CN115767434A - Security detection method, bluetooth device, and storage medium - Google Patents

Security detection method, bluetooth device, and storage medium Download PDF

Info

Publication number
CN115767434A
CN115767434A CN202211336174.6A CN202211336174A CN115767434A CN 115767434 A CN115767434 A CN 115767434A CN 202211336174 A CN202211336174 A CN 202211336174A CN 115767434 A CN115767434 A CN 115767434A
Authority
CN
China
Prior art keywords
bluetooth beacon
bluetooth
target
information
dangerous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211336174.6A
Other languages
Chinese (zh)
Inventor
刘桂县
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaihong Digital Industry Development Co Ltd
Original Assignee
Shenzhen Kaihong Digital Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaihong Digital Industry Development Co Ltd filed Critical Shenzhen Kaihong Digital Industry Development Co Ltd
Priority to CN202211336174.6A priority Critical patent/CN115767434A/en
Publication of CN115767434A publication Critical patent/CN115767434A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Emergency Alarm Devices (AREA)

Abstract

The application relates to the field of security detection, in particular to a security detection method, bluetooth equipment and a storage medium, wherein the method comprises the following steps: when a target Bluetooth beacon is detected in a preset range, acquiring the received signal intensity corresponding to the target Bluetooth beacon; determining a target distance value between the Bluetooth device and a target Bluetooth beacon according to the received signal strength corresponding to the target Bluetooth beacon based on the corresponding relation between the preset received signal strength and the distance value; and when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth equipment is close to the dangerous equipment or the dangerous area, and outputting danger alarm information, wherein the danger alarm information is used for prompting to be far away from the dangerous equipment or the dangerous area. When the target distance value between the Bluetooth device and the target Bluetooth beacon is smaller than the warning distance threshold value, the danger warning information is output, so that the operating personnel can be reminded of keeping away from dangerous devices or dangerous areas in time, and the personal safety of the operating personnel can be effectively improved.

Description

Security detection method, bluetooth device, and storage medium
Technical Field
The present application relates to the field of security detection, and in particular, to a security detection method, a bluetooth device, and a storage medium.
Background
With the rapid development of economic construction in China, a large number of construction site projects are developed and constructed in various places, wherein safety management is the most important. In a construction site, the problems of high personnel mobility, disordered site conditions, difficulty in discovering potential safety hazards and the like exist. For example, there are too many mud-headed vehicles coming and going and blind vision areas, and there are some dangerous areas where the workers are not allowed to get close and enter at will.
Therefore, on the construction site, how to improve the personal safety of the operators becomes an urgent problem to be solved.
Disclosure of Invention
The application provides a safety detection method, a Bluetooth device and a storage medium, wherein when a target distance value between the Bluetooth device and a target Bluetooth beacon is smaller than an alarm distance threshold value, danger alarm information is output, so that an operator can be timely reminded to keep away from dangerous equipment or a dangerous area, and personal safety of the operator can be effectively improved.
In a first aspect, the present application provides a security detection method, applied to a bluetooth device, the method including:
when a target Bluetooth beacon is detected within a preset range, acquiring the received signal intensity corresponding to the target Bluetooth beacon; determining a target distance value between the Bluetooth device and the target Bluetooth beacon according to the received signal strength corresponding to the target Bluetooth beacon based on a corresponding relation between preset received signal strength and the distance value; and when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth equipment is close to dangerous equipment or a dangerous area, and outputting dangerous alarm information, wherein the dangerous alarm information is used for prompting to be far away from the dangerous equipment or the dangerous area.
In a second aspect, the present application further provides a bluetooth device, which includes a memory and a processor;
the memory for storing a computer program;
the processor is configured to execute the computer program and implement the security detection method corresponding to the bluetooth device when executing the computer program.
In a third aspect, the present application also provides a computer-readable storage medium storing a computer program, which when executed by a processor causes the processor to implement the security detection method as described above.
The application discloses a safety detection method, bluetooth equipment and a storage medium, wherein when a target Bluetooth beacon is detected in a preset range, the received signal strength corresponding to the target Bluetooth beacon is obtained, so that the target distance value between the Bluetooth equipment and the target Bluetooth beacon can be determined according to the received signal strength corresponding to the target Bluetooth beacon; when the target distance value is smaller than the preset alarm distance threshold value, the Bluetooth device is determined to be close to the dangerous device or the dangerous area, and the dangerous alarm information is output, so that the operating personnel can be timely reminded to keep away from the dangerous device or the dangerous area, and the personal safety of the operating personnel can be effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic diagram of a security detection system provided in an embodiment of the present application;
fig. 2 is a schematic block diagram of a bluetooth device according to an embodiment of the present disclosure;
fig. 3 is a schematic flow chart of a security detection method provided in an embodiment of the present application;
fig. 4 is a schematic diagram of detecting whether there is a target bluetooth beacon according to an embodiment of the present application;
FIG. 5 is a schematic flow chart diagram of sub-steps of another security detection provided by an embodiment of the present application;
FIG. 6 is a schematic flow chart diagram of sub-steps of another security check provided by an embodiment of the present application;
fig. 7 is a schematic scene diagram of security detection provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flowcharts shown in the figures are illustrative only and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The embodiment of the application provides a security detection method, bluetooth equipment and a storage medium. The safety detection method is applied to a construction site, and when the target distance value between the Bluetooth device and the target Bluetooth beacon is smaller than the alarm distance threshold value, the danger alarm information is output, so that the operating personnel can be reminded of keeping away from dangerous devices or dangerous areas in time, and the personal safety of the operating personnel can be effectively improved.
Referring to fig. 1, fig. 1 is a schematic diagram of a security detection system according to an embodiment of the present disclosure. As shown in fig. 1, the security detection system 100 includes a bluetooth device 1000, a bluetooth beacon 2000, and a server 3000. The bluetooth device 1000 may establish a communication connection with the server 3000 through the HTTTPS protocol.
It should be noted that the server 3000 is configured to issue the alarm distance threshold to the bluetooth device 1000, and the server 3000 is further configured to receive the security detection information sent by the bluetooth device 1000 and display the security detection information. The server 3000 may be an independent server or a server cluster. In the embodiment of the present application, the server 3000 may be a server installed with an Open Harmony system.
In the embodiment of the present application, the bluetooth device 1000 may be a bluetooth module disposed in a safety helmet, a safety suit, a bluetooth interphone, a bluetooth headset, a mobile phone, or the like.
Illustratively, the bluetooth device 1000 may be a bluetooth module installed in a safety helmet. It should be noted that, at a construction site, an operator needs to wear a safety helmet. In order not to influence the operation of the operator, a bluetooth module can be arranged in the safety helmet of the operator. In the embodiment of the present application, how to perform security detection will be described by taking the bluetooth device 1000 as a security helmet having a bluetooth module as an example.
Illustratively, bluetooth beacon 2000 is located in a hazardous device or area. Among other things, hazardous equipment may include, but is not limited to, a mud truck, a crane, a blender, an excavator, a bulldozer, a power transformer, and so forth. The dangerous area may be a working area corresponding to the dangerous equipment or an area where raw materials are stored. Wherein the raw material may be glass, paint, etc.
It should be noted that the bluetooth beacon 2000 is usually placed at a fixed location and continuously broadcasts to the surroundings based on the bluetooth low energy broadcast protocol. The bluetooth beacon 2000 may also automatically send information to the users in the coverage area, determine the location of the users, and then transmit corresponding information based on the location.
For example, the bluetooth beacon 2000 may be installed in a work area corresponding to a crane, the bluetooth beacon 2000 may be installed in a mud saver, and so on.
In some embodiments, when detecting that there is a target bluetooth beacon within a preset range, the bluetooth device 1000 obtains a received signal strength corresponding to the target bluetooth beacon; determining a target distance value between the bluetooth device 1000 and the target bluetooth beacon according to the received signal strength corresponding to the target bluetooth beacon based on a preset corresponding relationship between the received signal strength and the distance value; and when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth equipment is close to the dangerous equipment or the dangerous area, and outputting danger alarm information, wherein the danger alarm information is used for prompting to be far away from the dangerous equipment or the dangerous area.
Referring to fig. 2, fig. 2 is a schematic block diagram of a bluetooth apparatus 1000 according to an embodiment of the present disclosure. In fig. 2, the bluetooth device 1000 includes a processor 1001 and a memory 1002, wherein the processor 1001 and the memory 1002 are connected by a bus, such as an I2C (Inter-integrated Circuit) bus, a distributed soft bus.
The memory 1002 may include a storage medium and an internal memory, among others. The storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause the processor to perform any of the security detection methods associated with bluetooth device 1000.
The processor 1001 is used to provide computing and control capabilities to support the operation of the entire bluetooth device 1000.
The Processor 1001 may be a Central Processing Unit (CPU), and the Processor may also be other general-purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field-Programmable Gate arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The processor 1001 is configured to run a computer program stored in the memory 1002, and when executing the computer program, the following steps are implemented:
when a target Bluetooth beacon is detected in a preset range, acquiring the received signal intensity corresponding to the target Bluetooth beacon; determining a target distance value between the Bluetooth device and the target Bluetooth beacon according to the received signal strength corresponding to the target Bluetooth beacon based on a corresponding relation between preset received signal strength and distance value; and when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth equipment is close to dangerous equipment or a dangerous area, and outputting dangerous alarm information, wherein the dangerous alarm information is used for prompting to be far away from the dangerous equipment or the dangerous area.
In some embodiments, the processor 1001 is further configured to implement:
receiving Bluetooth beacon information sent by any client or server, wherein the Bluetooth beacon information comprises identification information of one or more Bluetooth beacons; and establishing a Bluetooth beacon list according to the Bluetooth beacon information.
In some embodiments, the processor 1001 is further configured to implement:
executing wireless searching operation based on a preset first searching frequency, and acquiring the identification information of the searched Bluetooth beacon; and if the identification information of the Bluetooth beacon is in the Bluetooth beacon list, determining that a target Bluetooth beacon exists in a preset range.
In some embodiments, the processor 1001 is further configured to implement:
when a wireless communication broadcast message is received, performing wireless searching operation based on a preset second searching frequency to acquire the identification information of the searched Bluetooth beacon, wherein the second searching frequency is greater than the first searching frequency; and if the identification information of the Bluetooth beacon is in the Bluetooth beacon list, determining that a target Bluetooth beacon exists in a preset range.
In some embodiments, the processor 1001, after implementing obtaining the identification information of the searched bluetooth beacon, is further configured to implement:
and if the identification information of the Bluetooth beacon is not in the Bluetooth beacon list, executing wireless searching operation based on the first searching frequency.
In some embodiments, the processor 1001, after enabling determining that the bluetooth device is near a dangerous device or a dangerous area, is further configured to enable:
and acquiring safety detection information, and sending the safety detection information to a client or a server, wherein the safety detection information comprises one or more of position information of the Bluetooth equipment, identification information of the target Bluetooth beacon, an alarm type and alarm time.
In some embodiments, the processor 1001, after implementing outputting the danger warning information, is further configured to implement:
and when detecting that the target distance value between the Bluetooth device and the target Bluetooth beacon is greater than the alarm distance threshold value, stopping outputting danger alarm information.
Referring to fig. 3, fig. 3 is a schematic flowchart of a security detection method according to an embodiment of the present disclosure. The safety detection method can be applied to Bluetooth equipment, and can realize timely reminding of operators to keep away from dangerous equipment or dangerous areas by outputting danger alarm information when the target distance value between the Bluetooth equipment and the target Bluetooth beacon is smaller than an alarm distance threshold value, so that the personal safety of the operators can be effectively improved.
As shown in fig. 3, the security detection method includes steps S10 to S30.
And S10, when a target Bluetooth beacon is detected in a preset range, acquiring the received signal intensity corresponding to the target Bluetooth beacon.
It should be noted that, after the bluetooth module in the bluetooth device carried by the operator is turned on, the wireless search operation can be automatically executed to detect whether there is a target bluetooth beacon around the operator.
Referring to fig. 4, fig. 4 is a schematic diagram illustrating detecting whether there is a target bluetooth beacon within a preset range according to an embodiment of the present disclosure. The preset range can be a coverage range corresponding to the maximum bluetooth power of the bluetooth device, and can also be set according to actual conditions.
It should be noted that the target bluetooth beacon refers to a bluetooth beacon in a preset bluetooth beacon list. In this embodiment of the present application, a bluetooth beacon corresponding to a dangerous device or a dangerous area may be added to the bluetooth beacon list in advance.
In some embodiments, the security detection method provided in the embodiments of the present application may include: receiving Bluetooth beacon information sent by any client or server, wherein the Bluetooth beacon information comprises identification information of one or more Bluetooth beacons; and establishing a Bluetooth beacon list according to the Bluetooth beacon information.
By way of example, the client may include, but is not limited to, an electronic device such as a smart phone, a tablet computer, a laptop computer, and a desktop computer. The identification information of the bluetooth beacon may be a Universal Unique Identifier (UUID) or a Media Access Control (MAC) address, which is used to identify the uniqueness of the bluetooth beacon.
For example, after receiving the bluetooth beacon information transmitted by the client or the server, the bluetooth beacon list may be created according to the bluetooth beacon information. When the bluetooth beacon list exists, the identification information of the bluetooth beacon can be directly added to the bluetooth beacon list.
By establishing the Bluetooth beacon list according to the Bluetooth beacon information, the corresponding Bluetooth beacon can be determined as the target Bluetooth beacon when the Bluetooth beacon in the Bluetooth beacon list is searched wirelessly subsequently, and the authentication process is simplified.
In the embodiment of the application, the bluetooth device can actively perform wireless search to detect whether a target bluetooth beacon exists in a preset range.
Referring to fig. 5, fig. 5 is a schematic flow chart of sub-steps of another security detection provided in an embodiment of the present application, and detecting whether there is a target bluetooth beacon within a predetermined range may include the following steps S101 and S102.
Step S101, based on a preset first search frequency, executing wireless search operation, and acquiring the identification information of the searched Bluetooth beacon.
For example, a wireless search operation may be performed based on a preset first search frequency to acquire identification information of a searched bluetooth beacon. For example, the UUID of the searched bluetooth beacon may be acquired.
The preset first search frequency may be set according to an actual situation, and the specific value is not limited herein.
By performing the wireless search operation based on the first search frequency, the identification information of the searched bluetooth beacon can be acquired.
And step S102, if the identification information of the Bluetooth beacon is in the Bluetooth beacon list, determining that a target Bluetooth beacon exists in a preset range.
For example, when the identification information of the detected bluetooth beacon is in the bluetooth beacon list, it may be determined that a target bluetooth beacon within the preset range is detected. When the identification information of the detected bluetooth beacon is not in the bluetooth beacon list, it may be determined that a target bluetooth beacon within the preset range is not detected.
In this embodiment, the bluetooth device may further perform a wireless search to detect whether there is a target bluetooth beacon within a preset range when receiving the wireless communication broadcast message.
Referring to fig. 6, fig. 6 is a schematic flow chart of sub-steps of another security detection provided in the embodiment of the present application, and detecting whether there is a target bluetooth beacon within a predetermined range may include the following steps S103 and S104.
Step S103, when the wireless communication broadcast message is received, executing wireless searching operation based on a preset second searching frequency, and acquiring the identification information of the searched Bluetooth beacon, wherein the second searching frequency is greater than the first searching frequency.
Illustratively, when a wireless communication broadcast message sent by a bluetooth beacon is received, a wireless search operation is executed based on a preset second search frequency, and identification information of the searched bluetooth beacon is acquired. It should be noted that the bluetooth beacon may actively transmit the wireless communication broadcast message.
Illustratively, the second search frequency is greater than the first search frequency.
In the embodiment, when the wireless communication broadcast message is received, the wireless search operation is executed based on the second search frequency, so that the wireless search is performed at a higher search frequency when the Bluetooth beacon exists around, whether the target Bluetooth beacon exists in the preset range can be timely and accurately detected, and the timeliness of outputting the danger warning information subsequently can be ensured. In addition, the Bluetooth device executes the wireless search operation when the Bluetooth beacon actively initiates the wireless request, so that the Bluetooth device can be prevented from being in an active scanning state all the time, and the power consumption of the Bluetooth device can be reduced.
And step S104, if the identification information of the Bluetooth beacon is in the Bluetooth beacon list, determining that a target Bluetooth beacon exists in a preset range.
For example, when the acquired identification information of the bluetooth beacon is in the bluetooth beacon list, it may be determined that a target bluetooth beacon within a preset range is detected. When the identification information of the detected bluetooth beacon is not in the bluetooth beacon list, it may be determined that a target bluetooth beacon within the preset range is not detected.
In some embodiments, after obtaining the identification information of the searched bluetooth beacon, the method further includes: and if the identification information of the Bluetooth beacon is not in the Bluetooth beacon list, executing wireless searching operation based on the first searching frequency.
For example, when the acquired identification information of the bluetooth beacon is not in the bluetooth beacon list, the search frequency may be decreased from the second search frequency to the first search frequency, and the wireless search operation may be performed based on the first search frequency.
In the above embodiment, when the identification information of the bluetooth beacon is not in the bluetooth beacon list, the wireless search operation is performed based on the first search frequency, so that the wireless search can be performed at a lower search frequency, and power consumption of the bluetooth device can be further reduced.
And step S20, determining a target distance value between the Bluetooth device and the target Bluetooth beacon according to the received signal strength corresponding to the target Bluetooth beacon based on the corresponding relationship between the preset received signal strength and the distance value.
It should be noted that, in this embodiment of the present application, when the bluetooth device executes the wireless search operation, in addition to acquiring the identification information of the searched bluetooth beacon, the bluetooth device may also detect a Received Signal Strength Indication (RSSI) corresponding to the target bluetooth beacon.
For example, the target distance value between the bluetooth device and the target bluetooth beacon may be determined according to the received signal strength corresponding to the target bluetooth beacon based on a preset corresponding relationship between the received signal strength and the distance value.
In the embodiment of the present application, the correspondence between the received signal strength and the distance value may be measured and set in advance. For example, when the range value is 1 meter, the corresponding received signal strength is [ -58, -64] dBm.
By determining the target distance value between the Bluetooth device and the target Bluetooth beacon, whether danger alarm information is output or not can be judged subsequently according to the target distance value.
And S30, when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth device is close to a dangerous device or a dangerous area, and outputting danger alarm information, wherein the danger alarm information is used for prompting to be far away from the dangerous device or the dangerous area.
Referring to fig. 7, fig. 7 is a schematic scene diagram of security detection according to an embodiment of the present disclosure. As shown in fig. 7, when the target distance value is smaller than the preset alarm distance threshold, it is determined that the bluetooth device is close to a dangerous device or a dangerous area. The preset alarm distance threshold value may be set according to an actual situation, and a specific numerical value is not limited herein.
In some embodiments, when the target distance value is smaller than a preset alarm distance threshold value, it is determined that the bluetooth device is close to a dangerous device or a dangerous area, and dangerous alarm information is output. For example, when a bluetooth device in a safety helmet worn by a worker detects that a target distance value between the bluetooth device and a bluetooth beacon is smaller than an alarm distance threshold value, it is determined that the worker is close to a dangerous device or a dangerous area, and danger alarm information is output.
The manner of outputting the danger warning information may include, but is not limited to, a warning light, a speaker, a buzzer, a voice broadcast, and the like. For example, when the preset alarm distance threshold is 2 meters, if the target distance value is less than 2 meters, the dangerous alarm information of "dangerous area, don't approach" may be output in a voice broadcast manner.
In the above embodiment, when the target distance value is smaller than the preset warning distance threshold, it is determined that the bluetooth device is close to the dangerous device or the dangerous area, and the dangerous warning information is output, so that the operating personnel can be timely reminded of keeping away from the dangerous device or the dangerous area, and the personal safety of the operating personnel can be effectively improved.
In some embodiments, after determining that the bluetooth device is close to a dangerous device or a dangerous area, the security detection method provided in this embodiment may further include: and acquiring safety detection information, and sending the safety detection information to the client or the server. The safety detection information comprises one or more of position information of the Bluetooth device, identification information of the target Bluetooth beacon, an alarm type and alarm time.
For example, identification information of the target bluetooth beacon may be sent to the client or the server. As another example, the alert type may be sent to the client or server.
It should be noted that the location information of the bluetooth device may include longitude and latitude of the bluetooth device. The identification information of the bluetooth device may include a MAC address and/or an IMEI (International Mobile Equipment Identity). The identification information of the target bluetooth beacon may include a MAC address and a UUID. The types of alarms may include hazardous equipment alarms and hazardous area alarms.
For example, the security detection information may be collected and sent to the client or the server. And displaying the safety detection information by the client or the server.
By acquiring the safety detection information and sending the safety detection information to the client or the server, related personnel can check and analyze the safety detection information conveniently.
In some embodiments, after outputting the danger warning information, the security detection method provided in the embodiments of the present application may further include: and when the target distance value between the Bluetooth device and the target Bluetooth beacon is larger than the alarm distance threshold value, stopping outputting the danger alarm information.
For example, after outputting the danger warning information, the target distance value between the bluetooth device and the target bluetooth beacon may be continuously detected, and when the target distance value between the bluetooth device and the target bluetooth beacon is detected to be greater than the warning distance threshold, the danger warning information may be stopped from being output.
When the target distance value between the Bluetooth device and the target Bluetooth beacon is larger than the alarm distance threshold value, the danger alarm information is stopped being output, so that the operation personnel can be prevented from being excessively interfered, and the experience degree of the operation personnel is improved.
According to the safety detection method provided by the embodiment, the Bluetooth beacon list is established according to the Bluetooth beacon information, and the corresponding Bluetooth beacon can be determined as the target Bluetooth beacon when the Bluetooth beacon in the Bluetooth beacon list is searched wirelessly subsequently, so that the authentication process is simplified; by performing a wireless search operation based on the first search frequency, identification information of the searched bluetooth beacon can be acquired; when the wireless communication broadcast message is received, wireless searching operation is executed based on the second searching frequency, wireless searching is carried out at a higher searching frequency when the Bluetooth beacons exist at the periphery, whether the target Bluetooth beacon exists in a preset range can be timely and accurately detected, and the timeliness of subsequent danger warning information output is ensured; when the identification information of the Bluetooth beacon is not in the Bluetooth beacon list, the wireless search operation is executed based on the first search frequency, so that the wireless search can be performed at a lower search frequency, and the power consumption of the Bluetooth equipment can be further reduced; by determining a target distance value between the Bluetooth device and the target Bluetooth beacon, whether danger warning information is output or not can be judged subsequently according to the target distance value; when the target distance value is smaller than the preset alarm distance threshold value, the Bluetooth device is determined to be close to the dangerous device or the dangerous area, and the dangerous alarm information is output, so that the operating personnel can be reminded to be away from the dangerous device or the dangerous area in time, and the personal safety of the operating personnel can be effectively improved; when the target distance value between the Bluetooth device and the target Bluetooth beacon is larger than the alarm distance threshold value, the danger alarm information is stopped being output, so that the operation personnel can be prevented from being excessively interfered, and the experience degree of the operation personnel is improved.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, where the computer program includes program instructions, and the processor executes the program instructions to implement any one of the security detection methods provided in the embodiments of the present application. For example, the computer program is loaded by a processor and may perform the following steps:
when a target Bluetooth beacon is detected within a preset range, acquiring the received signal intensity corresponding to the target Bluetooth beacon; determining a target distance value between the Bluetooth device and the target Bluetooth beacon according to the received signal strength corresponding to the target Bluetooth beacon based on a corresponding relation between preset received signal strength and distance value; and when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth equipment is close to dangerous equipment or a dangerous area, and outputting danger alarm information, wherein the danger alarm information is used for prompting to keep away from the dangerous equipment or the dangerous area.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
The computer-readable storage medium may be an internal storage unit of the bluetooth device described in the foregoing embodiment, for example, a hard disk or a memory of the bluetooth device. The computer readable storage medium may also be an external storage device of the bluetooth device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital Card (SD), a Flash memory Card (Flash Card), and the like, provided on the bluetooth device.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A safety detection method is applied to Bluetooth equipment and comprises the following steps:
when a target Bluetooth beacon is detected in a preset range, acquiring the received signal intensity corresponding to the target Bluetooth beacon;
determining a target distance value between the Bluetooth device and the target Bluetooth beacon according to the received signal strength corresponding to the target Bluetooth beacon based on a corresponding relation between preset received signal strength and distance value;
and when the target distance value is smaller than a preset alarm distance threshold value, determining that the Bluetooth equipment is close to dangerous equipment or a dangerous area, and outputting dangerous alarm information, wherein the dangerous alarm information is used for prompting to be far away from the dangerous equipment or the dangerous area.
2. The security detection method of claim 1, further comprising:
receiving Bluetooth beacon information sent by any client or server, wherein the Bluetooth beacon information comprises identification information of one or more Bluetooth beacons;
and establishing a Bluetooth beacon list according to the Bluetooth beacon information.
3. The security detection method of claim 2, further comprising:
executing wireless searching operation based on a preset first searching frequency, and acquiring the identification information of the searched Bluetooth beacon;
and if the identification information of the Bluetooth beacon is in the Bluetooth beacon list, determining that a target Bluetooth beacon exists in a preset range.
4. The security detection method of claim 3, further comprising:
when a wireless communication broadcast message is received, executing wireless searching operation based on a preset second searching frequency, and acquiring the identification information of the searched Bluetooth beacon, wherein the second searching frequency is greater than the first searching frequency;
and if the identification information of the Bluetooth beacon is in the Bluetooth beacon list, determining that a target Bluetooth beacon exists in a preset range.
5. The security detection method according to claim 4, wherein after acquiring the identification information of the searched bluetooth beacon, the method further comprises:
and if the identification information of the Bluetooth beacon is not in the Bluetooth beacon list, executing wireless search operation based on the first search frequency.
6. The security detection method of claim 1, wherein after determining that the bluetooth device is near a hazardous device or a hazardous area, the method further comprises:
and acquiring safety detection information, and sending the safety detection information to a client or a server, wherein the safety detection information comprises one or more of position information of the Bluetooth equipment, identification information of the target Bluetooth beacon, an alarm type and alarm time.
7. The safety detection method according to claim 1, wherein after the outputting of the danger warning message, the method further comprises:
and when detecting that the target distance value between the Bluetooth device and the target Bluetooth beacon is greater than the alarm distance threshold value, stopping outputting danger alarm information.
8. The safety detection method according to any one of claims 1 to 7, wherein the target Bluetooth beacon is provided in the hazardous device or the hazardous area.
9. A bluetooth device, characterized in that the bluetooth device comprises a memory and a processor;
the memory is used for storing a computer program;
the processor for executing the computer program and implementing the security detection method of any one of claims 1 to 8 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement the security detection method of any one of claims 1 to 8.
CN202211336174.6A 2022-10-28 2022-10-28 Security detection method, bluetooth device, and storage medium Pending CN115767434A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211336174.6A CN115767434A (en) 2022-10-28 2022-10-28 Security detection method, bluetooth device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211336174.6A CN115767434A (en) 2022-10-28 2022-10-28 Security detection method, bluetooth device, and storage medium

Publications (1)

Publication Number Publication Date
CN115767434A true CN115767434A (en) 2023-03-07

Family

ID=85355834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211336174.6A Pending CN115767434A (en) 2022-10-28 2022-10-28 Security detection method, bluetooth device, and storage medium

Country Status (1)

Country Link
CN (1) CN115767434A (en)

Similar Documents

Publication Publication Date Title
US10771945B2 (en) Tracking and theft-recovery system for mobile assets
US9230439B2 (en) Method and system for monitoring interactions with a vehicle
US11104302B2 (en) Method and vehicle system for handling parameters associated with surroundings of a vehicle
CN104284337A (en) Base station detection method and system
US20040235453A1 (en) Access point incorporating a function of monitoring illegal wireless communications
US9900741B2 (en) Method for implementing geo-fencing and mobile device
TW201404208A (en) Automatically determining and alerting users to available wireless networks
CN106685891A (en) Verification method and apparatus for accessing network
US20140226512A1 (en) Displaying radio-wave condition
JP2017097750A (en) Positioning system, wireless tag device, and positioning method thereof
US11741479B1 (en) Asset tracker loss alert and notification process
US10848916B2 (en) Service provision device, service provision method, and program storage medium
US9820321B2 (en) System and method of pairing wireless sensors with an access point control panel
US20210037339A1 (en) High precision geofence system
CN115767434A (en) Security detection method, bluetooth device, and storage medium
WO2022267803A1 (en) Security and protection monitoring system, security and protection monitoring method, and device
CN112440937A (en) Vehicle unlocking method and related device
US11341833B2 (en) Industrial plant monitoring system
JP2015532046A (en) Electronic device, operation method and logic device
CN111667175A (en) Personal safety warning method, system, platform and storage medium
US20220379804A1 (en) Control device, system, vehicle, and determination method
US20220153261A1 (en) Vehicle To Device Proximity Detection Using Location Comparison
CN113341856B (en) Security monitoring system, security monitoring method and security monitoring equipment
US20220379868A1 (en) Control device, system, vehicle, and control method
US20220379805A1 (en) Control device, system, vehicle, and control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination