CN113950003A - Information processing method, device, equipment and computer readable storage medium - Google Patents
Information processing method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN113950003A CN113950003A CN202010688689.7A CN202010688689A CN113950003A CN 113950003 A CN113950003 A CN 113950003A CN 202010688689 A CN202010688689 A CN 202010688689A CN 113950003 A CN113950003 A CN 113950003A
- Authority
- CN
- China
- Prior art keywords
- equipment
- distance
- determining
- broadcast
- broadcast messages
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
- Alarm Systems (AREA)
Abstract
The embodiment of the application discloses an information processing method, which is characterized by being applied to first equipment, and the method comprises the following steps: receiving a plurality of broadcast messages sent by second equipment; determining a distance relationship between the second device and the first device based on the plurality of broadcast messages; determining a device type of the second device based on the distance relationship. The embodiment of the application also discloses an information processing device, an information processing device and a computer readable storage medium.
Description
Technical Field
The present application relates to the field of wireless communication technologies, and in particular, to an information processing method, an information processing apparatus, information processing equipment, and a computer-readable storage medium.
Background
Security monitoring has been a topic of interest in the industry. How to provide a more effective and safer security monitoring technology is the direction of efforts in the industry and academia. The existing security monitoring systems can be mainly divided into two categories, namely visual security monitoring systems and non-visual security monitoring systems.
In practical application, a visual security monitoring system usually utilizes a camera to collect images of the surrounding environment to monitor the surrounding environment, and specifically, when the content in the collected images is detected to change to a certain degree, an alarm mechanism is triggered. However, there are many scenarios for triggering the alarm mechanism of the visual security monitoring system, for example, walking of animals, vehicles driving on roads, and light changes trigger the alarm mechanism, so the false triggering rate of the visual security monitoring system is high. In addition, the non-visual security system generally adopts non-visible light frequency band electromagnetic waves such as infrared rays and radio frequencies to monitor the surrounding environment, the accuracy of triggering an alarm mechanism is relatively high, the false triggering rate is relatively low, but the specific user cannot be accurately positioned, so that the problem of difficult evidence collection is caused.
Disclosure of Invention
The embodiment of the application provides an information processing method, an information processing device, information processing equipment and a computer storage medium.
The embodiment of the application provides an information processing method, which is applied to first equipment, and comprises the following steps:
receiving a plurality of broadcast messages sent by second equipment;
determining a distance relationship between the second device and the first device based on the plurality of broadcast messages;
determining a device type of the second device based on the distance relationship.
An embodiment of the present application provides an information processing apparatus, including:
a communication unit for receiving a plurality of broadcast messages transmitted by a second device;
a distance relationship determination unit configured to determine a distance relationship between the second device and the first device based on the plurality of broadcast messages;
a processing unit, configured to determine a device type of the second device based on the distance relationship.
An embodiment of the present application provides an information processing apparatus including a transceiver, a processor, and a memory for storing a computer program capable of running on the processor;
the transceiver, the processor and the memory communicate with each other through a communication bus;
the processor is configured to perform the steps of any of the above methods when the computer program stored in the memory is run in conjunction with the transceiver.
Embodiments of the present application also provide a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of any one of the above methods.
According to the information processing method provided by the embodiment of the application, the first device can analyze the distance relationship between the second device and the first device according to the plurality of broadcast information sent by the second device; and determining the device type of the second device according to the distance relationship. Like this, through the characteristic monitoring second equipment of a plurality of broadcast messages to the distance between the first equipment, can improve the accuracy of security protection monitoring, reduce the false triggering probability to can accurately lock the equipment that produces the threat, reduce the degree of difficulty that the crime was forensics.
Drawings
Fig. 1 is a schematic architecture diagram of an exemplary wireless communication system according to an embodiment of the present application;
fig. 2 is a schematic diagram of an exemplary application scenario provided in an embodiment of the present application;
fig. 3 is a first flowchart illustrating an information processing method according to an embodiment of the present application;
fig. 4 is a second flowchart illustrating an information processing method according to an embodiment of the present application;
FIG. 5(a) is a first exemplary scenario for calculating a risk factor according to an embodiment of the present disclosure;
FIG. 5(b) is a diagram illustrating an exemplary second scenario for calculating a risk factor according to an embodiment of the present disclosure;
fig. 5(c) is a schematic view of an exemplary scenario for calculating a risk factor provided in an embodiment of the present application;
fig. 6 is a schematic flowchart of a data transmission method according to an embodiment of the present application;
fig. 7 is a flowchart illustrating a data transmission method according to an embodiment of the present application.
Detailed Description
So that the manner in which the features and elements of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
It should be noted that the terms "first", "second", and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In practical application, a security monitoring system needs to balance the accuracy of user identification and the sensitivity of false triggering and the difficulty of evidence obtaining after crime occurs.
The visual security monitoring system is intuitive in operation, each camera has a region which can be covered by the camera, and the region which is expected to be monitored can be covered by installing a plurality of cameras. The visual security monitoring system needs to combine the content recorded by the camera to realize the automatic alarm function; the existing camera can realize motion perception alarm. That is, when the content of the captured image changes to some extent, an alarm mechanism is triggered or the user is notified that the user needs to pay attention. However, in practical applications, the number of scenes capable of triggering motion alarm is large, for example, animals, vehicles running on roads, wind blowing grass and light changes can trigger alarm, and the false triggering rate is high. In addition, from the perspective of obtaining evidence after a crime, the camera can most intuitively record a criminal suspect and a criminal process, but the criminal suspect can reduce the accuracy of obtaining evidence by the camera through means of shielding the face and the like.
The accuracy of the non-visual security monitoring system triggering the alarm mechanism is relatively high, and the false triggering rate is relatively low. For example, infrared sensing is used to monitor the opening state of doors and windows, and an alarm is triggered only when the doors and windows are actually opened. In addition, from the perspective of evidence collection after crime, the non-visual security monitoring system is only suitable for monitoring the change of the deployment and control scene, and cannot be accurately locked to a specific user, so that the problem of difficult evidence collection is caused.
Currently, techniques for implementing monitoring using radio frequency technology are widely studied. Briefly, the technology is to utilize different influences of different human bodies on WiFi signals to realize identification and tracking of people. However, in practical use, due to changes of use scenes, such as multiple reflections caused by indoor complex environments, the position of the WiFi monitoring system, and wearing of people (e.g., wearing of metal objects), WiFi signals to be monitored can be seriously affected, and therefore, the monitoring effect is affected.
In order to solve the above problems in the related art, embodiments of the present application provide an information processing method, apparatus, device, and computer-readable storage medium, which can reduce a false triggering rate in a security monitoring process, accurately lock a device used by a user, and improve accuracy of security monitoring.
The information processing method, apparatus, device, and computer-readable storage medium provided in the embodiments of the present application may be applied to an exemplary wireless network architecture shown in fig. 1, and a brief description is provided below for a wireless communication system related to the embodiments of the present application.
As shown in fig. 1, the wireless network architecture includes a device 110, a device 120, and a network 130. Where device 120 is connected to device 110 through network 130. The Network 130 may be a wireless wide area Network (ww an), a wireless local area Network (wlan), a Global System for Mobile communication (GSM) Network or a Code Division Multiple Access (CDMA) Network, a Wideband Code Division Multiple Access (WCDMA) Network, a Long Term Evolution (LTE) Network, a New Radio interface (NR) Network of a fifth generation Mobile communication System (5G), a Cloud Radio Access Network (CRAN), a bluetooth communication Network, a Device-to-Device (D2D) communication Network, and the like. The embodiments of the present application are not limited herein.
The device 110 and the device 120 may be network devices or terminal devices. Here, the Network device may be a WiFi router, a Base Transceiver Station (BTS) of a Global System for Mobile communication (GSM) System or a Code Division Multiple Access (CDMA) System, a Base Station (NodeB, NB) of a Wideband Code Division Multiple Access (WCDMA) System, an evolved NodeB (eNB), an Access Point (AP), or a relay Station of a Long Term Evolution (LTE) System, a Base Station (e.g., a gbb or a Transmission Point (TRP)) of a 5G System, a wireless controller under a Cloud Radio Access Network (CRAN), a wearable device, or a vehicle-mounted device. And is not limited herein.
The terminal device mentioned in the embodiments of the present application may be a User Equipment (UE), an access terminal, a UE unit, a UE station, a mobile station, a remote terminal, a mobile device, a UE terminal, a wireless terminal device, a UE agent, or a UE apparatus. But may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a handheld device with Wireless communication capability, a computing device or other processing device connected to a Wireless modem, a vehicle mounted device, a drone, a wearable device, a robot, a terminal in a future 5G Network or a terminal in a future evolved Public Land Mobile Network (PLMN), etc.
In one possible implementation, when device 110 is implemented as a network device, device 120 may be implemented as a terminal device. When a user carries a device 120 (i.e., a terminal device) into the coverage area of the device 110 (i.e., a network device), a radio frequency signal conforming to the access standard of the device 110, such as a 5G cellular network signal, a WiFi signal, or a bluetooth probe signal, may be transmitted to the device 110. Device 110 may decide whether to allow access by device 120 based on the radio frequency signal.
In another possible implementation, when device 110 is implemented as a terminal device, device 120 may also be implemented as a terminal device. When a user approaches the device 110 (i.e., the terminal device) with the device 120 (i.e., the terminal device), a radio frequency signal requesting a connection, such as a WiFi signal, a D2D probe signal, or a bluetooth probe signal, may be sent to the device 110. Based on the probe signal, device 110 may decide whether to allow access by device 120 based on the radio frequency signal.
The following provides an exemplary description of an application scenario to which embodiments of the present application are applicable.
Fig. 2 is a schematic diagram of an exemplary application scenario provided in the embodiment of the present application, and as shown in fig. 2, the device 110 may be disposed in an area that needs to be monitored, for example, the device 110 may be disposed in a home, a museum, or the like. Device 110 may acquire and record radio frequency signals emitted by devices 120 ( terminals 1201 and 1202 are illustratively shown) within its network coverage area. The device 110 implements person monitoring by monitoring radio frequency signals emitted by the devices 1201 and 1202, where the person monitoring is a person carrying the terminal 1201 or the terminal 1202.
Next, an information processing method provided by the embodiment of the present application is described with reference to an exemplary network architecture shown in fig. 1 and an exemplary application scenario shown in fig. 2.
The embodiment of the application provides an information processing method, and an execution main body of the information processing method is a first device. Here, the first device may be the device 110 shown in fig. 1 and 2. The second device that enables information interaction with the first device may be the device 120 shown in fig. 1 and 2.
Fig. 3 is a schematic flowchart of an information processing method according to an embodiment of the present application, and as shown in fig. 3, the data transmission method includes the following steps:
In practical applications, the wireless device may transmit various radio frequency signals to the outside. According to the embodiment of the application, personnel monitoring can be achieved by utilizing the characteristics of the transmission signals. By personnel monitoring is meant herein a person carrying a wireless device capable of transmitting radio frequency signals.
In the embodiments provided in the present application, the second device may transmit various radio frequency signals to the outside, such as cellular signals based on 4G or 5G, WiFi signals, bluetooth signals, and the like. In many cases, the second device transmits a broadcast message to the outside even if a perfect association is not established with the network device or other devices. Here, the broadcast message is one of radio frequency signals, and the broadcast message can carry identification information of the second device, where the identification information can uniquely identify the second device, and for example, the identification information may be a Universal Unique Identifier (UUID) or a Media Access Control (Mac) address of the second device.
In one embodiment, the broadcast message may be any type of probe request message for probing a wireless network located around the second device. Illustratively, the broadcast message may be a WiFi probe request message.
It should be noted that the first device may receive a plurality of broadcast messages sent by the second device within a period of time, so that the first device may determine the distance relationship between the first device and the second device within the period of time according to the received plurality of broadcast messages. The period of time may be several hours or minutes in succession. The embodiments of the present application are not limited herein.
In the embodiments provided by the present application, the first device may store the related information of the received broadcast message after receiving the broadcast message each time; for example, the first device may create a storage space for storing the broadcast message of the second device for the second device based on the identification information of the second device, and store the received broadcast message sent by the second device in the storage space.
In one embodiment, receiving a plurality of broadcast messages sent by the second device may be implemented by:
step 3011, receiving a first broadcast message sent by a second device;
step 3012, receiving at least one second broadcast message sent by the second device in a first duration period taking the time of receiving the first broadcast message as the starting time; the plurality of broadcast messages includes a first broadcast message and at least one second broadcast message.
That is, the first device may monitor the second broadcast message transmitted by the second device for the first duration from the time when the first broadcast message transmitted by the second device is received, until the first duration is over, and receive one first broadcast message and at least one second broadcast message.
In another embodiment, receiving a plurality of broadcast messages sent by the second device may be further implemented by:
step 3011', receiving a first broadcast message sent by a second device;
step 3012', obtain a plurality of broadcast messages sent by the second device within the fourth duration; the fourth duration is a specific duration before the moment of receiving the first broadcast message; the plurality of broadcast messages includes a first broadcast message and at least one second broadcast message.
That is to say, the first broadcast message is a broadcast message currently received by the first device, and after receiving the first broadcast message, the first device may obtain, from the local storage space, historical broadcast information sent by the second device within a specific time period according to the identification information of the second device carried in the first broadcast message. Wherein the fourth duration refers to a specific duration before the time of receiving the first broadcast message.
It should be noted that the fourth duration period may be the same as or different from the first duration period, and the embodiment of the present application is not limited herein.
In the embodiment provided by the present application, the first duration and the fourth duration may be set by a user, or the first device may perform adaptive adjustment according to a received broadcast message sent by the second device, for example, when a broadcast message sent by the second device is received less, a value of the first duration or the fourth duration may be extended, and when a broadcast message sent by the second device is received more, a value of the first duration or the fourth duration may be shortened. The embodiments of the present application are not limited herein.
In the embodiments provided in the present application, the first device may determine, according to a broadcast message sent by the second device each time the first device receives the broadcast message, a distance between the second device and the first device when the broadcast message is received. In this way, the first device may determine a distance relationship between the second device and the second device over a period of time based on the plurality of broadcast messages. That is, the first device may determine whether the second device is gradually approaching or gradually departing from the first device over a period of time (e.g., a first duration or a fourth duration), or whether the second device is first rapidly approaching and then rapidly departing from the first device.
In practical applications, the signal strength, the signal quality, and the Channel State Information (CSI) between the first device and the second device are related to the distance between the first device and the second device. For example, the closer the first device and the second device are, the larger the signal value (e.g., amplitude) of the CSI, whereas the farther the first device and the second device are, the smaller the signal value of the CSI.
In embodiments provided herein, the first device may determine a distance between the second device and the first device based on a signal strength of the received broadcast message (e.g., a signal level value of the broadcast message); the first device may also determine a distance between the second device and the first device based on a signal quality of the received broadcast message. The first device may also determine a distance between the second device and the first device according to CSI carried in the broadcast message. The embodiments of the present application are not limited herein.
In embodiments provided herein, the types of equipment include hazardous equipment and non-hazardous equipment. A hazardous device, meaning that a user holding the device may pose a threat to users and/or property within the network coverage of the first device; conversely, a non-hazardous device refers to a device that a user in possession of the device has no threat to users and/or property within the network coverage of the first device.
It is understood that the first device may determine whether the second device is a dangerous device in step 330 according to a distance relationship between the first device and the second device over a period of time (e.g., a first duration or a fourth duration).
For example, if the distance relationship represents that the distance between the second device and the first device is rapidly decreased and then rapidly increased within a period of time (e.g., the first duration or the fourth duration), that is, the second device rapidly enters the deployment range of the first device and rapidly departs from the deployment range, it can be considered that the second device does not pose a threat to the first device, and the device type of the second device is a non-dangerous device. If the distance relationship represents that the distance between the second device and the first device is changed from small to large within a period of time and is smaller than the distance threshold within the duration time, that is, the second device approaches the control area of the first device and stays in the area close to the first device, the device type of the second device can be determined to be dangerous device.
Therefore, according to the information processing method provided by the embodiment of the application, the first device can analyze the distance relationship between the second device and the first device according to the plurality of broadcast information sent by the second device; and determining the type of the second device based on the distance relationship. Like this, through the characteristic monitoring second equipment of a plurality of broadcast messages to the distance between the first equipment, can improve the accuracy of security protection monitoring, reduce the false triggering probability, can also accurately lock the equipment that produces the threat, reduce the degree of difficulty that the crime was forensics.
In an embodiment, step 320 determines a distance relationship between the second device and the first device based on a plurality of broadcast messages, which may be implemented through steps 3201 to 3202. The method comprises the following specific steps:
step 3301, the first device determines a plurality of channel state information based on the plurality of broadcast messages; wherein, the plurality of broadcast messages correspond to the plurality of channel state information one to one;
step 3302, the first device determines a distance relationship between the second device and the first device based on the plurality of channel state information.
In the embodiment provided by the present application, each broadcast message in the multiple broadcast messages sent by the second device carries channel state information, that is, CSI. The first device may determine the specific CSI carried by each broadcast message by parsing each broadcast message sent by the second device.
Here, CSI is understood to be a wireless communication channel attribute, the most important channel attribute of which is signal strength, which is the strength of a signal that a first device can receive from a second device. This signal strength is related to the own radio frequency characteristics of the second device sending the broadcast message, to the first device antenna gain, and also to the distance between the first device and the second device. In practical applications, the closer the first device and the second device are, the stronger the CSI signal value (e.g., amplitude) is, and the weaker the CSI signal value is. The distance relationship between the first device and the second device can be determined by the CSI change of the received broadcast message.
In the embodiments provided in this application, there are various implementations of determining the device type of the second device based on the distance relationship in step 330, and two of them are described in detail below: mode one and mode two.
In a first way,
In one possible implementation, the step 330 of determining the device type of the second device based on the distance relationship may be implemented by:
3301, determining whether the distance relationship satisfies a first condition; the first condition includes the second device being within a second time duration, the distance between the first device and the second device each being less than a distance threshold;
and 3302, if the distance relationship meets the first condition, determining that the equipment type of the second equipment is dangerous equipment.
In embodiments provided herein, when the distance between the second device and the first device continues to be less than the distance threshold for the second duration of time, the device type of the second device may be considered to be a hazardous device. That is, in the case where the residence time of the second device exceeds a certain time within a certain distance range of the first device, the first device may consider the second device as a dangerous device.
It should be noted that the second duration may be the same as the first duration or the fourth duration, or may be different from the first duration or the fourth duration, and the embodiment of the present application is not limited herein.
In one embodiment, the second duration and the distance threshold may both be set by a user. Thus, when the security level requirement is high, the user may set the distance threshold to be larger and the second duration to be shorter; conversely, when the security level requirement is low, the user may set the distance threshold to be smaller and the second duration to be longer. Therefore, the user can adaptively adjust the level of safety prevention and control, and the flexibility of the safety prevention and control system is improved.
The second way,
In another possible implementation manner, the step 330 of determining the device type of the second device based on the distance relationship may be implemented by the following steps:
3301', calculating a risk coefficient of the second device based on the distance relationship; the danger coefficient is used for representing the comprehensive change degree of the distance between the second equipment and the first equipment in a third duration period;
step 3302', if the risk factor is greater than the risk threshold, then the equipment type of the second equipment is determined to be dangerous equipment.
In the embodiment provided by the application, the first device may quantize the distance relationship between the first device and the second device into a risk coefficient, and determine whether the second device is a dangerous device by judging the relationship between the risk coefficient and a danger threshold, so that the device type of the second device can be determined simply and quickly.
In embodiments provided herein, the risk factor may characterize a combined degree of change in distance between the second device and the first device over a third duration; specifically, the greater the comprehensive change degree of the distance between the second device and the first device, the greater the risk coefficient of the second device, which indicates that the user holding the second device has a greater threat to the user and/or property within the network coverage of the first device; conversely, the smaller the comprehensive change degree of the distance between the second device and the first device, the smaller the risk coefficient of the second device, which indicates that the user holding the second device has less threat to the user and/or property within the network coverage of the first device.
It should be noted that the third duration may be the same as or different from the first duration, the second duration, or the fourth duration, and the embodiments of the present application are not limited herein.
Next, a manner of quantifying the distance relationship between the first device and the second device will be exemplarily described.
In embodiments provided herein, the risk factors include a first sub-risk factor and a second sub-risk factor. The first sub-risk factor may characterize an accumulated rate of change of the distance between the first device and the second device over a particular time period. The second sub-risk factor may be indicative of a maximum rate of change of distance between the first device and the second device over a particular time period. By the cumulative rate of change of the distance between the first device and the second device,
correspondingly, in step 3301', the risk factor of the second device is calculated based on the distance relationship, including:
3301' a, determining target distance change rates of the second device and the first device when receiving the two adjacent broadcast messages based on the distance relationship, to obtain a plurality of target distance change rates;
step 3301' b, determining a first sub-risk factor based on the plurality of target range rates, and the total number of the plurality of broadcast messages;
step 3301' c, the maximum target range rate of change among the plurality of target range rates of change is taken as a second sub-risk coefficient;
step 3301'd, a risk coefficient is determined based on the first sub-risk coefficient and the second sub-risk coefficient.
In the embodiment provided by the present application, the first device may determine the distance change rate Δ between the first device and the second device when the two adjacent broadcast messages are received, based on the time of the two adjacent received broadcast messages and the distance between the first device and the second device when each broadcast message is received.
Specifically, Δ can be calculated by formula (1):
here, Δ t is a time difference when the adjacent two broadcast messages are received, and Δ d is a distance change amount between the first device and the second device when the adjacent two broadcast messages are received.
It should be noted that there are multiple broadcast messages received by the first electronic device during the first duration or the fourth duration, and thus, the first device may obtain multiple target range rates during the first duration or the fourth duration.
Further, the first device may calculate the first sub-risk factor according to a total number of broadcast messages received within a specific time period (i.e., a total number of the first broadcast message and the second broadcast message), and the obtained plurality of target distance change rates.
In one embodiment, the first sub-risk factor may be a sum of a total number of the plurality of broadcast messages and a plurality of target range change rates.
It is understood that the greater the number of broadcast messages received during the first duration or the fourth duration, the greater the first sub-risk factor, and the greater the rate of change of the distance between the first device and the second device during the first duration or the fourth duration, the greater the first sub-risk factor. Conversely, the smaller the number of received broadcast messages, the smaller the rate of change of the distance between the first device and the second device, and the smaller the first sub-risk factor.
In one embodiment, the second risk sub-coefficient may be a value obtained by averaging the largest partial range rate among the plurality of target range rates.
Further, the first device may determine a final risk factor based on the first sub-risk factor and the second sub-risk factor.
In one possible implementation, the risk factor may be a weighted sum of the first sub-risk factor and the second sub-risk factor. Specifically, the final risk coefficient can be calculated by formula (2):
a risk factor α + β + second sub-risk factor; (2)
and alpha and beta are weighted values of the first sub-risk coefficient and the second sub-risk coefficient respectively, and can represent the importance degree of the first sub-risk coefficient in the risk coefficient and the importance degree of the second sub-risk coefficient in the risk coefficient respectively. Here, α and β are user-set parameters, and may be any real values.
In practical applications, when the second device is close to the first device, the rate of change of the distance between the second device and the first device is kept within a small range, but the second device may be substantially threatening to the first device. In consideration of this situation, the step 3301' a, based on the distance relationship, determines the target distance change rates of the second device and the first device when receiving the two adjacent broadcast messages, and obtains a plurality of target distance change rates, which can be implemented by the following steps:
determining the initial distance change rate of the second equipment and the first equipment when receiving the adjacent two broadcast messages based on the distance relation;
if the initial distance change rate is smaller than the change rate threshold value, setting the first parameter as the target distance change rate;
and if the initial distance change rate is not less than the preset change rate threshold value, taking the initial distance change rate as the target distance change rate.
It will be appreciated that the first device may detect the relationship between the rate of change and the rate of change of the distance between the first device and the second device when receiving two adjacent broadcast messages. And if the distance change rate between the first device and the second device is smaller than the change rate threshold value, determining the first parameter as the target distance change rate. If it is detected that the distance change rate between the first device and the second device is not less than (i.e., greater than or equal to) the change rate threshold, the calculated initial distance change rate is continuously used as the current target distance change rate. Therefore, the real scene can be better restored, and the accuracy of calculating the danger coefficient is improved.
In a possible implementation manner, the first parameter is preset, or the first parameter is a maximum initial distance change rate among a plurality of initial distance change rates.
In an embodiment, before step 320 determines the distance relationship between the second device and the first device based on a plurality of broadcast messages, the following steps may be further performed:
judging whether the identification information of the second equipment is matched with the identification information of the first safety equipment or not; the first safety device is any one device in the safety device set;
if the identification information is matched with the identification information of the first safety equipment, determining that the second equipment is not dangerous equipment, and responding to the broadcast message;
the corresponding step 320 of determining a distance relationship between the second device and the first device based on the plurality of broadcast messages may be implemented by:
if the identification information does not match the first secure identification information, a distance relationship between the second device and the first device is determined for a particular time period based on the first broadcast message and the second broadcast message.
In the embodiments provided in the present application, a secure device list may be stored in the internal storage space of the first device. The list column stores identification information of all the security devices in the set of security devices. Here, the security device refers to a device that commonly uses a wireless function of the first device, such as a smart phone, a smart tablet, a notebook, and the like of the user himself or herself and family. The secure device list may be preset by the user.
In the embodiment provided by the present application, each of the plurality of broadcast messages sent by the second device carries identification information of the second device.
That is, upon receiving the broadcast message, the first device may parse the information in the broadcast message and determine the identification information of the device that transmitted the broadcast message. And comparing the identification information with the identification information corresponding to each safety device in the safety device list one by one, and judging whether the device sending the broadcast message is the device in the safety device set.
And if the first equipment is the equipment in the safety equipment set, responding to the first broadcast message by the first equipment, and accessing the second equipment which sends the broadcast message into the wireless network. If the device is not a device in the security device set, the broadcast message continues to be received, the distance relationship between the second device and the first device in the specific time period is determined based on the received plurality of broadcast messages, and the device type of the second device is determined according to the manner in step 330.
In one possible implementation, the identification information is a medium access control, MAC, address.
In a possible implementation manner, after the first device determines that the device type of the second device is a dangerous device, the first device may further perform the following steps:
sending alarm information; the alarm information is used for indicating that the second equipment is dangerous equipment.
Here, the first device may send alert information to a particular user device in a cloud storage manner, notifying the user that some mobile devices have triggered an alert threshold within their deployment range. The specific user equipment can be a monitoring platform created by law enforcement agencies or a smart phone of the user.
In the embodiment provided by the present application, the alarm information may carry identification information of the second device (i.e., a MAC address of the second device), and the identification information may be used for forensic analysis of law enforcement agencies.
In an embodiment provided by the present application, the first device is a wireless router and the second device is a mobile device. For example, the first device may be a WiFi router and the second device may be a smartphone.
In the embodiments provided in the present application, the broadcast message is a probe request message; the detection request message is a radio frequency signal emitted by the second device to the outside, and the detection request message is used for detecting a wireless network around the second device.
The following describes the above scheme in detail by taking the first device as a WiFi router and the second device as a mobile terminal device (UE) as an example, with reference to the schematic flow chart of the information processing method shown in fig. 4. Referring to the information processing method flow diagram shown in fig. 4, in the present example, the information processing method includes the steps of:
step a, the WiFi router receives a first detection request message sent by the UE.
In the embodiment provided by the application, the identification calculation of the security monitoring system can be completed in the WiFi router, compared with the traditional router, the WiFi router is added with new functions of calculation and algorithm, and can process the received detection request message.
In an embodiment provided by the present application, the first probe request message is a probe request conforming to a WiFi communication standard; the first probe request message may include a WiFi Mac address of the UE that transmits the probe request message.
It should be noted that the first probe request message is a broadcast message, and when any UE does not access a specific WiFi network, as long as the WiFi function of the UE is turned on, the first probe request message sends a broadcast probe request message to the outside for probing the surrounding wireless network.
And b, the WiFi router analyzes the first detection request information and determines the WiFi Mac address of the UE.
And step c, the WiFi router determines whether the UE is safe based on the WiFi Mac address.
In the embodiments provided in the present application, a secure UE list may be stored in an internal storage space of the WiFi router. The WiFi MAC addresses of all secure UEs are stored in this list. Here, the secure UE refers to a device with a WiFi function in common use, such as a smart phone, a smart tablet, a laptop computer, etc. of a user and a family. The secure UE list may be user preset.
In the embodiment provided by the application, after the WiFi router obtains the WiFi Mac address carried in the first detection request message through analysis, the WiFi Mac address can be compared with WiFi Mac addresses corresponding to the secure UEs in the secure UE list one by one, and whether the WiFi Mac address of the UE sending the first detection request message matches with the WiFi Mac address of the secure UE in the list is judged.
And if the WiFi Mac address of the UE sending the first detection request message is matched with the WiFi Mac address of a certain safe UE in the safe UE list, determining that the UE sending the first detection request message is the safe UE. Further, after the UE is determined to be a safe UE, step d may be continued.
And if the WiFi Mac address of the UE sending the detection request message is not matched with the WiFi Mac addresses of all the safe UEs in the safe UE list, determining that the UE sending the detection request message is not the safe UE. Further, after determining that the UE is not a secure UE, step e may be continued.
And d, if the UE is safe, responding the first detection request message by the WiFi router, and accessing the UE to the WiFi network.
And e, if the UE is not the safe UE, the WiFi router stores the relevant information of the first detection request message into a non-safe UE list.
Here, the non-secure UE list stores WiFi Mac addresses of the non-secure UEs. The WiFi router reserves a certain storage space for each non-secure UE in the storage space, and the storage space is used for storing the related information of the UE. For example, the time of receiving each probe request message, CSI of each probe request message, and risk factor of the UE.
If the non-secure UE list stores the relevant information of the UE, the relevant information of the UE stored in the non-secure UE list is updated according to the first probe request information. If the non-secure UE list does not store the related information of the UE, the WiFi router creates a storage space for the UE, and stores the WiFi Mac address of the UE and the time for receiving the first detection request message into the created storage space.
In an embodiment, the WiFi router may store information of the non-secure UE, so that the user may query the high-risk UE even if the non-secure UE does not trigger the alarm mechanism. Here, the WiFi router may push the non-secure UE list to the user through a specific algorithm, so as to facilitate the user to refer; for example, by pushing information, the user may be interested in certain devices that do not trigger an alarm mechanism, but are often present near the deployment area of a WiFi router.
And step f, the WiFi router receives at least one second detection request message sent by the UE in a first duration period taking the moment of receiving the first detection request message as the starting moment, and calculates the danger coefficient of the UE based on the relevant information of the first detection request message and the relevant information of the at least one second detection request message.
Here, the related information of the first probe request message and the second probe request message may include CSI of the corresponding probe request message and time information when the WiFi router receives the probe request message. Here, the WiFi router may look up the relevant information of all probe request messages sent by the UE in the first duration period from the non-secure UE list created in step e.
In practical application, the closer the UE and the WiFi router are, the larger the CSI signal value corresponding to the UE is, and vice versa. Therefore, in the embodiment of the application, the distance relationship between the UE and the WiFi router can be determined according to the change of the CSI in the first duration.
In the embodiment provided by the application, the WiFi router may detect the number of multiple probe request messages received by the UE and the signal value size of the CSI of each probe request message to perform the risk factor calculation.
Here, the risk coefficient may include a first sub-risk coefficient and a second sub-risk coefficient. The first sub-risk factor may characterize an accumulated rate of change of the distance between the WiFi router and the UE over the first duration. And the second sub-risk coefficient can represent the maximum value of the distance change rate between the WiFi router and the UE in the second duration.
In an embodiment, when a UE is first identified as a non-secure UE, its first sub-risk factor is 1. Each time the WiFi router receives the probe request message for the UE within a first duration (e.g., 1 hour or 30 minutes), the first sub-risk factor is incremented by 1. When detecting that the CSI of the probe request information sent by the UE is increased (meaning that the UE is close to the WiFi router), the first sub-risk factor is increased by delta*,
The WiFi router may calculate the increase Δ of the first sub-risk coefficient by the following equation (3)*,
And delta CSI is a signal difference value of CSI in two adjacent detection request messages, and delta t is a time difference value of the WiFi router receiving the two adjacent detection request messages.
It can be understood that, the larger the difference between the signals of the CSI of two adjacent probe request messages is, the larger the increase of the first sub-risk factor is, the smaller the time difference between two adjacent probe request messages is, the larger the increase of the first sub-risk factor is, and conversely, the smaller the increase of the first sub-risk factor is.
It should be noted that when the UE is close to the WiFi router, the value of the increase of the first sub-risk coefficient may be small, but the UE is essentially threatening the WiFi router to a great extent. In view of this situation, the WiFi router may detect a relationship between a signal difference value of two adjacent CSI and a preset change rate threshold, and if the WiFi router detects that the signal difference value of two adjacent CSI is smaller than the preset change rate threshold, the current first sub-risk coefficient increase amount may refer to an increase amount of the previous first sub-risk coefficient, where a maximum increase amount of the previous first sub-risk coefficient may be used as the current increase amount of the first sub-risk coefficient. Therefore, the real scene can be better restored, and the accuracy of the danger coefficient is improved.
In one embodiment, the second sub-risk factor may be a maximum value of each increase of the first sub-risk factor for the first duration.
Further, the WiFi router may calculate a final risk factor according to the first sub-risk factor and the second sub-risk factor.
In one embodiment, the final risk factor may be calculated by the following equation (4):
a risk factor α + β + second sub-risk factor; (4)
and alpha and beta are weighted values of the first sub-risk coefficient and the second sub-risk coefficient respectively, and represent the importance degree of the first sub-risk coefficient in the risk coefficient and the importance degree of the second sub-risk coefficient in the risk coefficient respectively. Here, α and β are user-set parameters, and may be any real values.
The following describes how to calculate the sub-risk factor with reference to the scene diagrams of calculating the risk factor shown in fig. 5(a) to 5 (c). As shown in fig. 5(a) to 5(c), the WiFi router may receive 5 probe request information transmitted by the UE at uniform time.
As can be seen from fig. 5(a), the CSI signal value of the probe request message sent by the UE each time does not change significantly, i.e. the physical meaning is that the UE stays within a certain distance from the WiFi router. Thus, in the scenario shown in fig. 5(a), the first risk factor of the UE increases by 1 each time the WiFi router receives a probe request message. Specifically, referring to the content of the first 5 rows shown in table 1, in the scenario shown in fig. 5(a), each time the WiFi router receives a probe request message of a UE, the first sub-risk coefficient of the UE is increased by 1. Finally, in time t, the first sub-risk coefficient of the UE takes a value of 5 (see row 6 shown in table 1), and the second sub-risk coefficient takes a value of 1 (see row 7 shown in table 2) as the maximum value of each increase of the first sub-risk coefficient. When α and β are 0.5, respectively, in the scenario shown in fig. 5(a), the risk coefficient of the UE is 3 (see row 8 shown in table 2).
TABLE 1
1 | 1 |
2 | 1+1 |
3 | 1+1+1 |
4 | 1+1+1+1 |
5 | 1+1+1+1+1 |
First risk factor | 5 |
Second risk factor | 1 |
Coefficient of risk | 3 |
As can be seen from fig. 5(b), during time t, the CSI signal value of the probe request message of the UE rapidly increases and rapidly decreases, and the physical meaning of the CSI signal value is that the UE rapidly enters the deployment and control range of the WiFi router and rapidly leaves, which can be understood as that the UE is carried by a courier. Referring to the content shown in table 2, in the scenario shown in fig. 5(b), when a probe request message sent by the UE is received for the first time, the first sub-risk coefficient takes a value of 1 (see, specifically, line 1 shown in table 2); since the UE rapidly enters the deployment and control range of the WiFi router in the first half of the specific time period, the WiFi router may determine that the first sub-risk coefficient of the UE is increased by 5 on the original basis when receiving the probe request message for the 2 nd time and the 3 rd time (see the 2 nd row and the 3 rd row shown in table 2); the UE leaves the deployment range of the WiFi router quickly in the second half of the time, and the WiFi router may determine that the first sub-risk factor of the UE increases by-5 when the probe request message is received 4 th and 5 th times (see lines 4 and 5 shown in table 2). Finally, in the scenario shown in fig. 5(b), the first sub-risk coefficient of the UE is 1, the value of the second sub-risk coefficient is 5, and the final risk coefficient is 3.
TABLE 2
As can be seen from the scenario shown in fig. 5(c), during time t, the CSI signal value of the probe request message of the UE increases and maintains a higher CSI size. The physical meaning of the method can be regarded that the UE enters the deployment and control range of the WiFi router and stays in an area close to the WiFi router. Referring to the content shown in table 3, in the scenario shown in fig. 5(c), when a probe request message sent by the UE is received for the first time, the first sub-risk coefficient takes a value of 1 (see, specifically, line 1 shown in table 3); since the UE rapidly enters the deployment and control range of the WiFi router in the first half of the specific time period, the WiFi router may determine that the first sub-risk coefficient of the UE is increased by 5 on the original basis when receiving the probe request message for the 2 nd time and the 3 rd time (see the 2 nd row and the 3 rd row shown in table 3); as can be seen from fig. 5(c), the CSI signal values of the probe request signals received by the WiFi router at 4 th and 5 th times are kept at higher values, and the CSI signal of the probe request information received at 4 th time is the same as that received at 3 rd time, and the CSI signal value of the probe request information received at 5 th time is the same as that received at 4 th time. Since the CSI change rates of two adjacent probe request messages are within the preset change rate threshold, when receiving the probe request messages of 4 th and 5 th times, the first sub-risk factor is still 5 on the original basis (i.e. the 4 th and 5 th increases are the previous maximum increase of 5). Therefore, in the scenario shown in fig. 5(c), the first sub-risk coefficient takes a value of 21, the second sub-risk coefficient takes a value of 5, and the final risk coefficient takes a value of 13.
TABLE 3
1 | 1 |
2 | 1+5 |
3 | 1+5+5 |
4 | 1+5+5+5 |
5 | 1+5+5+5+5 |
First risk factor | 21 |
Second risk factor | 5 |
Coefficient of risk | 13 |
In summary, the UE shown in fig. 5(c) can be determined to be an obvious high-risk device.
And g, the WiFi router judges whether the danger coefficient of the UE is larger than a preset danger threshold value or not.
Here, the preset risk coefficient may be a value set by a user according to a demand.
In the embodiment provided by the application, if the risk coefficient of the UE is greater than the preset risk threshold, alarm information is sent.
And if the danger coefficient of the UE is smaller than the preset danger threshold, updating the non-safety UE list, and storing the calculated danger coefficient in the information content of the UE corresponding to the non-safety UE table.
For example, in the scene diagrams of calculating the risk coefficients shown in fig. 5(a) to 5(c), the preset risk threshold may be set to 10. Comparing the final risk coefficient value of the UE in fig. 5(a) to fig. 5(c) with the preset risk threshold, it can be determined that the UE in fig. 5(c) is a dangerous device. Alarm information may be sent to a monitoring platform created by law enforcement or to the user's smartphone.
Based on the foregoing embodiments, an embodiment of the present application provides an information processing apparatus. Fig. 6 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application, and as shown in fig. 6, the information processing apparatus includes:
a communication unit 601, configured to receive a plurality of broadcast messages sent by a second device;
a distance relationship determining unit 602, configured to determine a distance relationship between the second device and the first device based on the plurality of broadcast messages;
a processing unit 603, configured to determine a device type of the second device based on the distance relationship.
In an embodiment, the communication unit 601 is configured to receive a first broadcast message sent by the second device; receiving at least one second broadcast message sent by the second equipment within a first duration period taking the moment of receiving the first broadcast message as a starting moment; the plurality of broadcast messages includes the first broadcast message and the at least one second broadcast message.
In an embodiment, the processing unit 603 is configured to determine that the device type of the second device is a dangerous device if the distance relationship satisfies a first condition; the first condition includes a distance between the first device and the second device being less than a distance threshold for a second duration of time.
In an embodiment, the processing unit 603 is configured to use the risk factor to characterize a combined degree of change in distance between the second device and the first device over a third duration; and if the danger coefficient is larger than a danger threshold value, determining that the equipment type of the second equipment is dangerous equipment.
In an embodiment, the distance relation determining unit 602 is configured to determine a plurality of channel state information based on the plurality of broadcast messages; wherein the plurality of broadcast messages correspond to the plurality of channel state information one to one; determining a distance relationship between the second device and the second device based on the plurality of channel states.
In one embodiment, the first device is a wireless router, and the broadcast message is a probe request message; the probe request message is used for probing wireless networks around the second device.
In an embodiment, the plurality of broadcast messages each carry an identification message of the second device.
In one embodiment, the identification information is a MAC address.
In one embodiment, the communication unit 601 is configured to send alarm information; the alarm information is used for indicating that the second equipment is dangerous equipment.
In the embodiment of the present application, the functions implemented by each unit in the terminal may be understood by referring to the related description of the foregoing network connection method. In a specific implementation, the computing Unit, the adjusting Unit, and the controlling Unit in the terminal may be implemented by a Processor in the terminal, such as a Central Processing Unit (CPU), a Digital Signal Processor (DSP), a Micro Control Unit (MCU), or a Programmable Gate Array (FPGA); the communication unit in the terminal can be realized by a communication module (comprising a basic communication suite, an operating system, a communication module, a standardized interface, a protocol and the like) and a receiving and transmitting antenna, and the detection unit in the terminal can be realized by a temperature sensor.
It should be noted that: the division of the units is only exemplary, and in practical applications, the internal structure of the information processing apparatus may be divided into different units to complete all or part of the functions described above. In addition, the information processing apparatus and the information processing method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Based on the hardware implementation of the information processing apparatus, an embodiment of the present application further provides an information processing device, fig. 7 is a schematic diagram of a hardware composition structure of the information processing device according to the embodiment of the present application, and as shown in fig. 7, the information processing device includes a transceiver 701, a processor 702, and a memory 703 in which a computer program is stored.
Further, the terminal also includes a communication bus 704; the various components in the terminal are coupled together by a communication bus 704. It is understood that communication among the transceiver 701, the processor 702, and the memory 703 in the information processing apparatus is via a communication bus 704.
As a first embodiment, the transceiver 701 is configured to receive a plurality of broadcast messages transmitted by a second device;
the processor 702, when executing the computer program in the memory 703, is configured to perform the following steps:
determining a distance relationship between the second device and the first device based on the plurality of broadcast messages;
determining a device type of the second device based on the distance relationship.
In an embodiment, the transceiver 701 is configured to receive a first broadcast message sent by the second device; receiving at least one second broadcast message sent by the second equipment within a first duration period taking the moment of receiving the first broadcast message as a starting moment; the plurality of broadcast messages includes the first broadcast message and the at least one second broadcast message.
In an embodiment, the processor 702 is configured to determine that the device type of the second device is a dangerous device if the distance relationship satisfies a first condition; the first condition includes a distance between the first device and the second device being less than a distance threshold for a second duration of time.
In an embodiment, the processor 702 is further configured to calculate a risk factor of the second device based on the distance relationship; the risk factor is used for representing the comprehensive change degree of the distance between the second equipment and the first equipment in a third duration period; and if the danger coefficient is larger than a danger threshold value, determining that the equipment type of the second equipment is dangerous equipment.
In one embodiment, the processor 702 is configured to determine a plurality of channel state information based on the plurality of broadcast messages; wherein the plurality of broadcast messages correspond to the plurality of channel state information one to one;
determining a distance relationship between the second device and the second device based on the plurality of channel states.
In one embodiment, the first device is a wireless router, and the broadcast message is a probe request message; the probe request message is used for probing wireless networks around the second device.
In an embodiment, the plurality of broadcast messages each carry identification information of the second device.
In one embodiment, the identification information is a MAC address.
In one embodiment, the transceiver 701 is configured to send alarm information; the alarm information is used for indicating that the second equipment is dangerous equipment.
It will be appreciated that the memory in this embodiment can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a magnetic Random Access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced Synchronous DRAM), Direct Memory Access (DRAM), and Direct Memory Access (DRDRU). The memories described in the embodiments of the present application are intended to comprise, without being limited to, these and any other suitable types of memory.
The method disclosed in the embodiments of the present application may be applied to a processor, or may be implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in a storage medium having a memory and a processor reading the information in the memory and combining the hardware to perform the steps of the method.
The embodiment of the application also provides a computer storage medium, in particular a computer readable storage medium. As a first implementation, when the computer storage medium is located in a terminal, the computer instructions are executed by a processor to implement any steps of the network connection method described above in the embodiments of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or at least two units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
It should be noted that: the technical solutions described in the embodiments of the present application can be arbitrarily combined without conflict.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (12)
1. An information processing method applied to a first device, the method comprising:
receiving a plurality of broadcast messages sent by second equipment;
determining a distance relationship between the second device and the first device based on the plurality of broadcast messages;
determining a device type of the second device based on the distance relationship.
2. The method of claim 1, wherein receiving the plurality of broadcast messages transmitted by the second device comprises:
receiving a first broadcast message sent by the second equipment;
receiving at least one second broadcast message sent by the second equipment within a first duration period taking the moment of receiving the first broadcast message as a starting moment; the plurality of broadcast messages includes the first broadcast message and the at least one second broadcast message.
3. The method of claim 1 or 2, wherein the determining the device type of the second device based on the distance relationship comprises:
if the distance change relation meets a first condition, determining that the equipment type of the second equipment is dangerous equipment; the first condition includes a distance between the first device and the second device being less than a distance threshold for a second duration of time.
4. The method of claim 1 or 2, wherein the determining the device type of the second device based on the distance-change relationship comprises:
calculating a risk coefficient of the second device based on the distance relationship; the risk factor is used for representing the comprehensive change degree of the distance between the second equipment and the first equipment in a third duration period;
and if the danger coefficient is larger than a danger threshold value, determining that the equipment type of the second equipment is dangerous equipment.
5. The method of any of claims 1-4, wherein determining the distance relationship between the second device and the first device based on the plurality of broadcast messages comprises:
determining a plurality of channel state information based on the plurality of broadcast messages; wherein the plurality of broadcast messages correspond to the plurality of channel state information one to one;
determining a distance relationship between the second device and the second device based on the plurality of channel states.
6. The method of any of claims 1-5, wherein the first device is a wireless router, and wherein the broadcast message is a probe request message; the probe request message is used for probing wireless networks around the second device.
7. The method according to any of claims 1-6, wherein the plurality of broadcast messages each carry identification information of the second device.
8. The method of claim 7, wherein the identification information is a Media Access Control (MAC) address.
9. The method of any of claims 2-8, wherein after determining that the device type of the second device is a hazardous device, the method further comprises:
sending alarm information; the alarm information is used for indicating that the second equipment is dangerous equipment.
10. An information processing apparatus characterized by comprising:
a communication unit for receiving a plurality of broadcast messages transmitted by a second device;
a distance relationship determination unit configured to determine a distance relationship between the second device and the first device based on the plurality of broadcast messages;
a processing unit, configured to determine a device type of the second device based on the distance relationship.
11. An information processing apparatus comprising, a transceiver, a processor, and a memory for storing a computer program operable on the processor;
the transceiver, the processor and the memory communicate with each other through a communication bus;
the processor, when executing the computer program stored in the memory in combination with the transceiver, is configured to perform the steps of the method of any of claims 1 to 9.
12. A computer-readable storage medium, on which a computer program is stored which is executed by a processor for implementing the steps of the method of any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010688689.7A CN113950003B (en) | 2020-07-16 | 2020-07-16 | Information processing method, apparatus, device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010688689.7A CN113950003B (en) | 2020-07-16 | 2020-07-16 | Information processing method, apparatus, device and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113950003A true CN113950003A (en) | 2022-01-18 |
CN113950003B CN113950003B (en) | 2023-05-05 |
Family
ID=79326562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010688689.7A Active CN113950003B (en) | 2020-07-16 | 2020-07-16 | Information processing method, apparatus, device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113950003B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016119834A1 (en) * | 2015-01-28 | 2016-08-04 | Nokia Solutions And Networks Oy | Method for communications reliability enhancements with access entity assistance |
CN108111999A (en) * | 2017-12-28 | 2018-06-01 | 北京地平线机器人技术研发有限公司 | Short-distance communication equipment shares request and control method and electronic equipment |
CN108282502A (en) * | 2017-01-05 | 2018-07-13 | 上海竺程信息科技有限公司 | Vehicle network message optimisation broadcasting method based on dynamic priority |
CN109151796A (en) * | 2018-08-10 | 2019-01-04 | Oppo广东移动通信有限公司 | NAN equipment finding method, relevant device and computer readable storage medium |
US10506415B1 (en) * | 2019-01-24 | 2019-12-10 | T-Mobile Usa, Inc. | Mobile-initiated SMS cell broadcast |
-
2020
- 2020-07-16 CN CN202010688689.7A patent/CN113950003B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016119834A1 (en) * | 2015-01-28 | 2016-08-04 | Nokia Solutions And Networks Oy | Method for communications reliability enhancements with access entity assistance |
CN108282502A (en) * | 2017-01-05 | 2018-07-13 | 上海竺程信息科技有限公司 | Vehicle network message optimisation broadcasting method based on dynamic priority |
CN108111999A (en) * | 2017-12-28 | 2018-06-01 | 北京地平线机器人技术研发有限公司 | Short-distance communication equipment shares request and control method and electronic equipment |
CN109151796A (en) * | 2018-08-10 | 2019-01-04 | Oppo广东移动通信有限公司 | NAN equipment finding method, relevant device and computer readable storage medium |
US10506415B1 (en) * | 2019-01-24 | 2019-12-10 | T-Mobile Usa, Inc. | Mobile-initiated SMS cell broadcast |
Also Published As
Publication number | Publication date |
---|---|
CN113950003B (en) | 2023-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10446000B2 (en) | Detecting an intruder's wireless device during a break in to a premises | |
AU2017376793B2 (en) | System and method for detecting and locating contraband devices in a secure environment | |
JP4301080B2 (en) | Monitoring system | |
US7821542B2 (en) | System and method for restricting use of camera of a mobile terminal | |
WO2015182752A1 (en) | Wireless communication device and wireless communication system | |
JP5105100B2 (en) | Intrusion detection system, alarm terminal, intruder detection method, program and recording medium | |
US11104302B2 (en) | Method and vehicle system for handling parameters associated with surroundings of a vehicle | |
US10559177B2 (en) | Area and property monitoring system and method | |
US9053621B2 (en) | Image surveillance system and image surveillance method | |
KR20190036443A (en) | A door monitoring system and a process thereof | |
US20090207247A1 (en) | Hybrid remote digital recording and acquisition system | |
CN111414828B (en) | Abnormal aggregation identification method and device | |
US7605695B2 (en) | Automatic discovery and classification of detectors used in unattended ground sensor systems | |
US20210326563A1 (en) | Electronic fingerprint device for identifying perpetrators and witnesses of a crime and method thereof | |
CN105336173A (en) | Image information acquisition method and related device | |
US20080220724A1 (en) | Apparatus and method for perceiving and reporting neighborhood object | |
US8519884B2 (en) | Distance estimation | |
CN107466007B (en) | Positioning method and terminal | |
CN116520237A (en) | Detection method, communication device, apparatus and storage medium | |
CN113950003B (en) | Information processing method, apparatus, device and computer readable storage medium | |
US11798328B2 (en) | System and method for monitoring access to a residential structure | |
US11875560B2 (en) | Unmanned aerial vehicle and image recognition method thereof | |
CN205050283U (en) | Air conditioner and intelligent anti-theft system | |
CN114202880A (en) | Fire detection method, system, intelligent terminal and storage medium | |
CN111540183A (en) | Patrol robot safety region intrusion early warning method based on wireless signal analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |