WO2009097781A1 - 监控主机的方法、监控装置及主机 - Google Patents

监控主机的方法、监控装置及主机 Download PDF

Info

Publication number
WO2009097781A1
WO2009097781A1 PCT/CN2009/070188 CN2009070188W WO2009097781A1 WO 2009097781 A1 WO2009097781 A1 WO 2009097781A1 CN 2009070188 W CN2009070188 W CN 2009070188W WO 2009097781 A1 WO2009097781 A1 WO 2009097781A1
Authority
WO
WIPO (PCT)
Prior art keywords
host
monitoring
monitored
module
monitoring device
Prior art date
Application number
PCT/CN2009/070188
Other languages
English (en)
French (fr)
Other versions
WO2009097781A8 (zh
Inventor
Deying Guo
Jun Li
Wei Zhang
Penghui Yang
Jianrong Ye
Huaxing Chen
Zuohua Zhou
Dengke Wang
Chundong Fang
Yantao Zhao
Bijun Zhang
Original Assignee
Yulong Computer Telecommunication Technologies (Shenzhen) Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CNU200820091929XU external-priority patent/CN201181963Y/zh
Priority claimed from CNA2008100652175A external-priority patent/CN101227199A/zh
Priority claimed from CNA2008100660970A external-priority patent/CN101232535A/zh
Priority claimed from CNU2008200483469U external-priority patent/CN201213280Y/zh
Priority claimed from CN2008100285301A external-priority patent/CN101286806B/zh
Priority claimed from CN2008100291660A external-priority patent/CN101304571B/zh
Priority claimed from CN2008100300176A external-priority patent/CN101335575B/zh
Application filed by Yulong Computer Telecommunication Technologies (Shenzhen) Co., Ltd. filed Critical Yulong Computer Telecommunication Technologies (Shenzhen) Co., Ltd.
Priority to CN2009801038959A priority Critical patent/CN101919184B/zh
Publication of WO2009097781A1 publication Critical patent/WO2009097781A1/zh
Publication of WO2009097781A8 publication Critical patent/WO2009097781A8/zh
Priority to US12/848,902 priority patent/US20100302002A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, a monitoring device, and a host for monitoring a host. Background technique
  • the embodiment of the invention provides a method, a monitoring device and a host for monitoring a host, so as to implement monitoring of the host.
  • the monitoring device pages the host within the valid range, and the host that is paged returns the device information of the page; the device information returned by the at least one host confirms that the at least one host is the monitored host; respectively, and the at least one monitored The monitoring connection relationship of the host;
  • the monitoring device includes a control module, a communication module and a query module, wherein the control module is configured to control communication between the communication module and the query module;
  • a communication module configured to establish a monitoring connection relationship with the monitored host
  • the query module is configured to send a search command to the monitored host to send a request for returning the host device information to the monitored host during the process of establishing a monitoring connection relationship with the monitored host, or after establishing a monitoring connection relationship with the monitored host, The incident of the monitored host and querying the working state of the monitored host.
  • the host includes a communication module, a detection module, and a control response module, wherein the communication module is configured to establish a monitoring connection relationship with the monitoring device that performs the monitoring task; a detecting module, configured to detect, in a process of establishing a monitoring connection relationship with the monitoring device, whether there is a search instruction sent by the monitoring device; or after establishing a monitoring connection relationship with the monitoring device, detecting whether the monitoring is received A list of monitoring event queries sent by the device or whether there is an emergency event;
  • a control response module configured to: when the detecting module detects that the monitoring device issues a search command, send the device information to the monitoring device through the communication module; and the detecting module detects that the monitoring event sent by the monitoring device is received When querying the list, querying and collecting the working status information of the own device, and transmitting the working status information of the device to the monitoring device through the communication module; or when the detecting module detects that an emergency event occurs, the emergency event information is generated.
  • the monitoring device is sent by the communication module.
  • the method, the monitoring device and the host for monitoring the host provided by the embodiment of the present invention, when the monitoring device wants to monitor the host, first page the host within the valid range to request the host to return its own device information; once the host returns to the host Device information, the monitoring device can confirm the monitored host according to the device information returned by the host, and establish a monitoring connection relationship with the host; once the monitoring device establishes a monitoring connection relationship with the host, the monitoring device can monitor the host Send an event and query the working status of the monitored host.
  • FIG. 1 is a flowchart of a method for monitoring a host by a slave according to an embodiment of the present invention.
  • FIG. 2 is a flow chart of the monitoring of the host side in the host reporting method provided by the embodiment.
  • FIG. 4 is a flowchart of a monitoring operation performed by a host side in a sub-machine query method according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a monitoring operation performed by the slave side in the slave inquiry method according to the embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a system of a child monitoring host provided by an embodiment of the present invention.
  • FIG. 7 is a structural block diagram of a slave according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram showing the display of a slave according to an embodiment of the present invention.
  • FIG. 9 is a structural block diagram of a host according to an embodiment of the present invention.
  • FIG. 10 is a flowchart of a method for dynamically setting a monitoring event menu of a slave according to an embodiment of the present invention.
  • FIG. 11 is a structural block diagram of a child machine according to an embodiment of the present invention.
  • FIG. 12 is a structural block diagram of a host according to an embodiment of the present invention.
  • FIG. 13 is a flowchart of a method for communication authentication between a host and a slave according to an embodiment of the present invention.
  • FIG. 14 is a flowchart of binding a host to a slave according to an embodiment of the present invention.
  • FIG. 15 is a flowchart of setting communication authentication authority of a host to a slave according to an embodiment of the present invention.
  • FIG. 16 is a schematic diagram of an interface for granting a subroutine permission by a host according to an embodiment of the present invention.
  • FIG. 17 is a flowchart of a method for communication authentication between a slave and a host in a process of placing a call by a child machine according to an embodiment of the present invention.
  • FIG. 18 is a structural block diagram of a host according to an embodiment of the present invention.
  • FIG. 19 is a structural block diagram of a first embodiment of a mobile phone state monitoring slave according to the present invention.
  • FIG. 20 is a structural block diagram of a second embodiment of a mobile phone state monitoring slave according to the present invention.
  • FIG. 21 is a structural block diagram of a third embodiment of a mobile phone state monitoring slave according to the present invention.
  • FIG. 22 is a flowchart of a first embodiment of a mobile phone state monitoring method provided by the present invention.
  • FIG. 23 is a flowchart of a second embodiment of a mobile phone state monitoring method provided by the present invention.
  • FIG. 24 is a structural block diagram of a first embodiment of a multimedia player provided by the present invention.
  • Figure 25 is a block diagram showing the structure of a second embodiment of the multimedia player provided by the present invention.
  • 26 is a structural block diagram of a third embodiment of a multimedia player provided by the present invention.
  • FIG. 27 is a flowchart of a method for a multimedia player to monitor and play a mobile phone audio and video file according to an embodiment of the present invention. Mode for carrying out the invention
  • the monitoring device pages the host in the valid range to request the host to return its own device information; and confirms that the at least one host is the monitored host according to the device information returned by the at least one host; Establishing a monitoring connection relationship with the at least one monitored host, and monitoring the incident of the at least one monitored host and querying the working status of the at least one monitored host by using the established monitoring connection relationship.
  • the monitoring device monitors an emergency event and a query corresponding to the monitored function item information of each monitored host according to the monitored function item information of each monitored host. The working status of each monitored host corresponding to the monitored function item information.
  • the monitoring device establishes a monitoring connection relationship with one or more monitored hosts, and respectively uses the monitoring connection relationship established with the one or more monitored hosts to pass the host
  • the reporting method and the sub-machine query method respectively perform multi-channel monitoring operations for processing the one or more monitored host emergencies and querying the working state of the one or more monitored hosts.
  • the host may be an electronic device with strong functions, such as a notebook computer equipped with a corresponding monitoring function module, a palmtop computer, a smart phone, and a digital camera equipped with communication capabilities.
  • the monitoring device can be a simple, portable, electronic device that monitors other hosts, such as a mobile communication electronic product such as a multimedia player.
  • the monitoring device in order to correspond to the "host", the monitoring device may also be referred to as a "slave".
  • the "host” and the "slave” can actually be two independent terminal devices.
  • a terminal device in an actual application can be used as a host in some occasions, monitored by other terminal devices, and used as a slave device in some occasions to monitor other terminal devices.
  • FIG. 1 is a flowchart of a method for monitoring a host by a slave according to an embodiment of the present invention. As shown in Figure 1, the method includes the following steps:
  • Step 101 The slave searches for a host within the valid range, and sends a request for returning the host device information. At this time, all the hosts that are within the effective communication range and the communication module is started may be searched by the slave. The slave communicates with each host in accordance with a unified, shared command that does not reveal host content. Step 102: The searched host sends its own device information to the slave.
  • the device information may include a device category or a device number, such as indicating whether the host is a laptop or a smart phone.
  • Step 103 The slave saves the device information of the host to identify each host, thereby communicating with each host.
  • Step 104 The user selects and confirms the monitored host through the slave device, and simultaneously sends a pairing connection request to the monitored host.
  • paired connection is hereinafter referred to as “monitoring connection”.
  • Step 105 After receiving the pair connection request, the monitored host determines whether it is set to the monitoring mode. If yes, go to step 107; otherwise, go to step 106.
  • Step 106 The monitored host rejects the pairing connection request of the child machine, and ends the process.
  • Step 107 The monitored host accepts the pairing connection request of the slave, and returns a connection response signal to the slave. After receiving the connection response signal, the handset connects to the monitored host.
  • Step 108 The slave establishes a monitoring connection relationship with the monitored host, and sets a monitoring event menu for the monitored host. At this point, the process ends.
  • the host reporting method can be used to complete the monitoring operation.
  • the monitored incidents are different depending on the type of host being monitored.
  • a smartphone's emergency can be a user's incoming call, a new incoming SMS, an alarm, etc.
  • the laptop's emergency can be a new email, a system timer switch, and the like.
  • the monitored event menu set for the monitored host includes the monitored function item information of the monitored host.
  • the slave monitors the monitored host according to the monitored function item information of the monitored host.
  • monitoring event menu is actually a human-machine operation interface, and the function thereof is to monitor the monitored function item information of the monitored host and the sudden response corresponding to the monitored function item information returned by the monitored host. Event information and work status are displayed to the user.
  • FIG. 2 is a flowchart of a monitoring operation performed by a host side in a host reporting method according to an embodiment of the present invention. As shown in Figure 2, in the reporting method of the host, the monitoring operations performed by the monitored host side are as follows:
  • Step 201 The host starts the monitoring task program according to the content of the set monitoring event menu.
  • Step 202 The host determines whether an emergency event occurs. When no incident is detected, the monitoring task program is transferred to the background; when an unexpected event is detected, the event is reported to the operating system.
  • Step 203 The host sends the emergency event and its own device information to the slave to process, and waits for the result of the reply processing.
  • Step 204 The host determines whether the reply of the slave is timed out. If the slave responds with a timeout, step 205 is performed; otherwise, step 206 is performed.
  • Step 205 The host resends the emergency to the slave. If the transmission is not successful within the set number of retransmissions, the transmission is discarded, and the process proceeds to step 202 to wait for the next emergency.
  • Step 206 The host feeds back its own state information to the slave, so that the host completes the reporting of the emergency.
  • the host returns, and step 202 waits for the arrival of the next emergency.
  • Step 301 The child machine starts the monitoring task program.
  • Step 302 The slave determines whether an emergency event sent by the monitored host is received.
  • Step 303 Determine, according to the host device information received at the same time, which monitored host is sent by the monitored host.
  • step 303 may be executed instead of step 304.
  • Step 304 Display the received emergency, and notify the user to process by sound or vibration.
  • the slave can establish a corresponding page for each host. Once an incident is received from a host, the incident is displayed on the page corresponding to the host. This will alert the user more intuitively.
  • Step 305 Wait for the user to input the processing result of the emergency.
  • Step 306 Determine whether the user reply processing result is timed out. If the user reply processing result times out, step 307 is performed; otherwise, step 308 is performed.
  • Step 307 The slave returns the default processing result to the monitored host corresponding to the emergency. After completing this step, you can end the process directly or go to step 309.
  • Step 308 The slave returns the processing result of the user reply to the monitored host corresponding to the emergency.
  • Step 309 Display the status information of the received monitored host, as displayed on the page corresponding to the monitored host. In this way, the handset completes the processing of this emergency, and returns to step 302 to wait for the next emergency.
  • the slave When the slave wants to query the working status of the monitored host, it can use the slave query method to complete the monitoring operation.
  • the working status to be queried is also different.
  • the working status to be queried may be signal strength, caller number, battery margin, etc.
  • the working state to be queried may be storage space, battery margin, and the like.
  • FIG. 4 is a flowchart of a monitoring operation performed by a host side in a sub-machine query method according to an embodiment of the present invention. As shown in Figure 4, in the sub-machine query method, the monitoring steps performed by the host side are as follows:
  • Step 401 The host starts the monitoring task program.
  • Step 402 Determine whether to establish a monitoring connection relationship with the child machine. If yes, step 404 is performed, and if no, step 403 is performed.
  • Step 403 Waiting or actively establishing a monitoring connection relationship with the child machine.
  • Step 404 Determine whether the slave sends a monitoring event query list. If the child machine sends a monitoring event query list, step 405 is performed.
  • Step 405 Receive and parse the monitoring event query list.
  • Step 406 Collect work status information to be queried according to the received monitoring event query list.
  • Step 407 The packaged work status information is packaged and sent to the slave machine, and the current query ends, and the process returns to step 402 to wait for the next query.
  • FIG. 5 is a flowchart of a monitoring operation performed by a slave side in a slave inquiry method according to an embodiment of the present invention.
  • the monitoring operation performed on the slave side is as follows:
  • Step 501 Start the monitoring task program of the child machine according to the user's needs.
  • Step 502 Select a host to be queried according to the user's needs.
  • Step 503 Establish a monitoring connection relationship with the host to be queried.
  • Step 504 Determine whether the establishment of the monitoring connection relationship is successful. If yes, go to step 506, otherwise go to step 505.
  • Step 505 Re-establish a monitoring connection relationship with the queried host. If the establishment is not successful within the set number of repetitions, return to step 502.
  • Step 506 Send a monitoring event query list to the host.
  • Step 507 Receive a working status information packet sent by the host.
  • Step 508 Decompress the received working status information packet, and display the working status information of the queried host for the user to view.
  • the working status information of the queried host can be displayed on the page corresponding to the queried host.
  • the query ends and returns to step 502 to wait for the next query.
  • the method for monitoring the host by using the slave machine provided by the embodiment of the present invention realizes monitoring the host through a split type slave, which is convenient to operate and enhances the human-computer interaction performance.
  • the embodiment of the present invention further provides a system for a child monitoring host, including a single child machine and at least one host, and the single child machine realizes concentration of at least one host through a wired or wireless network by using the method provided in the foregoing embodiment.
  • a child monitoring host including a single child machine and at least one host
  • the single child machine realizes concentration of at least one host through a wired or wireless network by using the method provided in the foregoing embodiment. Monitoring and simple control, the specific structure is shown in Figure 6.
  • the embodiment of the present invention further provides a system for monitoring a host by another seed machine, including at least one slave and a single host. That is, each slave can implement monitoring and simple control of one host through a wired or wireless network by using the method provided in the above embodiment.
  • FIG. 7 is a structural block diagram of a slave according to an embodiment of the present invention.
  • the slave device provided by the embodiment of the present invention includes a control module 701, a communication module 702, a display module 703, a query module 704, and a warning module 705.
  • the communication module 702, the display module 703, the query module 704, and the alert module 705 are electrically connected to the control module 701, respectively.
  • the control module 701 is configured to control communication between modules in the slave.
  • control module 701 is further configured to perform information processing on information input by the user through an input module such as a keyboard operation.
  • the communication module 702 is configured to establish a monitoring connection relationship with the monitored host to transmit and receive information.
  • the display module 703 is configured to display working state information or emergency event information fed back by the monitored host.
  • the display module 703 can be a display screen, and can display the monitoring information of each monitored host according to the host name of each monitored host, that is, the monitoring information of each monitored host is displayed on a separate page.
  • FIG. 8 is a schematic diagram of display of a slave according to an embodiment of the present invention. As shown in FIG. 8 , the top of the screen of the slave is a property page named by the monitored host name, and the user can switch the display of the monitoring information page of each monitored host by pressing the left and right direction buttons or by clicking a different property page name.
  • the screen width may be smaller than the total width of the property page.
  • a multi-page prompt will be displayed on both sides of the property page, and the display of other host monitoring information can be switched through related operations.
  • the querying module 704 is configured to send a search command to the monitored host to send a request for returning the host device information during the process of establishing a monitoring connection relationship with the monitored host, or to notify the monitored host after establishing a monitoring connection relationship with the monitored host.
  • the host issues a list of monitoring event queries.
  • the warning module 705 when receiving the working status information or the emergency event information fed back by the monitored host, issues an alert to remind the user, such as issuing a specific prompt sound or blinking light or vibration to remind the user.
  • the slave device provided by the embodiment of the present invention may include only the control module 701, the communication module 702, and the query module 704.
  • FIG. 9 is a structural block diagram of a host according to an embodiment of the present invention.
  • the host provided by the embodiment of the present invention includes: a communication module 901, a detection module 902, and a control response module 903. These three modules are electrically connected to each other.
  • the communication module 901 is configured to establish a monitoring connection relationship with the slave device that performs the monitoring task to transmit and receive information.
  • the detecting module 902 is configured to detect, in a process of establishing a monitoring connection relationship with the slave machine that performs the monitoring task, whether there is a search instruction sent by the child machine; or, after establishing a monitoring connection relationship with the child machine, detecting whether the monitoring sent by the child machine is received The event query list or its own occurrence of an unexpected event.
  • the control response module 903 is configured to: when the detecting module 902 detects that a slave sends a search command, send the device information to the slave through the communication module 901; and the detecting module 902 detects that the monitoring event is sent by the slave. In the case of a list, the working status information of the device is queried and collected, and the working status information of the device is sent to the slave through the communication module 901. When the detecting module 902 detects that an emergency event occurs, the event information is passed. The communication module 901 transmits to the slave.
  • the slave can only monitor the monitoring items set in advance, and cannot monitor the content other than the previously set monitoring items, that is, It is not possible to set monitoring items according to user requirements.
  • an embodiment of the present invention further provides a method for dynamically setting a monitoring event menu matching a host on a child machine.
  • FIG. 10 is a flowchart of a method for dynamically setting a monitoring event menu of a slave according to an embodiment of the present invention. As shown in FIG. 10, the method specifically includes the following steps:
  • Step 1001 The slave sends a search command to search all monitored hosts in the valid range to support the client tool development tool (CTK, Customer ToolKit) function, and prepares to establish a matching monitoring link channel with each monitored host.
  • the slave records the device information of each monitored host to distinguish the type and model of each monitored host.
  • Step 1002 According to the user's needs, the slave sends a function item query command to the monitored host, and requests the monitored host to feed back its own function item information and corresponding ID number.
  • the functional items to be monitored are also different.
  • the function items to be monitored may be signal strength, caller ID, battery margin, new short message, etc.;
  • the function items to be monitored may be storage space, battery capacity, etc.
  • the function items to be monitored may be whether new mail, battery remaining, host storage space, etc. are received.
  • the sub-machine may not have the ability to monitor a certain function item of the host in advance. For example, the sub-machine may not be able to monitor whether the laptop receives new mail beforehand.
  • Step 1003 After the monitored host obtains the function item query instruction, collect the function items of the machine, and generate a unique ID number for each item, and package the data to the slave machine.
  • Step 1004 The slave machine parses the received function item information of the monitored host, selects one or more items from the function item information of the monitored host to perform monitoring, and creates a corresponding monitoring event menu according to the selected function item. Select according to the ID number of the function item.
  • the monitored host is a laptop computer
  • the monitored function items returned by the notebook computer to the slave device and the corresponding ID numbers are as follows: ID1000 indicates the battery power of the notebook computer, ID number 1002 indicates the CPU temperature of the notebook computer, and ID number 1004 indicates the notebook computer.
  • the computer receives the mail function item.
  • the handset can select the ID number 1004, which represents the receiving mail function of the notebook, and add it to the handset to create a monitoring event menu that matches the laptop.
  • the "Receive Mail" menu option is displayed on the "Notebook" monitor page of the handset screen, and the handset system records the corresponding ID number to identify each function item in the menu.
  • Step 1005 After the monitoring link channel is established, the slave machine processes the monitored event reported by each monitored host and actively queries related information of the monitored host according to the monitoring event menu, thereby completing the monitoring task.
  • the slave can set different monitoring event menus for different monitored hosts according to the type and function of the monitored host, or set different monitoring for the same monitored host according to different usage scenarios. Event menu.
  • the slave machine and the host can complete the monitoring process of the slave to the host through the host reporting method and the slave query method.
  • the slave machine can send the ID number corresponding to the function item to be queried to the monitored host.
  • the monitored host collects information according to the received ID number, and feeds the collected data back to the slave.
  • FIG. 11 is a structural block diagram of a child machine according to an embodiment of the present invention.
  • the slave device provided by the embodiment of the present invention includes: a control module 701, a communication module 702, a display module 703, a query module 704, a warning module 705, and a storage module 706.
  • the control module 701, the communication module 702, the display module 703, and the alert module 705 have the same functions as the corresponding modules in the slave shown in FIG.
  • the query module 704 is further configured to send a function item query command to the monitored host, receive function item information returned by the monitored host, and set a monitoring event according to the function item information returned by the monitored host. menu.
  • the storage module 706 is configured to store related event information such as a monitoring event menu and monitoring data of each monitored host.
  • the sub-machine provided by the embodiment of the present invention may further include a control module 701, a communication module 702, a display module 703, a query module 704, and an alert module 705 in the sub-machine shown in FIG. 7, and further includes a monitoring event menu setting module.
  • Storage module 706 The monitoring event menu setting module is used to The monitored host sends a function item query command, receives the function item information returned by the monitored host, and sets a monitoring event menu according to the function item information returned by the monitored host.
  • the storage module 706 is configured to store related event information such as a monitoring event menu and monitoring data of each monitored host.
  • FIG. 12 is a structural block diagram of a host according to an embodiment of the present invention.
  • the host provided by the embodiment of the present invention includes: a communication module 901, a detection module 902, a control response module 903, and a monitoring item matching module 904.
  • the communication module 901 and the control response module 903 are the same as the embodiment shown in FIG.
  • the detecting module 902 is further configured to detect whether a function item query command issued by the slave is received.
  • the monitoring item matching module 904 is configured to return the function item that needs to be monitored to the slave machine when the detecting module receives the function item query command sent by the slave machine, so as to complete the setting of the monitoring event menu with the child machine.
  • the method for monitoring the host by using the slave device provided by the embodiment of the present invention by using a client application development tool (CTK, Customer ToolKit) or software to perform monitoring menu matching setting between the slave device and the monitored host, the new function on the monitored host can be performed.
  • CTK Customer ToolKit
  • the project is added to the monitoring event menu in the sub-machine, which greatly enhances the flexible operation of the system and facilitates the upgrade of system functions.
  • the embodiment of the present invention provides a method for communication authentication between a seed machine and a host, and performs authentication binding between the host and the child machine in the connection process, and gives the child machine specific function rights, so that different child machines can be obtained. Different certifications enable different functions.
  • FIG. 13 is a flowchart of a method for communication authentication between a host and a slave according to an embodiment of the present invention. As shown in Figure 13, the method for communication authentication between the host and the sub-machine includes the following steps:
  • Step 1301 The host sets communication authentication authority to the slave.
  • Step 1302 The host determines, according to the set communication authentication authority, whether the application request sent by the slave device to the host is within the range allowed by the communication authentication authority; if yes, the process proceeds to step 1303, otherwise, the process proceeds to step 1304.
  • Step 1303 The host executes the application request of the child machine, and ends the process.
  • Step 1304 The host disconnects from the child machine and ends the process.
  • the method provided by the embodiment of the present invention further includes: binding the host to the slave and establishing a connection with the slave after the binding.
  • the binding process between the host and the slave can be initiated by the host or by the slave.
  • the following describes how the host actively initiates binding with the child.
  • FIG. 14 is a schematic flowchart of binding a host to a slave according to an embodiment of the present invention. As shown in Figure 14, the process of binding a host to a child includes the following steps:
  • Step 1401 The host initializes the wireless communication module to prepare for the wireless communication connection between the host and the slave.
  • Step 1402 The host queries a sub-machine that can establish a link key in a certain range.
  • the specific process is as follows: The host initiates a device query by actively initiating a search command, and the sub-machine is in a state of waiting for a search command. Through the device query, the host can find the slaves within the valid range.
  • the query message does not include any message of the query device, but can specify two query methods: DIAC (Dedicated Inquiry Access Code) and GIAC (Global Information Assurance Certification).
  • Step 1403 The host determines whether the slave is queried within the valid range; if the slave is queried, the process proceeds to step 1404; otherwise, the process proceeds to step 1402.
  • each device has a globally unique device identifier
  • the host can use the device ID to query the slaves in the valid range.
  • Step 1404 The user inputs the link key in the child machine, and the host checks the link key to verify the legality of the child device. The host determines whether the key input by the user is correct. After the user inputs the correct key, the host and the host The binding of the child machine is successful. After the binding is completed, the connection request can be initiated by either the slave or the host, and there is no fixed master-slave device.
  • the user when using the host and slave systems for the first time, the user needs to enter the correct PIN code on the host side to create a link key.
  • the child machine In the process of the child machine actively initiating the binding, the child machine initializes the wireless communication module to prepare for the wireless communication connection between the host and the child machine; and the slave machine actively queries the host within a certain range.
  • FIG. 15 is a schematic flowchart of setting communication authentication authority of a host to a slave according to an embodiment of the present invention. As shown in Figure 15, the process of setting the communication authentication authority for the slave to the slave includes the following steps:
  • Step 1501 The host selects the service and permission granted to the slave machine with which the binding is successful.
  • the user selects the service and authority of the slave that is successfully bound to the host through the host.
  • an interface may be set to facilitate the user to select the services and permissions granted to the child machine, and an embodiment of the interface may be as shown in FIG. 16.
  • Step 1502 According to the service and permission granted for the child machine selection, the host generates a trust domain to record the correspondence between the services and rights of each child machine and each child machine.
  • the record slave 1 can make and receive calls through the host, and can also send and receive short messages; the slave 2 can only send and receive short messages; other similar wireless communication devices can only exchange data, and can only send data to Host, etc.
  • the host can find out whether each sub-machine has a certain service and permission by looking up the trust domain.
  • the services and permissions granted to the host in the trusted domain can be granted to the sub-machine, including but not limited to: dialing, answering calls, sending and receiving text messages, caller ID, and synchronizing contacts, text messages, call logs, note-taking, alarm reminders, and so on.
  • Step 1503 The host sends the service and permission granted to the child machine to the child machine;
  • Step 1504 The host is disconnected from the slave.
  • the following is an example of making a call by a slave, which specifies the process of communication authentication between the split host and the slave.
  • FIG. 17 is a flowchart of a method for communication authentication between a slave and a host in a process of placing a call by a child machine according to an embodiment of the present invention.
  • the communication authentication process between the host and the slave includes the following steps: Step 1701: The slave initializes the wireless communication module to prepare for the wireless communication connection between the slave and the host.
  • Step 1702 The handset inputs the phone number through the keyboard and displays it on the display, and presses the "Call" button.
  • Step 1703 The sub-machine queries the host within a certain range, the sub-machine initiates the device query, and the host performs the query scan. Through the device query, the sub-machine can find the host bound to the valid range.
  • Step 1704 The slave determines whether the host bound to the host is queried. If the determination is yes, go to step 1705. If the determination is no, go to step 1703.
  • Step 1705 After the sub-machine queries the host bound to it, establish a data and voice connection with the host.
  • Step 1707 The host determines whether the application request sent by the slave is recorded in the trust domain of the host. If the trust domain indicates that the handset has the function of making a call, that is, the application request sent by the slave is recorded in the trusted domain of the host, go to step 1709, otherwise, go to step 1708. .
  • Step 1708 The slave does not get the call authorization of the host, and the function of dialing out the call is not performed.
  • the host disconnects the wireless communication connection with the slave and ends the process.
  • Step 1709 The host executes the application request of the slave, dials the phone number, and communicates the call status to the slave display in response mode. After this situation, there will be at least three cases in the following, that is, the other party hangs up the phone, the handset answers the call, and the handset hangs up.
  • Step 1710 Determine whether the other party hangs up the call at this time, or the handset answers the call, or the handset hangs up. If the other party hangs up, go to step 1711; if the handset answers the call, go to step 1712; if the handset actively hangs up, go to step 1715.
  • Step 1711 The host notifies the slave that the other party has hanged the call and disconnects the wireless connection between the host and the slave, and the process ends.
  • Step 1712 The voice signal is transmitted between the host and the slave through the communication module.
  • Step 1713 The host determines whether to continue to hold the call. If yes, go to step 1712, otherwise proceed to step 1714.
  • Step S1714 The host determines whether the other party hangs up the phone, or the child machine hangs up the phone actively. If the other party hangs up, go to step 1711. If the slave actively hangs up, go to step 1715.
  • Step 1715 The slave requests the host to hang up.
  • Step 1716 The host disconnects the wireless communication connection with the child machine, and the process ends.
  • FIG. 18 is a structural block diagram of a host according to an embodiment of the present invention.
  • the host includes a host control module 2 and a communication judging module 4.
  • the host control module 2 further includes a selection granting unit 22, an authority recording unit 24, and a rights transmitting unit 26 that are connected to each other.
  • the communication judging module 4 further includes a request receiving unit 42 and a request judging unit 44 which are connected to each other.
  • the host control module 2 is configured to set communication authentication authority for the slave device successfully bound to the host.
  • the selection granting unit 22 is configured to select the services and permissions granted to the guest.
  • the authority record unit 24 is configured to generate a trust domain to record the services and rights granted for the child machine selection.
  • a permission sending unit 26, for granting a selection The service and permissions are sent to the slave.
  • the communication judging module 4 is configured to determine, according to the communication authentication authority set by the host control module 2 for the slave device, whether the application request sent by the slave device is within the range allowed by the communication authentication authority of the slave device, and if yes, executing the slave device to send Application request, otherwise, disconnected from the child machine.
  • the request receiving unit 42 is configured to receive an application request sent by the slave.
  • the request judging unit 44 is configured to determine, according to the communication authentication authority set by the host control module 2 for the slave device, whether the application request sent by the slave device is within the range allowed by the communication authentication authority of the slave device, and if yes, executing the slave device to send Apply the request, otherwise, disconnect from the child.
  • the host may also include a binding module 6 and a communication module 8.
  • the binding module 6 includes a host initial unit 62, a query unit 64, and a binding determination unit 66.
  • Binding module 6 is used to bind to the child machine.
  • the host initial unit 62 is used to initialize the communication module, and is ready to establish a monitoring connection with the child machine.
  • the query unit 64 is configured to query whether there is a child in the valid range.
  • the binding determining unit 66 is configured to determine, according to the password input by the user, whether to establish a link key connection with the queried sub-machine if the queried module 64 queries the sub-machine, and if so, with the queried sub-ent. The machine is bound.
  • the communication module 8 is configured to establish a communication connection with the slave machine that is bound to the host.
  • the host shown in this embodiment may further include a control response module 903, a monitoring item matching module 904, and a detecting module 902, and the functions of the communication module 8 may be the same as those of the communication module 901.
  • the invention establishes a trust domain at the host through the method and host for communication authentication between the host and the slave, and assigns different rights to the slave and other wireless connection modules, so that the slaves and other wireless connection modules can only be within the scope permitted by the permission. Communication between the inside and the host. Authorize the slaves to allow the slaves to work within their allowed range to avoid interference between multiple slaves. At the same time, the host can change the permissions of the slave to increase flexibility.
  • a method for monitoring a host by a slave is described below by taking a host as a mobile phone as an example.
  • the host computer is a mobile terminal having communication functions such as a palmtop computer or a PDA.
  • FIG. 19 is a structural block diagram of a first embodiment of a mobile phone state monitoring slave according to the present invention.
  • the slave includes a control module (central processing module) 701, a query communication module 1902, a display module 703, a storage module 706, an input module 707, and an authentication module 708.
  • the control module 701 is configured to process various types of data information, data operations, and process execution instructions input by the user through the input module 703.
  • the display module 703 is connected to the control module 701 and is configured to output various types of status information of the mobile phone obtained from the query communication module 1902.
  • the display module 703 can be a display screen or a voice mode.
  • the input module 707 is connected to the control module 701 for inputting an operation instruction of the user and sent to the control module 701.
  • the input module 707 can be a keyboard, a touch screen, or an audio input module.
  • the storage module 706 is connected to the control module 701 for storing data files.
  • the memory module 706 can be a dynamic memory, a read only memory, or a static memory.
  • the authentication module 708 is connected to the control module 701, and is used to establish a communication connection between the slave and the mobile phone. When connected, the identity security is authenticated to the mobile phone.
  • the query communication module 1902 is connected to the control module 701 for interactive communication with the mobile phone to obtain various status information or data of the mobile phone.
  • the query communication module 1902 may include a wired communication module or a wireless communication module.
  • query communication module 1902 in this embodiment actually has the functionality of both the communication module 702 and the query module 704 in the embodiment of FIG.
  • the query communication module 1902 can be a USB, serial port, parallel port or network port interface.
  • the query communication module 1902 When the query communication module 1902 includes a wireless communication module, the query communication module 1902 is also coupled to an antenna. Specifically, the query communication module 1902 can use any one of 2.4G, 5.8G, DECT, GSM, GPRS, CDMA, TD-SCDMA, WCDMA. In the specific product application, the low-power wireless communication module is the best, such as digital spread spectrum technology, UWB, Wi-Fi, IrDA, NFC, ZigBee, which can greatly reduce the radiation damage to the human body.
  • the query communication module 1902 can use any one of 2.4G, 5.8G, DECT, GSM, GPRS, CDMA, TD-SCDMA, WCDMA.
  • the low-power wireless communication module is the best, such as digital spread spectrum technology, UWB, Wi-Fi, IrDA, NFC, ZigBee, which can greatly reduce the radiation damage to the human body.
  • each module may be an independent module or an integrated module.
  • the slave device provided by the embodiment of the present invention can read the state change information or data of the mobile phone by querying the communication module 1902, and display the mobile phone state information through the display module 703 for the user to browse.
  • the user can further control the mobile phone through the input module 707, such as answering or making a call, reading or replying to a short message, creating a new schedule, and the like.
  • the slave provided by the foregoing embodiment may include only the control module 701, the query communication module 1902, the display module 703, and the input module 707 in the simplest case. It may also include only the control module 701, the query communication module 1902, the display module 703, the input module 707, and the authentication module 708, and may also include only the control module 701, the query communication module 1902, the display module 703, the storage module 706, and the input module. 707.
  • FIG. 20 is a structural block diagram of a second embodiment of a mobile phone state monitoring slave according to the present invention.
  • the slave in addition to the control module (also referred to as the main control module) 701, the communication module (in particular, a proximity transceiver module) 702, the display module 703, and the input module 707, the slave further includes Power source 710 and audio module 709.
  • the power source 710 is configured to supply power to each module of the control module 701, the query communication module 1902, the display module 703, the input module 707, and the audio module 709 in the slave device, and can complete the charging function.
  • the power source 710 can be used in a manner that can be used. It is a power management mode such as a low dropout regulator (LDO, Low Drop Out) or a DC/DC converter (DC/DC, Direct Current/Direct Current).
  • LDO low dropout regulator
  • DC/DC Direct Current/Direct Current
  • the audio module 709 is configured to receive the voice information of the user, and send the voice information input by the user to the control module 701 for processing to be sent to the host by querying the communication module 1902.
  • the voice signal from the host is received by the query communication module 1902 and the control module 701. And output to the user.
  • the audio module 709 includes a microphone 791 and a receiver 792.
  • the audio signal from the microphone 791 is processed by the control module 701, and then sent out by the query communication module 1902 in the slave; the query communication module 1902 receives the audio signal from the host, and demodulates the audio under the control of the control module 701. The signal is output to the user by the receiver 792.
  • FIG. 21 is a structural block diagram of a third embodiment of a mobile phone state monitoring sub-machine provided by the present invention.
  • the host has the circuit structure shown in Fig. 20, and the extension function can be set for the slave.
  • a voice recognition module 711 is provided between the microphone 791 and the control module 701.
  • the voice recognition module 711 is used to identify the voice information input by the audio module 709, and realize the identity recognition of the user by the slave.
  • the slave can also be equipped with a motor 712 according to actual needs.
  • the motor 712 is connected to the control module 701 and is controlled to vibrate according to the control module 701. When an audio signal or control signal is returned from the host to the handset by querying the communication module 1902, the motor can vibrate to alert the user.
  • motor 712 herein can be considered an embodiment of alert module 705.
  • FIG. 22 is a flowchart of a first embodiment of a mobile phone state monitoring method provided by the present invention. As shown in Fig. 22, the handset that monitors the state of the handset is recorded as a mobile device, and the method includes the following steps:
  • Step 2201 The mobile device sends a request to establish a communication connection to the mobile phone.
  • Step 2202 After receiving the connection request of the mobile device, the mobile phone performs identity authentication on the mobile terminal.
  • Step 2204 Establish a communication connection between the mobile device and the mobile phone.
  • Step 2205 The mobile device reads status information of the mobile phone.
  • the reading operation may be that the mobile device actively reads the parameters according to the parameters set by the user, or after receiving the trigger signal of the mobile phone (for example, when a call or a short message is sent).
  • the status information of the mobile phone includes the status of the communication function or the status of the information.
  • the communication function status includes call status, short message status, and information status including schedule reminder, travel reminder, alarm reminder, power prompt, network status, storage status, notepad, contact, and call history.
  • the mobile device needs to read all state data information of the mobile phone.
  • Step 2206 The mobile device displays status information of the output mobile phone through its display module.
  • Step 2207 According to the status information of the mobile phone, the user controls the mobile phone through the mobile device, for example, performing a communication function such as answering or making a call, sending and receiving a short message, or performing an operation function of establishing a schedule, a trip, a contact, and the like.
  • a communication function such as answering or making a call
  • sending and receiving a short message or performing an operation function of establishing a schedule, a trip, a contact, and the like.
  • FIG. 23 is a flowchart of a second embodiment of a mobile phone state monitoring method provided by the present invention. As shown in FIG. 23, the difference between this embodiment and the embodiment shown in FIG. 22 is that the triggering situation of the mobile device reading the mobile phone state is different, that is, a step 2305 is further included between step 2204 and step 2205, and the remaining steps are The execution is the same as in Fig. 22.
  • Step 2305 The mobile device detects whether the mobile phone status changes. If the mobile phone status changes, step 2205 is performed. If the mobile phone status does not change, step 2204 is returned.
  • the device for monitoring the state of the mobile phone may also be a multimedia player.
  • the device should also include functional components with multimedia playback.
  • FIG. 24 is a structural diagram of a multimedia player for monitoring a state of a mobile phone according to an embodiment of the present invention. As shown in FIG. 24, the multimedia player includes not only the module shown in FIG. 19 but also an audio processing module 713. Audio output module 714.
  • the audio processing module 713 is connected to the control module 701 and is used for encoding and decoding the audio signal.
  • the audio processing module 713 may include an audio codec for audio encoding and decoding of multimedia files such as audio; and a digital to analog converter for converting between digital signals and analog signals.
  • the audio processing module 713 may further include an audio power amplifier module for amplifying the audio analog signal.
  • the audio processing module 713 can be a stand-alone module or integrated with other modules, such as the control module 701. In the embodiment shown in Fig. 20, the audio processing module can be integrated in the control module 701.
  • the audio output module 714 is connected to the audio processing module 713 for outputting the audio signal after the audio processing module 713 is coded and processed.
  • the audio output module 714 can be a speaker, a microphone 792, or an audio interface, such as a headphone jack.
  • the voice signal (audio and video signal) from the other party is transmitted to the query communication module 1902 of the multimedia player via the mobile phone, and then processed by the control module 701 and the audio processing module 713, and then transmitted to the audio.
  • the output module 714 is in turn transmitted to the user.
  • FIG. 25 is a block diagram showing the structure of a second embodiment of the multimedia player provided by the present invention.
  • the multimedia player further includes an audio input module 715 connected to the audio processing module 713 for receiving audio and video signals input by the user.
  • the audio processing module 713 processes and transmits to the query communication module 1902.
  • the user can not only receive the mobile phone information through the multimedia play, but also send the voice information to other users through the mobile phone through the audio input module 715.
  • the voice signal (audio and video signal) sent by the user is transmitted to the audio processing module 713 via the audio input module 715 for processing, and then transmitted to the query communication module 1902 via the control module 701.
  • the query communication module 1902 finally transmits the voice signal. To the phone, and then to other users.
  • 26 is a structural block diagram of a third embodiment of a multimedia player provided by the present invention.
  • the audio processing module 713 may not be needed at this time, and the audio input module 715 and the audio output module 714 are both connected to the query communication module 1902.
  • the voice signal (audio and video signal) sent by the user to the outside is transmitted to the inquiry communication module 1902 via the audio input module 715, and then the voice signal is transmitted to the mobile phone via the inquiry communication module 1902, thereby being transmitted to the other party.
  • the voice signal from the other party also needs to be directly output to the audio output module 714 after being processed by the query communication module 1902.
  • the player connects to the mobile phone through a wired connection to realize data interaction.
  • the user can hang the player on the neck or the jacket pocket, and put the mobile phone in the bag or the trouser pocket, so that the mobile phone state can be conveniently and accurately monitored. And control the phone through the input module.
  • the operation of answering or making a call to the mobile phone through the player can greatly reduce the radiation damage of the mobile phone signal to the human body.
  • the size of the multimedia player can be made small, and the mobile phone user can place the multimedia player close to the head, such as hanging around the neck or in the jacket pocket, and enjoying through the device.
  • the player establishes a communication connection with the mobile phone by querying the communication module 1902, The status change information or data of the mobile phone is read, and the status information of the mobile phone is displayed through the display module 703.
  • the mobile phone user can control the mobile phone through the input module 707, such as answering or making a call, reading or replying to a short message, creating a new schedule, and the like.
  • the audio module shown in FIG. 20 may also be composed of the audio processing module 713 and the audio output module 714 shown in FIG. 24, or the audio processing module 713 and the audio output module 714 shown in FIG.
  • the audio input module 715 is composed of, or only the audio input unit shown in FIG.
  • FIG. 27 is a flowchart of a method for a multimedia player to monitor and play a mobile phone audio and video file according to an embodiment of the present invention. As shown in FIG. 27, the method for the multimedia terminal to monitor and play the audio and video files of the mobile phone includes the following steps:
  • Step 2701 After receiving the operation instruction for sharing the audio and video files in the mobile phone, the multimedia player sends a request for establishing a communication connection to the mobile phone.
  • Step 2702 After receiving the connection request of the multimedia player, the mobile phone requests identity authentication.
  • Step 2703 If the multimedia player passes the identity authentication of the mobile phone, go to step 2704. Otherwise, return to step 2702 to request re-authentication. Alternatively, the authentication may be closed, the program is terminated, and the connection request needs to be re-initiated.
  • Step 2704 Establish a communication connection between the mobile phone and the multimedia player.
  • Step 2705 The multimedia player searches for all the audio and video file information in the mobile phone, and displays it by means of a list.
  • the audio and video files can be arranged in the audio and video format type, or in the order of the file names.
  • Step 2706 According to the user's selection, in the multimedia player, select an audio and video file to be played in the mobile phone, and select a single file or multiple files. At the same time, you can also select a playback mode, such as automatically playing all the files. Or selected audio and video files, or looping and so on.
  • Step 2707 The multimedia player receives and plays the selected audio and video file.
  • the multimedia player receives and plays the multimedia file of the mobile phone from the mobile phone, and can be a real-time streaming mode, and after receiving the audio and video file and buffering, the multimedia file is played, and the receiving and playing are processed in parallel; or the multimedia player first starts from the mobile phone.
  • step 2706 the audio and video files to be played in step 2706 are not necessary. If step 2706 is not performed, after the communication connection is established, the multimedia player plays the searched audio and video stored in the mobile phone one by one. file.
  • the above method can also bring a beneficial effect, that is, the multimedia player can share and play the multimedia files stored in the mobile phone, so that even if the multimedia player with a very small storage space is used, the mass storage in the host such as the mobile phone can be shared. Audio and video information. It is worth noting that in the specific industrial application, the multimedia player and the mobile phone of the present invention do not need to be bundled for production or sale, and the multimedia player and the mobile phone are two separate products, and the user can purchase the mobile phone separately from different manufacturers. The multimedia player enables the communication and connection between the two to establish a corresponding relationship between monitoring and manipulation.
  • this method can be extended to a broader scope, that is, the slave can share all the resources in the host that it is monitoring, such as text information, audio, video, and so on.

Description

监控主机的方法、 监控装置及主机
技术领域
本发明涉及通信领域, 尤其是涉及监控主机的方法、 监控装置及主机。 背景技术
随着科技的,步, 目 现 J越来越多的电子设备, 如手机、 数码相机、、移 的随身携带品。 但是由于这些电子设备通常体积、 重量较大, 以及在使用时会对 人体重要部位造成有害辐射, 因此人们通常将这些电子设备放在远离头部的提包 内或裤兜内, 或者放在远离人体的办公桌内或家里某处。 而这样使用起来非常不 方便, 往往容易使用户错过一些重要的电话或短信, 尤其是在嘈杂的户外或公共 场所, 或者在听 MP3音乐时, 这种问题更是频繁发生。
另外, 随着电子设备越来越多, 比如如果携带多种这样的电子设备, 必须一 一查看各种电子设备的工作状态或处理突发事件。 比如接听手机电话, 查看笔记 本电脑的邮件, 查看数码相机里的照片, 不能通过一台轻便的移动终端设备集中 监控和处理, 比较麻烦。
因此, 迫切需要一种技术或产品, 可以帮助用户监控一个或多个电子设备的 状态, 以使用户方便、 及时、 准确的掌握各类电子设备的状态。 发明内容
本发明实施例提供了一种监控主机的方法、 监控装置及主机, 以实现对主机 的监控。
本发明实施例提供的监控主机的方法包括:
监控装置寻呼有效范围内的主机, 被寻呼到的主机返回自身的设备信息; 根据至少一个主机返回的设备信息确认所述至少一个主机为被监控主机; 分别建立与所述至少一个被监控主机的监控连接关系;
利用所建立的监控连接关系, 监控所述至少一个被监控主机的突发事件和查 询所述至少一个被监控主机的工作状态。
本发明实施例提供的监控装置包括控制模块、通信模块以及查询模块,其中, 控制模块, 用于控制通信模块与查询模块之间的通信;
通信模块, 用于与被监控主机建立监控连接关系;
查询模块, 用于与被监控主机建立监控连接关系过程中, 向被监控主机发出 搜寻指令, 以向被监控主机发送返回主机设备信息的请求; 或当与被监控主机建 立监控连接关系后,监控所述被监控主机的突发事件和查询所述被监控主机的工 作状态。
本发明实施例提供的主机包括通信模块、检测模块以及控制响应模块,其中, 通信模块, 用于与执行监控任务的监控装置建立监控连接关系; 检测模块, 用于在与所述监控装置建立监控连接关系过程中, 检测是否有所 述监控装置发出的搜寻指令; 或在与所述监控装置建立监控连接关系后, 检测是 否收到所述监控装置发出的监控事件查询列表或自身有无突发事件发生;
控制响应模块, 用于在检测模块检测到有所述监控装置发出搜寻指令时, 将 自身设备信息通过通信模块发送给所述监控装置; 在检测模块检测到收到所述监 控装置发出的监控事件查询列表时, 查询并搜集自身设备的工作状态信息, 并通 过通信模块将自身的工作状态信息发送给所述监控装置; 或在检测模块检测到自 身有突发事件发生时, 将突发事件信息通过通信模块发送给所述监控装置。
利用本发明实施例提供的监控主机的方法、 监控装置及主机, 在监控装置欲 对主机进行监控时,先寻呼有效范围内的主机,以请求主机返回自身的设备信息; 一旦主机返回自身的设备信息,监控装置就可以根据主机返回的设备信息确认被 监控主机, 并建立与该主机的监控连接关系; 一旦监控装置建立了与该主机的监 控连接关系, 该监控装置就可以监控主机的突发事件和查询所述被监控主机的工 作状态。 附图简要说明
图 1是本发明实施例提供的子机监控主机的方法流程图。
图 2是本发明,施例提供的主机上报法中主机侧执 的监控 · ^作流程图。 图 4是本发明实施例提供的子机查询法中主机侧执行的监控操作流程图。 图 5是本发明实施例提供的子机查询法中子机侧执行的监控操作流程图。 图 6是本发明实施例提供的子机监控主机的系统示意图。
图 7是本发明实施例提供的子机的结构框图。
图 8是本发明实施例提供的子机的显示示意图。
图 9是本发明实施例提供的主机的结构框图。
图 10是本发明实施例提供的子机动态设置监控事件菜单的方法流程图。 图 11是本发明实施例提供的子机的结构框图。
图 12是本发明实施例提供的主机的结构框图。
图 13是本发明实施例提供的主机和子机间通信认证的方法流程图。
图 14是本发明实施例提供的主机与子机绑定的流程图。
图 15是本发明实施例提供的主机对子机设置通信认证权限的流程图。
图 16是本发明实施例提供的主机选择授予子机权限的界面示意图。
图 17是本发明实施例提供的子机拨打电话过程中子机和主机间通信认证的 方法流程图。
图 18是本发明实施例提供的主机的结构框图。
图 19为本发明提供的手机状态监控子机的第一实施例的结构框图。
图 20为本发明提供的手机状态监控子机的第二实施例的结构框图。
图 21为本发明提供的手机状态监控子机的第三实施例的结构框图。 图 22是本发明提供的手机状态监控方法的第一实施例的流程图。
图 23是本发明提供的手机状态监控方法的第二实施例的流程图。
图 24是本发明提供的多媒体播放器第一实施例的结构框图。
图 25是本发明提供的多媒体播放器第二实施例的结构框图。
图 26是本发明提供的多媒体播放器第三实施例的结构框图。
图 27是本发明实施例提供的多媒体播放器监控并播放手机音视频文件的方 法流程图。 实施本发明的方式
为了使本发明所要解决的技术问题、 技术方案及有益效果更加清楚明白, 以 下结合附图及实施例, 对本发明进行进一步详细说明。
在本发明实施例提供的监控主机的方法中, 监控装置寻呼有效范围内的主 机, 以请求主机返回自身的设备信息; 根据至少一个主机返回的设备信息确认该 至少一个主机为被监控主机; 分别建立与该至少一个被监控主机的监控连接关 系; 利用所建立的监控连接关系, 监控该至少一个被监控主机的突发事件和查询 该至少一个被监控主机的工作状态。
在本发明另一实施例提供的监控主机的方法中, 监控装置根据每一个被监控 主机的被监控功能项目信息,监控每一个被监控主机的与被监控功能项目信息对 应的突发事件和查询每一个被监控主机的与被监控功能项目信息对应的工作状 态。
在本发明实施例提供的子机监控主机的方法中, 监控装置与一个或多个被监 控主机建立监控连接关系, 并分别利用与该一个或多个被监控主机建立的监控连 接关系, 通过主机上报法和子机查询法分别完成处理该一个或多个被监控主机突 发事件和查询该一个或多个被监控主机工作状态的多路监控操作。
在本发明实施例中, 主机可以是目前功能较强的电子设备, 比如配备了相应 监控功能模块的笔记本电脑、掌上电脑、智能手机以及配备通信能力的数码相机。 监控装置可以是功能简单、 便携的、 负责监控其它主机的电子设备, 如多媒体播 放器等移动通信电子产品。 在下文的描述中, 为了与 "主机" 对应, 监控装置又 可以称为 "子机"。
但本领域技术人员可以理解, 在本发明实施例中, "主机" 和 "子机" 实际 上可以是两个独立的终端设备。 另外, 实际应用中的一个终端设备在某些场合上 可以作为主机使用, 被其他终端设备监控, 在某些场合上又可以作为子机使用, 以监控其他终端设备。
图 1是本发明实施例提供的子机监控主机的方法流程图。 如图 1所示, 该方 法包括步骤如下:
步骤 101 : 子机搜寻有效范围内的主机, 发送返回主机设备信息的请求。 这 时只要在有效通信范围内并且启动了通信模块的所有主机都可能被子机搜寻到。 子机与每个主机之间按照一个统一的、 共用的、 不会泄露主机内容的指令通信。 步骤 102: 被搜寻到的主机发送自身设备信息给子机。 其中设备信息里可以 包含设备类别或设备号, 比如指明主机是笔记本电脑, 还是智能手机。
步骤 103: 子机保存主机的设备信息, 以便识别各个主机, 从而与各主机进 行通信。
步骤 104: 用户通过子机选择确认被监控的主机, 同时向被监控的主机发送 配对连接请求。 这里 "配对连接" 在下文又可称为 "监控连接"。
步骤 105: 被监控主机收到该配对连接请求后, 判断自身是否被设置成监控 模式。 如果是, 执行步骤 107; 否则执行步骤 106。
步骤 106: 被监控主机拒绝该子机的配对连接请求, 并结束该流程。
步骤 107: 被监控主机接受子机的配对连接请求,返回连接响应信号给子机。 子机收到连接响应信号后, 连接该被监控主机。
步骤 108: 子机与被监控主机建立监控连接关系, 并设置好对被监控主机的 监控事件菜单, 至此, 该流程结束。
建立监控连接关系后, 当被监控的主机有被监控的突发事件发生时, 可以釆 用主机上报法完成监控操作的过程。 根据被监控主机的类型不同, 被监控的突发 事件也不同。 比如智能手机的突发事件可以是用户来电、 新发来短信、 闹钟提示 等, 而笔记本电脑的突发事件可以是新邮件、 系统定时开关机等。 本领域技术人 员可以理解, 这里为被监控主机设置的监控事件菜单中包括被监控主机的被监控 功能项目信息。 在子机监控主机的过程中, 子机根据被监控主机的被监控功能项 目信息来实现对被监控主机的监控。
本领域技术人员还可以理解, 监控事件菜单实际上是一种人机操作界面, 其 作用在于将被监控主机的被监控功能项目信息以及被监控主机返回的与被监控 功能项目信息对应的突发事件信息以及工作状态显示给用户。
图 2是本发明实施例提供的主机上报法中主机侧执行的监控操作流程图。如 图 2所示, 在釆用主机上报法中, 被监控主机侧执行的监控操作步骤如下:
步骤 201 : 主机根据设定的监控事件菜单内容, 启动监控任务程序。
步骤 202: 主机判断突发事件是否发生。 当没有监控到突发事件发生时, 监 控任务程序转入后台进行; 当监控到突发事件发生时, 向操作系统上报此事件。
步骤 203: 主机将突发事件和自身的设备信息发送给子机处理, 等待回复处 理的结果。
步骤 204:主机判断子机的回复是否超时。如果子机回复超时,执行步骤 205; 否则执行步骤 206。
步骤 205: 主机将该突发事件重新发送给子机, 若在设定的重发次数内未发 送成功的话, 放弃此次发送, 转向执行步骤 202等待下一次突发事件的到来。
步骤 206: 主机将自身状态信息反馈给子机, 这样主机就完成了本次突发事 件的上报。 主机返,步骤 202等待下一次突发事件的到 。、 、 。。 - 图 3所示, 在釆用主机上报法中, 子机侧执行的监控操作步骤如下: 步骤 301 : 子机启动监控任务程序。
步骤 302: 子机判断是否收到被监控主机发来的突发事件。
步骤 303: 根据同时收到的主机设备信息, 判断突发事件是由哪个被监控主 机发来的。
当整个监控系统中只包括一个子机以及一个被监控主机时, 此时子机收到的 突发事件只可能来自与该被监控主机, 那么此时可以不执行步骤 303而是直接执 行步骤 304。
步骤 304: 显示收到的突发事件, 并以声音或振动方式通知用户处理。
当一个子机监控多个主机时, 子机可以为每个主机建立一个对应的页面, 一 旦收到来自某一主机的突发事件, 将该突发事件在与该主机对应的页面上进行显 示, 这样可以更直观地提醒用户。
步骤 305: 等待用户输入对突发事件的处理结果。
步骤 306: 判断用户回复处理结果是否超时。 如果用户回复处理结果超时, 则执行步骤 307; 否则执行步骤 308。
步骤 307: 子机返回默认的处理结果给与突发事件对应的被监控主机。 执行 完该步骤后, 可以直接结束本流程, 也可以转向执行步骤 309。
步骤 308:子机将用户回复的处理结果返回给与突发事件对应的被监控主机。 步骤 309: 显示收到的被监控主机的状态信息, 如显示在与该被监控主机对 应的页面上。 这样子机完成了对本次突发事件的处理, 返回步骤 302等待下一次 突发事件的到来。
当子机要查询被监控主机的工作状态时, 可以釆用子机查询法完成监控操作 的过程。 根据被监控主机的类型不同, 要查询的工作状态也不同。 比如对于智能 手机而言, 要查询的工作状态可以是信号强度、 来电号码、 电池余量等, 而对于 数码相机而言, 要查询的工作状态可以是存储空间、 电池余量等。
图 4是本发明实施例提供的子机查询法中主机侧执行的监控操作流程图。如 图 4所示, 在釆用子机查询法中, 主机侧执行的监控操作步骤如下:
步骤 401 : 主机启动监控任务程序。
步骤 402: 判断是否和子机建立监控连接关系。 如果是, 则执行步骤 404, 如果否, 则执行步骤 403。
步骤 403: 等待或主动与子机建立监控连接关系。
步骤 404: 判断子机是否发送监控事件查询列表。 如果子机发送了监控事件 查询列表, 则执行步骤 405。
步骤 405: 接收并解析该监控事件查询列表。
步骤 406: 根据接收到的监控事件查询列表, 收集各项要查询的工作状态信 息。
步骤 407: 将查询得到的工作状态信息打包发送给子机, 则本次查询结束, 返回步骤 402以等待下次查询。
图 5是本发明实施例提供的子机查询法中子机侧执行的监控操作流程图。如 图 5所示, 在釆用子机查询法中, 子机侧执行的监控操作步骤如下:
步骤 501 : 根据用户的需求, 启动子机的监控任务程序。
步骤 502: 根据用户的需求, 选择要查询的主机。
步骤 503: 和要查询的主机建立监控连接关系。
步骤 504: 判断建立监控连接关系是否成功, 如果是, 执行步骤 506, 否则 执行步骤 505。
步骤 505: 重新和被查询主机建立监控连接关系, 如果在设定的重复次数内 未建立成功, 则返回步骤 502。
步骤 506: 向主机发送监控事件查询列表。
步骤 507: 接收主机发来的工作状态信息包。
步骤 508: 将接收到的工作状态信息包解压, 并显示被查询主机的工作状态 信息, 供用户查看。 如可以将被查询主机的工作状态信息显示在被查询主机对应 的页面上。 本次查询结束, 返回步骤 502以等待下次查询。
釆用本发明实施例提供的子机监控主机的方法, 通过一个分体式子机实现对 主机的监控, 操作方便, 增强了人机交互性能。
相应地, 本发明实施例还提供了子机监控主机的系统, 包括单个子机和至少 一个主机, 单个子机利用上述实施例提供的方法、 通过有线或无线网实现对至少 一台主机的集中监控与简单控制, 具体结构如图 6所示。
本发明实施例还提供了另一种子机监控主机的系统, 包括至少一个子机和单 个主机。 即每个子机都可以利用上述实施例提供的方法、 通过有线或无线网实现 对一台主机的监控与简单控制。
相应地, 本发明实施例还提供了子机监控主机系统中子机和主机的内部结 构。 图 7是本发明实施例提供的子机的结构框图。 如图 7所示, 本发明实施例提 供的子机包括控制模块 701、 通信模块 702、 显示模块 703、 查询模块 704、 警示 模块 705。 其中通信模块 702、 显示模块 703、 查询模块 704和警示模块 705分别 与控制模块 701电连接。
控制模块 701 , 用于控制子机内部各模块之间的通信。
当子机进一步包括输入模块时 ,控制模块 701进一步用于对用户通过输入模 块(如键盘操作)输入的信息进行信息处理。
通信模块 702, 用于与被监控主机建立监控连接关系以传送、 接收信息。 显示模块 703 , 用于显示被监控主机反馈的工作状态信息或突发事件信息。 通常来说, 显示模块 703可以是一个显示屏, 并且可以按照各被监控主机的 主机名来区分显示各个被监控主机的监控信息, 即将每个被监控主机的监控信息 在单独的页面上显示。 图 8是本发明实施例提供的子机的显示示意图。 如图 8所 示,子机的屏幕顶端是使用被监控主机名命名的属性页,用户通过左右方向按键, 或者触摸笔点击不同属性页名称, 可以切换显示各个被监控的主机的监控信息页 面。 当被监控主机较多时, 可能会出现屏幕宽度比属性页总宽度小的情况, 此时 属性页两边会显示多页提示符, 可通过相关操作切换其它主机监控信息的显示。 查询模块 704, 用于与被监控主机建立监控连接关系过程中, 向被监控主机 发出搜寻指令, 以发送返回主机设备信息的请求; 或当与被监控主机建立监控连 接关系后, 向被监控的主机发出监控事件查询列表。
警示模块 705, 用于接收到被监控主机反馈的工作状态信息或突发事件信息 时, 发出警示以提醒用户, 如发出特定的提示声或闪烁灯光或震动以提醒用户。
本领域技术人员可以理解, 在最简的情况下, 本发明实施例提供的子机可以 只包括控制模块 701、 通信模块 702、 查询模块 704。
图 9是本发明实施例提供的主机的结构框图。 如图 9所示, 本发明实施例提 供的主机包括: 通信模块 901、 检测模块 902、 控制响应模块 903。 这三个模块相 互电连接。
通信模块 901 , 用于与执行监控任务的子机建立监控连接关系以传送、 接收 信息。
检测模块 902, 用于与执行监控任务的子机建立监控连接关系过程中, 检测 是否有子机发出的搜寻指令; 或当与子机建立监控连接关系后, 检测是否收到子 机发出的监控事件查询列表或自身有无突发事件发生。
控制响应模块 903 , 用于在检测模块 902检测到有子机发出搜寻指令时, 将 自身设备信息通过通信模块 901发送给该子机; 在检测模块 902检测到收到子机 发出的监控事件查询列表时, 查询并搜集自身设备的工作状态信息, 并通过通信 模块 901将自身的工作状态信息发送给子机; 在检测模块 902检测到自身有突发 事件发生时, 将该突发事件信息通过通信模块 901发送给子机。
根据本发明上述实施例, 虽然可以实现子机对主机的监控, 但是一般来说, 子机只能监控事先设定好的监控项, 而不能监控事先设定好的监控项以外的内 容, 即不能根据用户需求自行设定监控项。
为此, 本发明实施例进一步提供了一种在子机上动态设置与主机相匹配的监 控事件菜单的方法。
图 10是本发明实施例提供的子机动态设置监控事件菜单的方法流程图。 如 图 10所示, 该方法具体包括如下步骤:
步骤 1001 : 子机发出搜寻指令搜寻有效范围内所有支持客户应用开发工具 ( CTK, Customer ToolKit )功能的被监控主机, 准备与各被监控主机建立相匹配 的监控链接通道。 其中子机记录各个被监控主机的设备信息, 以区别各个被监控 主机的种类与型号。
步骤 1002: 根据用户的需求, 子机向被监控主机发送功能项目查询命令, 要 求被监控主机反馈自身的功能项目信息和对应的 ID号。
根据被监控主机的种类与型号不同, 需监控的功能项目也不同, 比如对于智 能手机来说, 要监控的功能项目可以是信号强度、 来电号码、 电池余量、 新短消 息等; 对于数码相机来说, 要监控的功能项目可以是存储空间、 电池余量等; 对 于笔记本电脑来说, 要监控的功能项目则可以是是否收到新邮件、 电池余量、 主 机存储空间等。 另外可能因生产厂家不同, 或者版本不同, 子机中可能事先没有监控主机某 个功能项目的能力, 如子机可能事先不能监控笔记本电脑是否收到新邮件的事 件。 通过发出查询指令给被监控主机, 要求其反馈需监控的功能项目和该功能项 目对应的 ID号, 就可以通过编辑子机中的程序在监控事件菜单中增加该项监控 项目。
步骤 1003: 被监控主机得到功能项目查询指令后, 收集本机的功能项目, 并 对每一项生成一个唯一的 ID号, 打包后将数据反馈给子机。
步骤 1004: 子机解析接收到的被监控主机的功能项目信息,从被监控主机的 功能项目信息中选择一项或多项进行监控, 并根据选择的功能项目创建相应的监 控事件菜单。 如根据功能项目的 ID号进行选择。
比如被监控主机是笔记本电脑, 笔记本电脑向子机返回的被监控功能项目以 及对应的 ID号分别如下: ID1000表示笔记本电脑的电池电量, ID号 1002表示 笔记本电脑的 CPU温度, ID号 1004表示笔记本电脑的接收邮件功能项。子机可 以从中选择 ID号为 1004、 表示笔记本电脑的接收邮件功能项, 并将其添加到该 子机中, 创建与笔记本电脑相匹配的监控事件菜单。 此时子机屏幕的 "笔记本电 脑" 监控页面上显示 "接收邮件" 菜单选项, 同时子机系统记录相应的 ID号, 以识别菜单中每个功能项目。
步骤 1005: 建立监控链接通道后,子机分别根据其上的监控事件菜单来处理 各被监控主机上报的被监控事件以及主动查询被监控主机的相关信息,从而完成 监控任务。
通过与被监控主机的交互, 子机可以根据被监控主机的类型和功能, 为不同 的被监控主机设置不同的监控事件菜单, 也可以根据不同的使用场景, 为同一被 监控主机设置不同的监控事件菜单。
当监控事件菜单设置完成后, 子机和主机之间就可以通过主机上报法和子机 查询法完成子机对主机的监控过程了。
在本实施例中, 由于用 ID号来标识每个功能项目, 因此在子机查询主机的 过程中, 子机可以发送要查询的功能项目对应的 ID号给被监控主机。 被监控主 机根据接收到的 ID号, 信息收集, 并将收集的数据打包反馈给子机。
图 11是本发明实施例提供的子机的结构框图。 如图 11所示, 本发明实施例 提供的子机包括: 控制模块 701、 通信模块 702、 显示模块 703、 查询模块 704、 警示模块 705、 存储模块 706。 其中控制模块 701、 通信模块 702、 显示模块 703、 警示模块 705与图 7所示子机中对应模块功能相同。 相比与图 7所示子机, 查询 模块 704进一步用于向被监控主机发送功能项目查询命令,接收被监控主机返回 的功能项目信息, 并根据被监控主机返回的功能项目信息, 设置监控事件菜单。 存储模块 706,用于存储各个被监控主机的监控事件菜单和监控数据等相关信息。
当然本发明实施例提供的子机还可以是包含图 7 所示子机中的控制模块 701、 通信模块 702、 显示模块 703、 查询模块 704、 警示模块 705, 并进一步包 括监控事件菜单设置模块以及存储模块 706。 其中监控事件菜单设置模块用于向 被监控主机发送功能项目查询命令, 接收被监控主机返回的功能项目信息, 并根 据被监控主机返回的功能项目信息, 设置监控事件菜单。 存储模块 706, 用于存 储各个被监控主机的监控事件菜单和监控数据等相关信息
图 12是本发明实施例提供的主机的结构框图。 如图 12所示, 本发明实施例 提供的主机包括: 通信模块 901、 检测模块 902、 控制响应模块 903以及监控项 目匹配模块 904。 其中通信模块 901和控制响应模块 903与图 9所示的实施例相 同。 检测模块 902进一步用于检测是否收到子机发出的功能项目查询命令。 监控 项目匹配模块 904用于在检测模块收到子机发出的功能项目查询命令时, 向子机 返回自身需监控的功能项目, 以配合子机完成监控事件菜单的设置。
釆用本发明实施例提供的子机监控主机的方法, 通过客户应用开发工具 ( CTK, Customer ToolKit )或软件对子机与被监控主机进行监控菜单匹配设置, 能将被监控主机上的新功能项目添加到子机中的监控事件菜单中, 大大增强了系 统的灵活操作性, 还方便系统功能的升级。
当上述实施例提供的子机监控主机的系统中出现多个子机或主机时, 只要子 机具有的功能相同, 那么每个子机均可以和主机通信, 这样可能会产生混乱, 如 某个主机可能会被一个攻击者子机所控制, 或某一主机可能同时接收到不同子机 完全相反的操作指令等等。 另外使用者还期望对不同子机的权限有所限制。 为此 本发明实施例提供了一种子机和主机间通信认证的方法, 通过主机与子机之间在 连接进程中进行认证绑定, 赋予子机特定的功能权限, 使得不同的子机可以获得 不同的认证, 实现不同的功能。
图 13是本发明实施例提供的主机和子机间通信认证的方法流程图。 如图 13 所示 , 该主机和子机间通信认证的方法包括以下步骤:
步骤 1301 : 主机对子机设置通信认证权限。
步骤 1302:主机根据设置的通信认证权限判断子机向主机发送的应用请求是 否在该通信认证权限允许的范围内; 如果是, 则转向步骤 1303 , 否则, 转向步骤 1304。
步骤 1303: 主机执行子机的应用请求, 并结束该流程。
步骤 1304: 主机与子机断开连接, 并结束该流程。
在上述主机对子机设置通信认证权限之前, 本发明实施例提供的方法还进一 步包括: 主机与该子机进行绑定, 并与绑定后的子机建立连接。
具体来说, 主机与子机的绑定过程, 即可以由主机主动发起, 也可以由子机 发起。 下面介绍主机主动发起与子机绑定的方法。
图 14是本发明实施例主机与子机绑定的流程示意图。 如图 14所示, 主机与 子机绑定的过程包括如下步骤:
步骤 1401 : 主机初始化无线通信模块, 为主机与子机的无线通信连接做好准 备。
步骤 1402:主机对一定范围内可建立链路密钥的子机进行查询,具体过程为: 主机通过主动发起搜寻指令来发起设备查询, 此时子机处于等待搜寻指令状态。 通过设备查询, 主机就可以找到有效范围内的子机。 查询过程中, 查询消息不含 查询设备的任何消息, 但可以指定专用查询码( DIAC, Dedicated Inquiry Access Code )和全求信息安全认证 ( GIAC, Global Information Assurance Certification ) 两种查询方式。
步骤 1403: 主机判断在有效范围内是否查询到子机; 如果查询到子机, 则转 入步骤 1404; 否则转入步骤 1402。
由于每个设备具体全球唯一性的设备识别码, 因此主机可以利用设备识别码 来查询有效范围内的子机。
步骤 1404: 用户在子机输入链路密钥,主机通过检查链路密钥来验证子机设 备的合法性, 主机判断用户输入的密钥是否正确, 在用户输入正确的密钥后, 主 机与子机的绑定成功。绑定完成后,可以由子机或者主机任何一方发起连接请求, 没有固定的主从设备之分。
这里在第一次使用主机和子机系统时, 用户需要在主机一方输入正确的 PIN 码来创建链路密钥。
在子机主动发起绑定的过程中, 子机初始化无线通信模块, 为主机与子机的 无线通信连接做好准备; 并由子机主动查询一定范围内的主机。
图 15是本发明实施例主机对子机设置通信认证权限的流程示意图。 如图 15 所示, 主机对子机设置通信认证权限的过程包括如下步骤:
步骤 1501 : 主机选择授予与其绑定成功的子机的服务及权限。本领域技术人 员可以理解, 在具体应用中, 是由用户通过主机来选择授予与主机绑定成功的子 机的服务及权限。 为此, 在实现过程中, 可以设置一个界面来方便用户选择授予 子机的服务及权限, 该界面的一个实施例可以如图 16所示。
步骤 1502: 根据为子机选择授予的服务及权限, 主机生成信任域, 以记录各 子机与各子机所具有的服务及权限的对应关系。 如信任域中记录子机 1可以通过 主机拨打、 接听电话, 也可以收发短消息; 子机 2只能实现收发短消息; 其它同 类无线通信设备只能交换数据, 甚至只能发送数据给主机等。 这样主机就可以通 过查找信任域来判断各子机是否具有某服务及权限。
信任域中记录的主机可授予子机的服务及权限包括但不限于: 拨打、 接听电 话、 收发短信、 来电显示、 和同步联系人、 短信、 通话记录、 记事查询、 闹钟提 醒等。
步骤 1503: 主机将授予子机的服务及权限发送给子机;
步骤 1504: 主机与子机断开连接。
下面以子机拨打电话为例, 具体说明分体式主机和子机之间的通信认证的流 程。
图 17是本发明实施例提供的子机拨打电话过程中子机和主机间通信认证的 方法流程图。 如图 17所示, 此时主机和子机之间的通信认证过程包括以下步骤: 步骤 1701 : 子机初始化无线通信模块, 为子机与主机的无线通信连接做好准 备。 步骤 1702: 子机通过键盘输入电话号码, 并在显示屏上显示, 按下 "通话" 键。
步骤 1703: 子机对一定范围内主机进行查询, 子机发起设备查询, 主机进行 查询扫描, 通过设备查询, 子机就可以找到有效范围内与其绑定过的主机。
步骤 1704: 子机判断是否查询到与其绑定过的主机, 如果判断为是, 转到步 骤 1705 , 如果判断为否, 转到步骤 1703。
步骤 1705: 子机查询到与其绑定的主机后, 与主机建立数据和语音连接。 步骤 1706: 子机对主机发送应用请求, 进行通信认证, 子机将拨号信息传送 给主机。
步骤 1707: 主机判断子机发送的应用请求是否记录在该主机的信任域中。如 果信任域显示该子机具有拨打电话的功能, 即子机发送的应用请求记录在该主机 的信任域中, 转入步骤 1709, 否则转向步骤 1708。。
步骤 1708: 子机没有得到主机的通话授权, 没有拨出电话的功能, 主机与子 机断开无线通信连接, 并结束该流程。
步骤 1709: 主机执行子机的应用请求, 拨出电话号码, 并以应答的方式将呼 叫状态传达给从机上显示。 在这种情况后, 后续至少会出现三种情况, 即对方挂 掉电话、 子机接听电话、 子机主动挂掉电话。
步骤 1710: 判断此时的事件对方挂掉电话, 还是子机接听电话, 或者是子机 主动挂掉电话。如果是对方挂掉电话,转向执行步骤 1711 ;如果是子机接听电话, 转向执行步骤 1712; 如果是子机主动挂掉电话, 转向执行步骤 1715。
步骤 1711 : 主机通知子机对方已挂掉电话, 并断开主机与子机之间的无线连 接, 至此流程结束。
步骤 1712: 主机与子机之间通过通信模块传送语音信号。
步骤 1713: 主机判断是否要继续保持通话。 如果是, 转到步骤 1712, 否则 继续执行步骤 1714。
步骤 S1714: 主机判断是否是对方挂掉电话, 还是子机主动挂断电话。 如果 是对方挂掉电话, 转向执行步骤 1711 , 如果是子机主动挂掉电话, 转向执行步骤 1715。
步骤 1715: 子机请求主机挂掉电话。
步骤 1716: 主机与子机断开无线通信连接, 至此结束该流程。
相应的, 本发明实施例提供了一种主机, 利用该主机, 可以实现子机与主机 间的通信认证。 图 18为本发明实施例提供的主机的结构框图。 如图 18所示, 该 主机包括主机控制模块 2以及通信判断模块 4。 主机控制模块 2还包括相互连接 的选择授予单元 22、 权限记录单元 24以及权限发送单元 26。 通信判断模块 4还 包括相互连接的请求接收单元 42以及请求判断单元 44。
主机控制模块 2, 用于为与该主机绑定成功的子机设置通信认证权限。 其中 选择授予单元 22用于选择授予子机的服务及权限。权限记录单元 24用于生成信 任域, 以记录为子机选择授予的服务及权限。 权限发送单元 26, 用于将选择授予 的服务及权限发送给该子机。
通信判断模块 4, 用于根据主机控制模块 2为子机设置的通信认证权限, 判 断子机发送的应用请求是否在子机所具有的通信认证权限允许的范围内, 如果 是, 执行子机发送的应用请求, 否则, 与子机断开连接。 其中请求接收单元 42 用于接收子机发送的应用请求。 请求判断单元 44用于根据主机控制模块 2为子 机设置的通信认证权限, 判断子机发送的应用请求是否在子机所具有的通信认证 权限允许的范围内, 如果是,执行子机发送的应用请求, 否则, 与子机断开连接。
该主机还可以包括绑定模块 6以及通信模块 8。 其中绑定模块 6包括主机初 始单元 62、 查询单元 64以及绑定判定单元 66。
绑定模块 6,用于与子机进行绑定。主机初始单元 62,用于初始化通信模块, 为与子机建立监控连接作好准备。查询单元 64,用于查询有效范围内是否存在子 机。 绑定判定单元 66, 用于在查询模块 64查询到子机的情况下, 根据用户输入 的密码, 判断是否与查询到的子机建立链路密钥连接, 如果是, 与该查询到的子 机进行绑定。
通信模块 8 , 用于与该主机绑定后的子机建立通信连接。
本领域技术人员可以理解, 该实施例所示的主机还可以进一步包括控制响应 模块 903、监控项目匹配模块 904、检测模块 902, 并且通信模块 8的功能与通信 模块 901的功能可以相同。
本发明通过主机和子机间通信认证的方法及主机, 在主机处建立信任域, 为 子机和其它无线连接模块分配不同的权限, 使这些子机和其它无线连接模块只能 在权限允许的范围内与主机之间通信。 为子机授权, 让子机在其允许的范围内工 作, 避免多子机相互干扰。 同时通过主机可更改子机的权限, 增加灵活性。
下面以主机为手机为例说明本发明实施例提供的子机监控主机的方法。 当然 下面的例子同样适用与主机为掌上电脑、 PDA等具有通讯功能的移动终端的情 况。
图 19为本发明提供的手机状态监控子机的第一实施例的结构框图。 如图 19 所示, 该子机包括控制模块(中央处理模块) 701、 查询通信模块 1902、 显示模 块 703、 存储模块 706、 输入模块 707以及认证模块 708。
控制模块 701 , 用以处理各类数据信息、 数据运算, 以及处理执行用户通过 输入模块 703输入的操作指令。
显示模块 703 , 与控制模块 701 连接, 用于输出显示从查询通信模块 1902 获得的手机的各类状态信息。 显示模块 703可以是显示屏, 也可以语音方式。
输入模块 707, 与控制模块 701连接, 用于输入使用者的操作指令并送至控 制模块 701。 该输入模块 707可以是键盘, 也可以是触摸屏, 或者为音频输入模 块。
存储模块 706, 与控制模块 701连接, 用于存储数据文件。 该存储模块 706 可以是动态存储器、 只读存储器或静态存储器。
认证模块 708, 与控制模块 701连接, 用于在该子机与手机之间建立通信连 接时, 向手机进行身份安全认证。
查询通信模块 1902, 与控制模块 701连接,用于与手机进行交互通信以获取 手机的各类状态信息或数据。 该查询通信模块 1902可以包括有线通信模块, 也 可以是无线通信模块。
本领域技术人员很容易理解, 该实施例中的查询通信模块 1902 实际上具有 图 7所示实施例中通信模块 702和查询模块 704两者的功能。
当查询通信模块 1902包括有线通信模块时,查询通信模块 1902可以是 USB、 串口、 并口或网口接口的方式。
当查询通信模块 1902包括无线通信模块时, 该查询通信模块 1902还连接有 一天线。具体地,查询通信模块 1902可以釆用 2.4G、 5.8G、 DECT, GSM, GPRS, CDMA, TD-SCDMA、 WCDMA 中任意一种通信协议。 在具体的产品应用中, 以低功率无线通信模块为最佳, 如数字扩频技术、 UWB、 Wi-Fi, IrDA、 NFC、 ZigBee任意一种, 这样可以极大的降低对人体的辐射伤害。
在本发明实施例提供的子机中, 各模块均可以是独立模块, 也可以是集成模 块。
釆用本发明实施例提供的子机, 可以通过查询通信模块 1902读取手机的状 态改变信息或数据, 并通过显示模块 703显示手机状态信息以供用户浏览。 同时 用户还可以进一步通过输入模块 707对手机进行控制, 如接听或拨打电话、 读取 或回复短信、 新建日程等操作。
本领域技术人员可以理解, 上述实施例提供的子机在最简的情况下可以只包 括控制模块 701、 查询通信模块 1902、 显示模块 703以及输入模块 707。 也可以 是只包括控制模块 701、 查询通信模块 1902、 显示模块 703、 输入模块 707以及 认证模块 708,还可以是只包括控制模块 701、查询通信模块 1902、显示模块 703、 存储模块 706以及输入模块 707。
图 20为本发明提供的手机状态监控子机的第二实施例的结构框图。 如图 20 所示, 除了控制模块(又称主控模块) 701、 通信模块(具体情况下可以是一个 近距离收发模块) 702、 显示模块 703以及输入模块 707夕卜, 该子机还进一步包 括电源 710和音频模块 709。
其中电源 710用于给子机中控制模块 701、查询通信模块 1902、显示模块 703、 输入模块 707以及音频模块 709等各个模块供电并可以完成充电功能, 实施中, 电源 710可釆用的方式可以为低压降电压调节器(LDO, Low Drop Out )或直流 /直流变换器(DC/DC, Direct Current/Direct Current )等电源管理模式。
音频模块 709, 用于接收用户的语音信息, 将用户输入的语音信息发送给控 制模块 701处理以通过查询通信模块 1902发送给主机; 经过查询通信模块 1902 以及控制模块 701接收来自主机的语音信号, 并输出给用户。
其中音频模块 709包括话筒 791和受话器 792。 工作时, 来自话筒 791的音 频信号经控制模块 701处理后, 被子机中的查询通信模块 1902发送出去; 查询 通信模块 1902接收来自主机的音频信号, 在控制模块 701的控制下解调出音频 信号, 并由受话器 792输出给用户。
图 21为本发明提供的手机状态监控子机的第三实施例的结构框图。 如图 21 所示, 该主机出了包括图 20所示的电路结构外, 还可以对该子机进行拓展功能 设置。 其中, 话筒 791和控制模块 701之间设有语音识别模块 711 , 语音识别模 块 711用于识别音频模块 709输入的语音信息, 实现子机对用户的身份识别。 子 机还可根据实际需要装设马达 712, 马达 712与控制模块 701相接, 并根据控制 模块 701控制进行振动。 当有音频信号或控制信号通过查询通信模块 1902由主 机返回给子机时, 马达可进行震动提示用户。 本领域技术人员可以理解, 这里的 马达 712可以被认为是警示模块 705的一个实施例。
图 22是本发明提供的手机状态监控方法的第一实施例的流程图。 如图 22所 示, 将监控手机状态的子机记为移动装置, 该方法包括以下步骤:
步骤 2201 : 移动装置向手机发出建立通信连接请求。
步骤 2202: 手机收到移动装置的连接请求后, 对移动终端进行身份认证。 步骤 2203: 判断移动装置是否通过身份认证,如果移动终端通过手机的身份 认证, 则执行步骤 2204, 否则返回步骤 2201 , 要求重新进行认证。
步骤 2204: 在移动装置和手机之间建立通信连接。
步骤 2205: 移动装置读取手机的状态信息。 该读取操作, 既可以是移动装置 主动的按照用户设定的参数定期读取, 也可以是在接收到手机触发信号后读取 (例如来电或短信的时候发出触发信号)。
手机的状态信息包括通信功能状态或资讯状态。 通信功能状态包括来电状 态、 短信状态, 资讯状态包括日程提醒、 行程提醒、 闹钟提醒、 电源提示、 网络 状态、 存储空间状态、 记事本、 联系人、 通话记录。
需要特别说明的是, 移动装置与手机之间如果是第一次建立连接, 则移动装 置需要读取手机的所有状态数据信息。
步骤 2206: 移动装置通过其显示模块显示输出手机的状态信息。
步骤 2207: 根据手机的状态信息, 用户通过移动装置对手机进行操控, 例如 进行接听或拨打电话、 收发短信等通信功能操作, 或者进行建立日程、 行程、 联 系人等资讯功能操作。
图 23是本发明提供的手机状态监控方法的第二实施例的流程图。 如图 23所 示, 该实施例与图 22所示的实施例的区别仅在于移动装置读取手机状态的触发 情形不同, 即在步骤 2204和步骤 2205之间还包括一个步骤 2305 ,其余步骤的执 行情况与图 22相同。
步骤 2305: 移动装置检测手机状态是否发生改变, 如果手机状态发生改变, 则执行步骤 2205; 如果手机状态没有发生改变, 则返回执行步骤 2204。
在本发明一具体实施例中, 监控手机状态的装置还可以是一个多媒体播放 器, 此时该装置除了具备图 19所示的各模块外, 还应该包括具有多媒体播放的 功能部件。 图 24为本发明实施例中监控手机状态的多媒体播放器的结构图。 如 图 24所示,该多媒体播放器不仅包括图 19所示的模块,还具有音频处理模块 713、 音频输出模块 714。
其中音频处理模块 713 , 与控制模块 701连接, 用于对音频信号进行编解码 处理。 音频处理模块 713可以包括一个音频编解码器, 用于对音频等多媒体文件 进行音频编解码处理; 还可以包括一个数模转换器, 用于实现数字信号和模拟信 号之间的转换。 为了获得更好的声音效果, 音频处理模块 713还可以包括一个音 频功放模块, 用于放大音频模拟信号。
这里音频处理模块 713可以为独立的模块, 也可以是集成其他模块, 如控制 模块 701之中。 如图 20所示的实施例中, 控制模块 701中就可以集成音频处理 模块。
音频输出模块 714, 与音频处理模块 713连接, 用于将音频处理模块 713进 行编解码处理后的音频信号输出。 该音频输出模块 714 可以是扬声器、 受话筒 792, 也可以是音频接口, 如耳机接口。
这样用户使用多媒体播放器接听电话时,来自对方的语音信号(音视频信号 ) 经过手机传输到多媒体播放器的查询通信模块 1902, 后依次经由控制模块 701、 音频处理模块 713处理后, 传送给音频输出模块 714, 进而传送给用户。
图 25是本发明提供的多媒体播放器第二实施例的结构框图。 如图 25所示, 该多媒体播放器相比于图 24所示的多媒体播放器而言, 进一步包括一个音频输 入模块 715 , 与音频处理模块 713连接, 用以接收用户输入的音视频信号, 经过 音频处理模块 713进行处理后再传送给查询通信模块 1902。
这样用户不仅可以通过多媒体播放去接听手机信息,还可以通过音频输入模 块 715通过手机向其他用户发送语音信息。 此时用户对外发送的语音信号(音视 频信号)则经由音频输入模块 715传送给音频处理模块 713进行处理后, 再经由 控制模块 701传送给查询通信模块 1902, 查询通信模块 1902最后将语音信号传 至手机, 进而发送给其他用户。
图 26是本发明提供的多媒体播放器第三实施例的结构框图。 如图 26所示, 如果查询通信模块 1902釆用集成音频处理功能的通信模块, 这时, 可以不再需 要音频处理模块 713 , 音频输入模块 715和音频输出模块 714均与查询通信模块 1902 连接。 此时, 用户对外发送的语音信号 (音视频信号)经由音频输入模块 715传送给查询通信模块 1902, 再经由查询通信模块 1902将语音信号传送至手 机, 从而发送给对方。 来自对方的语音信号也仅需要经过查询通信模块 1902处 理后直接输出给音频输出模块 714。
播放器通过有线的方式与手机进行连接实现数据交互, 用户可以将播放器挂 在脖子上或上衣口袋, 而将手机放在包内或裤兜内, 照样可以很方便、 准确的监 控到手机状态, 并通过输入模块控制手机。 而且, 通过播放器对手机进行接听或 拨打电话等操作, 可以极大的减小手机信号对人体的辐射伤害。
釆用上述技术方案, 该多媒体播放器尺寸可以做的很小, 手机用户可以将该 多媒体播放器放置在靠近头部的地方, 如挂在脖子上, 或放置在上衣口袋内, 通 过该装置欣赏音乐, 同时, 播放器通过查询通信模块 1902与手机建立通信连接, 读取手机的状态改变信息或数据, 并通过显示模块 703显示手机的状态信息。 手 机用户可以通过输入模块 707对手机进行控制, 如接听或拨打电话、 读取或回复 短信、 新建日程等操作。
以上仅以话音业务为例进行重点说明,而随着通信业务的发展,视频业务(如 视频电话)也将得以广泛应用, 因此, 以上举例并不说明本发明仅限用于话音业 务, 同样也适用于视频业务, 仅需将音频处理模块 713、 音频输入模块 715等部 件对应替换成音视频处理模块、 音视频输入模块即可。
在本发明一实施例中, 图 20所示的音频模块也可以由图 24所示的音频处理 模块 713和音频输出模块 714组成,或者由图 25所示的音频处理模块 713、音频 输出模块 714以及音频输入模块 715组成, 或者仅为图 26所示的音频输入单元 组成。
图 27是本发明实施例提供的多媒体播放器监控并播放手机音视频文件的方 法流程图。 如图 27所示, 多媒体终端监控并播放手机音视频文件的方法包括以 下步骤:
步骤 2701 : 多媒体播放器收到共享播放手机内的音视频文件的操作指令后, 向手机发出建立通信连接请求。
步骤 2702: 手机收到多媒体播放器的连接请求后, 要求进行身份认证。
步骤 2703: 如果多媒体播放器通过手机的身份认证, 则执行步骤 2704, 否 则返回步骤 2702, 要求重新进行认证; 也可以直接关闭认证, 结束程序, 需要重 新发起连接请求。
步骤 2704: 手机与多媒体播放器之间建立通信连接。
步骤 2705: 多媒体播放器搜索手机内的所有音视频文件信息, 并通过列表的 方式显示出来。 此时, 音视频文件可以按照音视频格式类型排列, 也可以按照文 件名称顺序排列。
步骤 2706: 根据用户的选择,在多媒体播放器选择所要播放的存储在手机内 的音视频文件, 可以选择单个文件, 也可以选择多个文件; 同时, 也可以选择播 放方式, 例如自动顺序播放所有的或者选定的音视频文件, 或者循环播放等等。
步骤 2707: 多媒体播放器接收并播放上述选定的音视频文件。 此时, 多媒体 播放器从手机接收并播放手机的多媒体文件可以是实时流的方式, 在接收音视频 文件并进行緩冲后即予以播放, 接收与播放并行处理; 或者是多媒体播放器先从 手机接收完整个音视频文件, 并保存在自身的緩存区、 内存或存储模块之后才进 行播放。
在此需要特别说明的是, 步骤 2706中选择要播放的音视频文件不是必须的, 若不执行步骤 2706,在建立通信连接后, 多媒体播放器即逐一播放搜索到的存储 在手机内的音视频文件。
利用以上方法, 还可以带来一个有益效果, 即多媒体播放器可以共享播放存 储在手机内多媒体文件, 这样即使是利用存储空间非常小的多媒体播放器, 也可 以共享播放手机等主机内存储的大量音视频信息。 值得特别说明的是, 在具体的产业化应用中, 本发明的多媒体播放器和手机 无须捆绑生产或销售, 多媒体播放器和手机是单独的两类产品, 用户可以分别在 不同的厂家购买手机和多媒体播放器,使二者通信连接后即可使之建立监控和操 控的对应关系。
很显然, 这种方法还可以推广到一个更广的范围, 即子机可以共享被其所监 控的主机内的所有资源, 如文本信息、 音频、 视频等等。
以上所述是本发明的具体实施方式而已, 当然不能以此来限定本发明之权利 范围, 应当指出, 对于本技术领域的普通技术人员来说, 在不脱离本发明原理的 前提下, 还可以做出若干改进和变动, 如在子机和所述主机上设置功能近似的模 块等等, 这些改进和变动也视为本发明的保护范围。

Claims

权利要求
1、 一种监控主机的方法, 其特征在于, 包括:
监控装置寻呼有效范围内的主机, 被寻呼到的主机返回自身的设备信息; 根据至少一个主机返回的设备信息确认所述至少一个主机为被监控主机; 分别建立与所述至少一个被监控主机的监控连接关系;
利用所建立的监控连接关系, 监控所述至少一个被监控主机的突发事件和查 询所述至少一个被监控主机的工作状态。
2、 如权利要求 1 所述的方法, 其特征在于, 所述利用所建立的监控连接关 系,监控所述至少一个被监控主机的突发事件和查询所述至少一个被监控主机的 工作状态包括:
根据每一个被监控主机的被监控功能项目信息, 监控每一个被监控主机的与 所述被监控功能项目信息对应的突发事件和查询每一个被监控主机的与所述被 监控功能项目信息对应的工作状态。
3、 如权利要求 1 所述的方法, 其特征在于, 利用所建立的监控连接关系, 通过主机上报法或子机查询法,监控所述至少一个被监控主机的突发事件和查询 所述至少一个被监控主机的工作状态。
4、 如权利要求 3所述的方法, 其特征在于, 通过主机上报法, 监控一被监 控主机的突发事件和查询所述一被监控主机的工作状态包括:
接收所述一被监控主机发来的突发事件;
将所述一被监控主机发来的突发事件显示给用户;
接收用户对所述突发事件的处理结果;
将所述处理结果返回给所述一被监控主机。
5、 如权利要求 3所述的方法, 其特征在于, 通过子机查询法, 监控一被监 控主机的突发事件和查询所述一被监控主机的工作状态包括:
向所述一被监控主机发送监控事件查询列表; 其中, 所述监控事件查询列表 中包括被监控功能项目信息;
接收所述一被监控主机发来的工作状态信息; 其中, 所述工作状态信息为所 述被监控主机根据接收到的监控事件查询列表收集的。
6、 如权利要求 2所述的方法, 其特征在于, 根据一被监控主机的被监控功 能项目信息, 监控一被监控主机的与所述被监控功能项目信息对应的突发事件和 查询一被监控主机的与所述被监控功能项目信息对应的工作状态之前, 进一步包 括:
向所述一被监控主机发送功能项目查询命令,要求所述一被监控主机反馈自 身的功能项目信息;
接收所述一被监控主机发送的自身的功能项目信息;
从所述一被监控主机发送的功能项目信息中选择一项或多项, 并将选择的一 项或多项功能项目信息作为被监控功能项目信息。
7、 如权利要求 6所述的方法, 其特征在于, 所述接收所述一被监控主机发 送的自身的功能项目信息包括:
接收所述一被监控主机发送的自身的功能项目信息以及与每个功能项目信 息唯一对应的 ID号;
从所述一被监控主机发送的功能项目信息中选择一项或多项包括:
根据所述与每个功能项目信息唯一对应的 ID号, 从所述一被监控主机发送 的功能项目信息中选择一项或多项。
8、 如权利要求 6或 7所述的方法, 其特征在于, 进一步包括: 为用户提供 一个人机界面, 以显示与所述至少一个被监控主机的被监控项目信息对应的突发 事件和工作状态。
9、 如权利要求 1 所述的方法, 其特征在于, 分别在所述至少一个被监控主 机授予的通信认证权限内,监控所述至少一个被监控主机的突发事件和查询所述 至少一个被监控主机的工作状态。
10、 如权利要求 9所述的方法, 其特征在于, 所述被监控主机选择至少一个 服务及权限作为授予所述被监控装置的通信认证权限。
11、 如权利要求 9所述的方法, 其特征在于, 所述被监控主机进一步记录所 述监控装置与其所具有的服务及权限的对应关系;
在接收所述监控装置发送的应用请求时, 所述被监控主机根据所述记录的监 控装置与其所具有的服务及权限的对应关系, 判断所述监控装置发送的应用请求 是否在所述监控装置具有的服务及权限允许的范围之内; 如果是, 则执行所述监 控装置的应用请求; 否则, 与所述监控装置断开连接;
其中, 所述应用请求用于监控所述被监控主机的突发事件或查询所述被监控 主机的工作状态。
12、如权利要求 1所述的方法,其特征在于,所述监控装置为多媒体播放器; 所述多媒体播放器搜索所述被监控主机中的音视频文件, 从所述被监控主机 中接收并播放所述音视频文件。
13、 如权利要求 12所述的方法, 其特征在于, 在所述多媒体播放器搜索所 述被监控主机中的音视频文件后, 所述多媒体播放器进一步根据用户的选择, 从 所搜索到的音视频文件中选择一个或多个音视频文件;
所述从所述被监控主机中接收并播放所述音视频文件包括:
从所述被监控主机中接收并播放所述选择的一个或多个音视频文件。
14、 如权利要求 1或 2所述的方法, 其特征在于, 所述建立与所述被监控主 机的监控连接关系包括:
向所述被监控主机发送监控连接请求,
接收所述被监控主机返回的连接响应信号, 并根据所述连接响应信号连接所 述被监控主机;
其中, 所述连接响应信号指示所述主机接受所述监控装置的监控连接。
15、 一种监控装置, 其特征在于, 包括控制模块、 通信模块以及查询模块, 其中,
控制模块, 用于控制通信模块与查询模块之间的通信;
通信模块, 用于与被监控主机建立监控连接关系;
查询模块, 用于与被监控主机建立监控连接关系过程中, 向被监控主机发出 搜寻指令, 以向被监控主机发送返回主机设备信息的请求; 或当与被监控主机建 立监控连接关系后,监控所述被监控主机的突发事件和查询所述被监控主机的工 作状态。
16、 如权利要求 15所述的监控装置, 其特征在于, 进一步包括:
显示模块, 用于显示被监控主机反馈的工作状态信息或突发事件信息。
17、 如权利要求 15或 16所述的监控装置, 其特征在于, 进一步包括: 警示模块, 用于接收到被监控主机反馈的工作状态信息或突发事件信息时, 发出警示以提醒用户。
18、 如前任一权利要求所述的监控装置, 其特征在于, 进一步包括: 监控事件菜单设置模块, 用于向被监控主机发送功能项目查询命令, 接收被 监控主机返回的功能项目信息, 并根据被监控主机返回的功能项目信息, 设置对 被监控主机的监控事件菜单;
所述查询模块, 用于根据所述监控事件菜单设置模块设置的对被监控主机的 监控事件菜单,监控所述被监控主机的突发事件和查询所述被监控主机的工作状 态。
19、 如前任一权利要求所述的监控装置, 其特征在于, 进一步包括: 存储模块, 用于存储所述被监控主机的监控事件菜单和监控数据。
20、 如前任一权利要求所述的监控装置, 其特征在于, 进一步包括: 输入模块, 用于输入使用者的操作指令并送至控制模块;
所述控制模块, 进一步用于对用户通过输入模块输入的信息进行信息处理。
21、 如前任一权利要求所述的监控装置, 其特征在于, 进一步包括: 认证模块, 用于在与所述被监控主机建立通信连接时, 向所述被监控主机进 行身份安全认证。
22、 如前任一权利要求所述的监控装置, 其特征在于, 进一步包括: 音频模块, 用于接收用户的语音信息, 将用户输入的语音信息发送给控制模 块处理, 并通过通信模块发送给所述被监控主机; 将经过所述通信模块接收以及 控制模块处理后的语言信息输出给用户。
23、 如前任一权利要求所述的监控装置, 其特征在于, 进一步包括: 电源, 用于为所述子机中每一个模块提供供电。
24、 一种主机, 其特征在于, 包括通信模块、 检测模块以及控制响应模块, 其中,
通信模块, 用于与执行监控任务的监控装置建立监控连接关系;
检测模块, 用于在与所述监控装置建立监控连接关系过程中, 检测是否有所 述监控装置发出的搜寻指令; 或在与所述监控装置建立监控连接关系后, 检测是 否收到所述监控装置发出的监控事件查询列表或自身有无突发事件发生; 控制响应模块, 用于在检测模块检测到有所述监控装置发出搜寻指令时, 将 自身设备信息通过通信模块发送给所述监控装置; 在检测模块检测到收到所述监 控装置发出的监控事件查询列表时, 查询并搜集自身设备的工作状态信息, 并通 过通信模块将自身的工作状态信息发送给所述监控装置; 或在检测模块检测到自 身有突发事件发生时, 将突发事件信息通过通信模块发送给所述监控装置。
25、 如权利要求 24所述的主机, 其特征在于, 进一步包括:
监控项目匹配模块, 用于在检测模块收到所述监控装置发出的功能项目查询 命令时, 向所述监控装置返回自身需监控的功能项目, 以配合所述监控装置完成 监控事件菜单的设置;
所述检测模块, 进一步用于检测是否收到所述监控装置发出的功能项目查询 命令。
26、 如权利要求 24或 25所述的主机, 其特征在于, 进一步包括:
主机控制模块, 用于为所述监控装置设置通信认证权限;
通信判断模块, 用于根据主机控制模块为所述监控装置设置的通信认证权 限, 判断所述监控装置发送的应用请求是否在所述监控装置所具有的通信认证权 限允许的范围内, 如果是, 执行所述监控装置发送的应用请求, 否则, 与所述监 控装置断开连接。
27、 如权利要求 26所述的主机, 其特征在于, 进一步包括:
绑定模块, 用于与所述监控装置进行绑定。
28、如权利要求 26或 27所述的主机,其特征在于,所述主机控制模块包括: 选择授予单元, 用于选择授予所述监控装置的服务及权限。
权限记录单元, 用于根据所述选择授予单元为所述监控装置选择的服务和权 限, 生成信任域, 以记录为所述监控装置选择授予的服务及权限。
权限发送单元, 用于将为所述监控装置选择授予的服务及权限发送给所述监 控装置。
29、 如权利要求 26、 27或 28所述的主机, 其特征在于, 所述通信判断模块 包括:
请求接收单元, 用于接收所述监控装置发送的应用请求。
请求判断单元, 用于根据所述主机控制模块为所述监控装置设置的通信认证 权限, 判断监控装置发送的应用请求是否在监控装置所具有的通信认证权限允许 的范围内, 如果是, 执行监控装置发送的应用请求; 否则, 与监控装置断开连接。
30、 如权利要求 27所述的主机, 其特征在于, 所述绑定模块包括: 主机初始单元, 用于初始化所述通信模块;
查询单元, 用于查询有效范围内是否存在所述监控装置;
绑定判定单元, 用于在查询模块查询到所述监控装置的情况下, 根据用户输 入的密码, 判断是否与所述监控装置建立链路密钥连接, 如果是, 与所述监控装 置进行绑定。
PCT/CN2009/070188 2008-02-02 2009-01-16 监控主机的方法、监控装置及主机 WO2009097781A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009801038959A CN101919184B (zh) 2008-02-02 2009-01-16 监控主机的方法、监控装置及主机
US12/848,902 US20100302002A1 (en) 2008-02-02 2010-08-02 Method for Monitoring Main Machine, Monitoring Apparatus and Main Machine

Applications Claiming Priority (14)

Application Number Priority Date Filing Date Title
CN200810065217.5 2008-02-02
CN200820091929.X 2008-02-02
CNU200820091929XU CN201181963Y (zh) 2008-02-02 2008-02-02 一种多媒体播放器
CNA2008100652175A CN101227199A (zh) 2008-02-02 2008-02-02 一种监控手机状态的装置及方法
CN200810066097.0 2008-02-15
CNA2008100660970A CN101232535A (zh) 2008-02-15 2008-02-15 一种共享播放多媒体文件的方法及多媒体播放器
CN200820048346.9 2008-05-27
CNU2008200483469U CN201213280Y (zh) 2008-05-27 2008-05-27 分体式移动终端子机电路结构
CN200810028530.1 2008-06-04
CN2008100285301A CN101286806B (zh) 2008-06-04 2008-06-04 一种单个子机监控多个主机的方法、系统及设备
CN200810029166.0 2008-07-01
CN2008100291660A CN101304571B (zh) 2008-07-01 2008-07-01 分体式移动终端主机和子机间通信认证的方法及移动装置
CN2008100300176A CN101335575B (zh) 2008-08-05 2008-08-05 一种单个子机选择监控多个主机的方法及系统
CN200810030017.6 2008-08-05

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/848,902 Continuation US20100302002A1 (en) 2008-02-02 2010-08-02 Method for Monitoring Main Machine, Monitoring Apparatus and Main Machine

Publications (2)

Publication Number Publication Date
WO2009097781A1 true WO2009097781A1 (zh) 2009-08-13
WO2009097781A8 WO2009097781A8 (zh) 2009-11-19

Family

ID=40951778

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/070188 WO2009097781A1 (zh) 2008-02-02 2009-01-16 监控主机的方法、监控装置及主机

Country Status (2)

Country Link
US (1) US20100302002A1 (zh)
WO (1) WO2009097781A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167406A (zh) * 2011-12-19 2013-06-19 中国移动通信集团天津有限公司 一种全球定位系统监控方法、设备及系统
CN106068013A (zh) * 2016-07-25 2016-11-02 乐视控股(北京)有限公司 监控方法和装置以及移动终端

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10862994B1 (en) 2006-11-15 2020-12-08 Conviva Inc. Facilitating client decisions
US9549043B1 (en) 2004-07-20 2017-01-17 Conviva Inc. Allocating resources in a content delivery environment
US9124601B2 (en) 2006-11-15 2015-09-01 Conviva Inc. Data client
US8874725B1 (en) 2006-11-15 2014-10-28 Conviva Inc. Monitoring the performance of a content player
US8751605B1 (en) 2006-11-15 2014-06-10 Conviva Inc. Accounting for network traffic
US9264780B1 (en) 2006-11-15 2016-02-16 Conviva Inc. Managing synchronized data requests in a content delivery network
US8402494B1 (en) 2009-03-23 2013-03-19 Conviva Inc. Switching content
US9100288B1 (en) 2009-07-20 2015-08-04 Conviva Inc. Augmenting the functionality of a content player
US9032413B2 (en) 2011-09-01 2015-05-12 Microsoft Technology Licensing, Llc Decoupling background work and foreground work
US9063775B2 (en) * 2011-09-01 2015-06-23 Microsoft Technology Licensing, Llc Event aggregation for background work execution
US9164803B2 (en) 2012-01-20 2015-10-20 Microsoft Technology Licensing, Llc Background task resource control
US9613042B1 (en) 2012-04-09 2017-04-04 Conviva Inc. Dynamic generation of video manifest files
CN103389691A (zh) * 2012-05-11 2013-11-13 鸿富锦精密工业(深圳)有限公司 远端监控系统
US9246965B1 (en) 2012-09-05 2016-01-26 Conviva Inc. Source assignment based on network partitioning
US10182096B1 (en) 2012-09-05 2019-01-15 Conviva Inc. Virtual resource locator
US9489236B2 (en) 2012-10-31 2016-11-08 Microsoft Technology Licensing, Llc Application prioritization
CN103685676B (zh) * 2013-11-29 2016-02-10 宇龙计算机通信科技(深圳)有限公司 蓝牙子机、分体式移动终端及蓝牙子机的信息处理方法
US10305955B1 (en) 2014-12-08 2019-05-28 Conviva Inc. Streaming decision in the cloud
US10178043B1 (en) 2014-12-08 2019-01-08 Conviva Inc. Dynamic bitrate range selection in the cloud for optimized video streaming
CN110294372B (zh) * 2018-03-23 2023-02-28 奥的斯电梯公司 一种无线信号装置、电梯服务请求系统和方法
CN110164436A (zh) * 2019-05-22 2019-08-23 深圳市智乐创科技有限公司 便携式多点智能语音控制家居的系统及方法
CN114125390B (zh) * 2021-11-22 2022-11-25 深圳市博尔特科技发展有限公司 一种模块化分布式音视频处理系统及方法
CN115242359B (zh) * 2022-07-22 2023-08-01 重庆邮电大学 一种面向智慧养老的监护系统及其实现方法

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6891838B1 (en) * 1998-06-22 2005-05-10 Statsignal Ipc, Llc System and method for monitoring and controlling residential devices
CN1777326A (zh) * 2004-11-19 2006-05-24 乐金电子(中国)研究开发中心有限公司 移动通信终端通话状态监控系统及其工作方法
CN1901707A (zh) * 2006-07-04 2007-01-24 高金铎 监控手机及其远程监控方法
CN101227199A (zh) * 2008-02-02 2008-07-23 宇龙计算机通信科技(深圳)有限公司 一种监控手机状态的装置及方法
CN101232535A (zh) * 2008-02-15 2008-07-30 宇龙计算机通信科技(深圳)有限公司 一种共享播放多媒体文件的方法及多媒体播放器
CN101286806A (zh) * 2008-06-04 2008-10-15 宇龙计算机通信科技(深圳)有限公司 一种单个子机监控多个主机的方法、系统及设备
CN101304571A (zh) * 2008-07-01 2008-11-12 宇龙计算机通信科技(深圳)有限公司 分体式移动终端主机和子机间通信认证的方法及移动装置
CN101335575A (zh) * 2008-08-05 2008-12-31 宇龙计算机通信科技(深圳)有限公司 一种单个子机选择监控多个主机的方法及系统
CN201181963Y (zh) * 2008-02-02 2009-01-14 宇龙计算机通信科技(深圳)有限公司 一种多媒体播放器

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6915337B1 (en) * 2000-03-07 2005-07-05 Ricoh Co. Ltd. Method and system for updating the device driver of a business office appliance
US20050136988A1 (en) * 2003-12-19 2005-06-23 Villamil Camilo E. Method for reporting personal status of a mobile communication device user and method therefor
US8028038B2 (en) * 2004-05-05 2011-09-27 Dryden Enterprises, Llc Obtaining a playlist based on user profile matching
US7881832B2 (en) * 2006-06-09 2011-02-01 Garmin International, Inc. Automatic speech recognition system and method for aircraft

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6891838B1 (en) * 1998-06-22 2005-05-10 Statsignal Ipc, Llc System and method for monitoring and controlling residential devices
CN1777326A (zh) * 2004-11-19 2006-05-24 乐金电子(中国)研究开发中心有限公司 移动通信终端通话状态监控系统及其工作方法
CN1901707A (zh) * 2006-07-04 2007-01-24 高金铎 监控手机及其远程监控方法
CN101227199A (zh) * 2008-02-02 2008-07-23 宇龙计算机通信科技(深圳)有限公司 一种监控手机状态的装置及方法
CN201181963Y (zh) * 2008-02-02 2009-01-14 宇龙计算机通信科技(深圳)有限公司 一种多媒体播放器
CN101232535A (zh) * 2008-02-15 2008-07-30 宇龙计算机通信科技(深圳)有限公司 一种共享播放多媒体文件的方法及多媒体播放器
CN101286806A (zh) * 2008-06-04 2008-10-15 宇龙计算机通信科技(深圳)有限公司 一种单个子机监控多个主机的方法、系统及设备
CN101304571A (zh) * 2008-07-01 2008-11-12 宇龙计算机通信科技(深圳)有限公司 分体式移动终端主机和子机间通信认证的方法及移动装置
CN101335575A (zh) * 2008-08-05 2008-12-31 宇龙计算机通信科技(深圳)有限公司 一种单个子机选择监控多个主机的方法及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167406A (zh) * 2011-12-19 2013-06-19 中国移动通信集团天津有限公司 一种全球定位系统监控方法、设备及系统
CN106068013A (zh) * 2016-07-25 2016-11-02 乐视控股(北京)有限公司 监控方法和装置以及移动终端

Also Published As

Publication number Publication date
WO2009097781A8 (zh) 2009-11-19
US20100302002A1 (en) 2010-12-02

Similar Documents

Publication Publication Date Title
WO2009097781A1 (zh) 监控主机的方法、监控装置及主机
CN107277754B (zh) 一种蓝牙连接的方法及蓝牙外围设备
US8892088B2 (en) Systems and methods for handling incoming calls on a media device
WO2017071420A1 (zh) 一种智能设备语音交流方法、装置和系统
JP5396863B2 (ja) ワイヤレスネットワークシステム
CN105163366B (zh) 无线网络连接方法和装置
WO2021114952A1 (zh) 数据处理方法、终端设备、蓝牙设备及存储介质
WO2019090726A1 (zh) 选择蓝牙设备的方法、终端和系统
KR20140124304A (ko) 통신 제어 방법 및 이를 지원하는 전자 장치
EP3160110B1 (en) File transmission method, apparatus and storage medium
WO2016127795A1 (zh) 业务处理方法、服务器及终端
WO2015032249A1 (zh) 多媒体播放设备网络初始化的方法、系统、设备与终端
WO2021129529A1 (zh) 设备切换方法及相关设备
JP2018523176A (ja) 車載インフォテインメントとデータを交換するための方法、サーバ、モバイル端末、及び装置
JP2008009896A (ja) 情報処理装置、情報処理方法、およびプログラム
JP5849857B2 (ja) 近距離無線通信装置
CN103379448A (zh) 在取消连接时减少等待时间的方法和电子设备
WO2024016503A1 (zh) 一种通信方法及电子设备
JP4793062B2 (ja) 情報端末管理装置、表示装置、および情報端末管理方法
TW201019625A (en) Slave device fitting bluetooth communication protocol and communication connecting method
JP2012039282A (ja) 電子機器、その情報表示プログラム及びその情報表示方法
JP4683652B2 (ja) 画像データ送受信システム及び画像データ送信デバイス及びその制御方法、並びに、コンピュータプログラム
US20070207796A1 (en) Wireless voice operated system and method for portable communication device and wireless earphones thereof
WO2024082906A1 (zh) 信息获取方法、装置、蓝牙设备、终端设备及存储介质
WO2019037620A1 (zh) 账单自动归类的方法、存储介质及移动终端

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980103895.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09707182

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 221210

122 Ep: pct application non-entry in european phase

Ref document number: 09707182

Country of ref document: EP

Kind code of ref document: A1