IoT devices are mostly implemented by installing additional modules on conventional mechanical devices, which usually need to be detected manually by using corresponding tools, and have poor accuracy and low reliability. While the additional modules installed by NB-IoT devices, such as NB-IoT modules, cannot be judged by observation. Therefore, detection of the general NB-IoT devices requires combination of manpower and software, and a convenient, quick and effective detection means is lacking.
Disclosure of Invention
The invention mainly aims to provide an NB-IOT equipment detection method, an intelligent terminal and a storage medium, and aims to solve the problem that in the prior art, the factory detection efficiency of NB-IoT equipment is low.
In order to achieve the above object, the present invention provides a method for detecting NB-IOT equipment, comprising the steps of:
acquiring a detection item and an expected parameter corresponding to the detection item;
detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result;
and inputting the detection items and the detection results into a preset log file to generate a detection log.
Optionally, in the NB-IOT device detection method, the detection item includes version number detection, and the expected parameter includes an expected version number; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is a version number detection, acquiring a version number of the NB-IoT device and taking the version number as an actual version number;
judging whether the actual version number is equal to the expected version number;
if yes, determining that the detection result corresponding to the version number detection is successful;
if not, determining that the detection result corresponding to the version number detection is detection failure.
Optionally, the NB-IOT device detection method, wherein the detection item comprises signal strength detection, and the expected parameter comprises a signal strength threshold; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is signal intensity detection, controlling the NB-IoT device to acquire an NB signal, and recording the signal intensity of the NB signal as the actual intensity;
judging whether the actual intensity is larger than the signal intensity threshold value or not;
if yes, determining that the detection result corresponding to the signal intensity detection is successful;
if not, determining that the detection result corresponding to the signal intensity detection is detection failure.
Optionally, in the NB-IOT device detection method, the detection item includes key detection, and the expected parameter includes an expected key response value; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is key detection, controlling the NB-IoT device to simulate each key, and recording an actual key response value corresponding to each key after the simulated use;
judging whether the expected key response value is equal to the actual key response value or not;
if yes, determining that the detection result corresponding to the key detection is successful;
if not, determining that the detection result corresponding to the key detection is detection failure.
Optionally, the NB-IOT device detection method, wherein the detection item includes decryption detection, and the expected parameter includes a decryption parameter; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is decryption detection, decrypting the NB-IoT device according to the decryption parameter to generate a decryption result;
judging whether the decryption result is successful decryption;
if yes, determining that the detection result corresponding to the decryption detection is successful;
if not, determining that the detection result corresponding to the decryption detection is detection failure.
Optionally, the NB-IOT device detection method, wherein the decryption parameters include a fingerprint, a password, and a card.
Optionally, the NB-IOT device detection method further includes, after detecting the currently connected NB-IOT device according to the detection item and the expected parameter and generating a detection result:
judging whether the detection results are all successful;
if the detection results are all successful, acquiring an expected identification code and a packaging identification code of the NB-IoT device;
judging whether the package identification code is the same as the expected identification code;
if yes, controlling a burning machine to burn the identification code of the NB-IoT device according to the expected identification code.
Optionally, the NB-IOT device detection method, after determining whether the detection results are all successful, further includes:
if the detection result has detection failure, taking the detection item with the detection result of which the detection is failed as a detection failure result and outputting the detection result.
In addition, to achieve the above object, the present invention further provides an intelligent terminal, where the intelligent terminal includes: the device detection method comprises a memory, a processor and a device detection method program, wherein the device detection method program is stored in the memory and can run on the processor, and the device detection method program is executed by the processor to realize the steps of the device detection method.
In addition, in order to achieve the above object, the present invention further provides a storage medium, where the storage medium stores an NB-IOT device detection method program that, when executed by a processor, implements the steps of the NB-IOT device detection method described above.
According to the method, the detection item to be performed and the expected parameter corresponding to the item are obtained, then detection of different items is performed on the currently connected NB-IoT device according to the detection item and the expected parameter, and therefore detection results corresponding to different items are obtained. And writing the detection items and the corresponding detection results into a preset log file to generate a detection log. Therefore, the whole process does not need manual work, errors caused by manual detection are reduced, and automation for NB-IoT device detection is realized. In addition, in combination with the characteristics of the NB-IoT device, the detection items include version number detection, signal strength detection, key detection and decryption detection, covering the key detection that was manually detected in the past and the detection of signals and decryption that cannot be directly displayed. In addition, finally, the identification codes are burnt according to the detection results of all the items, when some detection has problems, the next step cannot be carried out, and the qualification of NB-IOT equipment is ensured. The detection items with failed detection can also be output as detection failure results to remind a user to detect specific items of the NB-IOT equipment.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the method for detecting NB-IOT devices according to the present invention;
FIG. 2 is a general flow chart of a preferred embodiment of the method for detecting NB-IOT devices according to the present invention;
FIG. 3 is a schematic diagram of a computer end and smart lock connection in a preferred embodiment of the present invention provided by the NB-IOT device detection method;
FIG. 4 is a diagram illustrating an interface for inputting detection parameters in a preferred embodiment of the detection method of NB-IOT devices according to the present invention;
FIG. 5 is a diagram illustrating an interface for selecting a test item in a preferred embodiment of the method for testing NB-IOT devices according to the present invention;
FIG. 6 is a diagram illustrating an interface for obtaining an expected identifier in a preferred embodiment of the method for detecting NB-IOT devices according to the present invention;
FIG. 7 is a diagram illustrating an interface for comparing an expected identification code with an actual identification code in a preferred embodiment of the method for detecting NB-IOT devices according to the present invention;
FIG. 8 is an exemplary diagram of an interface for creating log files in a preferred embodiment provided by the NB-IOT device detection method of the present invention;
FIG. 9 is a diagram showing an example of an interface for displaying each detection item and corresponding detection result in a preferred embodiment of the detection method of NB-IOT device according to the present invention;
FIG. 10 is a schematic view of an operating environment of a smart terminal according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clear and clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The method for detecting NB-IOT equipment in the preferred embodiment of the present invention, as shown in FIG. 1 and FIG. 2, comprises the following steps:
step S100, obtaining detection items and expected parameters corresponding to the detection items.
Specifically, in this embodiment, the NB-IOT device to be detected is an intelligent lock, and the main body for executing the NB-IOT device detection method is an NB-IOT device detection program installed on the computer side.
As shown in fig. 3, the computer end and the intelligent lock are connected by a serial port tool, and the black line is grounded. An instruction to enter a yield test mode is output to the NB-IOT device to be tested, and may be input in the form of a specific string, for example, string "123#". When the power-on is started, the NB signal is also connected once. And simultaneously starting the NB-IOT equipment detection program.
And then, the user sets detection parameters of the NB-IOT equipment detection program to obtain data through a computer end, and the detection comprises a serial number, a bit rate, a receiving timeout time and the like as shown in fig. 4. The serial number is used to help the NB-IOT device detection program determine from which serial port to transmit and obtain information, and the bit rate is used to limit the frequency of data transmission, in this embodiment 115200. Because each detection item needs time to be performed, the NB-IOT device returns the corresponding detection data after performing the detection, and if the returned detection data is not received beyond the timeout time, the detection is considered to be abnormal, and in this embodiment, the timeout time is 500ms.
After setting the detection parameters, the user needs to input detection items for detection and expected parameters corresponding to the items to the NB-IOT equipment detection program. In this embodiment, there are various ways of inputting the detection item, one is to check the preset detection name of the NB-IOT device detection program as shown in fig. 4, so as to determine the detection item to be performed.
After the detection item is input, expected parameters are required to be input, the intelligent lock returns corresponding detection data after detection, the NB-IOT equipment detection program is required to judge whether the detection data are equal to the expected parameters according to a certain certificate, so that whether the intelligent lock is normal is judged, and the expected parameters are the certificate for judgment. The expected parameters may include an international mobile equipment version number (International Mobile Equipment Identity, IMEI), the correct results that the smart lock should normally return after performing the test, etc. The corresponding relation between a preset expected parameter and the detection items can be preset, when the detection items are input, the corresponding expected parameter is directly selected from the preset expected parameters and input, or the expected parameter corresponding to each detection item can be manually input according to the requirements of a user or acquired and input.
Step S200, detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result.
Specifically, according to the serial number, the NB-IOT device detection program may determine an NB-IOT device that is currently connected and to be detected, and according to the detection item, the NB-IOT device detection program controls the NB-IOT device to detect.
Further, the detection items comprise version number detection, signal strength detection, key detection and decryption detection.
In this embodiment, according to the nature of the smart lock, the detection items are divided into four major items, including version number detection, signal strength detection, key detection and decryption detection. The version number detection refers to whether the version numbers such as the IMEI number and the MCU version number in the NB-IOT equipment are correct or not. The signal strength detection is to detect whether the NB-IOT equipment can normally collect Bluetooth and NB signals. And the key detection is used for detecting whether the NB-IOT equipment can work normally or not. Since the security can be improved through encryption in the actual use of NB-IOT equipment, when detecting the intelligent lock, the detection of whether the intelligent lock can be normally opened or not by using a correct key, namely decryption detection is also carried out.
When the detection item is a version number detection, the expected parameter is an expected version number, and step S200 includes:
step S211, when the detection item is a version number detection, obtains a version number of the NB-IoT device and uses the version number as an actual version number.
In this embodiment, since different hardware has different version types, for example, the model of the bluetooth module, the smart lock should ensure that the hardware or software versions of each smart lock are unified before leaving the factory, and are all expected versions or models. As shown in fig. 3, the MCU, NB module, bluetooth module, and fingerprint head module all have different version numbers. The user may preset the version number of each hardware or software desired as the desired version number.
When the user checks the version number detection and starts the detection, in this embodiment, namely, MCU version station detection and NB version station detection in fig. 5, the NB-IoT device detection program issues an instruction for acquiring an actual version number to the intelligent lock through a serial port, and the intelligent lock acquires the version numbers of each module of the intelligent lock and then sends the version numbers as the actual version numbers to the NB-IoT device detection program.
Step S212, determining whether the actual version number is equal to the expected version number.
Specifically, after the NB-IoT device detection program receives the actual version number returned by the smart lock, it compares the actual version number with the expected version number to determine whether the actual version number is equal to the expected version number.
Step S213, if yes, determining that the detection result corresponding to the version number detection is successful.
Specifically, a detection success flag bit and a detection failure flag bit are preset, for example, 1 and 0 are respectively the detection success flag bit and the detection failure flag bit. If the two are equal, the hardware or software of the intelligent lock is expected by a user, so that the version number detection success flag bit 1 is used as a detection result of the intelligent lock version number detection.
Step S214, if not, determining that the detection result corresponding to the version number detection is detection failure.
Specifically, if not, it is indicated that the version number of the hardware or software of the intelligent lock is different from the expected version number of the user, so that the detection failure flag bit 0 is used as the detection result corresponding to the version number detection of the intelligent lock.
When the detection item is version number detection, the expected parameter is a signal strength threshold, and step S200 includes:
step S221, when the detection item is signal strength detection, controlling the NB-IoT device to collect NB signals, and recording the signal strength of the NB signals as the actual strength.
In particular, since the NB-IoT device needs to pass NB signals to verify whether the input to the device is correct when in use, whether the NB-IoT device can effectively acquire signals is critical to whether the NB-IoT device can function properly. When the detection item is signal intensity detection, the NB-IoT device is controlled to collect NB signals. In order to ensure smooth signal acquisition, NB signals may be connected once when the NB-IoT device is turned on, but in consideration of battery life, NB signals may be connected again only when the signal strength is detected when the product mode is entered. While NB signals are collected, the signal mildness that it can collect is taken as the actual strength and sent to the NB-IoT device detection procedure.
Step S222, determining whether the actual intensity is greater than the signal intensity threshold.
Specifically, upon receiving the actual strength, the NB-IoT device detection program compares it to the signal strength threshold and determines whether the actual strength is greater than the signal strength threshold.
Step S223, if yes, determining that the detection result corresponding to the signal strength detection is successful.
Specifically, if yes, it is indicated that the capability of the intelligent lock for acquiring NB signals is normal, so that the successful detection flag bit 1 is used as a detection result corresponding to the signal intensity detection.
Step S223, if not, determining that the detection result corresponding to the signal strength detection is detection failure.
Specifically, if not, it is indicated that the capability of the intelligent lock for acquiring NB signals has a fault, so the detection failure flag bit 0 is used as a detection result corresponding to the signal intensity detection.
Further, the expected parameter includes an expected key response value, and step S200 includes:
in step S231, when the detection item is key detection, the NB-IoT device is controlled to perform simulation on each key, and an actual key response value corresponding to each key after the simulation is performed is recorded.
Specifically, when the detection item is key detection, the NB-IoT device is controlled to simulate each key, for example, ten keys, the situation that the ten keys are pressed is simulated in sequence, and the actual key response value corresponding to each key after the simulation is used is recorded. The key response value corresponding to the successful response or the unsuccessful response of the key is preset, for example, the prompting lamp is turned on after a certain key is pressed, whether the prompting lamp is turned on after simulation use is judged, and if the prompting lamp is turned on, the key response value corresponding to the successful response is recorded as the actual key response value.
Step S232, determining whether the expected key response value is equal to the actual key response value.
Specifically, all keys of the intelligent lock can normally respond when the intelligent lock leaves a factory, so that the expected key response value is equal to the key response value corresponding to the success. And judging whether the expected key response value is equal to the actual key response value, and judging whether all keys of the intelligent lock are normal.
Step S233, if yes, determining that the detection result corresponding to the key detection is successful.
Specifically, if yes, each key of the intelligent lock can be normally used, so that a detection result corresponding to the key detection is determined to be successful in detection, and the detection success flag bit 1 is recorded as the detection result.
Step S234, if not, determining that the detection result corresponding to the key detection is detection failure.
Specifically, if not, the intelligent latch is in a situation that the key cannot normally correspond to the key, so that a detection result corresponding to the key detection is determined to be a detection failure, and the detection failure flag bit 0 is recorded as the detection result.
Further, the expected parameters include decryption parameters, and step S200 includes:
step S241, when the detection item is decryption detection, decrypting the NB-IoT device according to the decryption parameter, and generating a decryption result.
Specifically, since the intelligent lock is used for protecting the security of a property, the intelligent lock can be unlocked according to a correct key when other keys such as a password are input in the actual use process. And therefore, when the detection item is decryption detection, taking the decryption parameter as a correct key, and decrypting the NB-IoT device according to the decryption parameter to generate a decryption result, wherein the decryption result comprises decryption success and decryption failure. Further, in the decryption detection, the decryption parameters can be passwords in a digital or letter form, cards such as a sensing card with a key, and biological characteristics such as voiceprints and fingerprints. And finally returning the decryption result to the NB-IoT device detection program.
Step S242, determining whether the decryption result is successful.
Specifically, after receiving the decryption result, the NB-IoT device detection program determines whether it is successful in decryption.
Step S243, if yes, determining that the detection result corresponding to the decryption detection is successful detection.
Specifically, if yes, it is indicated that the intelligent lock can normally complete decryption work, so that a detection result corresponding to decryption detection is determined to be successful in detection, and the detection success flag bit 1 is recorded as the detection result.
Step S244, if not, determining that the detection result corresponding to the decryption detection is detection failure.
Specifically, if not, it is indicated that the smart lock cannot normally complete the decryption operation, so that it is determined that the detection result corresponding to the decryption detection is a detection failure, and the detection failure flag bit 0 is recorded as the detection result.
Further, after step S200, the method further includes:
step S251, determining whether the detection results are all successful.
Specifically, after all the detection items are completed, whether the detection results corresponding to the detection items are all successful is judged by judging whether the flag bit is 1.
Step S252, if the detection results are all successful, acquiring the expected identification code and the package identification code of the NB-IoT device.
Specifically, if the detection results are all successful, the intelligent lock is a qualified intelligent lock, and the intelligent lock can be used for factory sales and use. If the current scene is the product inspection before leaving the factory, the computer end is connected with a code scanning gun in advance, the code scanning gun scans the base plate sticker, the nameplate sticker, the antenna sticker and the color box sticker of the intelligent lock to obtain the package identification code of the intelligent lock, and the IMEI code on the package box is adopted in the embodiment. In addition, as shown in fig. 6, after the detection before and during the detection of the smart lock, the preset expected identification code, in this embodiment, the IMEI code, is obtained.
Step S253, determining whether the package identification code is the same as the expected identification code.
Specifically, as shown in fig. 7, after the expected identification code and the package identification code are collected, the user clicks the comparison key to automatically determine whether the two are the same.
Step S254, if yes, controlling a burning machine to burn the identifier code of the NB-IoT device according to the expected identifier code.
Specifically, if the intelligent lock is the same, the intelligent lock is not only proved to be in the detection of the internal condition, but also is consistent with the internal identification, a 'pass' word can be displayed on a screen, and the intelligent lock can be sold in a factory, so that a connected burning machine is controlled to burn the identification code of the intelligent lock.
In this embodiment, the burning of the identification code is performed after all the tests are completed and the package identification codes on the package are matched, and when some test items have problems, the shipment cannot be performed, so that all the problems are detected and no problem is detected
Step S300, inputting the detection items and the detection results into a preset log file to generate a detection log.
Specifically, in this embodiment, as shown in fig. 6, the NB-IoT device detection program reads the IMEI of the smart lock, and creates a log file corresponding to the IMEI, so as to record the detection result.
Further, in order to trace the source and problem of the detection result later, in this embodiment, as shown in fig. 8, when the log file is created, the current time is also written into the log file.
After detection of all detection items input by a user is completed, writing the detection items and corresponding detection results thereof into the log file, and generating a detection log corresponding to the intelligent lock. Meanwhile, in order to facilitate the user to intuitively understand the detection results of each detection item of the intelligent lock, a visual display interface of the result may be provided, as shown in fig. 9, and when the detection results corresponding to each detection item are obtained, color representation is performed on the detection item according to the detection results. For example, green indicates successful detection, red indicates failure of detection, and gray indicates that the detection item is not performed.
Further, after step S251, the method further includes: if the detection result has detection failure, taking the detection item with the detection result of which the detection is failed as a detection failure result and outputting the detection result.
Specifically, if the detection result corresponding to the detection item has detection failure, the intelligent latch is indicated to be in failure, so that the detection item with the detection result of detection failure is taken as a detection failure result and output, and a user is reminded of the failure of the module corresponding to the detection item.
Further, as shown in fig. 10, based on the NB-IOT device detection method, the present invention further provides an intelligent terminal, which includes a processor 10, a memory 20 and a display 30. Fig. 10 shows only some of the components of the intelligent terminal, but it should be understood that not all of the illustrated components are required to be implemented, and more or fewer components may alternatively be implemented.
The memory 20 may in some embodiments be an internal storage unit of the smart terminal, such as a hard disk or a memory of the smart terminal. The memory 20 may also be an external storage device of the Smart terminal in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like. Further, the memory 20 may also include both an internal storage unit and an external storage device of the smart terminal. The memory 20 is used for storing application software installed in the intelligent terminal and various data, such as program codes for installing the intelligent terminal. The memory 20 may also be used to temporarily store data that has been output or is to be output. In one embodiment, memory 20 has stored thereon an NB-IOT device detection method program 40, where NB-IOT device detection method program 40 is executable by processor 10 to implement the NB-IOT device detection method of the present application.
The processor 10 may in some embodiments be a central processing unit (Central Processing Unit, CPU), microprocessor or other data processing chip for executing program code or processing data stored in the memory 20, such as for performing the NB-IOT device detection method, etc.
The display 30 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like in some embodiments. The display 30 is used for displaying information on the intelligent terminal and for displaying a visual user interface. The components 10-30 of the intelligent terminal communicate with each other via a system bus.
In one embodiment, the following steps are implemented when processor 10 executes NB-IOT device detection method program 40 in memory 20:
acquiring a detection item and an expected parameter corresponding to the detection item;
detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result;
and inputting the detection items and the detection results into a preset log file to generate a detection log.
The detection item comprises version number detection, and the expected parameter comprises an expected version number; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is a version number detection, acquiring a version number of the NB-IoT device and taking the version number as an actual version number;
judging whether the actual version number is equal to the expected version number;
if yes, determining that the detection result corresponding to the version number detection is successful;
if not, determining that the detection result corresponding to the version number detection is detection failure.
The detection item comprises signal strength detection, and the expected parameter comprises a signal strength threshold; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is signal intensity detection, controlling the NB-IoT device to acquire an NB signal, and recording the signal intensity of the NB signal as the actual intensity;
judging whether the actual intensity is larger than the signal intensity threshold value or not;
if yes, determining that the detection result corresponding to the signal intensity detection is successful;
if not, determining that the detection result corresponding to the signal intensity detection is detection failure.
The detection item comprises key detection, and the expected parameter comprises an expected key response value; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is key detection, controlling the NB-IoT device to simulate each key, and recording an actual key response value corresponding to each key after the simulated use;
judging whether the expected key response value is equal to the actual key response value or not;
if yes, determining that the detection result corresponding to the key detection is successful;
if not, determining that the detection result corresponding to the key detection is detection failure.
The detection item comprises decryption detection, and the expected parameter comprises a decryption parameter; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is decryption detection, decrypting the NB-IoT device according to the decryption parameter to generate a decryption result;
judging whether the decryption result is successful decryption;
if yes, determining that the detection result corresponding to the decryption detection is successful;
if not, determining that the detection result corresponding to the decryption detection is detection failure.
The decryption parameters include a fingerprint, a password, and a card.
The method comprises the steps of detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result, and then further comprises the steps of:
judging whether the detection results are all successful;
if the detection results are all successful, acquiring an expected identification code and a packaging identification code of the NB-IoT device;
judging whether the package identification code is the same as the expected identification code;
if yes, controlling a burning machine to burn the identification code of the NB-IoT device according to the expected identification code.
After judging whether the detection results are all successful, the method further comprises the following steps:
if the detection result has detection failure, taking the detection item with the detection result of which the detection is failed as a detection failure result and outputting the detection result.
The present invention also provides a storage medium, where the storage medium stores an NB-IOT device detection method program that when executed by a processor implements the steps of the NB-IOT device detection method described above.
Of course, those skilled in the art will appreciate that implementing all or part of the above-described methods may be implemented by a computer program for instructing relevant hardware (such as a processor, a controller, etc.), where the program may be stored in a computer-readable storage medium, and where the program may include the steps of the above-described method embodiments when executed. The storage medium may be a memory, a magnetic disk, an optical disk, or the like.
It is to be understood that the invention is not limited in its application to the examples described above, but is capable of modification and variation in light of the above teachings by those skilled in the art, and that all such modifications and variations are intended to be included within the scope of the appended claims.

Claims (6)

1. The method for detecting the NB-IOT equipment is characterized by comprising the following steps of:
acquiring a detection item and an expected parameter corresponding to the detection item;
detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result;
inputting the detection items and the detection results into a preset log file to generate a detection log;
the detection item comprises key detection, and the expected parameter comprises an expected key response value; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is key detection, controlling the NB-IoT device to simulate each key, and recording an actual key response value corresponding to each key after the simulated use;
judging whether the expected key response value is equal to the actual key response value or not;
if yes, determining that the detection result corresponding to the key detection is successful;
if not, determining that the detection result corresponding to the key detection is a detection failure;
the detection item comprises decryption detection, and the expected parameter comprises a decryption parameter; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is decryption detection, decrypting the NB-IoT device according to the decryption parameter to generate a decryption result;
judging whether the decryption result is successful decryption;
if yes, determining that the detection result corresponding to the decryption detection is successful;
if not, determining that the detection result corresponding to the decryption detection is detection failure;
obtaining detection parameters of the NB-IOT equipment through an NB-IOT equipment detection program, wherein the detection parameters comprise: serial number, bit rate, reception timeout time;
the NB-IOT equipment detection program determines the NB-IOT equipment which is currently connected and to be detected according to the serial number;
the NB-IOT equipment detection program controls the NB-IOT equipment to detect according to the detection item;
the method comprises the steps of detecting the currently connected NB-IoT device according to the detection item and the expected parameter, and generating a detection result, and then further comprises the steps of:
judging whether the detection results are all successful;
if the detection results are all successful, acquiring an expected identification code and a packaging identification code of the NB-IoT device;
judging whether the package identification code is the same as the expected identification code;
if yes, controlling a burning machine to burn the identification code of the NB-IoT device according to the expected identification code;
after judging whether the detection results are all successful, the method further comprises the following steps:
if the detection result has detection failure, taking a detection item with the detection result of which the detection is failed as a detection failure result and outputting the detection failure result;
and when detection results corresponding to all the detection items are obtained, carrying out color representation on the detection items according to the detection results.
2. The NB-IOT device detection method of claim 1, wherein the detection item comprises a version number detection, and the expected parameter comprises an expected version number; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is a version number detection, acquiring a version number of the NB-IoT device and taking the version number as an actual version number;
judging whether the actual version number is equal to the expected version number;
if yes, determining that the detection result corresponding to the version number detection is successful;
if not, determining that the detection result corresponding to the version number detection is detection failure.
3. The NB-IOT device detection method of claim 1, wherein the detection item comprises signal strength detection, and the expected parameter comprises a signal strength threshold; the detecting, according to the detection item and the expected parameter, the NB-IoT device that is currently connected, and generating a detection result specifically includes:
when the detection item is signal intensity detection, controlling the NB-IoT device to acquire an NB signal, and recording the signal intensity of the NB signal as the actual intensity;
judging whether the actual intensity is larger than the signal intensity threshold value or not;
if yes, determining that the detection result corresponding to the signal intensity detection is successful;
if not, determining that the detection result corresponding to the signal intensity detection is detection failure.
4. The NB-IOT device detection method of claim 1, wherein the decryption parameters comprise a fingerprint, a password, and a card.
5. An intelligent terminal, characterized in that, the intelligent terminal includes: memory, a processor, and an NB-IOT device detection method program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the NB-IOT device detection method of any of claims 1-4.
6. A storage medium storing an NB-IOT device detection method program that when executed by a processor performs the steps of the NB-IOT device detection method recited in any of claims 1-4.
CN202011279784.8A 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium Active CN112511602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011279784.8A CN112511602B (en) 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011279784.8A CN112511602B (en) 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112511602A CN112511602A (en) 2021-03-16
CN112511602B true CN112511602B (en) 2023-08-04

Family

ID=74956277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011279784.8A Active CN112511602B (en) 2020-11-16 2020-11-16 NB-IOT equipment detection method, intelligent terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112511602B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116149677B (en) * 2022-11-30 2024-08-02 深圳市湘凡科技有限公司 Method, device, equipment and medium for burning serial numbers

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1641592A (en) * 2004-01-07 2005-07-20 北京北阳电子技术有限公司 Method and system for measuring functions of electronic product with keyboard
CN110262468A (en) * 2019-07-26 2019-09-20 泰华智慧产业集团股份有限公司 Smart lock test equipment and test method
CN110719359A (en) * 2019-10-09 2020-01-21 中国联合网络通信集团有限公司 Terminal performance test method and system
CN111083018A (en) * 2019-12-31 2020-04-28 厦门市美亚柏科信息股份有限公司 Production detection method and device for wireless equipment
CN111239589A (en) * 2020-01-20 2020-06-05 福建宏泰智能工业互联网有限公司 Electronic lock circuit board testing method, device and system
CN111585847A (en) * 2020-05-21 2020-08-25 四川虹美智能科技有限公司 Detection system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1641592A (en) * 2004-01-07 2005-07-20 北京北阳电子技术有限公司 Method and system for measuring functions of electronic product with keyboard
CN110262468A (en) * 2019-07-26 2019-09-20 泰华智慧产业集团股份有限公司 Smart lock test equipment and test method
CN110719359A (en) * 2019-10-09 2020-01-21 中国联合网络通信集团有限公司 Terminal performance test method and system
CN111083018A (en) * 2019-12-31 2020-04-28 厦门市美亚柏科信息股份有限公司 Production detection method and device for wireless equipment
CN111239589A (en) * 2020-01-20 2020-06-05 福建宏泰智能工业互联网有限公司 Electronic lock circuit board testing method, device and system
CN111585847A (en) * 2020-05-21 2020-08-25 四川虹美智能科技有限公司 Detection system and method

Also Published As

Publication number Publication date
CN112511602A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
US9633492B2 (en) System and method for a vehicle scanner to automatically execute a test suite from a storage card
CN109145579A (en) Intelligent network joins automobile information secure authentication testing method and system
CN106828362B (en) Safety testing method and device for automobile information
CN104914845B (en) A kind of car body controller fault testing method and system based on industrial personal computer
CN110719300B (en) Method and system for automatic vulnerability verification
CN106650460A (en) Version check method and device and terminal equipment
CN112511602B (en) NB-IOT equipment detection method, intelligent terminal and storage medium
CN202584165U (en) IC card production testing system
CN108829090A (en) A kind of vehicle control unit of electric vehicle off-line detection system and detection method
CN112069074A (en) RFID tag chip verification device based on UVM
US8874302B2 (en) Automotive scanner with advanced module programming options
CN108596634A (en) A kind of detection method and system of genuine component
CN114282268A (en) Database integrity checking method and device based on SM3 algorithm
CN109032956A (en) A kind of interface test method and device
CN110619215B (en) Code security scanning method and system
CN112947964A (en) Chip firmware updating method, device, equipment and storage medium
CN117254945A (en) Vulnerability tracing method and device based on automobile attack link
CN111726247A (en) Electronic lock firmware updating method and device, electronic lock and storage medium
CN111625795A (en) Login authentication system and method based on finger veins
CN111143262A (en) Switching device, instrument control system and instrument control method
CN115146283A (en) Information security testing method and device for vehicle-mounted information interaction system
CN108594794A (en) Vehicle diagnosis method, device and equipment
CN109041011A (en) A kind of vehicle detection terminal and networking method, system, equipment, computer media
CN117494148B (en) Security detection method, security detection device, terminal equipment and computer readable storage medium
Hawrylak et al. Automated test system for ISO 18000-7-active RFID

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant