WO2019227374A1 - Alarm method, apparatus and system, and electronic device - Google Patents

Alarm method, apparatus and system, and electronic device Download PDF

Info

Publication number
WO2019227374A1
WO2019227374A1 PCT/CN2018/089205 CN2018089205W WO2019227374A1 WO 2019227374 A1 WO2019227374 A1 WO 2019227374A1 CN 2018089205 W CN2018089205 W CN 2018089205W WO 2019227374 A1 WO2019227374 A1 WO 2019227374A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
information
byte
sensor
mobile terminal
Prior art date
Application number
PCT/CN2018/089205
Other languages
French (fr)
Chinese (zh)
Inventor
彭灵
陈辉萍
钟城广
盘国权
范高如
李鑫
陈清泉
黄立旺
王增均
朱荆莲
李文彬
姚化桥
俞伟良
陈海裕
杨金桂
李文和
李国凯
郭飞锋
Original Assignee
深圳市蚂蚁雄兵物联技术有限公司
深圳佳比泰智能照明股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市蚂蚁雄兵物联技术有限公司, 深圳佳比泰智能照明股份有限公司 filed Critical 深圳市蚂蚁雄兵物联技术有限公司
Priority to PCT/CN2018/089205 priority Critical patent/WO2019227374A1/en
Priority to CN201880000643.2A priority patent/CN108701401B/en
Publication of WO2019227374A1 publication Critical patent/WO2019227374A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Definitions

  • the present application relates to the field of data processing technologies, and in particular, to an alarm method, device, system, and electronic device.
  • the sensor is an extension of human features, also known as electric features.
  • sensors can be applied in the field of smart homes, and the environment in the home can be monitored by setting sensors in smart devices or directly setting sensors.
  • gas sensors can be set at home to monitor and control gas parameters in various corners of the room.
  • these sensors used in the field of smart homes provide convenience to people, there are also a variety of external malicious intrusions. It may affect the normal operation of smart devices or sensors at home, and threaten the lives of family members.
  • the monitoring data sent by the sensor has been tampered with, leading to the problem that the alarm is not reported at the time of the alarm.
  • the concentration of carbon dioxide gas and flammable gas is very high, but without the alarm, it will seriously threaten the lives of family members
  • the data transmitted by traditional home sensors is not encrypted, and the data is easy to be intercepted and tampered, that is, the existing sensors have a low security factor for data transmission.
  • the purpose of the present application includes providing an alarm method, device, system and electronic equipment to alleviate at least the technical problem of low safety factor of sensors in the prior art.
  • an embodiment of the present application provides an alarm method, which is applied to a mobile terminal and includes:
  • the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table
  • the embodiment of the present application provides a first possible implementation manner of the first aspect, where the method further includes:
  • the alarm information is output for the convenience of the user.
  • an initial state of the alarm information is an unprocessed state
  • the initial state indicates a state in which the alarm information is not processed by a user.
  • the embodiment of the present application provides a third possible implementation manner of the first aspect, where the method further includes:
  • the embodiment of the present application provides a fourth possible implementation manner of the first aspect, wherein the alarm signal includes a first byte and a second byte, and the first byte indicates a sensor type; There are multiple types of sensors, each of which corresponds to a preset bit of the first byte; the second byte indicates the type of alarm; there are multiple types of alarms, and each of the alarms The kind corresponds to a preset bit of the second byte.
  • the embodiment of the present application provides a fifth possible implementation manner of the first aspect, wherein the alarm signal further includes a third byte, and the third byte It is configured to represent quantified monitoring information, and the mobile terminal analyzes specific values.
  • the embodiment of the present application provides a sixth possible implementation manner of the first aspect, wherein the alarm types are divided into multiple levels in advance.
  • the embodiment of the present application provides a seventh possible implementation manner of the first aspect, wherein the alarm signal further includes a fourth byte, and the fourth byte Configured to characterize a level of each alarm type, each level corresponding to a preset bit of the fourth byte.
  • an embodiment of the present application provides an alarm method, which is applied to a sensor and includes:
  • the alarm signal is encrypted and generated by the sensor according to a byte encryption table; so that the mobile terminal parses the alarm signal to obtain alarm information.
  • an embodiment of the present application provides an alarm device, including:
  • a receiving module configured to receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table for the alarm information;
  • the analysis module is configured to analyze the alarm signal to obtain alarm information.
  • the embodiment of the present application provides a first possible implementation manner of the third aspect, where the device further includes:
  • An output module is configured to output the alarm information for a user to view.
  • an initial state of the alarm information is an unprocessed state
  • the initial state indicates a state in which the alarm information is not processed by a user.
  • the embodiment of the present application provides a third possible implementation manner of the third aspect, where the device further includes:
  • the changing module is configured to receive processing feedback information of a user, and change a state of the alarm information according to the processing feedback information.
  • the embodiment of the present application provides a fourth possible implementation manner of the third aspect, where the device further includes:
  • the user management module is configured to receive a password login request of a user.
  • an embodiment of the present application further provides an alarm system, including: a sensor and a mobile terminal, where the sensor is communicatively connected to the mobile terminal;
  • the sensor is configured to send an alarm signal to the mobile terminal;
  • the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table for the alarm information;
  • the mobile terminal parses the alarm signal to obtain alarm information.
  • the embodiment of the present application provides a first possible implementation manner of the fourth aspect, where there are multiple sensors.
  • an embodiment of the present application provides an alarm method, which is applied to an alarm device and includes:
  • an alarm signal is generated and sent to the mobile terminal based on the monitoring information, so that the mobile terminal parses the alarm signal to obtain alarm information; wherein the alarm signal is transmitted by the alarm device according to bytes.
  • the encryption table is generated by encryption.
  • an embodiment of the present application further provides an alarm system, including: a sensor, an alarm device, and a mobile terminal, the sensor is connected to the alarm device, and the alarm device is communicatively connected to the mobile terminal;
  • the sensor is configured to monitor information
  • the alarm device is configured to determine whether the monitoring information satisfies an alarm condition, and when yes, generates alarm information based on the monitoring information;
  • the alarm device encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal
  • the alarm device sends an alarm signal to the mobile terminal
  • the mobile terminal outputs the alarm information.
  • an embodiment of the present application provides an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor.
  • the processor executes the computer program, Implement the steps of the alarm method described above.
  • an embodiment of the present application provides a computer-readable medium having a non-volatile program code executable by a processor, where the program code causes the processor to perform the steps of the foregoing alarm method.
  • An embodiment of the present application provides an alarm method, which is applied to a mobile terminal.
  • the method receives an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; and then the alarm signal is parsed to obtain Alarm information. Therefore, the technical solutions provided in the embodiments of the present application can alleviate the technical problem of low safety coefficient of sensors in the prior art, and improve the security of data transmission.
  • FIG. 1 is a schematic flowchart of an alarm method according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of another alarm method according to an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an alarm device according to an embodiment of the present application.
  • FIG. 4 is a schematic diagram of an alarm system according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of still another alarm method according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another alarm system according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of an electronic device according to an embodiment of the present application.
  • the data transmitted by traditional household sensors is not encrypted, and the data is easily intercepted and tampered.
  • the existing sensors have a problem of low security coefficients for data transmission. Based on this, an alarm method, device, system and The electronic device can alleviate the technical problem of low safety factor of the sensor in the prior art, and can improve the safety factor.
  • an embodiment of the present application provides an alarm method, which can be applied to a mobile terminal.
  • the method includes:
  • Step S101 Receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table;
  • the byte encryption table here includes a sensor type encryption table, an alarm type encryption table, an alarm type level encryption table, and a monitoring information quantization value encryption table, corresponding to the first byte, the second byte, and the third word, respectively. Section, fourth byte.
  • the byte encryption table can also be a total table including the above-mentioned various types of encryption tables.
  • the above alarm signal includes a first byte and a second byte.
  • the first byte indicates a sensor type (eight sensors, represented by 1 for each bit); there are multiple sensor types, and each of the above sensor types corresponds to the above.
  • the preset bit of the first byte; and the "0" and “1" of the preset bit respectively indicate the alarm status of the sensor of the preset bit (alarm or no alarm).
  • a byte includes 8 bits, so the first byte can represent 8 sensor categories, and a "1" in each bit indicates that a sensor issues an alarm, and a "0" indicates that the sensor has not issued an alarm.
  • the last bit of the first byte is taken as an example for description; the last bit represents the sensor type as a carbon dioxide sensor, and when the last bit (the first to the last bit is in the order of left to right) Arrangement, the last digit of the byte refers to the rightmost digit, the first digit on the left indicates the first digit of the byte) "1" indicates that the carbon dioxide sensor issues an alarm; when the last bit is "0", the carbon dioxide sensor is not Send an alarm; similarly other bits define other categories of sensors.
  • the first byte may also be location information indicating sensors of the same category placed at different positions in a preset place.
  • the first byte indicates the position of eight carbon dioxide sensors distributed in eight different places in the home (such as living room, kitchen, master bedroom, study, dining room, balcony, bathroom, second bedroom). 1-8 "respectively.
  • the second byte indicates an alarm type (eight types, represented by 1 for each bit); the above alarm types are multiple, and each of the above alarm types corresponds to a preset bit of the second byte.
  • the second byte includes 8 bits.
  • the second byte can represent eight alarm types, which are represented by “1” in each bit.
  • the above example of carbon dioxide sensors is also used to explain the last byte of the second byte. A "1" in one digit indicates that the carbon dioxide concentration exceeds the standard; a "0" in the last digit of the second byte indicates that the carbon dioxide concentration does not exceed the standard.
  • the alarm signal may further include a third byte, and the third byte is configured to characterize the quantified monitoring information (such as the concentration value and the power value), and the mobile terminal analyzes the specific value.
  • the quantified monitoring information such as the concentration value and the power value
  • the third byte can represent 256 numbers, that is, from 0-255, which corresponds to 00000000 to 11111111, and each number corresponds to a preset quantized value of monitoring information.
  • the third byte here can represent the byte of the gas concentration; each number can correspond to a preset concentration value, and the interval between the concentration values between two adjacent numbers is based on the actual The detection demand and sensor detection accuracy are set.
  • the interval between the concentration values of two adjacent numbers is set to any value between 10 and 60.
  • the preset concentration value corresponding to 00000000 is 1000 ppm (parts per million, One millionth), the preset concentration value corresponding to 00000001 is 1020ppm, the preset concentration value corresponding to 00000010 is 1040ppm, the preset concentration value corresponding to 00000011 is 1060ppm, ..., that is, the concentration between two adjacent numbers
  • the value interval is set to 20 ppm. It should be noted that the preset concentration value corresponding to each number can be set by referring to national standards, international standards, or other experimental standards to set how many alarms are higher.
  • the reference standard in this embodiment is as follows: the carbon dioxide concentration value and the physiological reaction of the human body : 350 ⁇ 1000ppm: fresh air and smooth breathing; 1000 ⁇ 2000ppm: feeling turbid air and beginning to feel drowsy; 2000 ⁇ 5000ppm: feeling headache, drowsiness, sluggishness, inattention, rapid heartbeat, mild nausea; Above 5000ppm: May cause severe hypoxia, causing permanent brain damage, coma, and even death.
  • the alarm information can also include a fourth byte.
  • the fourth byte is configured to represent the level of each alarm type. Each level corresponds to the preset bit of the fourth byte.
  • the fourth byte includes 8 bits.
  • the “1” of each bit indicates the alarm level respectively; the fourth byte can indicate eight alarm levels; then the above example of the carbon dioxide sensor is used for illustration.
  • the fourth word The "1" in the last digit of the section indicates that the carbon dioxide concentration exceeds the level one; the "1" in the first digit of the fourth byte indicates that the carbon dioxide concentration exceeds the level eight.
  • step S102 the alarm signal is analyzed to obtain alarm information.
  • the step S102 includes: searching a byte encryption table to analyze the alarm signal to obtain alarm information.
  • the byte encryption table here is the same as the byte encryption table described above, and the byte encryption table is stored in the memory of the mobile terminal in advance to facilitate the mobile terminal to retrieve and search, and then parse and obtain the alarm information.
  • the alarm signal When the alarm signal includes the first byte, the second byte, the third byte, and the fourth byte, the alarm signal is usually expressed in the order of the first byte to the fourth byte as : "00000001", "00000001", "00000001", "00000001”.
  • the analysis result of the mobile terminal is: sensor type-carbon dioxide sensor alarm, alarm type-concentration over standard, concentration value-1020ppm, alarm type level-first level (concentration Exceeded); the result is an alarm message.
  • the alarm signal When the alarm signal includes the first byte, the second byte, the third byte, and the fourth byte, the alarm signal is usually expressed in the order of the first byte to the fourth byte as : "00000001", "00000001", "00000001", "00000001”.
  • the analysis result of the mobile terminal is: sensor type-carbon dioxide sensor alarm, alarm type-concentration over standard, concentration value-1020ppm, alarm type level-first level (concentration Exceeded); the result is an alarm message.
  • An embodiment of the present application provides an alarm method, which is applied to a mobile terminal.
  • the method receives an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; and then the alarm signal is parsed to obtain Alarm information. Therefore, the technical solutions provided in the embodiments of the present application can alleviate the technical problem of low safety coefficient of sensors in the prior art, and improve the security of data transmission.
  • an embodiment of the present application provides another alarm method.
  • the method further includes:
  • step S201 the above-mentioned alarm information is output for the convenience of the user to check.
  • step S201 may be implemented in one of the following ways:
  • Method 1 output the above alarm information in the form of voice
  • the above alarm information is output to a visual interface.
  • the visual interface here may be a display screen of a mobile terminal or a display device connected to the mobile terminal.
  • it may be a projection device including a projector and a projection screen.
  • the alarm information can be projected on the projection screen through the projector; specifically, the alarm information here is displayed on the visual interface in a visual form, for example, the alarm information is displayed in the form of text, charts, and the like.
  • the initial state of the alarm information is an unprocessed state, and the initial state indicates a state where the alarm information has not been processed by the user.
  • the alarm information is marked as unprocessed in a preset mark form.
  • an unread mark such as an asterisk "*"
  • Add color identification more eye-catching
  • the alarm information is visual information
  • mark the alarm information with a preset color such as red
  • a chart to identify the unprocessed visual information status.
  • the method further includes:
  • Step S202 Receive processing feedback information of the user, and change the status of the alarm information according to the processing feedback information.
  • the user can process the unprocessed alarm information, generate processing feedback information to the mobile terminal, and the mobile terminal receives the processing feedback information, changes the status of the above-mentioned alarm information according to the processing feedback information, and changes the alarm information from the unprocessed state.
  • Change to the processing state for example, when the alarm information is voice information, the user clicks on the unread voice information for processing to generate processing feedback information, and the mobile terminal changes the unprocessed state of the voice information to processing according to the received processing feedback information Status (for example, you can change the asterisk "*" to a circle "O", and change the color when the asterisk has a color mark); when the alarm message is a visual message, such as a text, the user needs to click on the text or read the text.
  • the processing generates processing feedback information, and the mobile terminal changes the unprocessed state of the text to the processing state (for example, changes the text from red to green) according to the received processing feedback information.
  • the method further includes: judging whether the user has completely acquired the alarm information (that is, the mobile terminal will perform content integrity judgment).
  • the specific mobile terminal may By monitoring whether the user has finished listening to the voice message, for example, by comparing the playback duration with the preset duration of the sent alarm information, if the duration is consistent, it is determined that the alarm information is completely obtained, and then the status is changed according to the processing feedback information; otherwise It is determined that the alarm information is not completely obtained, and the user is prompted to re-process (that is, to listen to the voice message again); or the mobile terminal monitors whether the user has read the text message to identify, for example, the microphone receives the voice message of the text reading message and performs the voice The text information generated after recognition is compared with the similarity value. When the similarity value is greater than a preset threshold, it is determined that the alarm information is completely obtained; otherwise, a prompt message is issued to prompt the user to reprocess (
  • a third alarm method is provided in an embodiment of the present application.
  • the alarm method is applied to a sensor and includes: sending an alarm signal to a mobile terminal; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table. To enable the mobile terminal to analyze the alarm signal to obtain alarm information.
  • the alarm information here is generated by encrypting the alarm information, and the alarm information refers to the monitoring information when the alarm conditions are met.
  • an embodiment of the present application provides an alarm device, including:
  • the receiving module 301 may be configured to receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; that is, the alarm signal is expressed in the form of bytes;
  • the analysis module 302 is configured to analyze the alarm signal to obtain alarm information.
  • the device further includes: an output module 303 configured to output the above-mentioned alarm information for the convenience of a user to view.
  • the initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information is not processed by a user.
  • the device further includes: a change module 304 configured to receive processing feedback information of the user, and change the status of the alarm information according to the processing feedback information.
  • the device further includes a user management module 305 configured to receive a password login request of the user.
  • the user After the user logs in successfully, the user can view the alarm information and change the status of the alarm information.
  • the user management here includes a visual interface (such as a display screen).
  • FIG. 4 shows a schematic diagram of an alarm system according to an embodiment of the present application.
  • the system includes: a sensor 400 and a mobile terminal 500, where the sensor is communicatively connected with the mobile terminal;
  • the senor is configured to send an alarm signal to the mobile terminal;
  • the alarm signal is generated by encrypting the alarm information according to a pre-stored byte encryption table through the sensor;
  • the mobile terminal analyzes the alarm signal to obtain alarm information.
  • the senor includes a wireless communication module, an acquisition module, a storage module, and a processing module.
  • the wireless communication module, the acquisition module, and the storage module are respectively connected to the processing module;
  • the storage module is configured to store a byte encryption table; and
  • the acquisition module is configured to acquire in real time.
  • Monitoring information including concentration value, power value, etc.
  • the processing module is configured to receive the monitoring information and determine whether the monitoring information meets the alarm conditions, and when the alarm conditions are met, generate the alarm information; and then encrypt the alarm information according to the pre-stored bytes
  • the table is encrypted to generate an alarm signal;
  • the wireless communication module is configured to communicate with the mobile terminal, such as sending an alarm signal to the mobile terminal.
  • the sensor may be a carbon dioxide sensor configured to detect carbon dioxide (collecting carbon dioxide information such as carbon dioxide concentration); or a combustible gas sensor such as a hydrogen sensor configured to detect Combustible gas (collecting combustible gas information, such as the concentration value of combustible gas); it may also be a formaldehyde sensor configured to detect formaldehyde (collecting formaldehyde information, such as the concentration of formaldehyde).
  • a carbon dioxide sensor configured to detect carbon dioxide (collecting carbon dioxide information such as carbon dioxide concentration)
  • a combustible gas sensor such as a hydrogen sensor configured to detect Combustible gas (collecting combustible gas information, such as the concentration value of combustible gas)
  • it may also be a formaldehyde sensor configured to detect formaldehyde (collecting formaldehyde information, such as the concentration of formaldehyde).
  • sensors can be placed in the home, such as sensors that detect flammable gases, carbon dioxide, and formaldehyde.
  • the alarm signal includes at least two bytes, one of which indicates the sensor type
  • the sensor type is a carbon dioxide sensor
  • the other byte indicates the type of alarm
  • one byte includes 8 bits, and each bit can be defined as a type, such as an alarm for excessive concentration, an alarm for insufficient battery power, and an alarm for damage to the detection device.
  • the alarm types are set in different levels, for example, the concentration over alarm alarm is indicated in different levels, that is, it includes the first level concentration exceeding the standard and the second level concentration exceeding the standard. Insufficient power ..., power information can be collected through the power management module), detection device damage alarm can also be graded (completeness less than 90% is first-level damage, completeness less than 85% is second-level damage ..., completeness information can be collected through images The image collected by the device is subjected to image recognition analysis, and compared with the pre-stored image information of the initial sensor.) It is indicated that in the byte of the alarm type, each bit represents an alarm type, that is, essentially every bit type Divided, in the byte of the same alarm type level, each bit represents a type of alarm type, which is essentially a pre-classification of each alarm type.
  • bytes can also be included in the transmitted data, for example, bytes of gas concentration and bytes of remaining electricity. Since a byte can represent 256 numbers (0-255), it can pass a word The section shows the specific value, and then the data is parsed by the APP.
  • the data sent by the sensor (that is, the alarm signal) is transmitted to the APP, and the APP analyzes the data to generate alarm information and output it to the visual interface, so that the user can intuitively see the alarm information (sensor type, alarm type, concentration information) And alarm levels, etc.).
  • the alarm device and the alarm system provided in the embodiments of the present application have the same technical features as the alarm method provided in the above embodiments, so they can also solve the same technical problems and achieve the same technical effects.
  • an embodiment of the present application provides an alarm method, which can be applied to an alarm device, including:
  • Step S501 receiving monitoring information sent by a sensor
  • Step S502 determine whether the monitoring information meets an alarm condition
  • the alarm condition here refers to whether the value of the monitoring information is greater than a preset threshold or less than a preset threshold.
  • the monitoring information is gas (such as carbon dioxide, flammable gas, formaldehyde, etc.) concentration information
  • the gas concentration value that is, monitoring Whether the value of the information
  • the alarm condition is satisfied
  • the monitoring information is the power information
  • it is judged whether the power value that is, the value of the monitoring information
  • the alarm condition is satisfied, and the same applies to other monitoring information, such as temperature and humidity.
  • step S503 When yes, execute step S503; when not, return to step S501 to continue monitoring;
  • Step S503 Generate and send an alarm signal to the mobile terminal based on the monitoring information, so that the mobile terminal analyzes the alarm signal to obtain alarm information.
  • the alarm signal is encrypted and generated by the alarm device according to a byte encryption table.
  • the alarm device generates alarm information based on the monitoring information, and then encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal, and sends the alarm signal to the mobile terminal, so that the mobile terminal analyzes the alarm signal.
  • FIG. 6 illustrates another alarm system provided by an embodiment of the present application.
  • the alarm system includes: a sensor 400, an alarm device 600, and a mobile terminal 500.
  • the sensor is connected to the alarm device, and the alarm device is communicatively connected to the mobile terminal.
  • the above sensors are configured to monitor information; it should be noted that although the sensors use the same reference numerals as in FIG. 4, the sensors here only have a collection module, which can collect monitoring information.
  • the above-mentioned alarm device is configured to judge whether the monitoring information satisfies an alarm condition, and when it is, generate the alarm information based on the monitoring information.
  • the alarm information may include an alarm concentration value and / or an alarm type
  • the alarm device encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal
  • a sensor type and / or an alarm type level are added to the alarm information including an alarm concentration value and / or an alarm type, and encrypted according to a byte encryption table.
  • the alarm device sends an alarm signal to the mobile terminal
  • the mobile terminal analyzes the alarm signal to obtain alarm information
  • the alarm information corresponds to at least one of a sensor type, an alarm type, an alarm type level, and a monitoring information value (alarm concentration value).
  • the mobile terminal outputs the alarm information.
  • the above-mentioned mobile terminal outputs the above-mentioned alarm information to a display device in the form of visual information (for example, text, graphics) for display, so as to facilitate the user's viewing.
  • visual information for example, text, graphics
  • the alarm system provided by the embodiment of the present application has the same technical features as the alarm method provided by the foregoing embodiment, so it can also solve the same technical problems and achieve the same technical effect.
  • any specific value should be construed as exemplary only and not as a limitation, so other examples of the exemplary embodiments may have different values.
  • each block in the flowchart or block diagram may represent a module, a program segment, or a part of code, which contains one or more components for implementing a specified logical function Executable instructions.
  • the functions labeled in the blocks may also occur in a different order than those labeled in the drawings. For example, two consecutive blocks may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagrams and / or flowcharts, and combinations of blocks in the block diagrams and / or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or action. , Or it can be implemented with a combination of dedicated hardware and computer instructions.
  • an embodiment of the present application further provides an electronic device 100 including: a processor 40, a memory 41, a bus 42, and a communication interface 43.
  • the processor 40, the communication interface 43, and the memory 41 are connected through the bus 42;
  • the processor 40 is configured to execute an executable module, such as a computer program, stored in the memory 41.
  • the memory 41 may include high-speed random access memory (RAM, Random Access Memory), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
  • RAM random access memory
  • non-volatile memory non-volatile memory
  • the communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 43 (which may be wired or wireless), and the Internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
  • the bus 42 may be an ISA bus, a PCI bus, an EISA bus, or the like.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a two-way arrow is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.
  • the memory 41 is configured to store a program 401, and the processor 40 executes the program 401 after receiving an execution instruction.
  • the method executed by the apparatus defined by the flow process disclosed in any one of the foregoing embodiments of the present application may be applied. It may be implemented in the processor 40 or implemented by the processor 40.
  • the processor 40 may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 40 or an instruction in the form of software.
  • the above processor 40 may be a general-purpose processor, including a Central Processing Unit (CPU), a Network Processor (NP), etc .; it may also be a Digital Signal Processor (DSP) ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • a software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
  • the storage medium is located in the memory 41, and the processor 40 reads the information in the memory 41 and completes the steps of the foregoing method in combination with its hardware.
  • the terms “installation”, “connected”, and “connected” should be understood in a broad sense unless otherwise specified and limited. For example, they may be fixed connections or detachable connections. , Or integrally connected; it can be mechanical or electrical; it can be directly connected, or it can be indirectly connected through an intermediate medium, and it can be the internal communication of two elements.
  • installation should be understood in a broad sense unless otherwise specified and limited. For example, they may be fixed connections or detachable connections. , Or integrally connected; it can be mechanical or electrical; it can be directly connected, or it can be indirectly connected through an intermediate medium, and it can be the internal communication of two elements.
  • the specific meanings of the above terms in this application can be understood in specific situations.
  • the computer program product for performing the alarm method provided in the embodiment of the present application includes a computer-readable storage medium storing a non-volatile program code executable by the processor, and the program code includes instructions that can be used to execute the foregoing method embodiment. For specific implementation of the method described in the method embodiment, details are not described herein.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be through some communication interfaces, indirect coupling or communication connection of the device or unit, and may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a non-volatile computer-readable storage medium executable by a processor.
  • the technical solution of the present application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes .
  • An embodiment of the present application provides an alarm method applied to a mobile terminal.
  • the method receives an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; and then the alarm signal is generated. Analyze to get alarm information. Therefore, the technical solutions provided in the embodiments of the present application can alleviate the technical problem of low safety coefficient of sensors in the prior art, and improve the security of data transmission.

Abstract

The present application relates to the field of data processing technology, and provided therein are an alarm method, apparatus and system and an electronic device, so as to solve the problem in existing technology in which factors of security present in sensors are low; the present invention may improve the security of sensor data transmission, and said method is applicable to mobile terminals, said method comprising: receiving an alarm signal sent by a sensor, the alarm signal being encrypted and generated by the sensor according to a pre-stored byte encryption table; and then analyzing the alarm signal to obtain alarm information.

Description

报警方法、装置、系统及电子设备Alarm method, device, system and electronic equipment 技术领域Technical field
本申请涉及数据处理技术领域,尤其是涉及一种报警方法、装置、系统及电子设备。The present application relates to the field of data processing technologies, and in particular, to an alarm method, device, system, and electronic device.
背景技术Background technique
人们为了从外界获取信息,必须借助于感觉器官。而单靠人们自身的感觉器官,在研究自然现象和规律以及生产生活中它们的功能就远远不够了。为适应这种情况,就需要传感器。因此可以说,传感器是人类五官的延长,又称之为电五官。In order to obtain information from the outside world, people must rely on sensory organs. But people's own sense organs are far from enough to study natural phenomena and laws and their functions in production and life. To adapt to this situation, sensors are needed. Therefore, it can be said that the sensor is an extension of human features, also known as electric features.
随着科技的不断发展,传感器的使用越来越广泛。例如将传感器可以应用于智能家居领域中,通过在智能设备中设置传感器或者直接设置传感器来监测家中的环境,例如在家中可以设置气体传感器来监视和控制室内的各个角落的气体参数,然而,在这些应用于智能家居领域的传感器为提供人们方便的同时,也存在各式各样的外来恶意入侵。其轻则可能影响家用智能设备或传感器的正常运行,重则会威胁到家庭成员的生命安全。例如传感器发送的监测数据被篡改,导致在该报警的时候未报警的问题,例如二氧化碳气体、可燃气体浓度非常高,但是没有报警,便会严重威胁家人的生命安全With the continuous development of technology, the use of sensors is becoming more and more widespread. For example, sensors can be applied in the field of smart homes, and the environment in the home can be monitored by setting sensors in smart devices or directly setting sensors. For example, gas sensors can be set at home to monitor and control gas parameters in various corners of the room. However, in the While these sensors used in the field of smart homes provide convenience to people, there are also a variety of external malicious intrusions. It may affect the normal operation of smart devices or sensors at home, and threaten the lives of family members. For example, the monitoring data sent by the sensor has been tampered with, leading to the problem that the alarm is not reported at the time of the alarm. For example, the concentration of carbon dioxide gas and flammable gas is very high, but without the alarm, it will seriously threaten the lives of family members
综上,传统的家用传感器传输数据没有经过加密,数据容易被截获篡改,即现有的传感器进行数据传输存在安全系数较低的问题。In summary, the data transmitted by traditional home sensors is not encrypted, and the data is easy to be intercepted and tampered, that is, the existing sensors have a low security factor for data transmission.
发明内容Summary of the invention
有鉴于此,本申请的目的包括,提供报警方法、装置、系统及电子设备,以至少缓解现有技术中传感器存在的安全系数低的技术问题。In view of this, the purpose of the present application includes providing an alarm method, device, system and electronic equipment to alleviate at least the technical problem of low safety factor of sensors in the prior art.
第一方面,本申请实施例提供了一种报警方法,应用于移动终端,包括:In a first aspect, an embodiment of the present application provides an alarm method, which is applied to a mobile terminal and includes:
接收传感器发送的报警信号;所述报警信号经由所述传感器按照预先存储的字节加密表加密生成的;Receiving an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table;
对所述报警信号进行解析,得到报警信息。Analyze the alarm signal to obtain alarm information.
结合第一方面,本申请实施例提供了第一方面的第一种可能的实施方式,其中,该方法还包括:With reference to the first aspect, the embodiment of the present application provides a first possible implementation manner of the first aspect, where the method further includes:
将所述报警信息输出,以便于用户查看。The alarm information is output for the convenience of the user.
结合第一方面,本申请实施例提供了第一方面的第二种可能的实施方式,其中,所述报警信息的初始状态为未处理状态,初始状态表示所述报警信息未被用户处理的状态。With reference to the first aspect, the embodiment of the present application provides a second possible implementation manner of the first aspect, wherein an initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information is not processed by a user. .
结合第一方面的第二种可能的实施方式,本申请实施例提供了第一方面的第三种可能的实施方式,其中,该方法还包括:With reference to the second possible implementation manner of the first aspect, the embodiment of the present application provides a third possible implementation manner of the first aspect, where the method further includes:
接收用户的处理反馈信息,根据所述处理反馈信息对所述报警信息进行状 态变更。Receive the user's processing feedback information, and change the status of the alarm information according to the processing feedback information.
结合第一方面,本申请实施例提供了第一方面的第四种可能的实施方式,其中,所述报警信号包括第一字节和第二字节,所述第一字节表示传感器类别;所述传感器类别为多个,每个所述传感器类别对应于所述第一字节的预设位;所述第二字节表示报警种类;所述报警种类为多个,每个所述报警种类对应于所述第二字节的预设位。With reference to the first aspect, the embodiment of the present application provides a fourth possible implementation manner of the first aspect, wherein the alarm signal includes a first byte and a second byte, and the first byte indicates a sensor type; There are multiple types of sensors, each of which corresponds to a preset bit of the first byte; the second byte indicates the type of alarm; there are multiple types of alarms, and each of the alarms The kind corresponds to a preset bit of the second byte.
结合第一方面的第四种可能的实施方式,本申请实施例提供了第一方面的第五种可能的实施方式,其中,所述报警信号还包括第三字节,所述第三字节配置成表征量化的监测信息,由移动终端解析出具体数值。With reference to the fourth possible implementation manner of the first aspect, the embodiment of the present application provides a fifth possible implementation manner of the first aspect, wherein the alarm signal further includes a third byte, and the third byte It is configured to represent quantified monitoring information, and the mobile terminal analyzes specific values.
结合第一方面的第四种可能的实施方式,本申请实施例提供了第一方面的第六种可能的实施方式,其中,所述报警种类预先划分为多个等级。With reference to the fourth possible implementation manner of the first aspect, the embodiment of the present application provides a sixth possible implementation manner of the first aspect, wherein the alarm types are divided into multiple levels in advance.
结合第一方面的第六种可能的实施方式,本申请实施例提供了第一方面的第七种可能的实施方式,其中,所述报警信号还包括第四字节,所述第四字节配置成表征每个报警种类的等级,每个等级对应于所述第四字节的预设位。With reference to the sixth possible implementation manner of the first aspect, the embodiment of the present application provides a seventh possible implementation manner of the first aspect, wherein the alarm signal further includes a fourth byte, and the fourth byte Configured to characterize a level of each alarm type, each level corresponding to a preset bit of the fourth byte.
第二方面,本申请实施例提供了一种报警方法,应用于传感器,包括:In a second aspect, an embodiment of the present application provides an alarm method, which is applied to a sensor and includes:
发送报警信号至移动终端;所述报警信号经由所述传感器按照字节加密表加密生成的;以使所述移动终端对所述报警信号进行解析,得到报警信息。Sending an alarm signal to the mobile terminal; the alarm signal is encrypted and generated by the sensor according to a byte encryption table; so that the mobile terminal parses the alarm signal to obtain alarm information.
第三方面,本申请实施例提供了一种报警装置,包括:In a third aspect, an embodiment of the present application provides an alarm device, including:
接收模块,配置成接收传感器发送的报警信号;所述报警信号经由所述传感器对报警信息按照预先存储的字节加密表加密生成的;A receiving module configured to receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table for the alarm information;
解析模块,配置成对所述报警信号进行解析,得到报警信息。The analysis module is configured to analyze the alarm signal to obtain alarm information.
结合第三方面,本申请实施例提供了第三方面的第一种可能的实施方式,其中,该装置还包括:With reference to the third aspect, the embodiment of the present application provides a first possible implementation manner of the third aspect, where the device further includes:
输出模块,配置成将所述报警信息输出,以便于用户查看。An output module is configured to output the alarm information for a user to view.
结合第三方面,本申请实施例提供了第三方面的第二种可能的实施方式,其中,所述报警信息的初始状态为未处理状态,初始状态表示所述报警信息未被用户处理的状态。With reference to the third aspect, the embodiment of the present application provides a second possible implementation manner of the third aspect, wherein an initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information is not processed by a user. .
结合第三方面的第二种可能的实施方式,本申请实施例提供了第三方面的第三种可能的实施方式,其中,该装置还包括:With reference to the second possible implementation manner of the third aspect, the embodiment of the present application provides a third possible implementation manner of the third aspect, where the device further includes:
变更模块,配置成接收用户的处理反馈信息,根据所述处理反馈信息对所述报警信息进行状态变更。The changing module is configured to receive processing feedback information of a user, and change a state of the alarm information according to the processing feedback information.
结合第三方面,本申请实施例提供了第三方面的第四种可能的实施方式,其中,该装置还包括:With reference to the third aspect, the embodiment of the present application provides a fourth possible implementation manner of the third aspect, where the device further includes:
用户管理模块,配置成接收用户的密码登录请求。The user management module is configured to receive a password login request of a user.
第四方面,本申请实施例还提供一种报警系统,包括:传感器和移动终端,所述传感器与所述移动终端通讯连接;In a fourth aspect, an embodiment of the present application further provides an alarm system, including: a sensor and a mobile terminal, where the sensor is communicatively connected to the mobile terminal;
所述传感器配置成发送报警信号至移动终端;所述报警信号经由所述传感器对报警信息按照预先存储的字节加密表加密生成的;The sensor is configured to send an alarm signal to the mobile terminal; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table for the alarm information;
所述移动终端对所述报警信号进行解析,得到报警信息。The mobile terminal parses the alarm signal to obtain alarm information.
结合第四方面,本申请实施例提供了第四方面的第一种可能的实施方式,其中,所述传感器为多个。With reference to the fourth aspect, the embodiment of the present application provides a first possible implementation manner of the fourth aspect, where there are multiple sensors.
第五方面,本申请实施例提供了一种报警方法,应用于报警装置,包括:In a fifth aspect, an embodiment of the present application provides an alarm method, which is applied to an alarm device and includes:
接收传感器发送的监测信息;Receive monitoring information sent by sensors;
判断所述监测信息是否满足报警条件;Judging whether the monitoring information satisfies an alarm condition;
当是时,基于所述监测信息生成并发送报警信号至移动终端,以使所述移 动终端对所述报警信号进行解析,得到报警信息;其中,所述报警信号经由所述报警装置按照字节加密表加密生成的。When yes, an alarm signal is generated and sent to the mobile terminal based on the monitoring information, so that the mobile terminal parses the alarm signal to obtain alarm information; wherein the alarm signal is transmitted by the alarm device according to bytes. The encryption table is generated by encryption.
第六方面,本申请实施例还提供了一种报警系统,包括:传感器、报警装置和移动终端,所述传感器与报警装置相连接,所述报警装置与移动终端通信连接;According to a sixth aspect, an embodiment of the present application further provides an alarm system, including: a sensor, an alarm device, and a mobile terminal, the sensor is connected to the alarm device, and the alarm device is communicatively connected to the mobile terminal;
所述传感器配置成监测信息;The sensor is configured to monitor information;
所述报警装置配置成判断监测信息是否满足报警条件,当是时,基于监测信息生成报警信息;The alarm device is configured to determine whether the monitoring information satisfies an alarm condition, and when yes, generates alarm information based on the monitoring information;
所述报警装置按照预存的字节加密表对所述报警信息进行加密,生成报警信号;The alarm device encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal;
所述报警装置发送报警信号至所述移动终端;The alarm device sends an alarm signal to the mobile terminal;
所述移动终端对所述报警信号进行解析,得到报警信息;Analyzing, by the mobile terminal, the alarm signal to obtain alarm information;
所述移动终端将所述报警信息输出。The mobile terminal outputs the alarm information.
第七方面,本申请实施例提供了一种电子设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述所述的报警方法的步骤。In a seventh aspect, an embodiment of the present application provides an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor. When the processor executes the computer program, Implement the steps of the alarm method described above.
第八方面,本申请实施例提供了一种具有处理器可执行的非易失的程序代码的计算机可读介质,所述程序代码使所述处理器执行上述报警方法的步骤。In an eighth aspect, an embodiment of the present application provides a computer-readable medium having a non-volatile program code executable by a processor, where the program code causes the processor to perform the steps of the foregoing alarm method.
本申请实施例带来的有益效果至少包括:The beneficial effects brought by the embodiments of the present application include at least:
本申请实施例提供了一种报警方法,应用于移动终端,该方法通过接收传感器发送的报警信号;报警信号经由传感器按照预先存储的字节加密表加密生成的;然后对报警信号进行解析,得到报警信息。因此,本申请实施例提供的技术方案,能够缓解现有技术中传感器存在的安全系数低的技术问题,提高数据传输的安全性。An embodiment of the present application provides an alarm method, which is applied to a mobile terminal. The method receives an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; and then the alarm signal is parsed to obtain Alarm information. Therefore, the technical solutions provided in the embodiments of the present application can alleviate the technical problem of low safety coefficient of sensors in the prior art, and improve the security of data transmission.
本申请的其他特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。Other features and advantages of the present application will be explained in the following description, and partly become apparent from the description, or be understood by implementing the present application. The objectives and other advantages of the present application are achieved and obtained in the structures particularly pointed out in the description, the claims, and the drawings.
为使本申请的上述目的、特征和优点能更明显易懂,下文特举较佳实施例,并配合所附附图,作详细说明如下。In order to make the above-mentioned objects, features, and advantages of this application more comprehensible, preferred embodiments are described below in conjunction with the accompanying drawings and described in detail below.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the specific implementations of the present application or the technical solutions in the prior art, the drawings used in the specific implementations or prior art descriptions will be briefly introduced below. Obviously, the appended The drawings are some implementations of the present application. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without paying creative work.
图1为本申请实施例提供的一种报警方法的流程示意图;FIG. 1 is a schematic flowchart of an alarm method according to an embodiment of the present application;
图2为本申请实施例提供的另一种报警方法的流程示意图;2 is a schematic flowchart of another alarm method according to an embodiment of the present application;
图3为本申请实施例提供的一种报警装置的示意图;3 is a schematic diagram of an alarm device according to an embodiment of the present application;
图4为本申请实施例提供的一种报警系统的示意图;4 is a schematic diagram of an alarm system according to an embodiment of the present application;
图5为本申请实施例提供的又一种报警方法的示意图;5 is a schematic diagram of still another alarm method according to an embodiment of the present application;
图6为本申请实施例提供的另一种报警系统的示意图;6 is a schematic diagram of another alarm system according to an embodiment of the present application;
图7为本申请实施例提供的一种电子设备的示意图。FIG. 7 is a schematic diagram of an electronic device according to an embodiment of the present application.
具体实施方式Detailed ways
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present application, but not all of them. Examples. Based on the embodiments in the present application, all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
目前传统的家用传感器传输数据没有经过加密,数据容易被截获篡改,现有的传感器进行数据传输存在安全系数较低的问题,基于此,本申请实施例提供的一种报警方法、装置、系统及电子设备,可以缓解现有技术中传感器存在的安全系数低的技术问题,能够提高安全系数。At present, the data transmitted by traditional household sensors is not encrypted, and the data is easily intercepted and tampered. The existing sensors have a problem of low security coefficients for data transmission. Based on this, an alarm method, device, system and The electronic device can alleviate the technical problem of low safety factor of the sensor in the prior art, and can improve the safety factor.
为便于对本实施例进行理解,首先对本申请实施例所公开的一种报警方法进行详细介绍。In order to facilitate the understanding of this embodiment, a warning method disclosed in the embodiment of the present application is first introduced in detail.
在一些实施例中:In some embodiments:
如图1所示,本申请实施例提供了一种报警方法,其可以应用于移动终端,该方法包括:As shown in FIG. 1, an embodiment of the present application provides an alarm method, which can be applied to a mobile terminal. The method includes:
步骤S101,接收传感器发送的报警信号;上述报警信号经由上述传感器按照预先存储的字节加密表加密生成的;Step S101: Receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table;
具体的,这里的字节加密表包括传感器类别加密表、报警种类加密表、报警种类的等级加密表、监测信息量化值加密表,分别对应于第一字节、第二字节、第三字节、第四字节。当然,字节加密表也可以是一个包括上述各类加密表的总表。Specifically, the byte encryption table here includes a sensor type encryption table, an alarm type encryption table, an alarm type level encryption table, and a monitoring information quantization value encryption table, corresponding to the first byte, the second byte, and the third word, respectively. Section, fourth byte. Of course, the byte encryption table can also be a total table including the above-mentioned various types of encryption tables.
上述报警信号包括第一字节和第二字节,上述第一字节表示传感器类别(八个传感器,用每位的1表示);上述传感器类别为多个,每个上述传感器类别对应于上述第一字节的预设位;且预设位的“0”、“1”分别表示该预设位的传感器的报警状态(发出警报还是未发出警报)。The above alarm signal includes a first byte and a second byte. The first byte indicates a sensor type (eight sensors, represented by 1 for each bit); there are multiple sensor types, and each of the above sensor types corresponds to the above. The preset bit of the first byte; and the "0" and "1" of the preset bit respectively indicate the alarm status of the sensor of the preset bit (alarm or no alarm).
通常,一个字节包括8位,因此第一字节可以表示8个传感器类别,每一位的“1”分别表示一种传感器发出警报,用“0”表示该传感器未发出警报。Generally, a byte includes 8 bits, so the first byte can represent 8 sensor categories, and a "1" in each bit indicates that a sensor issues an alarm, and a "0" indicates that the sensor has not issued an alarm.
为了便于理解,下面以第一字节的最后一位为例进行说明;该最后一位代表了传感器类别为二氧化碳传感器,当该最后一位(第一位至最后一位以左至右的顺序排列,字节的最后一位即是指最右边的一位,左边首位表示字节的第一位)为“1”表示二氧化碳传感器发出警报;当该最后一位为“0”表示二氧化碳传感器未发出警报;同理其他位定义了其他类别的传感器。In order to facilitate understanding, the last bit of the first byte is taken as an example for description; the last bit represents the sensor type as a carbon dioxide sensor, and when the last bit (the first to the last bit is in the order of left to right) Arrangement, the last digit of the byte refers to the rightmost digit, the first digit on the left indicates the first digit of the byte) "1" indicates that the carbon dioxide sensor issues an alarm; when the last bit is "0", the carbon dioxide sensor is not Send an alarm; similarly other bits define other categories of sensors.
需要指出的是,第一字节还可以是指示放置在预设场所的不同位置处的同一类别的传感器的位置信息。例如第一字节指示分布于家中8个不同地方(例如客厅、厨房、主卧、书房、餐厅、阳台、卫生间、次卧)的8个二氧化碳传感器的位置,此时可以用编号区分(例如“1-8”分别对应上述地方)。It should be noted that the first byte may also be location information indicating sensors of the same category placed at different positions in a preset place. For example, the first byte indicates the position of eight carbon dioxide sensors distributed in eight different places in the home (such as living room, kitchen, master bedroom, study, dining room, balcony, bathroom, second bedroom). 1-8 "respectively.
上述第二字节表示报警种类(八个种类,用每位的1表示);上述报警种类为多个,每个上述报警种类对应于上述第二字节的预设位。The second byte indicates an alarm type (eight types, represented by 1 for each bit); the above alarm types are multiple, and each of the above alarm types corresponds to a preset bit of the second byte.
同样的,第二字节包括8位,第二字节可以表示八个报警种类,用每一位的“1”分别表示,还以上面的二氧化碳传感器的例子进行说明,第二字节的最后一位的“1”表示二氧化碳浓度超标;第二字节的最后一位的“0”表示二氧化碳浓度未超标。Similarly, the second byte includes 8 bits. The second byte can represent eight alarm types, which are represented by “1” in each bit. The above example of carbon dioxide sensors is also used to explain the last byte of the second byte. A "1" in one digit indicates that the carbon dioxide concentration exceeds the standard; a "0" in the last digit of the second byte indicates that the carbon dioxide concentration does not exceed the standard.
报警信号还可以包括第三字节,上述第三字节配置成表征量化的监测信息 (例如浓度值、电量值),由移动终端解析出具体数值。The alarm signal may further include a third byte, and the third byte is configured to characterize the quantified monitoring information (such as the concentration value and the power value), and the mobile terminal analyzes the specific value.
由于一个字节包括8位,因此第三字节可以表示256个数,即从0-255,分别对应于00000000~11111111,每个数对应一个监测信息的预设量化值,Because one byte includes 8 bits, the third byte can represent 256 numbers, that is, from 0-255, which corresponds to 00000000 to 11111111, and each number corresponds to a preset quantized value of monitoring information.
继续以上面的二氧化碳传感器的例子进行说明:这里的第三字节可以表示气体浓度的字节;每一个数可以对应于一个预设浓度值,相邻两个数之间的浓度值间隔根据实际检测需求和传感器检测精度设置,本实施例中,相邻两个数之间的浓度值间隔设置为10-60之间的任意数值,例如00000000对应的预设浓度值为1000ppm(parts per million,百万分之一),00000001对应的预设浓度值为1020ppm,00000010对应的预设浓度值为1040ppm,00000011对应的预设浓度值为1060ppm,……,即相邻两个数之间的浓度值间隔设置为20ppm。需要指出的是,在设置每个数对应的预设浓度值可以参照国家标准或者国际标准或其他实验标准设置高于多少报警,例如,本实施例中参照标准如下:二氧化碳浓度值与人体生理反应:350~1000ppm:空气清新,呼吸顺畅;1000~2000ppm:感觉空气浑浊,并开始觉得昏昏欲睡;2000~5000ppm:感觉头痛、嗜睡、呆滞、注意力无法集中、心跳加速、轻度恶心;大于5000ppm:可能导致严重缺氧,造成永久性脑损伤、昏迷、甚至死亡。Continue to use the example of the carbon dioxide sensor above to explain: the third byte here can represent the byte of the gas concentration; each number can correspond to a preset concentration value, and the interval between the concentration values between two adjacent numbers is based on the actual The detection demand and sensor detection accuracy are set. In this embodiment, the interval between the concentration values of two adjacent numbers is set to any value between 10 and 60. For example, the preset concentration value corresponding to 00000000 is 1000 ppm (parts per million, One millionth), the preset concentration value corresponding to 00000001 is 1020ppm, the preset concentration value corresponding to 00000010 is 1040ppm, the preset concentration value corresponding to 00000011 is 1060ppm, ..., that is, the concentration between two adjacent numbers The value interval is set to 20 ppm. It should be noted that the preset concentration value corresponding to each number can be set by referring to national standards, international standards, or other experimental standards to set how many alarms are higher. For example, the reference standard in this embodiment is as follows: the carbon dioxide concentration value and the physiological reaction of the human body : 350 ~ 1000ppm: fresh air and smooth breathing; 1000 ~ 2000ppm: feeling turbid air and beginning to feel drowsy; 2000 ~ 5000ppm: feeling headache, drowsiness, sluggishness, inattention, rapid heartbeat, mild nausea; Above 5000ppm: May cause severe hypoxia, causing permanent brain damage, coma, and even death.
考虑到报警种类可以有多个等级表示程度,因此报警种类还可以预先划分为多个等级,报警信息还可以包括第四字节,上述第四字节配置成表征每个报警种类的等级,每个等级对应于上述第四字节的预设位。Considering that the alarm type can have multiple levels, the alarm type can be divided into multiple levels in advance. The alarm information can also include a fourth byte. The fourth byte is configured to represent the level of each alarm type. Each level corresponds to the preset bit of the fourth byte.
同样的,第四字节包括8位,这里用每一位的“1”分别表示报警等级;第四字节可以表示八个报警等级;接着以上面的二氧化碳传感器的例子进行说明,第四字节的最后一位的“1”表示二氧化碳浓度超标为一级;第四字节的第一位的“1”表示二氧化碳浓度超标为八级。Similarly, the fourth byte includes 8 bits. Here, the “1” of each bit indicates the alarm level respectively; the fourth byte can indicate eight alarm levels; then the above example of the carbon dioxide sensor is used for illustration. The fourth word The "1" in the last digit of the section indicates that the carbon dioxide concentration exceeds the level one; the "1" in the first digit of the fourth byte indicates that the carbon dioxide concentration exceeds the level eight.
步骤S102,对上述报警信号进行解析,得到报警信息。In step S102, the alarm signal is analyzed to obtain alarm information.
具体实现时,该步骤S102包括:查找字节加密表对上述报警信号进行解析,得到报警信息。这里的字节加密表与上述的字节加密表为同一个,且字节加密表预先存储在移动终端的存储器中,以方便移动终端调取查找,继而解析获得报警信息。In specific implementation, the step S102 includes: searching a byte encryption table to analyze the alarm signal to obtain alarm information. The byte encryption table here is the same as the byte encryption table described above, and the byte encryption table is stored in the memory of the mobile terminal in advance to facilitate the mobile terminal to retrieve and search, and then parse and obtain the alarm information.
以二氧化碳传感器的例子说明:当报警信号包括第一字节、第二字节、第三字节和第四字节时,报警信号通常以第一字节至第四字节排列的顺序表示为:“00000001”、“00000001”、“00000001”、“00000001”,移动终端解析的结果为:传感器类别-二氧化碳传感器警报、报警种类-浓度超标、浓度值-1020ppm、报警种类等级-一级(浓度超标);该结果即为报警信息。Take the carbon dioxide sensor as an example: When the alarm signal includes the first byte, the second byte, the third byte, and the fourth byte, the alarm signal is usually expressed in the order of the first byte to the fourth byte as : "00000001", "00000001", "00000001", "00000001". The analysis result of the mobile terminal is: sensor type-carbon dioxide sensor alarm, alarm type-concentration over standard, concentration value-1020ppm, alarm type level-first level (concentration Exceeded); the result is an alarm message.
以二氧化碳传感器的例子说明:当报警信号包括第一字节、第二字节、第三字节和第四字节时,报警信号通常以第一字节至第四字节排列的顺序表示为:“00000001”、“00000001”、“00000001”、“00000001”,移动终端解析的结果为:传感器类别-二氧化碳传感器警报、报警种类-浓度超标、浓度值-1020ppm、报警种类等级-一级(浓度超标);该结果即为报警信息。Take the carbon dioxide sensor as an example: When the alarm signal includes the first byte, the second byte, the third byte, and the fourth byte, the alarm signal is usually expressed in the order of the first byte to the fourth byte as : "00000001", "00000001", "00000001", "00000001". The analysis result of the mobile terminal is: sensor type-carbon dioxide sensor alarm, alarm type-concentration over standard, concentration value-1020ppm, alarm type level-first level (concentration Exceeded); the result is an alarm message.
本申请实施例提供了一种报警方法,应用于移动终端,该方法通过接收传感器发送的报警信号;报警信号经由传感器按照预先存储的字节加密表加密生成的;然后对报警信号进行解析,得到报警信息。因此,本申请实施例提供的技术方案,能够缓解现有技术中传感器存在的安全系数低的技术问题,提高数据传输的安全性。An embodiment of the present application provides an alarm method, which is applied to a mobile terminal. The method receives an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; and then the alarm signal is parsed to obtain Alarm information. Therefore, the technical solutions provided in the embodiments of the present application can alleviate the technical problem of low safety coefficient of sensors in the prior art, and improve the security of data transmission.
参照图2,本申请实施例提供了另一种报警方法,该方法还包括:Referring to FIG. 2, an embodiment of the present application provides another alarm method. The method further includes:
步骤S201,将上述报警信息输出,以便于用户查看。In step S201, the above-mentioned alarm information is output for the convenience of the user to check.
具体实现时,该步骤S201可以通过以下方式之一实现:In specific implementation, step S201 may be implemented in one of the following ways:
方式一、将上述报警信息以语音的形式输出;Method 1: output the above alarm information in the form of voice;
方式二、将上述报警信息输出至可视化界面,这里的可视化界面可以是移动终端的显示屏,也可以是与移动终端相连接的显示装置,例如可以是包括投影仪和投影屏幕的投影装置,此时可以报警信息通过投影仪投影至投影屏幕上;具体的,这里的报警信息以可视化的形式显示在可视化界面上,例如报警信息以文字、图表等形式显示。Method 2: The above alarm information is output to a visual interface. The visual interface here may be a display screen of a mobile terminal or a display device connected to the mobile terminal. For example, it may be a projection device including a projector and a projection screen. The alarm information can be projected on the projection screen through the projector; specifically, the alarm information here is displayed on the visual interface in a visual form, for example, the alarm information is displayed in the form of text, charts, and the like.
进一步的,报警信息的初始状态为未处理状态,初始状态表示该报警信息未被用户处理的状态。Further, the initial state of the alarm information is an unprocessed state, and the initial state indicates a state where the alarm information has not been processed by the user.
具体的,报警信息以预设的标记形式标记为未处理状态,例如当报警信息为语音信息时,将上述语音信息的上方设置未读标记(例如星号“※”,当然也可以为星号添加颜色标识,更加醒目)来标识上述语音信息未未处理状态;当报警信息为可视化信息时,将上述报警信息以预设的颜色(例如红色)标记文字或者图表以标识上述可视化信息的未处理状态。Specifically, the alarm information is marked as unprocessed in a preset mark form. For example, when the alarm information is a voice message, an unread mark (such as an asterisk "*") may be set above the voice message. Add color identification (more eye-catching) to identify the unprocessed state of the voice information; when the alarm information is visual information, mark the alarm information with a preset color (such as red) text or a chart to identify the unprocessed visual information status.
进一步的,该方法还包括:Further, the method further includes:
步骤S202,接收用户的处理反馈信息,根据上述处理反馈信息对上述报警信息进行状态变更。Step S202: Receive processing feedback information of the user, and change the status of the alarm information according to the processing feedback information.
具体的,用户可以对未处理的报警信息进行处理,生成处理反馈信息至移动终端,移动终端接收该处理反馈信息,根据该处理反馈信息对上述报警信息进行状态变更,将报警信息由未处理状态变更为处理状态;例如,当报警信息为语音信息时,用户点击未读的语音信息进行处理,生成处理反馈信息,移动终端根据接收到的该处理反馈信息将语音信息的未处理状态变更为处理状态(例如可以将星号“※”变更为圆形“O”,当星号有颜色标识时,同时变更颜色);当报警信息为可视化信息时,例如文字,用户需要点击文字或者阅读文字进行处理生成处理反馈信息,移动终端根据接收到的处理反馈信息将文字的未处理状态变更为处理状态(例如,将文字由红色变为绿色)。Specifically, the user can process the unprocessed alarm information, generate processing feedback information to the mobile terminal, and the mobile terminal receives the processing feedback information, changes the status of the above-mentioned alarm information according to the processing feedback information, and changes the alarm information from the unprocessed state. Change to the processing state; for example, when the alarm information is voice information, the user clicks on the unread voice information for processing to generate processing feedback information, and the mobile terminal changes the unprocessed state of the voice information to processing according to the received processing feedback information Status (for example, you can change the asterisk "*" to a circle "O", and change the color when the asterisk has a color mark); when the alarm message is a visual message, such as a text, the user needs to click on the text or read the text. The processing generates processing feedback information, and the mobile terminal changes the unprocessed state of the text to the processing state (for example, changes the text from red to green) according to the received processing feedback information.
需要指出的是,在上述根据上述处理反馈信息对上述报警信息进行状态变更之前,该方法还包括:判断用户是否完整地获取报警信息(即移动终端会进行内容完整性判断),具体移动终端可以通过监听用户是否收听完语音信息,例如通过播放时长与发送的报警信息的预设时长进行比较,当时长一致是,判定完整地获取报警信息,然后才会根据该处理反馈信息进行状态变更;否则判定为未完整地获取报警信息,发出提示用户重新处理(即再次收听语音信息);或者,移动终端监听用户是否阅读完文字信息内容来识别,例如通过话筒接收文字阅读信息的语音信息与进行语音识别后生成的文字信息进行相似度值比对,当相似度值大于预设阈值时,判定完整地获取报警信息,否则,发出提示信息提示用户重新处理(即再次阅读文字信息)。It should be noted that before the above-mentioned alarm information is changed in status according to the processing feedback information, the method further includes: judging whether the user has completely acquired the alarm information (that is, the mobile terminal will perform content integrity judgment). The specific mobile terminal may By monitoring whether the user has finished listening to the voice message, for example, by comparing the playback duration with the preset duration of the sent alarm information, if the duration is consistent, it is determined that the alarm information is completely obtained, and then the status is changed according to the processing feedback information; otherwise It is determined that the alarm information is not completely obtained, and the user is prompted to re-process (that is, to listen to the voice message again); or the mobile terminal monitors whether the user has read the text message to identify, for example, the microphone receives the voice message of the text reading message and performs the voice The text information generated after recognition is compared with the similarity value. When the similarity value is greater than a preset threshold, it is determined that the alarm information is completely obtained; otherwise, a prompt message is issued to prompt the user to reprocess (that is, read the text information again).
此外,本申请实施例提供了第三种报警方法,该报警方法应用于传感器,包括:发送报警信号至移动终端;上述报警信号经由上述传感器对报警信息按照预先存储的字节加密表加密生成的;以使上述移动终端对上述报警信号进行解析,得到报警信息。这里的报警信息是对报警信息加密生成的,且报警信息是指满足报警条件时的监测信息。In addition, a third alarm method is provided in an embodiment of the present application. The alarm method is applied to a sensor and includes: sending an alarm signal to a mobile terminal; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table. To enable the mobile terminal to analyze the alarm signal to obtain alarm information. The alarm information here is generated by encrypting the alarm information, and the alarm information refers to the monitoring information when the alarm conditions are met.
可选的在一部分实施例中:Optional In some embodiments:
如图3所示,本申请实施例提供了一种报警装置,其包括:As shown in FIG. 3, an embodiment of the present application provides an alarm device, including:
接收模块301,可以配置成接收传感器发送的报警信号;上述报警信号经 由上述传感器对报警信息按照预先存储的字节加密表加密生成的;即上述报警信号是以字节的形式表示的;The receiving module 301 may be configured to receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; that is, the alarm signal is expressed in the form of bytes;
解析模块302,配置成对上述报警信号进行解析,得到报警信息。The analysis module 302 is configured to analyze the alarm signal to obtain alarm information.
进一步的,该装置还包括:输出模块303,配置成将上述报警信息输出,以便于用户查看。Further, the device further includes: an output module 303 configured to output the above-mentioned alarm information for the convenience of a user to view.
进一步的,上述报警信息的初始状态为未处理状态,初始状态表示上述报警信息未被用户处理的状态。Further, the initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information is not processed by a user.
进一步的,该装置还包括:变更模块304,配置成接收用户的处理反馈信息,根据上述处理反馈信息对上述报警信息进行状态变更。Further, the device further includes: a change module 304 configured to receive processing feedback information of the user, and change the status of the alarm information according to the processing feedback information.
进一步的,该装置还包括:用户管理模块305,配置成接收用户的密码登录请求。Further, the device further includes a user management module 305 configured to receive a password login request of the user.
当用户登录成功后,用户才能查看报警信息以及对报警信息进行状态变更。After the user logs in successfully, the user can view the alarm information and change the status of the alarm information.
这里的用户管理包括可视化界面(例如显示屏)。The user management here includes a visual interface (such as a display screen).
在有些实施例中:In some embodiments:
图4示出了本申请实施例提供的一种报警系统的示意图,具体的,该系统包括:传感器400和移动终端500,上述传感器与上述移动终端通讯连接;FIG. 4 shows a schematic diagram of an alarm system according to an embodiment of the present application. Specifically, the system includes: a sensor 400 and a mobile terminal 500, where the sensor is communicatively connected with the mobile terminal;
其中,上述传感器配置成发送报警信号至移动终端;上述报警信号经由上述传感器对报警信息按照预先存储的字节加密表加密生成的;Wherein, the sensor is configured to send an alarm signal to the mobile terminal; the alarm signal is generated by encrypting the alarm information according to a pre-stored byte encryption table through the sensor;
上述移动终端对上述报警信号进行解析,得到报警信息。The mobile terminal analyzes the alarm signal to obtain alarm information.
具体的,传感器包括无线通信模块、采集模块、存储模块和处理模块,无线通信模块、采集模块、存储模块分别与处理模块相连接;存储模块配置成存储字节加密表;采集模块配置成实时采集监测信息(包括浓度值、电量值等);处理模块配置成接收监测信息,并判断监测信息是否满足报警条件,当满足报警条件时,生成报警信息;然后对报警信息按照预先存储的字节加密表进行加密生成报警信号;无线通信模块配置成与移动终端通信,例如发送报警信号至移动终端。Specifically, the sensor includes a wireless communication module, an acquisition module, a storage module, and a processing module. The wireless communication module, the acquisition module, and the storage module are respectively connected to the processing module; the storage module is configured to store a byte encryption table; and the acquisition module is configured to acquire in real time. Monitoring information (including concentration value, power value, etc.); the processing module is configured to receive the monitoring information and determine whether the monitoring information meets the alarm conditions, and when the alarm conditions are met, generate the alarm information; and then encrypt the alarm information according to the pre-stored bytes The table is encrypted to generate an alarm signal; the wireless communication module is configured to communicate with the mobile terminal, such as sending an alarm signal to the mobile terminal.
进一步的,传感器为多个,能够采集不同的监测信息;例如传感器可以是二氧化碳传感器,配置成检测二氧化碳(采集二氧化碳信息,例如二氧化碳浓度);也可以是可燃气体传感器,例如氢气传感器,配置成检测可燃气体(采集可燃气体信息,例如可燃气体浓度值);还可以是甲醛传感器,配置成检测甲醛(采集甲醛信息,例如甲醛浓度)。Further, there are multiple sensors capable of collecting different monitoring information; for example, the sensor may be a carbon dioxide sensor configured to detect carbon dioxide (collecting carbon dioxide information such as carbon dioxide concentration); or a combustible gas sensor such as a hydrogen sensor configured to detect Combustible gas (collecting combustible gas information, such as the concentration value of combustible gas); it may also be a formaldehyde sensor configured to detect formaldehyde (collecting formaldehyde information, such as the concentration of formaldehyde).
下面结合具体应用场景对上述报警系统进行简要描述:The following briefly describes the above alarm system in combination with specific application scenarios:
家中可以放置有多个传感器,例如检测可燃气体、检测二氧化碳、检测甲醛等的传感器。Multiple sensors can be placed in the home, such as sensors that detect flammable gases, carbon dioxide, and formaldehyde.
当某个或多个传感器检测到某一气体浓度超标时,向移动终端的APP(应用程序)发送报警信号,在本方案中,报警信号包括至少两个字节,其中一个字节表示传感器类别,例如,传感器类别为二氧化碳传感器;另一个字节表示报警种类;其中,一个字节包括8位,每一位可定义为一个种类,例如浓度超标报警、电量不足报警、检测装置损坏报警等When one or more sensors detect that a certain gas concentration exceeds the standard, an alarm signal is sent to the APP (application program) of the mobile terminal. In this solution, the alarm signal includes at least two bytes, one of which indicates the sensor type For example, the sensor type is a carbon dioxide sensor; the other byte indicates the type of alarm; of which, one byte includes 8 bits, and each bit can be defined as a type, such as an alarm for excessive concentration, an alarm for insufficient battery power, and an alarm for damage to the detection device.
此外,报警种类分等级设置,例如,浓度超标报警分级别表示,即包括一级浓度超标、二级浓度超标等,同样的电量不足报警(电量小于30为一级电量不足,小于25为二级电量不足…,电量信息可以通过电量管理模块采集)、检测装置损坏报警也可以分级(完整度小于90%为一级损坏,完整度小于85% 为二级损坏…,完整度信息可以通过图像采集装置采集的图像进行图像识别分析,并与预存的初始传感器的图像信息对比获取)表示,由于在报警种类的字节中,每一位代表一种报警种类,即实质上是对每一位种类进行划分,同样的报警种类的级别的字节中,每一位代表一种报警种类等级,即实质上是对每一位报警种类预划分等级。In addition, the alarm types are set in different levels, for example, the concentration over alarm alarm is indicated in different levels, that is, it includes the first level concentration exceeding the standard and the second level concentration exceeding the standard. Insufficient power ..., power information can be collected through the power management module), detection device damage alarm can also be graded (completeness less than 90% is first-level damage, completeness less than 85% is second-level damage ..., completeness information can be collected through images The image collected by the device is subjected to image recognition analysis, and compared with the pre-stored image information of the initial sensor.) It is indicated that in the byte of the alarm type, each bit represents an alarm type, that is, essentially every bit type Divided, in the byte of the same alarm type level, each bit represents a type of alarm type, which is essentially a pre-classification of each alarm type.
当然,在传输的数据中,也可包含其它字节,例如,气体浓度的字节、电量剩余量的字节,由于一个字节可表示256个数(0-255),所以能通过一个字节表示出具体的量值,然后由APP解析出数据。Of course, other bytes can also be included in the transmitted data, for example, bytes of gas concentration and bytes of remaining electricity. Since a byte can represent 256 numbers (0-255), it can pass a word The section shows the specific value, and then the data is parsed by the APP.
通过传感器发送的数据(即报警信号)传输至APP,APP再对数据进行解析,生成报警信息并输出至可视化界面,即可使用户能够直观的看到报警信息(传感器类别、报警种类、浓度信息以及报警等级等)。The data sent by the sensor (that is, the alarm signal) is transmitted to the APP, and the APP analyzes the data to generate alarm information and output it to the visual interface, so that the user can intuitively see the alarm information (sensor type, alarm type, concentration information) And alarm levels, etc.).
本申请实施例提供的报警装置、报警系统,与上述实施例提供的报警方法具有相同的技术特征,所以也能解决相同的技术问题,达到相同的技术效果。The alarm device and the alarm system provided in the embodiments of the present application have the same technical features as the alarm method provided in the above embodiments, so they can also solve the same technical problems and achieve the same technical effects.
本申请实施例所提供的装置、系统,其实现原理及产生的技术效果和前述方法实施例相同,为简要描述,装置、系统实施例部分未提及之处,可参考前述方法实施例中相应内容。The implementation principles and technical effects of the devices and systems provided in the embodiments of the present application are the same as those of the foregoing method embodiments. For a brief description, the parts of the device and system embodiments are not mentioned. For details, refer to the corresponding method embodiments. content.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统和装置的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of the description, the specific working processes of the systems and devices described above may refer to the corresponding processes in the foregoing method embodiments, and are not repeated here.
在某些实施例中:In some embodiments:
如图5所示,本申请实施例提供了一种报警方法,可以应用于报警装置,包括:As shown in FIG. 5, an embodiment of the present application provides an alarm method, which can be applied to an alarm device, including:
步骤S501,接收传感器发送的监测信息;Step S501, receiving monitoring information sent by a sensor;
步骤S502,判断上述监测信息是否满足报警条件;Step S502: determine whether the monitoring information meets an alarm condition;
这里的报警条件是指监测信息的数值是否大于预设阈值或者小于预设阈值,例如,当监测信息是气体(诸如二氧化碳、可燃气体、甲醛等)浓度信息时,则判断气体浓度值(即监测信息的数值)是否大于气体浓度的预设阈值;当大于预设阈值时,则满足报警条件;当监测信息是电量信息时,则判断电量值(即监测信息的数值)是否小于电量的预设阈值;当小于预设阈值时,则满足报警条件,同样的,适用于其他监测信息,例如温度、湿度等。The alarm condition here refers to whether the value of the monitoring information is greater than a preset threshold or less than a preset threshold. For example, when the monitoring information is gas (such as carbon dioxide, flammable gas, formaldehyde, etc.) concentration information, the gas concentration value (that is, monitoring Whether the value of the information) is greater than the preset threshold of the gas concentration; when it is greater than the preset threshold, the alarm condition is satisfied; when the monitoring information is the power information, it is judged whether the power value (that is, the value of the monitoring information) is less than the preset power Threshold value; when it is less than the preset threshold value, the alarm condition is satisfied, and the same applies to other monitoring information, such as temperature and humidity.
当是时,执行步骤S503;当否时,返回步骤S501继续监测;When yes, execute step S503; when not, return to step S501 to continue monitoring;
步骤S503,基于上述监测信息生成并发送报警信号至移动终端,以使上述移动终端对上述报警信号进行解析,得到报警信息。Step S503: Generate and send an alarm signal to the mobile terminal based on the monitoring information, so that the mobile terminal analyzes the alarm signal to obtain alarm information.
其中,上述报警信号经由上述报警装置按照字节加密表加密生成的。The alarm signal is encrypted and generated by the alarm device according to a byte encryption table.
具体的,报警装置基于上述监测信息生成报警信息,然后对报警信息按照预先存储的字节加密表进行加密生成报警信号,发送报警信号至移动终端,以使上述移动终端对上述报警信号进行解析,得到报警信息;Specifically, the alarm device generates alarm information based on the monitoring information, and then encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal, and sends the alarm signal to the mobile terminal, so that the mobile terminal analyzes the alarm signal. Get alarm information;
图6示出了本申请实施例提供的另一种报警系统,该报警系统包括:传感器400、报警装置600和移动终端500,上述传感器与报警装置相连接,上述报警装置与移动终端通信连接;FIG. 6 illustrates another alarm system provided by an embodiment of the present application. The alarm system includes: a sensor 400, an alarm device 600, and a mobile terminal 500. The sensor is connected to the alarm device, and the alarm device is communicatively connected to the mobile terminal.
上述传感器配置成监测信息;需要指出的是,虽然传感器与图4采用同样的标号,但是此处的传感器仅具有采集模块,能够实现采集监测信息即可。The above sensors are configured to monitor information; it should be noted that although the sensors use the same reference numerals as in FIG. 4, the sensors here only have a collection module, which can collect monitoring information.
上述报警装置配置成判断监测信息是否满足报警条件,当是时,基于监测 信息生成报警信息。The above-mentioned alarm device is configured to judge whether the monitoring information satisfies an alarm condition, and when it is, generate the alarm information based on the monitoring information.
其中,当传感器为气体传感器时,此处的报警信息可以包括报警浓度值和/或报警种类;When the sensor is a gas sensor, the alarm information here may include an alarm concentration value and / or an alarm type;
上述报警装置按照预存的字节加密表对上述报警信息进行加密,生成报警信号;The alarm device encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal;
具体的,当传感器为气体传感器时,在包括报警浓度值和/或报警种类的报警信息中加入传感器种类和/或报警种类等级,并根据字节加密表表进行加密。Specifically, when the sensor is a gas sensor, a sensor type and / or an alarm type level are added to the alarm information including an alarm concentration value and / or an alarm type, and encrypted according to a byte encryption table.
上述报警装置发送报警信号至上述移动终端;The alarm device sends an alarm signal to the mobile terminal;
上述移动终端对上述报警信号进行解析,得到报警信息;The mobile terminal analyzes the alarm signal to obtain alarm information;
即报警信息对应的包括传感器种类、报警种类、报警种类等级、监测信息数值(报警浓度值)的至少一种。That is, the alarm information corresponds to at least one of a sensor type, an alarm type, an alarm type level, and a monitoring information value (alarm concentration value).
上述移动终端将上述报警信息输出。The mobile terminal outputs the alarm information.
具体的,上述移动终端将上述报警信息以可视化信息(例如文字、图表)的形式输出至显示装置进行显示,以方便用户查看。Specifically, the above-mentioned mobile terminal outputs the above-mentioned alarm information to a display device in the form of visual information (for example, text, graphics) for display, so as to facilitate the user's viewing.
本申请实施例提供的报警系统,与上述实施例提供的报警方法具有相同的技术特征,所以也能解决相同的技术问题,达到相同的技术效果。The alarm system provided by the embodiment of the present application has the same technical features as the alarm method provided by the foregoing embodiment, so it can also solve the same technical problems and achieve the same technical effect.
本申请实施例所提供的系统,其实现原理及产生的技术效果和前述方法实施例相同,为简要描述,系统实施例部分未提及之处,可参考前述方法实施例中相应内容。The implementation principle and technical effects of the system provided in the embodiments of the present application are the same as the foregoing method embodiments. For a brief description, the parts that are not mentioned in the system embodiments may refer to the corresponding content in the foregoing method embodiments.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统和装置的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of the description, the specific working processes of the systems and devices described above may refer to the corresponding processes in the foregoing method embodiments, and are not repeated here.
在这里示出和描述的所有示例中,任何具体值应被解释为仅仅是示例性的,而不是作为限制,因此,示例性实施例的其他示例可以具有不同的值。In all the examples shown and described herein, any specific value should be construed as exemplary only and not as a limitation, so other examples of the exemplary embodiments may have different values.
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。It should be noted that similar reference numerals and letters indicate similar items in the following drawings, so once an item is defined in one drawing, it need not be further defined and explained in subsequent drawings.
附图中的流程图和框图显示了根据本申请的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagram may represent a module, a program segment, or a part of code, which contains one or more components for implementing a specified logical function Executable instructions. It should also be noted that in some alternative implementations, the functions labeled in the blocks may also occur in a different order than those labeled in the drawings. For example, two consecutive blocks may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved. It should also be noted that each block in the block diagrams and / or flowcharts, and combinations of blocks in the block diagrams and / or flowcharts, can be implemented in a dedicated hardware-based system that performs the specified function or action. , Or it can be implemented with a combination of dedicated hardware and computer instructions.
参见图7,本申请实施例还提供一种电子设备100,包括:处理器40,存储器41,总线42和通信接口43,所述处理器40、通信接口43和存储器41通过总线42连接;处理器40配置成执行存储器41中存储的可执行模块,例如计算机程序。Referring to FIG. 7, an embodiment of the present application further provides an electronic device 100 including: a processor 40, a memory 41, a bus 42, and a communication interface 43. The processor 40, the communication interface 43, and the memory 41 are connected through the bus 42; The processor 40 is configured to execute an executable module, such as a computer program, stored in the memory 41.
其中,存储器41可能包含高速随机存取存储器(RAM,Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。通过至少一个通信接口43(可以是有线或者无线)实现该 系统网元与至少一个其他网元之间的通信连接,可以使用互联网,广域网,本地网,城域网等。The memory 41 may include high-speed random access memory (RAM, Random Access Memory), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 43 (which may be wired or wireless), and the Internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
总线42可以是ISA总线、PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图7中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。The bus 42 may be an ISA bus, a PCI bus, an EISA bus, or the like. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only a two-way arrow is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.
其中,存储器41配置成存储程序401,所述处理器40在接收到执行指令后,执行所述程序401,前述本申请实施例任一实施例揭示的流过程定义的装置所执行的方法可以应用于处理器40中,或者由处理器40实现。The memory 41 is configured to store a program 401, and the processor 40 executes the program 401 after receiving an execution instruction. The method executed by the apparatus defined by the flow process disclosed in any one of the foregoing embodiments of the present application may be applied. It may be implemented in the processor 40 or implemented by the processor 40.
处理器40可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器40中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器40可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(Digital Signal Processing,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现成可编程门阵列(Field-Programmable Gate Array,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器41,处理器40读取存储器41中的信息,结合其硬件完成上述方法的步骤。The processor 40 may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 40 or an instruction in the form of software. The above processor 40 may be a general-purpose processor, including a Central Processing Unit (CPU), a Network Processor (NP), etc .; it may also be a Digital Signal Processor (DSP) ), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. Various methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed. A general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor. A software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like. The storage medium is located in the memory 41, and the processor 40 reads the information in the memory 41 and completes the steps of the foregoing method in combination with its hardware.
另外,在本申请实施例的描述中,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。In addition, in the description of the embodiments of the present application, the terms "installation", "connected", and "connected" should be understood in a broad sense unless otherwise specified and limited. For example, they may be fixed connections or detachable connections. , Or integrally connected; it can be mechanical or electrical; it can be directly connected, or it can be indirectly connected through an intermediate medium, and it can be the internal communication of two elements. For those of ordinary skill in the art, the specific meanings of the above terms in this application can be understood in specific situations.
在本申请的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。In the description of this application, it should be noted that the terms "center", "upper", "down", "left", "right", "vertical", "horizontal", "inside", "outside", etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing this application and simplified description, and does not indicate or imply that the device or element referred to must have a specific orientation, a specific orientation Construction and operation are therefore not to be construed as limitations on the present application. In addition, the terms "first," "second," and "third" are used for descriptive purposes only, and should not be construed to indicate or imply relative importance.
本申请实施例所提供的进行报警方法的计算机程序产品,包括存储了处理器可执行的非易失的程序代码的计算机可读存储介质,所述程序代码包括的指令可用于执行前面方法实施例中所述的方法,具体实现可参见方法实施例,在此不再赘述。The computer program product for performing the alarm method provided in the embodiment of the present application includes a computer-readable storage medium storing a non-volatile program code executable by the processor, and the program code includes instructions that can be used to execute the foregoing method embodiment. For specific implementation of the method described in the method embodiment, details are not described herein.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices, and units described above can refer to the corresponding processes in the foregoing method embodiments, and are not repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划 分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. The device embodiments described above are only schematic. For example, the division of the units is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be through some communication interfaces, indirect coupling or communication connection of the device or unit, and may be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个处理器可执行的非易失的计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a non-volatile computer-readable storage medium executable by a processor. Based on this understanding, the technical solution of the present application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. The foregoing storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes .
最后应说明的是:以上所述实施例,仅为本申请的具体实施方式,用以说明本申请的技术方案,而非对其限制,本申请的保护范围并不局限于此,尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本申请实施例技术方案的精神和范围,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。Finally, it should be noted that the above-mentioned embodiments are only specific implementations of the present application, and are used to describe the technical solutions of the present application, rather than limiting the scope of protection of the present application. The embodiments describe this application in detail. Those of ordinary skill in the art should understand that anyone skilled in the art can still modify the technical solutions described in the foregoing embodiments within the technical scope disclosed in this application. Or you can easily think of changes, or equivalent replacements of some of the technical features; and these modifications, changes, or replacements do not deviate the essence of the corresponding technical solution from the spirit and scope of the technical solutions of the embodiments of the present application, and should be covered in this application Within the scope of protection. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.
工业实用性:本申请实施例提供了一种报警方法,应用于移动终端,该方法通过接收传感器发送的报警信号;报警信号经由传感器按照预先存储的字节加密表加密生成的;然后对报警信号进行解析,得到报警信息。因此,本申请实施例提供的技术方案,能够缓解现有技术中传感器存在的安全系数低的技术问题,提高数据传输的安全性。Industrial applicability: An embodiment of the present application provides an alarm method applied to a mobile terminal. The method receives an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table; and then the alarm signal is generated. Analyze to get alarm information. Therefore, the technical solutions provided in the embodiments of the present application can alleviate the technical problem of low safety coefficient of sensors in the prior art, and improve the security of data transmission.

Claims (20)

  1. 一种报警方法,其特征在于,应用于移动终端,包括:An alarm method, which is characterized in that it is applied to a mobile terminal and includes:
    接收传感器发送的报警信号;所述报警信号经由所述传感器按照预先存储的字节加密表加密生成的;Receiving an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table;
    对所述报警信号进行解析,得到报警信息。Analyze the alarm signal to obtain alarm information.
  2. 根据权利要求1所述的方法,其特征在于,还包括:将所述报警信息输出,以便于用户查看。The method according to claim 1, further comprising: outputting the alarm information for easy viewing by a user.
  3. 根据权利要求1所述的方法,其特征在于,所述报警信息的初始状态为未处理状态,初始状态表示所述报警信息未被用户处理的状态。The method according to claim 1, wherein an initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information has not been processed by a user.
  4. 根据权利要求3所述的方法,其特征在于,还包括:The method according to claim 3, further comprising:
    接收用户的处理反馈信息,根据所述处理反馈信息对所述报警信息进行状态变更。Receiving processing feedback information of a user, and performing state change on the alarm information according to the processing feedback information.
  5. 根据权利要求1所述的方法,其特征在于,所述报警信号包括第一字节和第二字节,所述第一字节表示传感器类别;所述传感器类别为多个,每个所述传感器类别对应于所述第一字节的预设位;所述第二字节表示报警种类;所述报警种类为多个,每个所述报警种类对应于所述第二字节的预设位。The method according to claim 1, wherein the alarm signal includes a first byte and a second byte, and the first byte indicates a sensor type; the sensor type is multiple, and each of the The sensor type corresponds to the preset bit of the first byte; the second byte indicates the alarm type; the alarm type is multiple, and each of the alarm types corresponds to the preset of the second byte Bit.
  6. 根据权利要求5所述的方法,其特征在于,所述报警信号还包括第三字节,所述第三字节配置成表征量化的监测信息,由移动终端解析出具体数值。The method according to claim 5, wherein the alarm signal further comprises a third byte, and the third byte is configured to represent quantified monitoring information, and the mobile terminal parses out a specific value.
  7. 根据权利要求5所述的方法,其特征在于,所述报警种类预先划分为多个等级。The method according to claim 5, wherein the types of alarms are divided into multiple levels in advance.
  8. 根据权利要求7所述的方法,其特征在于,所述报警信号还包括第四字节,所述第四字节配置成表征每个报警种类的等级,每个等级对应于所述第四字节的预设位。The method according to claim 7, wherein the alarm signal further comprises a fourth byte, the fourth byte is configured to represent a level of each alarm type, and each level corresponds to the fourth word The preset position of the section.
  9. 一种报警方法,其特征在于,应用于传感器,包括:An alarm method, characterized in that it is applied to sensors and includes:
    发送报警信号至移动终端;所述报警信号经由所述传感器按照字节加密表加密生成的;以使所述移动终端对所述报警信号进行解析,得到报警信息。Sending an alarm signal to the mobile terminal; the alarm signal is encrypted and generated by the sensor according to a byte encryption table; so that the mobile terminal parses the alarm signal to obtain alarm information.
  10. 一种报警装置,其特征在于,包括:An alarm device, comprising:
    接收模块,配置成接收传感器发送的报警信号;所述报警信号经由所述传感器对报警信息按照预先存储的字节加密表加密生成的;A receiving module configured to receive an alarm signal sent by a sensor; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table for the alarm information;
    解析模块,配置成对所述报警信号进行解析,得到报警信息。The analysis module is configured to analyze the alarm signal to obtain alarm information.
  11. 根据权利要求10所述的装置,其特征在于,还包括:The apparatus according to claim 10, further comprising:
    输出模块,配置成将所述报警信息输出,以便于用户查看。An output module is configured to output the alarm information for a user to view.
  12. 根据权利要求10所述的装置,其特征在于,所述报警信息的初始状态为未处理状态,初始状态表示所述报警信息未被用户处理的状态。The device according to claim 10, wherein an initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information has not been processed by a user.
  13. 根据权利要求12所述的装置,其特征在于,还包括:The apparatus according to claim 12, further comprising:
    变更模块,配置成接收用户的处理反馈信息,根据所述处理反馈信息对所述报警信息进行状态变更。The changing module is configured to receive processing feedback information of a user, and change a state of the alarm information according to the processing feedback information.
  14. 根据权利要求10所述的装置,其特征在于,还包括:The apparatus according to claim 10, further comprising:
    用户管理模块,配置成接收用户的密码登录请求。The user management module is configured to receive a password login request of a user.
  15. 一种报警系统,其特征在于,包括:传感器和移动终端,所述传感器与所述移动终端通讯连接;An alarm system, comprising: a sensor and a mobile terminal, wherein the sensor is communicatively connected with the mobile terminal;
    所述传感器配置成发送报警信号至移动终端;所述报警信号经由所述传感器对报警信息按照预先存储的字节加密表加密生成的;The sensor is configured to send an alarm signal to the mobile terminal; the alarm signal is encrypted and generated by the sensor according to a pre-stored byte encryption table for the alarm information;
    所述移动终端对所述报警信号进行解析,得到报警信息。The mobile terminal parses the alarm signal to obtain alarm information.
  16. 根据权利要求15所述的报警系统,其特征在于,所述传感器为多个。The alarm system according to claim 15, wherein there are a plurality of sensors.
  17. 一种报警方法,其特征在于,应用于报警装置,包括:An alarm method, which is characterized in that it is applied to an alarm device and includes:
    接收传感器发送的监测信息;Receive monitoring information sent by sensors;
    判断所述监测信息是否满足报警条件;Judging whether the monitoring information satisfies an alarm condition;
    当是时,基于所述监测信息生成并发送报警信号至移动终端,以使所述移动终端对所述报警信号进行解析,得到报警信息;其中,所述报警信号经由所述报警装置按照字节加密表加密生成的。When yes, an alarm signal is generated and sent to the mobile terminal based on the monitoring information, so that the mobile terminal parses the alarm signal to obtain alarm information; wherein the alarm signal is transmitted by the alarm device according to bytes. The encryption table is generated by encryption.
  18. 一种报警系统,其特征在于,包括:传感器、报警装置和移动终端,所述传感器与报警装置相连接,所述报警装置与移动终端通信连接;An alarm system, comprising: a sensor, an alarm device, and a mobile terminal, the sensor is connected to the alarm device, and the alarm device is communicatively connected to the mobile terminal;
    所述传感器配置成监测信息;The sensor is configured to monitor information;
    所述报警装置配置成判断监测信息是否满足报警条件,当是时,基于监测信息生成报警信息;The alarm device is configured to determine whether the monitoring information satisfies an alarm condition, and when yes, generates alarm information based on the monitoring information;
    所述报警装置按照预存的字节加密表对所述报警信息进行加密,生成报警信号;The alarm device encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal;
    所述报警装置发送报警信号至所述移动终端;The alarm device sends an alarm signal to the mobile terminal;
    所述移动终端对所述报警信号进行解析,得到报警信息;Analyzing, by the mobile terminal, the alarm signal to obtain alarm information;
    所述移动终端将所述报警信息输出。The mobile terminal outputs the alarm information.
  19. 一种电子设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现上述权利要求1至9、17任一项所述的方法的步骤。An electronic device includes a memory, a processor, and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the foregoing claims 1 to 1 when the computer program is executed. Steps of the method of any of 9, 17.
  20. 一种具有处理器可执行的非易失的程序代码的计算机可读介质,其特征在于,所述程序代码使所述处理器执行所述权利要求1至9、17任一所述方法。A computer-readable medium having a processor-executable non-volatile program code, wherein the program code causes the processor to perform the method according to any one of claims 1 to 9, and 17.
PCT/CN2018/089205 2018-05-31 2018-05-31 Alarm method, apparatus and system, and electronic device WO2019227374A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/089205 WO2019227374A1 (en) 2018-05-31 2018-05-31 Alarm method, apparatus and system, and electronic device
CN201880000643.2A CN108701401B (en) 2018-05-31 2018-05-31 Alarm method, device and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/089205 WO2019227374A1 (en) 2018-05-31 2018-05-31 Alarm method, apparatus and system, and electronic device

Publications (1)

Publication Number Publication Date
WO2019227374A1 true WO2019227374A1 (en) 2019-12-05

Family

ID=63841477

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/089205 WO2019227374A1 (en) 2018-05-31 2018-05-31 Alarm method, apparatus and system, and electronic device

Country Status (2)

Country Link
CN (1) CN108701401B (en)
WO (1) WO2019227374A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111899482B (en) * 2020-07-01 2022-04-26 山西太钢工程技术有限公司 Alarm method and device
CN112148103A (en) * 2020-09-09 2020-12-29 北京中电华大电子设计有限责任公司 Circuit for protecting power supply attack implemented from PAD

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060022819A1 (en) * 2004-07-27 2006-02-02 Nicola Vincent Granny Device and implementation method for citizen notification in well defined geographic regions of homeland security and/or civil defense warnings, alerts and desired protective actions
CN2828961Y (en) * 2005-10-26 2006-10-18 羊贵祥 Networking alarm system using special communication form
CN102368345A (en) * 2010-06-28 2012-03-07 东芝电梯株式会社 Elevator remote monitoring system
CN205121847U (en) * 2015-04-08 2016-03-30 鹰潭嘉坤云计算科技有限公司 Monitor terminal of fire alarm information

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007156779A (en) * 2005-12-05 2007-06-21 Hitachi Ltd Sensor network system, base station and relay method for sensing data
CN102355529B (en) * 2011-09-29 2014-09-10 汉王科技股份有限公司 Method for unified display of short message and mail and device and mobile terminal
CN102413180B (en) * 2011-11-15 2014-08-06 河海大学 Wireless sensor network for monitoring irrigation area and communication protocol of wireless sensor network
CN102797501B (en) * 2012-08-07 2015-03-18 哈尔滨东方报警设备开发有限公司 Wireless portable gas detection alarm control method
CN104022938A (en) * 2013-02-28 2014-09-03 腾讯科技(深圳)有限公司 Message synchronization method, system, server and client end
CN104219370B (en) * 2013-05-30 2017-08-22 腾讯科技(深圳)有限公司 Carry out the method and mobile terminal of short message reading process
CN106100969A (en) * 2016-05-30 2016-11-09 北京三快在线科技有限公司 A kind of do not read the based reminding method of session, device and terminal unit
CN106330687B (en) * 2016-10-17 2019-09-13 腾讯科技(深圳)有限公司 Message treatment method, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060022819A1 (en) * 2004-07-27 2006-02-02 Nicola Vincent Granny Device and implementation method for citizen notification in well defined geographic regions of homeland security and/or civil defense warnings, alerts and desired protective actions
CN2828961Y (en) * 2005-10-26 2006-10-18 羊贵祥 Networking alarm system using special communication form
CN102368345A (en) * 2010-06-28 2012-03-07 东芝电梯株式会社 Elevator remote monitoring system
CN205121847U (en) * 2015-04-08 2016-03-30 鹰潭嘉坤云计算科技有限公司 Monitor terminal of fire alarm information

Also Published As

Publication number Publication date
CN108701401A (en) 2018-10-23
CN108701401B (en) 2021-01-15

Similar Documents

Publication Publication Date Title
WO2022062775A1 (en) Monitoring processing method and system based on vehicle terminal system, and related device
CN107426022A (en) Security incident monitoring method and device, electronic equipment, storage medium
WO2019227374A1 (en) Alarm method, apparatus and system, and electronic device
JP2017538229A (en) Perceptual memory for neuro-language behavior recognition system
WO2018111355A1 (en) Content-level anomaly detection for heterogeneous logs
CN112749058A (en) Fault alarm equipment for computer
CN113050445A (en) Voice control system for smart home
CN104808775A (en) Device and method for judging effectiveness of authentication information of head-wearing intelligent equipment
CN116307674A (en) Security supervision method, device, system, equipment, medium and product
CN106713604B (en) Information security prompting method and system
US20190087905A1 (en) Remote processing of anomalous property sensor data
CN108898807A (en) Concealed alarm method, apparatus, terminal and storage medium
CN204129807U (en) A kind of disadvantaged group visual remote supervisory system
CN109856999A (en) Determine the method and system whether status information relevant to equipment is executed is tampered
US20220270464A1 (en) Healthy indoor environment and air quality monitoring system and method for accessing and sharing information, publicly
CN108831105A (en) A kind of taxi driver's energy conservation personal safety analysis alarm method and system
CN112905408A (en) Server for electric power operation and maintenance network safety monitoring and early warning system
CN113254287A (en) Health state self-checking method, device, equipment and computer readable medium
CN112910657A (en) Cloud security token early warning system
CN112134723A (en) Network anomaly monitoring method and device, computer equipment and storage medium
CN112073477A (en) Data storage and calibration method for cold chain online temperature and humidity monitor
WO2016095190A1 (en) Anti-theft method and device
CN205121541U (en) But remote alarm and spare embedded system encrypt spare still original mounting
TWI823657B (en) Monitoring system and monitoring method for abnormal behavior of user equipment
WO2018157354A1 (en) Smoke alarming robot and operation method therefor

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18921182

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18921182

Country of ref document: EP

Kind code of ref document: A1