WO2023109780A1 - 设备监控方法及电子设备 - Google Patents

设备监控方法及电子设备 Download PDF

Info

Publication number
WO2023109780A1
WO2023109780A1 PCT/CN2022/138511 CN2022138511W WO2023109780A1 WO 2023109780 A1 WO2023109780 A1 WO 2023109780A1 CN 2022138511 W CN2022138511 W CN 2022138511W WO 2023109780 A1 WO2023109780 A1 WO 2023109780A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
electronic device
monitoring
server
electronic
Prior art date
Application number
PCT/CN2022/138511
Other languages
English (en)
French (fr)
Inventor
赖聪
李昌竹
麦睿楷
张乐乐
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023109780A1 publication Critical patent/WO2023109780A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B6/00Tactile signalling systems, e.g. personal calling systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a device monitoring method and electronic devices.
  • an embodiment of the present application provides a device monitoring method, which is applied to a server.
  • the device monitoring method includes: receiving first information of a first electronic device, wherein the first mode of the first electronic device has been turned on and uses the first The account information logs into the server, the first information includes the status information of the first device, and the second information of the second electronic device is received, wherein the first mode of the second electronic device has been turned on and the first account information is used to log in to the server, and the second information includes the second 2.
  • the first device state information is the device state information of the first electronic device
  • the second device state information is the device state information of the second electronic device.
  • the device state information is the information of the use state of the electronic device, or the information of the working state (including the working state or the standby state).
  • the device state information includes: whether to wear it, and/or whether to lock the screen. For a wearable device, its device state information includes whether it is worn, and for an electronic device with a display screen, its device state information includes whether its screen is locked.
  • two or more electronic devices use the same account information (for example, first account information) to log in to the server, that is, the device owners of the two or more electronic devices are the same user.
  • the server selects the monitoring device from multiple electronic devices logged in with the same account information and whose first mode has been turned on.
  • the server selects the electronic device with the highest priority among the first electronic device and the second electronic device as the monitoring device according to the first priority and the second priority. Specifically, according to the first device status information and the second device status information, the server selects the electronic device that can promptly and effectively deliver the electronic device alarm information to the user as the monitoring device, thereby improving the user experience of device monitoring. For example, if the first priority is the first level and the second priority is the second level, then the first electronic device corresponding to the first level with the highest priority among the first priority and the second priority is taken as Monitoring equipment. If the first priority is the third level and the second priority is the second level, the second electronic device corresponding to the second highest priority among the first priority and the second priority is used as the monitoring device.
  • the electronic devices that are not the same as the device owner of the monitoring device are determined as irrelevant devices, and then among the electronic devices logged into the server except the irrelevant devices, the electronic devices other than the irrelevant devices are determined as being blocked.
  • Monitoring equipment The server summarizes the device identifiers of the monitored devices, and sends the device identifiers of the monitored devices to the monitoring device, so that the monitoring device can obtain more comprehensive device identifiers of the monitored devices.
  • the device monitoring method further includes: monitoring the first device status information and the second device status information, and when the first device status information and/or the second device status information change, according to the current first device status information and the status information of the second device to determine whether to reselect the monitoring device.
  • the first device status information and/or the second device status information change that is, the first device status information changes, the second device status information changes, or the first device status information and the second device status information change.
  • the server monitors the device status information of the two electronic devices, and the server may report to the two electronic devices according to a preset time interval.
  • the device requests its device status information, or when the device status information of the electronic device (the first electronic device and/or the second electronic device) changes, the electronic device proactively reports its changed device status information to the server. That is, after the server selects a monitoring device from M electronic devices, the server monitors the device status information of the M electronic devices, and M is greater than or equal to 1. For example, after the server selects a monitoring device from one electronic device, the server Device status information of the electronic device is monitored. Or after the server selects the monitoring device from the three electronic devices, the server obtains the device status information of the three electronic devices.
  • the server can also monitor whether there is a new electronic device (such as the fifth electronic device) using the same account information as the monitoring device (such as the first account information) to log in and The first mode is enabled. If it is detected that a new electronic device is logged in with the same account information as the monitoring device and the first mode is enabled, the server needs to determine whether to re-select the monitoring device to ensure that the current login with the same account information And among the plurality of electronic devices whose first mode has been turned on, the device that can deliver the alarm information of the electronic device to the user most timely and effectively is the monitoring device.
  • a new electronic device such as the fifth electronic device
  • the server needs to determine whether to re-select the monitoring device to ensure that the current login with the same account information And among the plurality of electronic devices whose first mode has been turned on, the device that can deliver the alarm information of the electronic device to the user most timely and effectively is the monitoring device.
  • determining whether to re-select the monitoring device includes: judging whether the priority of the currently selected monitoring device is the highest, if so, not re-selecting the monitoring device, and if not, re-selecting the monitoring device.
  • the device with the highest priority is the device that can deliver the alarm information of the electronic device to the user in the most timely and effective manner.
  • an embodiment of the present application provides a device monitoring method, which is applied to a first electronic device with a first mode, and the device monitoring method includes: receiving a first operation, wherein the first operation is used to input first account information, In response to the first operation, use the first account information to log in to the server, and when it is detected that the first mode is turned on, send the first information to the server, the first information includes the first device status information, and receive the first instruction information from the server, wherein the first The indication information is used to indicate whether the first electronic device is a monitoring device, wherein the first indication information is at least determined according to the status information of the first device.
  • the first indication information is at least determined based on the first device status information, that is, the first indication information is determined at least based on the device status information of the first electronic device, and the first indication information may also be determined by the server based on multiple electronic The device status information of the device is determined.
  • the monitored device information further includes second connected device information of the second electronic device, wherein the second connected device information includes an identifier of a fourth electronic device, and the fourth electronic device is communicatively connected to the second electronic device.
  • the device monitoring method further includes: when a change in the first mode or a change in the first device state information is detected, sending the changed first mode or the changed first device state information to the server.
  • the surrounding device information is obtained based on the first wireless communication protocol, and when the surrounding device information includes the identifier of the fourth electronic device, the identity of the fourth electronic device is determined. Identifying the signal strength of the corresponding first signal, wherein the first signal is based on the first wireless communication protocol, judging whether the signal strength is lower than a preset threshold, and if lower than the preset threshold, displaying a first warning message.
  • the first signal is a Bluetooth paging signal.
  • the second connected device information further includes the trust value of the fourth electronic device
  • the preset threshold includes a first preset threshold and a second preset threshold for signal strength.
  • the device monitoring method further includes: judging whether the current environment is a safe environment or a non-safe environment according to the trust value of the fourth electronic device, determining the first preset threshold when the environment is a safe environment, and determining a first preset threshold when the environment is a non-safe environment environment, determining a second preset threshold, wherein the first preset threshold is smaller than the second preset threshold.
  • the monitoring device before the monitoring device judges whether the signal strength is lower than the preset threshold, the monitoring device first acquires the preset threshold.
  • the preset thresholds include a default preset threshold, a first preset threshold and a second preset threshold.
  • the monitoring device can obtain the preset threshold value corresponding to the current environment according to the current environment. If the current environment is a normal environment, the preset threshold value is the default preset threshold value. If the current environment is a safe environment, the preset threshold value is the first. A preset threshold, if the current environment is an unsafe environment, then the preset threshold is the second preset threshold.
  • the preset threshold includes a threshold for signal strength and a threshold for distance, that is, the preset threshold may be a threshold for judging signal strength or a threshold for judging distance. If the preset threshold is the threshold for signal strength, the default preset threshold is the default strength threshold in the embodiment of the present application, the first preset threshold is the first strength threshold in the embodiment of the present application, and the second preset threshold is For the second intensity threshold in this embodiment of the present application, the first intensity threshold is smaller than the second intensity threshold.
  • the default preset threshold is the default distance threshold in the embodiment of the application
  • the first preset threshold is the first distance threshold in the embodiment of the application
  • the second preset threshold is the default distance threshold in the embodiment of the application.
  • the first distance threshold is greater than the second distance threshold.
  • the embodiment of the present application provides a device monitoring method, which is applied to a device monitoring system.
  • the device monitoring system includes a server, a first electronic device and a second electronic device with a first mode, and the first electronic device receives the first operation , wherein the first operation is used to input the first account information, the first electronic device uses the first account information to log in to the server in response to the first operation, and the second electronic device receives the second operation, wherein the second operation is used to input the first account information information, the second electronic device uses the first account information to log in to the server in response to the second operation, and when the first electronic device detects that the first mode is enabled, it sends the first information to the server, the first information includes the first device status information, the second When the second electronic device detects that the first mode is on, it sends the second information to the server, the second information includes the second device state information, the server determines the monitoring device according to the first device state information and the second device state information, and the server sends the first electronic device The device sends the first
  • the device monitoring system is the network in the embodiment of the present application, such as the network 100 .
  • the device monitoring system further includes a third electronic device, the first electronic device is communicatively connected to the third electronic device, the first information further includes: first connected device information, the first connected device information includes the information of the third electronic device logo.
  • the device monitoring method further includes: the server determines the corresponding first priority according to the first device state information, determines the corresponding second priority according to the second device state information, and compares the first priority and the second priority The device corresponding to the higher priority among the two priorities is used as the monitoring device.
  • the device monitoring system further includes a fourth electronic device, and the fourth electronic device is communicatively connected to the second electronic device, and the second information further includes: second connected device information, and the second connected device information includes the information of the fourth electronic device logo.
  • the device monitoring method further includes: when the server determines that the first electronic device is a monitoring device, the server sends monitored device information to the first electronic device, wherein the monitored device information includes an identifier of the second electronic device.
  • the monitored device information further includes an identifier of the fourth electronic device.
  • the device state information includes: whether to wear it, and/or whether to lock the screen.
  • the first electronic device when the first indication information indicates that the first electronic device is a monitoring device, the first electronic device obtains the surrounding device information based on the first wireless communication protocol; when the surrounding device information includes the identifier of the fourth electronic device, the first The electronic device determines the signal strength of the first signal corresponding to the identity of the fourth electronic device, where the first signal is based on the first wireless communication protocol, and the first electronic device judges whether the signal strength is lower than a preset threshold, and if it is lower than the preset threshold, The first electronic device displays first warning information.
  • the first signal is a Bluetooth paging signal.
  • the second connected device information further includes a trust value of the fourth electronic device
  • the preset threshold includes a first preset threshold and a second preset threshold.
  • the server determines whether the current environment is a safe environment or a non-safe environment according to the trust value of the fourth electronic device, and when the environment is a safe environment, determine a first preset threshold, and when the environment is a non-safe environment, determine a second preset threshold, wherein , the first preset threshold is smaller than the second preset threshold.
  • the device monitoring method further includes: when the second electronic device detects a change in the information of the second connected device, sending the changed second connected device information to the server, and the server sends the changed second connected device information sent to the first electronic device.
  • the device monitoring method further includes: the server monitors the first device state information and the second device state information, and when the first device state information and the second device state information change, the server and the status information of the second device to determine whether to reselect the monitoring device.
  • the device monitoring system further includes a fifth electronic device
  • the device monitoring method further includes: the server detects that the first mode of the fifth electronic device has been turned on, and receives the third information of the fifth electronic device, wherein the fifth electronic device The device uses the first account information to log in to the server, the third information includes the third device status information, and the server determines whether to reselect the monitoring device according to the first device status information, the second device status information and the third device status information.
  • determining whether to re-select the monitoring device includes: the server judges whether the priority of the currently selected monitoring device is the highest, if so, then does not re-select the monitoring device, if not, the server re-selects the monitoring device .
  • the embodiment of the present application provides a device monitoring method, which is applied to a device monitoring system.
  • the device monitoring system includes a first electronic device and a second electronic device, and the first electronic device is connected to the second electronic device in communication, wherein the first electronic device The anti-lost mode of an electronic device and a second electronic device has been turned on and both use the first account information to log in.
  • the method includes: the first electronic device obtains the device status information of the second electronic device, and the first electronic device obtains the device status information of the second electronic device according to the first electronic device and The device status information of the second electronic device, select the first target device with the highest priority as the monitoring device from the first electronic device and the second electronic device, and the first electronic device notifies the second electronic device that the first target device is the monitoring device .
  • the second electronic device receives the device status information of the first electronic device, and the second electronic device receives the device status information from the first electronic device and the second electronic device according to the device status information of the first electronic device and the second electronic device.
  • the first target device with the highest priority is selected as the monitoring device, and the second electronic device notifies the first electronic device that the first target device is the monitoring device.
  • the device monitoring system further includes a third electronic device.
  • the third electronic device receives the device status information of the first electronic device and the second electronic device, and the first electronic device determines according to the device status information of the first electronic device, the second electronic device and the third electronic device Whether to reselect the monitoring device; the second electronic device determines whether to reselect the monitoring device according to the device status information of the first electronic device, the second electronic device and the third electronic device; the third electronic device determines whether to reselect the monitoring device according to the first electronic device, the second electronic device The device status information of the second electronic device and the third electronic device determines whether to reselect the monitoring device.
  • the third electronic device when the first electronic device is a monitoring device, the third electronic device sends the second connected device information to the first electronic device, the second connected device information includes the identification of the fourth electronic device, and the fourth electronic device communicates Connect a third electronic device.
  • the third electronic device when the first electronic device is a monitoring device, when the second connected device information of the third electronic device changes, the third electronic device sends the changed second connected device information to the first electronic device.
  • the method further includes: when the first electronic device detects a change in its first mode or a change in device status information, sending the changed first electronic device to one or more of the second electronic device and the third electronic device. A mode or changed device status information.
  • the second electronic device detects a change in its first mode or a change in device state information, it sends the changed first mode or changed device state information to one or more of the first electronic device and the third electronic device .
  • the third electronic device detects a change in its first mode or a change in device state information, it sends the changed first mode or changed device state information to one or more of the second electronic device and the first electronic device .
  • determining whether to reselect the monitoring device includes: the first electronic device, the second electronic device, and the third electronic device determine whether the priority of the first target device is the highest, and if so, do not reselect the monitoring device , if not, select the second target device with the highest priority as the monitoring device.
  • the embodiment of the present application provides an electronic device, including: a memory for storing a computer program; a processor for executing the computer program stored in the memory, and when the computer program is executed, the processor is used for executing any of the above A device monitoring method.
  • the embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium includes computer instructions, and when the computer instructions are run on the electronic device, the electronic device is made to execute any one of the device monitoring methods above.
  • the embodiment of the present application provides a computer program product, the computer program product includes computer program code, and when the computer program code is executed by a computer, the computer program code can cause the computer to execute any one of the above device monitoring methods.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an anti-lost mode enabled according to an embodiment of the present application.
  • Fig. 3 is a schematic flow chart of a method for an election monitoring device provided in an embodiment of the present application.
  • 4(a) to 4(b) are schematic diagrams of the login interface provided by the embodiment of the present application.
  • FIG. 5 is a schematic diagram of another application scenario provided by the embodiment of the present application.
  • Fig. 6 is a schematic flowchart of another campaign monitoring device method provided by the embodiment of the present application.
  • Fig. 7(a) is a schematic diagram of a first list display provided by the embodiment of the present application.
  • Fig. 7(b) is a schematic diagram of another first list display provided by the embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a method for monitoring a monitoring device provided in an embodiment of the present application.
  • FIG. 9 is a location distance topology diagram provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of an alarm interface provided by an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • a plurality referred to in this application refers to two or more than two.
  • words such as “first” and “second” are only used for the purpose of distinguishing descriptions, and cannot be understood as indicating or implying relative importance, nor can they be understood as indicating or imply order.
  • the embodiment of the present application provides a device monitoring method and related devices.
  • a monitoring device not limited to mobile phones to monitor monitored devices, flexible device monitoring is realized.
  • the electronic device that can promptly and effectively deliver the electronic device alarm information to the user is selected as the monitoring device, so as to improve the user experience of anti-lost detection.
  • Real-time monitoring of equipment status information of electronic equipment when the electronic equipment currently selected as monitoring equipment cannot deliver electronic equipment alarm information to users in a timely and effective manner, re-select monitoring equipment to ensure the reliability of monitoring equipment, so as to achieve stability and reliability monitoring.
  • device information of each electronic device can be obtained in a timely, reliable and more complete manner.
  • the monitoring device can obtain the device information of each monitored device from the first list, and the monitoring device can monitor each monitored device based on the device information of the monitored device, not limited to the above One-to-one monitoring of the monitored device by mobile phone monitoring.
  • the monitoring equipment obtains the monitoring information of the monitored equipment (such as equipment location, distance, and drop status changes, etc.), and detects the relative distance between the monitored equipment and the monitoring equipment in real time according to the monitoring information, as well as the status of the monitored equipment. Threshold output alarm information to remind users that the monitored equipment is in an unsafe state.
  • the monitoring information of the monitored equipment such as equipment location, distance, and drop status changes, etc.
  • the electronic device may include a handheld device, a vehicle-mounted device, a wearable device, a computing device or other processing devices connected to a wireless modem.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • Fig. 1 only provides an illustration of one embodiment, but does not imply any limitation on the application scenarios in which different embodiments may be implemented.
  • the numbers and device types of the watch 20 , mobile phone 30 , tablet 40 and earphone 50 in FIG. 1 are only illustrative examples.
  • the number of electronic devices can be any other number, and the device types can be other device types.
  • network 100 includes server 10 , watch 20 , cell phone 30 , tablet 40 and headset 50 .
  • the watch 20 , mobile phone 30 , and tablet 40 use the first account information to log in to the server 10 , and the watch 20 , mobile phone 30 , and tablet 40 communicate with the server 10 .
  • the communication connection between watch 20, mobile phone 30 or tablet 40 and server 10 can be a wireless connection, such as a wireless local area network (Wireless Local Area Network, WLAN) connection.
  • the tablet 40 is communicatively connected with the earphone 50 .
  • the communication connection between the mobile phone 30 and the earphone 50 may be a wireless connection, such as a Bluetooth connection.
  • the server 10 may be a cloud server or a local server, and the server 10 may be a server or a server cluster including multiple servers.
  • the account number refers to the credential used by the electronic device to log in to the server 10 .
  • the same account can be logged in simultaneously on two or more electronic devices (such as watches 20 , mobile phones 30 , and tablets 40 ) managed by the server 10 .
  • the server 10 can manage multiple accounts.
  • the account information includes at least an account number, and the account information may also include a password corresponding to the account number.
  • the first account information includes a first account and a password corresponding to the first account. Each account information corresponds to a user.
  • the first account may be a Huawei account or an account of another device manufacturer.
  • the server 10 may be a device manufacturer's server, for example, may be a Huawei server or other device manufacturer's server, which is not specifically limited in this embodiment of the present application.
  • the watch 20, the mobile phone 30, and the tablet 40 are electronic devices with an anti-lost mode.
  • the electronic device with the anti-lost mode turned on can compete with other electronic devices with the anti-lost mode turned on as the monitoring device. For example, if the watch 20 is selected by the server 10 as the monitoring device, the monitoring device can monitor the mobile phone 30 and the tablet 40 .
  • the earphone 50 is an electronic device without an anti-lost mode, and an electronic device without an anti-lost mode cannot participate in election as a monitoring device or cannot be selected as a monitoring device.
  • the anti-lost mode can be implemented as a function of the electronic device, or as a sub-function of the application, such as a sub-function of the "find device” application on the mobile phone 30, which is not specifically limited in this application.
  • the electronic device with anti-lost mode enabling the anti-lost mode may include but not limited to the following possible implementations:
  • Method 1 Electronic devices with an anti-lost mode enable the anti-lost mode by default.
  • Method 2 The user turns on the anti-lost mode of the electronic device.
  • an "anti-lost mode" switch is set on the setting interface of the mobile phone 30 as an example.
  • the user can also turn on the anti-lost mode of other electronic devices.
  • Way 3 The electronic device turns on its anti-lost mode in response to the information that the anti-lost mode of other electronic devices with the same login account has been turned on.
  • the user turns on the anti-lost mode of the watch 20 and the mobile phone 30, and makes the watch 20, the mobile phone 30, and the tablet 40 log in to the server 10 with the first account information.
  • the server 10 detects that the anti-lost mode of the wristwatch 20 and mobile phone 30 with the first account information is turned on, and the server 10 starts the synchronization parameter setting function, and transmits to the tablet 40 that the anti-lost mode of the wristwatch 20 and mobile phone 30 logged in with the first account information has been activated. open information. Tablet 40 turns on its anti-lost mode in response to the message.
  • the electronic device with the anti-lost mode can store and maintain a list of device information.
  • the device information list of an electronic device records connected device information, that is, records device information of other electronic devices that are communicatively connected to it.
  • the mobile phone 30 communicates with the earphone 50, and the mobile phone 30 can request its device information from the earphone 50, or the mobile phone 30 receives the device information sent by the earphone 50, and the connected device information recorded in the device information list of the mobile phone 30 includes the information of the earphone 50.
  • Device Information is provided by the earphone 50, and the mobile phone 30 can request its device information from the earphone 50, or the mobile phone 30 receives the device information sent by the earphone 50, and the connected device information recorded in the device information list of the mobile phone 30 includes the information of the earphone 50.
  • the connected device information of the electronic device may also include the device information of other electronic devices that the electronic device has been connected to in the past, that is, the device information list of the electronic device may also record the device information of the electronic device that has been connected in the past, This application does not specifically limit it.
  • the above anti-lost mode status information refers to the status information of the anti-lost mode of the electronic device, and the status information of the anti-lost mode includes whether the anti-lost mode is enabled or disabled. If the anti-lost mode of the electronic device is turned on, the anti-lost mode status information is that the anti-lost mode is turned on, and if the anti-lost mode of the electronic device is turned off, the anti-lost mode status information is that the anti-lost mode is not turned on.
  • the device state information of the electronic device may be understood as information on the use state of the electronic device.
  • its device state information may include a wearing state and a non-wearing state.
  • the wearing state means that the wearable device is worn (worn) on the human body
  • the non-wearing state means that the wearable device is not worn (worn) on the human body.
  • its device status information may include a locked screen status or an unlocked screen status, wherein the locked screen status refers to a status in which the screen of the electronic device is locked, and wherein the unlocked screen status refers to a status in which the screen of the electronic device is not locked. locked state.
  • the method for a wearable device to obtain its device status information is illustrated below by way of example.
  • a priority list may be preset.
  • the priority list includes device status information of electronic devices and corresponding priorities. Exemplarily, the priority list is shown in Table 1. If the wearable device is worn (worn) on the human body, the wearable device worn (worn) on the human body is the first level. If the electronic device with a display screen is in an unlocked state, the electronic device with a display screen in an unlocked state is at the second level. If the electronic device with a display screen is in a locked screen state, then the electronic device with a display screen in a locked screen state is at the third level. The wearable device is not worn (worn) on the human body, and the wearable device not worn (worn) on the human body is the fourth level. The order of priority from high to low is level 1 to level 4.
  • the wearable device when setting the priority list, first enumerate the device status information that can be used to determine the association between the electronic device and the user, and then set the corresponding priority according to the degree of association between the electronic device and the user. For example, when setting the above Table 1, the wearable device is worn (worn) on the human body, it can be considered that it has the highest degree of relevance to the user, and the setting priority is the first level.
  • Step 31 the watch 20 , the mobile phone 30 , and the tablet 40 all send a login request to the server 10 , wherein the login request carries a login account number and password.
  • Step 32 the server 10 verifies the login account and password.
  • the server 10 After receiving the first account information of the watch 20, mobile phone 30, and tablet 40, the server 10 obtains the first account "HUAWEI-01" and password "HUAWEI111" in the login request, and verifies the accounts of the watch 20, mobile phone 30, and tablet 40 respectively. The legitimacy of the first account number and password carried in the sent login request.
  • step 34 the server 10 acquires the device status information and connected device information of the electronic device whose anti-lost mode has been turned on.
  • the server 10 may allow the electronic device to access data corresponding to the electronic device stored on the server 10.
  • the server 10 configures a storage space for the watch 20
  • the server 10 may allow the watch 20 to access the storage space configured for the watch 20 on the server 10 .
  • the watch 20 can also send the data in its memory (such as device status information, device information list, pictures, video, audio, etc.) to the server 10, and then the server 10 will save the received data in the storage space configured for the watch 20 middle.
  • the server 10 configures a storage space for an account, and different accounts correspond to different storage spaces. When the watch 20 uses the first account to log in to the server 10, the watch 20 can store data in the storage space configured for the first account by the server 10, or access the storage space configured for the first account.
  • an electronic device when an electronic device logs in to the server 10, it may carry its device information (such as a device identifier), or the server 10 requests the electronic device for its corresponding device information after the electronic device successfully logs in, so as to follow up on these electronic devices.
  • Devices are managed.
  • the server 10 can identify the electronic devices successfully logged into the server 10 through different device identifiers.
  • Server 10 stores priority list (such as Table 1), and server 10 determines that the first priority of watch 20 is the first level according to the device status information of priority list and watch 20, mobile phone 30, determines the second priority of mobile phone 30 For the second level, the server 10 selects the watch 20 with the highest priority among the watch 20 and the mobile phone 30 that have logged in the same account information and the anti-lost mode has been turned on as the monitoring device.
  • priority list such as Table 1
  • server 10 determines that the first priority of watch 20 is the first level according to the device status information of priority list and watch 20, mobile phone 30, determines the second priority of mobile phone 30
  • the server 10 selects the watch 20 with the highest priority among the watch 20 and the mobile phone 30 that have logged in the same account information and the anti-lost mode has been turned on as the monitoring device.
  • the server 10 may also notify all electronic devices (including electronic devices whose anti-lost mode is turned on or not turned on) using the first account information to log in that the monitoring device is a watch 20, that is, the server 10 notifies the watch 20, the mobile phone 30 and The monitoring device of the tablet 40 is the watch 20 .
  • the server 10 may also obtain the device information of the electronic device whose anti-lost mode has been turned on, and list the obtained device information And the device information is summarized to obtain the first list.
  • the server 10 summarizes the device information of the watch 20 and the mobile phone 30 and a first list obtained from the device information list.
  • the server 10 summarizes the device information of the watch 20, the mobile phone 30 and the tablet 40 and the device information list of the mobile phone 30 to obtain the first list , that is, the first list includes the device information of the watch 20 , the mobile phone 30 and the tablet 40 and the connected device information of the mobile phone 30 (device information of the earphone 50 ).
  • the server 10 may store for each account a first list corresponding to the account.
  • the server 10 stores the first list in the storage space configured for the account.
  • the server 10 stores the above-mentioned first list (that is, Table 2) in the storage space corresponding to the first account HUAWEI-01.
  • the anti-lost mode of a new electronic device D has been turned on, and the new electronic device D sends its device status information and connected device information C to the server 10, and the server 10 responds to receiving the device status information of the new electronic device , according to the device status information of the electronic device currently meeting the first condition, it is determined whether a monitoring device needs to be selected again.
  • the server 10 updates the first list according to the connected device information C, and transmits the updated first list to the currently determined monitoring device. For example, in response to receiving the device state information of the new electronic device D, the server 10 determines to reselect the monitoring device according to the device state information of the electronic device currently meeting the first condition, and the selected monitoring device is the new electronic device D.
  • the server 10 updates the first list according to the connected device information C, and transmits the updated first list to the currently determined monitoring device (new electronic device D).
  • the server 10 determines whether the monitoring device needs to be reselected may include judging whether the priority of the currently selected monitoring device is the highest; if so, not reselecting the monitoring device; monitoring equipment. For example, the priority of the watch 20 becomes the fourth level, and the priority of the mobile phone 30 is the second level, then the priority of the currently selected monitoring device watch 20 is not the highest, then the mobile phone 30 with the highest current priority is selected. for monitoring equipment.
  • FIG. 6 is a schematic flowchart of another campaign monitoring device method provided by the embodiment of the present application. It should be understood that FIG. 6 shows the steps or operations of the campaign monitoring device method, but these steps or operations are only examples, and other operations or variations of the operations in FIG. 6 may also be performed in the embodiment of the present application.
  • the campaign monitoring device method includes the steps of:
  • the watch 20 , the mobile phone 30 and the tablet 40 transmit their respective anti-lost mode status information to each other.
  • the watch 20 requests the mobile phone 30 for the anti-lost mode status information of the mobile phone 30, or the watch 20 receives the information sent by the mobile phone 30 that the anti-lost mode of the mobile phone 30 has been turned on.
  • the mobile phone 30 and the earphone 50 transmit respective state information of the anti-lost mode to each other.
  • the mobile phone 30 requests the earphone 50 anti-lost mode status information to the earphone 50, or the mobile phone 30 receives the information that the earphone 50 anti-lost mode sent by the earphone 50 is not turned on. Wherein, the earphone 50 does not have an anti-lost mode, and the state information of the anti-lost mode of the earphone 50 indicates that the anti-lost mode is not enabled.
  • the electronic devices whose anti-lost mode has been turned on include the watch 20 and the mobile phone 30 , and the watch 20 and the mobile phone 30 transmit their respective device status information to each other.
  • Step 63 the electronic device whose anti-lost mode has been turned on selects the monitoring device according to the device status information.
  • Step 64 the electronic devices whose anti-lost mode has been turned on notify each other that the watch 20 is a monitoring device.
  • the monitoring device watch 20 acquires the device information and connected device information of the mobile phone 30, such as the watch 20 requests its device information and connected device information from the mobile phone 30, or after determining that the monitoring device is the watch 20, the mobile phone 30 sends a request to the mobile phone 30
  • the watch 20 transmits its device information and connected device information.
  • the monitoring device watch 20 collects its device information and the device information and connected device information of the mobile phone 30 to obtain the first list.
  • the connected device information of the electronic device may also include device information of electronic devices that have been connected to the electronic device in history. If the mobile phone 30 has been connected to the notebook computer F, the connected device information of the mobile phone 30 includes the device information of the watch 20, the tablet 40, the notebook computer F and the earphone 50, and the first list can include the watch 20, the mobile phone 30, the tablet 40, the earphone 50 and device information for laptop F.
  • the connected device information A of the electronic device except the monitoring device (such as the mobile phone 30) in the electronic device that the anti-lost mode has been turned on is updated to the connected device information B, and the mobile phone 30 sends the monitoring device (such as the watch 20) Transmits its updated connected device information B.
  • the monitoring device updates the first list according to the updated connected device information B.
  • the connected device information C of the monitoring device is updated to connected device information D, and the monitoring device updates the first list according to the updated connected device information D.
  • the anti-lost mode of a new electronic device D has been turned on, and the new electronic device D communicates with the electronic device (such as a mobile phone 30 ) whose anti-lost mode has been turned on in the network 200, and the new electronic device D sends
  • the mobile phone 30 sends its device state information and connected device information E, or the mobile phone 30 requests the new electronic device D for its device state information and connected device information E.
  • the electronic device with the current anti-lost mode enabled determines to reselect the new electronic device D as the monitoring device according to the device status information of the electronic device with the current anti-lost mode enabled.
  • the new electronic device D obtains the unupdated first list from the watch 20, and updates the first list according to the connected device information E.
  • the anti-lost mode status information of the mobile phone 30 has been turned on from the anti-lost mode to the anti-lost mode.
  • the electronic equipment mobile phone 30 that has closed anti-lost mode sends its anti-lost mode not to open to the electronic equipment (such as watch 20) that the anti-lost mode that is connected with mobile phone 30 has been opened, and the electronic equipment that anti-lost mode has opened responds to the anti-lost mode.
  • the information for which the anti-lost mode is not enabled is shared among the electronic devices in the network 200 whose anti-lost mode is enabled.
  • the electronic device whose anti-lost mode is currently enabled determines whether a monitoring device needs to be selected again according to the device status information of the electronic device whose anti-lost mode is currently enabled.
  • the electronic device whose current anti-lost mode has been turned on determines whether a monitoring device needs to be reselected may include judging whether the priority of the currently selected monitoring device is the highest; if so, not reselecting the monitoring device ; If not, select the monitoring device again. For example, the priority of the watch 20 becomes the fourth level, and the priority of the mobile phone 30 is the second level, then the priority of the currently selected monitoring device watch 20 is not the highest, then the mobile phone 30 with the highest current priority is selected. for monitoring equipment.
  • the electronic devices in the first list that are not the same as the device owners of the monitoring devices are determined as irrelevant devices, and then the electronic devices except the irrelevant devices in the first list are determined as the monitored devices, including The electronic device whose device owner is the same as that of the monitoring device in the first list is used as the monitored device.
  • the monitoring device may present the first list to the user.
  • the user can select the electronic device that needs to be monitored in the first list as the monitored device according to his own needs.
  • the monitoring device may provide the user with the first list, so that the user can determine whether the electronic device not specified by the device owner is the monitored device.
  • the watch 20 of the monitoring device displays a first list (such as Table 2). Jack does not want to monitor the mobile phone 30, then Jack can delete the mobile phone 30 from the first list, then as shown in Figure 7(b), the watch 20 displays the first list after the user selects the monitored device.
  • a first list such as Table 2. Jack does not want to monitor the mobile phone 30, then Jack can delete the mobile phone 30 from the first list, then as shown in Figure 7(b), the watch 20 displays the first list after the user selects the monitored device.
  • FIG. 8 is a schematic flowchart of a method for monitoring a monitoring device provided in an embodiment of the present application. It should be understood that FIG. 8 shows steps or operations of the method for monitoring a monitoring device, but these steps or operations are only examples, and other operations or variations of the operations in FIG. 8 may also be performed in the embodiment of the present application.
  • the monitoring method for monitoring equipment includes the following steps:
  • Step 80 the monitoring device acquires the first list.
  • FIG. 3 or FIG. 6 for specific content of the first list acquired by the monitoring device, which will not be repeated here.
  • the monitoring device after the monitoring device obtains the first list, it may refer to the above description of determining the monitored device, and determine the monitored device according to the first list.
  • the monitoring device may also acquire the device identifier of the monitored device according to the first list.
  • step 81 the monitoring device identifies its environment and determines a preset threshold.
  • the monitoring device identifies the environment, and determines the preset threshold according to the environment.
  • the monitoring device obtains the location information of the monitored device, the distance between the monitoring device and the monitored device can be obtained, and the preset threshold can be a preset threshold about the distance, that is, the preset distance threshold, then the monitoring device can be based on the monitoring device The distance from the monitored device and the preset distance threshold determine whether to send an alarm message.
  • the monitoring device monitors the wireless signal of the monitored device according to the device identification, it can obtain the received signal strength indication (RSSI) of the wireless signal, and the preset threshold can be a preset threshold for the signal strength, that is, the preset threshold Intensity threshold, the monitoring device can determine whether to send alarm information according to the RSSI of the wireless signal and the preset intensity threshold.
  • RSSI received signal strength indication
  • the preset threshold can be a preset threshold for the signal strength, that is, the preset threshold Intensity threshold
  • the monitoring device can determine whether to send alarm information according to the RSSI of the wireless signal and the preset intensity threshold.
  • the preset threshold is determined according to the current environment of the monitoring device. If the monitoring device recognizes that its environment is an ordinary environment, such as setting a restaurant or coffee shop as an ordinary environment, the preset distance threshold is the default distance threshold, and the preset intensity threshold is the default intensity threshold. If the monitoring device recognizes that its environment is a safe environment, for example, the home or office area or the place where the device owner stays for a long time within a day is set as a safe environment, the current preset distance threshold is the value that modifies the default distance threshold After the first distance threshold is obtained, the current preset intensity threshold is the first intensity threshold obtained after modifying the value of the default intensity threshold.
  • the current environment may also include an unsafe environment, for example, a public place with a large number of people (a park, a shopping mall, a subway, etc.) is set as an unsafe environment.
  • the monitoring device can judge whether it is currently in a park, shopping mall or subway according to the location information reported by the monitored device or its own location information. If it is confirmed that the current environment is an unsafe environment, the current preset distance threshold is to modify the default distance threshold
  • the second distance threshold obtained after the value of , the current preset intensity threshold is the second intensity threshold obtained after modifying the value of the default intensity threshold.
  • the value range of the default threshold corresponding to the common environment may be greater than 5 meters and less than or equal to 10 meters.
  • the value range of the first distance threshold corresponding to the safe environment may be greater than 10 meters and less than or equal to 20 meters.
  • the value range of the second distance threshold corresponding to the unsafe environment may be greater than 1 meter and less than or equal to 5 meters. That is, for the preset distance threshold, the first distance threshold is greater than the default distance threshold, and the default distance threshold is greater than the second distance threshold.
  • the preset threshold of intensity the first intensity threshold is smaller than the default intensity threshold, and the default intensity threshold is smaller than the second intensity threshold.
  • the distance between the receiving end and the sending end, and the RSSI of the Bluetooth paging signal between the receiving end and the sending end can be converted by a formula, which is the prior art and will not be repeated here.
  • the RSSI strength received by the devices is about -60dbm to -40dbm
  • the preset threshold of signal strength can be - 60dbm.
  • the preset thresholds of signal strengths corresponding to the normal environment, the secure environment, and the non-secure environment may be respectively set according to the preset thresholds of distances corresponding to the normal environment, the secure environment, and the non-secure environment.
  • the user can set the trust level for the electronic equipment he owns.
  • the trust degree of the electronic device is related to a preset threshold. If the trust value of the electronic device is high, it is considered that the current environment is a safe environment, and the first distance threshold can be larger than the default distance threshold, that is, the distance between the electronic device and the monitoring device is allowed to be greater than the default distance threshold. Do not call the police. If the trust value of the electronic device is low, it is considered that the current environment is an unsafe environment, and the second distance threshold can be smaller than the default distance threshold, that is, the distance between the electronic device and the monitoring device is allowed to be smaller than the default distance threshold .
  • the device information includes the trust value of the electronic device, and the trust value of each electronic device may be recorded in the device information list, the connected device information and the first list.
  • the monitoring device obtains the trust value of the monitored device located in the environment where the monitoring device is located, it reads the corresponding trust value of the monitored device, and if the trust value is 1, it judges that the current environment is a safe environment. If the trust value of the monitored device is 0, it is judged that the current environment is a normal environment. If the trust value of the monitored device is -1, it is judged that the current environment is an unsafe environment.
  • the trust value of the earphone 50 is set to 1, and both the watch 20 and the earphone 50 turn on Bluetooth.
  • the watch 20 scans the Bluetooth paging signal in the current environment, and the device identification (CMIIT ID: 2019DP11735) carried by the Bluetooth paging signal A in the current environment matches the device identification (CMIIT ID: 2019DP11735) of the earphone 50 in the first list, Then it is determined that the earphone 50 is in the environment where the monitoring device is located.
  • the monitoring device reads that the trust value of the earphone 50 is 1 according to the connected device information (or the first list) of the mobile phone 30, and then considers that the current environment is a safe environment.
  • the user may set the trust value of household devices (for example, smart screens, televisions) placed at home that are not portable to be 1.
  • household devices for example, smart screens, televisions
  • the monitoring device can record its location information and stay time. If it is judged that the time it stays in a certain location area reaches a preset time threshold (for example, 8 hours), it is considered that the environment where the current monitoring device is located is security environment.
  • the location area may be a certain point, or may be a range with a certain point as a center and a radius of 0.5 meters.
  • the monitoring device confirms that the current environment is a safe environment, and the monitoring device may stop monitoring the monitored device.
  • Step 82 the monitoring device collects monitoring information.
  • the monitoring information is information about the monitored device.
  • the monitoring device can judge whether the monitored device is lost according to the monitoring information.
  • the monitoring device starts monitoring and collects monitoring information of the monitored device.
  • the monitoring device can collect the monitoring information of the monitored device through the communication connection with the monitored device, or collect the monitoring information of the monitored device through the device identification of the monitored device, that is, the monitoring device can establish a communication connection with the monitored device, or No communication connection is established.
  • the monitoring device establishes a communication connection with the monitored device, and the monitoring information may include the location information of the monitored device, the distance information between the monitored device and the monitoring device, acceleration sensor data or gyroscope data, and drop information. Status related information.
  • the monitoring device obtains the location information of the monitored device based on its communication connection with the monitored device.
  • the monitoring device requests its location information (such as GPS location information) from the monitored device, or the monitored device actively sends its location information to the monitoring device.
  • the monitoring device after the monitoring device obtains the location information of the monitored device, it first determines whether the monitored device is within the monitoring range, and if the currently monitored device is not within the monitoring range, the monitored device is not monitored. On the contrary, the monitoring device monitors the monitored device based on the location information of the monitored device. Among them, the monitoring device can request its location information from the monitored device at a preset time interval, or the monitored device can send its location information to the monitoring device at a preset time interval, so as to ensure that the monitoring device can continuously and real-time obtain the location information of the monitored device. location information.
  • the preset time interval may be a default value, or a value set by the user according to the actual situation, such as 5 seconds, 10 seconds and so on.
  • the monitoring range may be an area range centered on the location of the monitoring device after the monitoring device is determined.
  • the monitoring range is used to determine whether the monitored device is near the monitoring device.
  • the monitored device is within the monitoring range of the monitoring device, which means that the monitored device is near the monitoring device.
  • the size of the monitoring range can be set according to the actual situation.
  • the monitoring range may be a circle with the location of the monitoring device as the center and a radius of 50 meters.
  • the monitoring range can be set large enough to ensure that the monitoring device can monitor enough monitored devices around the user, and also avoid monitoring the monitored electronic devices that are far away from the user.
  • the monitored device establishes a communication connection with the monitoring device, and the monitored device may report its acceleration sensor data, gyroscope data, and other information related to the drop state to the monitoring device, or the monitoring device may request the monitored device Acceleration sensor data, gyroscope data, and other information related to the drop status of the monitored device.
  • the monitored device may determine that it is in a falling state according to one or more of the acceleration sensor data and the gyroscope data, and report that it is in a falling state to the monitoring device.
  • the monitoring device may determine whether the monitored device is in a falling state according to one or more of the acceleration sensor data and the gyroscope data.
  • the monitoring device monitors the monitored device based on the monitored device being in a falling state. Wherein, judging whether the electronic device is in a falling state according to the data of the acceleration sensor or the data of the gyroscope is a prior art, and will not be repeated here.
  • the monitored device has not established a communication connection with the monitoring device.
  • the monitoring information may be a received signal strength indication (received signal strength indication, RSSI) of the wireless signal.
  • RSSI received signal strength indication
  • the monitoring device obtains the device identification of the monitored device, monitors the wireless signal (such as a short-distance wireless signal) of the monitored device according to the device identification of the monitored device, and obtains the RSSI of the wireless signal.
  • the monitoring device may automatically turn on Bluetooth.
  • the server 10 informs the watch 20 that it is a monitoring device, or, as shown in Figure 6, the electronic device whose anti-lost mode has been turned on selects the watch 20 as a monitoring device, and then the watch 20 turns on its bluetooth.
  • the foregoing wireless signal is a Bluetooth paging signal.
  • monitoring the wireless signal of the monitored device according to the device identifier includes: the monitoring device scans the Bluetooth paging signal according to the device identifier, receives the Bluetooth paging signal, and monitors the RSSI of the Bluetooth paging signal.
  • the RSSI of the Bluetooth paging signal is used to represent the signal strength of the Bluetooth paging signal received by the monitoring device.
  • the RSSI of a Bluetooth paging signal is inversely proportional to the distance between devices. The farther the distance between the monitoring device and the monitored device is, the smaller the RSSI of the Bluetooth paging signal of the monitored device detected by the monitoring device is; the closer the distance is, the larger the RSSI of the Bluetooth paging signal is.
  • the monitored device is monitored by means of distance measurement (such as sensing the signal strength of the wireless signal carrying the device identifier) through the device identifier.
  • the monitoring device and the monitored device both turn on Bluetooth.
  • the monitoring device scans the Bluetooth paging signal in the current environment, and can obtain the device identification carried by the Bluetooth paging signal.
  • the monitoring device detects whether the device identifier of the monitored device in the first list matches the device identifier carried by the Bluetooth paging signal in the current environment. If not, the monitoring device does not monitor the RSSI of the Bluetooth paging signal, that is, does not monitor the Bluetooth paging signal.
  • the electronic device corresponding to the Bluetooth paging signal If they match, the monitoring device monitors the RSSI of the Bluetooth paging signal.
  • the Bluetooth paging signal A is The matched device identifier corresponds to the Bluetooth paging signal A sent by the monitored device (earphone 50 ).
  • the monitoring device can monitor the RSSI of the Bluetooth paging signal A, or the monitoring device can evaluate the relationship between the monitored device (earphone 50) corresponding to the Bluetooth paging signal A according to the RSSI of the matched Bluetooth paging signal A. distance, so as to realize the monitoring of the earphone 50.
  • the monitoring device evaluates the distance between the monitored device and the monitoring device according to the RSSI strength of the Bluetooth paging signal of the monitored device, the relationship between the RSSI of various Bluetooth paging signals and the distance can be obtained in advance, for example When the distance between the monitored device and the monitoring device is about 1m, the RSSI of the Bluetooth paging signal sent by the monitored device received by the monitoring device is between -60dbm and -40dbm. When the monitoring device detects that the RSSI of the Bluetooth paging signal of the monitored device is -50dbm, it can be estimated that the distance between the monitored device and the monitoring device is 1 meter. In practical applications, the relationship between the RSSI of the Bluetooth paging signal and the distance can also be set according to specific conditions (such as two set antennas, transmission and reception characteristics, and the current environment), which is not specifically limited in this application.
  • specific conditions such as two set antennas, transmission and reception characteristics, and the current environment
  • the monitoring device can flexibly use positioning technologies such as time of arrival (ToA), time difference of arrival (Time Difference of Arrival, TDoA), received signal strength (Received Signal Strength, RSS) and angle of arrival (Angle of Arrival) , AoA) to determine the location of the monitored device or to determine the distance between the monitored device and the monitored device, which is not specifically limited in this application.
  • ToA time of arrival
  • TDoA time difference of arrival
  • RSS Receiveived Signal Strength
  • AoA angle of arrival
  • the monitored device includes a monitored device that starts monitoring.
  • the monitored device that starts monitoring is in communication connection with the monitoring device, and the monitoring information obtained by the monitoring device may include distance information between the monitored devices and RSSI of the Bluetooth paging signal of the monitored device.
  • the monitored device that starts monitoring can monitor other monitored devices based on the device identification it has obtained, and obtain the RSSI of the wireless signal of other monitored devices, or the monitored device that starts monitoring can obtain other monitored devices based on its communication with other monitored devices. Location information or distance information of the monitored equipment, etc. That is to say, the embodiment of the present application is not limited to only the monitoring device for monitoring, and electronic devices with anti-lost mode among the monitored devices can also start monitoring, and the devices can be flexibly networked to realize mutual monitoring between devices.
  • the monitored device that starts monitoring reports the obtained monitoring information to the monitoring device, then the monitoring device can obtain more comprehensive and complete monitoring information (such as location information, distance information, etc.), and then the monitoring device can build a topological map of the location and distance between devices , and can also provide the topological map of the location and distance between devices to the user, which is convenient for the user to find the device.
  • more comprehensive and complete monitoring information such as location information, distance information, etc.
  • the monitored device that starts monitoring can also monitor the monitored device by referring to the device identification of the monitored device obtained by it, and then report to the monitoring device Report the RSSI of the Bluetooth paging signal of the monitored device or evaluate the distance from the monitored device according to the RSSI.
  • the monitored device that starts monitoring may report the location information of other monitored devices it monitors and the distance between it and other monitored devices to the monitoring device.
  • the monitoring device builds a topological map of the location and distance between devices according to the obtained location information and distance information. For example, a location and distance topology map between devices is constructed according to the locations of the monitoring device, the monitored device that starts monitoring, and other monitored devices, and the distances between the three.
  • the monitoring device can provide the user with a topological map of the location and distance between devices, so as to provide the user with more accurate and comprehensive information on the location and distance of the device, and facilitate the user to find the device.
  • the monitored device mobile phone 30
  • other monitored devices earphone 50
  • monitoring device watch 20
  • the mobile phone 30 and the earphone 50 are communicatively connected, and the mobile phone 30 can obtain the position information of the earphone 50 (such as GPS position information) of the global positioning system, and then can know the distance A between the mobile phone 30 and the earphone 50 .
  • the watch 20 can monitor the mobile phone 30 and the earphone 50 , and then can obtain the distance B between the watch 20 and the mobile phone 30 , and the distance C between the watch 20 and the earphone 50 .
  • the mobile phone 30 reports its location information, the location information of the earphone 50 and the distance A between the mobile phone 30 and the earphone 50 to the monitoring watch 20 .
  • the wristwatch 20 constructs a topological map of location and distance between devices according to the location information of the mobile phone 30 and the earphone 50 and the distances A, B, and C, as shown in FIG. 9 .
  • the monitoring device can update the topological map of the location distance between the devices in real time according to the change of the location distance between the devices.
  • step 81 and step 82 may be performed simultaneously, for example, the monitoring device may identify the current environment while collecting monitoring information.
  • step 81 is executed after step 82 is executed first, for example, the monitoring device collects the location information of the monitored device, and identifies the current environment according to the location information of the monitored device.
  • step 82 is executed after step 81 is executed first. This application does not specifically limit it.
  • step 81 is an optional step.
  • step 83 the monitoring device judges whether to output alarm information according to the preset threshold and the monitoring information.
  • step 81 the monitoring device acquires the RSSI of the wireless signal of the monitored device, and when the RSSI of the wireless signal is smaller than the preset threshold, the judgment result of step 83 is no. When the RSSI of the wireless signal is greater than or equal to the preset threshold, the judgment result of step 83 is yes.
  • step 81 the monitoring device obtains the location information of the monitored device, and then the monitoring device may perform the following steps:
  • Step 1 the monitoring device judges whether the distance between it and the monitored device exceeds the monitoring range.
  • the monitoring device judges whether the distance between it and the monitored device exceeds the monitoring range according to the location information of the monitored device.
  • step 2 execute step 2 to end the monitoring of the monitored device.
  • step 3 is executed, and the monitoring device judges whether the distance between it and the monitored device exceeds the current preset threshold.
  • the current preset threshold may be a default preset threshold, or may be a preset threshold determined according to the security of the environment after the monitoring device recognizes the environment.
  • step 3 If the judgment result of step 3 is no, then the judgment result of step 83 is no.
  • step 3 If the judgment result of step 3 is yes, then the judgment result of step 83 is yes.
  • the monitoring device may determine whether to output the alarm information based on the time period during which the distance between the monitoring device and the monitored device exceeds the current preset threshold. For example, when the monitoring device detects that the distance between the monitored device and the monitoring device has reached the current preset threshold, the monitoring device starts timing, and until the preset time threshold is reached, the distance between the monitored device and the monitoring device still exceeds If the current preset threshold is exceeded, the monitoring device will output an alarm message.
  • the monitoring device obtains the acceleration sensor data, gyroscope data, or drop status information of the monitored device, and the monitoring device can directly judge whether the monitored device has fallen based on the acceleration sensor data, gyroscope data, and drop status information. If the monitoring device determines that the monitored device has fallen, the monitoring device outputs an alarm message.
  • the monitoring device may also directly receive the information about the falling state reported by the monitored device. For example, the monitored device reports to the monitoring device that it is in a falling state. Alternatively, the monitored device that starts monitoring reports to the monitoring device that it or other monitored devices are in a falling state. The monitored device that starts monitoring receives acceleration sensor data or gyroscope data reported by other monitored devices, and determines that the other monitored device is in a falling state. The monitored device that starts monitoring reports the information that the monitored device is in a falling state to the monitoring device. Alternatively, the monitoring device receives acceleration sensor data or gyroscope data reported by the monitored device, and the monitoring device judges whether the monitored device is in a falling state according to the received acceleration sensor data or gyroscope data.
  • the monitoring device When the monitoring device obtains that the monitored device is in a falling state, the monitoring device outputs an alarm message. Wherein, judging whether the electronic device is in a falling state according to the data of the acceleration sensor or the data of the gyroscope is a prior art, and will not be repeated here.
  • the monitoring device can flexibly combine the above monitoring information to determine whether the monitored device is lost.
  • the monitoring device monitors that the monitored device is in a falling state, and monitors that the monitored device is near the monitoring device, and then monitors that the distance between the monitored device and the monitoring device gradually exceeds the preset threshold, then the monitoring device judges that the monitored device is lost. Output warning information. In this way, the accuracy of the monitoring device in judging the loss of the monitored device is improved, and the monitoring device is prevented from misjudging that the monitored device is only dropped rather than lost as the monitored device is lost, and erroneously outputting an alarm message.
  • step 83 If the judgment result of step 83 is no, continue to execute step 82 or step 83 .
  • the monitoring device judges not to output the monitoring information according to the monitoring information, and the monitoring device continues to monitor the monitored device. If the monitoring device has not been replaced, the device monitoring can be continued from step 82 or step 83 . If the monitoring device is replaced, the replaced monitoring device may continue to perform device monitoring from step 81 .
  • step 84 is executed to output an alarm message, which is used to prompt that the monitored device is in an unsafe state.
  • the monitoring device determines that the monitored device may be lost, the monitoring device outputs an alarm message to the user.
  • the monitoring device if the number of alarms output by the monitoring device to the user reaches the preset threshold or the duration of the alarm reaches the alarm time threshold, the monitoring device has not yet received the user's alarm confirmation, that is, the user has not sent an alarm to the monitoring device.
  • the monitored device can send the alarm information to the user, or the monitoring device and the monitored device jointly alarm.
  • the monitored device that sends the alarm information to the user may be a monitored device that is determined to be lost by the monitoring device, or may be other monitored devices that are not determined to be lost. If the monitoring device is in communication connection with the monitored device, the monitoring device will send the alarm information to the monitored device, so that the monitored device will alarm the user.
  • the watch 20 of the monitoring device can control the vibration of the mobile phone 30 or a voice alarm.
  • the monitoring device may preferentially control the monitored device that is highly related to the user among the monitored devices to output alarm information to the user. If the monitored device does not receive a response from the user after outputting the alarm information, it can control the Bluetooth devices around the user (such as earphones 50, etc.) to send the alarm information to the user, so that the alarm information can be reached.
  • the alarm information may be implemented as vibration, sound or interface presentation, which is not specifically limited in this embodiment of the present application.
  • the monitoring device watch 20 presenting alarm information on the interface as an example, please also refer to FIG. 10 .
  • the monitoring device watch 20 judges that the mobile phone is lost, it will display on the interface of the watch 20 "detection that the earphone may be lost", or display an alarm message such as "detected that the distance of the earphone exceeds the preset threshold", or broadcast the above-mentioned alarm information by voice to remind the user of the earphone may be lost.
  • options such as “clear alarm”, “suspend alarm”, “lock mode” and “map search” are also presented on the interface of watch 20, for the user to make corresponding choices after learning the alarm information.
  • the "clear alarm” option is used to inform the monitoring device to clear the current alarm information, and inform the monitoring device that the area is a safe environment, so that the monitoring device stops device monitoring in the safe environment.
  • the "pause alarm” option is used to inform the monitoring equipment to cancel the current alarm information and inform the monitoring equipment to continue monitoring the monitored equipment.
  • the same point of "suspending the alarm” and “clearing the alarm” is that the user thinks that the device (such as a mobile phone) that is judged to be lost is safe and not really lost, and the user cancels the current alarm message.
  • “clear alarm” means that the user sets the current area as a safe environment, and does not monitor equipment in a safe environment.
  • "Pause alarm” means that the user does not set the current area as a safe environment, and needs to monitor equipment in this area.
  • the "lock mode” option is used to inform the monitoring device that it is hoped that the monitoring device will control the monitored device to enter the locked mode, and the monitored device is not allowed to be powered off or moved.
  • the "map search” option is used to inform the monitoring device to present corresponding map information (as shown in FIG. 9 ).
  • the user confirms that the monitored device is lost, he can find the corresponding monitored device through the map information provided by the monitoring device.
  • the monitored device may also display an interface as shown in FIG. 10 .
  • Step 85 the monitoring device receives the user's confirmation operation.
  • the user confirms the alarm information based on his judgment on the monitored device.
  • the monitored device or the monitoring device receives the user's confirmation operation (for example, click "clear alarm”, “pause alarm”, “lock mode” or "map search"), then the monitored device or monitoring device can confirm that the alarm information has been delivered to the user.
  • the user can click the above-mentioned "clear alarm” option. If the user confirms that the monitored device judged to be lost is currently in a safe state, but the location area is not in a safe environment, the user can click the above-mentioned "suspend warning”. If the user feels that the monitored device judged to be lost is currently in a safe state, but may be in an unsafe state (for example, the monitored device judged to be lost cannot be carried), the user can click on "Lock Mode". If the user thinks that the warning information is valid and the device may really be lost, the user can click "device search".
  • step 86 the monitoring device performs corresponding operations in response to the user's confirmation operation.
  • the monitoring device When the monitoring device detects that the user selects "clear alarm", the monitoring device cancels the current alarm information, and does not perform device monitoring in this area.
  • the monitoring device records the current location information, determines the location information as a safe environment and saves it, so that when the monitoring device detects that it is in the safe environment during the next monitoring, the monitoring device stops monitoring the monitored device.
  • the monitoring device detects that the area is a safe environment, and may monitor the monitored device according to a preset threshold corresponding to the safe environment.
  • the monitoring device detects that the user selects "suspend the alarm", the monitoring device releases the current alarm information, and continues to perform device monitoring on the monitored device, and may continue to execute the above steps 82 to 86.
  • the monitoring device detects that the user selects "lock mode", and the monitoring device sends a locking command to the monitored device that is judged to be lost, such as sending a locking command to the mobile phone that is judged to be lost in Figure 10, so that the mobile phone is not allowed to be turned off. Not allowed to be moved. If the monitored device detects that it is powered off or moved, the monitored device will vibrate, alarm or sound reminder, or the monitored device will send information that it is powered off or moved to the monitoring device, and the monitoring device will send an alarm to the user information.
  • the monitoring device can send a locking instruction to the monitored device through a communication connection with the monitored device that is judged to be lost, or, by modifying the communication protocol, such as modifying the Bluetooth protocol, a new instruction is added to monitor An additional locking instruction is transmitted between the device and the monitored device judged to be lost.
  • the monitored device After receiving the lock command, the monitored device enters a state where it is not allowed to be forced to shut down and not allowed to be moved.
  • the monitored device can send its information (for example, receiving shutdown operation or acceleration sensor data) to the monitoring device, and the monitoring device judges the state of the monitored device. When the state of the monitored equipment changes (for example, being moved or shut down), the monitoring equipment will alarm, and the monitored equipment can also be controlled to alarm.
  • the monitoring device detects that the user selects "map lookup".
  • the monitoring device organizes the topological map of the distance between devices and the current location information of the monitoring device to construct a map that is convenient for users to find devices. Users can find the monitored device that is judged to be lost based on the map.
  • the monitored device when the monitored device alerts the user, it can send the user's confirmation operation to the monitoring device through a communication connection with the monitoring device, and the monitoring device performs corresponding operations.
  • the monitored device receives the user's selection of the "clear alarm" option, the monitored device informs the monitoring device of the selection, and the monitoring device responds to the user's selection by setting the location area as a safe environment and stopping device monitoring.
  • the monitoring device can maintain a security environment list, and the monitoring device can also provide a function of adding and deleting security environments. That is, the user can add or delete a security environment in the security environment list according to his judgment on the security of each area environment.
  • the timeliness of the alarm can also be set, for example, it is set not to alarm within a preset period of time in the future in a certain location area. For example, in area A, the monitoring device determines that the monitored device is lost, and the monitoring device alerts the user. After the user selects "suspend alarm", and set not to alarm in the next 5 hours. Then within the next 5 hours, the monitoring device will stop monitoring the monitored device in the area, and after 5 hours, the monitoring device will resume the device monitoring of the monitored device in the area.
  • the situation of triggering reselection as the monitoring device may occur in any step shown in FIG. 8 .
  • the device is reselected as the monitoring device, and the flow of the device monitoring method shown in FIG. 8 is re-executed.
  • the monitoring device can also monitor itself, that is, it can be controlled to be locked, not allowed to be moved and not allowed to be turned off. Taking the mobile phone 30 as the monitoring device and the earphone 50 as the monitored device, the mobile phone 30 judges that it is currently in a locked screen state, the mobile phone 30 is connected to the earphone 50 via Bluetooth, and the audio is being played on the earphone 50, then the mobile phone 30 can consider that the earphone 50 is in normal operation. worn by the user. The mobile phone 30 monitors that the distance between it and the earphone 50 exceeds the preset threshold, and the mobile phone 30 controls the earphone 50 to give an alarm to remind the user, and the mobile phone 30 can automatically enter the lock mode.
  • the distance between the Bluetooth paging signal and the mobile phone 30 is estimated according to the RSSI of the Bluetooth paging signal. In this way, the watch 20 monitors the mobile phone 30 and the earphone 50 .
  • the memory 143 may exist independently, and is connected to the processor 141 through the communication bus 142 .
  • the memory 143 can also be integrated with the processor 141 .
  • the memory 143 can store computer instructions, and when the computer instructions stored in the memory 143 are executed by the processor 141, the device monitoring method of the present application can be realized.
  • the memory 143 may also store data required by the processor during the process of executing the above method and generated intermediate data and/or result data.
  • the communication interface 144 uses any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area network (Wireless Local Area Networks, WLAN) and the like.
  • RAN radio access network
  • WLAN wireless Local Area Networks
  • the processor 141 may include one or more CPUs.
  • This embodiment also provides a computer program product, which, when running on a computer, causes the computer to execute the above related steps, so as to implement the application program device monitoring in the above method embodiments.
  • the disclosed devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined Or it can be integrated into another device, or some features can be omitted, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units. If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a readable storage medium.
  • the technical solution of the embodiment of the present application is essentially or the part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, and the software product is stored in a storage medium Among them, several instructions are included to make a device (which may be a single-chip microcomputer, a chip, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
  • the above is only a specific implementation of the application, but the protection scope of the application is not limited thereto, and any changes or replacements within the technical scope disclosed in the application should be covered within the protection scope of the application .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Emergency Management (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)
  • Hardware Redundancy (AREA)

Abstract

本申请实施例公开一种设备监控方法及电子设备,应用于服务器,该设备监控方法包括:接收第一电子设备的第一设备状态信息,接收第二电子设备的第二设备状态信息,其中第一电子设备和第二电子设备的第一模式已开启且使用第一账户信息登录服务器,根据第一设备状态信息和第二设备状态信息确定监控设备,向第一电子设备发送第一指示信息,其中第一指示信息用于指示第一电子设备是否为监控设备,向第二电子设备发送第二指示信息,其中第二指示信息用于指示第二电子设备是否为监控设备。根据设备的状态选择监控设备,实现灵活的设备监控。将能及时有效地将电子设备告警信息送达用户的电子设备选为监控设备,提升设备监控的用户体验。

Description

设备监控方法及电子设备
本申请要求于2021年12月15日提交中国专利局、申请号为202111539983.2,发明名称为“设备监控方法及电子设备”的中国专利的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种设备监控方法及电子设备。
背景技术
在个人所持有电子设备数量增多的同时,电子设备丢失的概率也增加。比如手机、平板、耳机等经常存在丢失的情况。目前可以采用将蓝牙报警器和被监控设备机械连接在一起,蓝牙报警器与手机建立蓝牙连接,在蓝牙报警器和手机之间的蓝牙连接断开,手机就通过振动提醒用户被监控设备可能丢失。
然而在实际应用中,若手机关机或手机不在用户身边,则可能无法检测该被监控设备是否丢失,手机的提醒可能无法送达用户。
发明内容
本申请实施例提供一种设备监控方法及电子设备,根据设备的状态选择监控设备,实现灵活的设备监控。将能及时有效地将电子设备告警信息送达用户的电子设备选为监控设备,提升设备监控的用户体验。
第一方面,本申请实施例提供一种设备监控方法,应用于服务器,该设备监控方法包括:接收第一电子设备的第一信息,其中第一电子设备的第一模式已开启且使用第一账户信息登录服务器,第一信息包括第一设备状态信息,接收第二电子设备的第二信息,其中第二电子设备的第一模式已开启且使用第一账户信息登录服务器,第二信息包括第二设备状态信息,根据第一设备状态信息和第二设备状态信息确定监控设备,向第一电子设备发送第一指示信息,其中第一指示信息用于指示第一电子设备是否为监控设备,向第二电子设备发送第二指示信息,其中第二指示信息用于指示第二电子设备是否为监控设备。
其中,第一模式即为本申请实施例中的防丢模式,开启防丢模式的电子设备可以与其他同样开启防丢模式的电子设备竞选监控设备。也即服务器可以从开启防丢模式的电子设备中选出监控设备。
其中,第一设备状态信息即第一电子设备的设备状态信息,第二设备状态信息即第二电子设备的设备状态信息。设备状态信息即电子设备的使用状态的信息,或者说工作状态(包括正工作或待机状态)的信息。在一些实施例中,设备状态信息包括:是否佩戴,和/或,是否锁屏。对于穿戴设备,其设备状态信息包括是否佩戴,对于具有显示屏的电子设备,其设备状态信息包括是否锁屏。
可以理解,两个或两个以上的电子设备使用同一账户信息(例如第一账户信息)登录服务器,也即该两个或两个以上的电子设备的设备拥有者为同一用户。为了提高设备监控的安 全性,避免监控到其他用户的设备,服务器从使用同一账户信息登录且第一模式已开启的多个电子设备中选出监控设备。
在本申请实施例中,服务器在监测到第一电子设备和第二电子设备均使用第一账户信息登录且第一电子设备和第二电子设备的第一模式均已开启时,服务器可以向第一电子设备和第二电子设备请求设备状态信息。或者,电子设备开启第一模式后即可以主动向服务器发送其设备状态信息。服务器在接收到第一电子设备的第一设备状态信息和第二电子设备的第二设备状态信息时,服务器即可以知道第一电子设备和第二电子设备的第一模式已开启。服务器从第一模式已开启且使用同一账户信息登录的电子设备中选出监控设备。服务器接收到第一电子设备的第一设备状态信息和第二电子设备的第二设备状态信息,然后根据第一设备状态信息和第二设备状态信息从第一电子设备和第二电子设备中选出监控设备。也即服务器根据电子设备的设备状态选出监控设备,实现灵活的设备监控。
其中第一指示信息可以为第一电子设备是否为监控设备,第二指示信息为第二电子设备是否为监控设备。在一些实施例中,第一指示信息和第二指示信息还可以分别为告知第一电子设备和第二电子设备监控设备的信息。也即服务器所发送的第一指示信息和第二指示信息可以为同一信息,例如,在服务器选出监控设备为第一电子设备时,则服务器可以通知第一电子设备和第二电子设备监控设备为第一电子设备的信息,也即第一指示信息和第二指示信息均为“监控设备为第一电子设备”。
可以理解,在仅有第一电子设备的第一模式已开启且使用第一账户信息登录服务器,则服务器可以直接将该第一电子设备判定为监控设备。
在一些实施例中,第一信息还包括:第一连接设备信息,第一连接设备信息包括第三电子设备的标识,其中第一电子设备通信连接第三电子设备。其中,标识即本申请实施例中的设备标识。第一连接设备信息即第一电子设备的连接设备信息。电子设备的连接设备信息即与该电子设备通信连接的其他电子设备的设备信息。在一些实施例中,连接设备信息还可以包括该电子设备历史通信连接过的其他电子设备的设备信息。
在一些实施例中,该设备监控方法还包括:服务器根据第一设备状态信息确定对应的第一优先级,根据第二设备状态信息确定对应的第二优先级,将第一优先级和第二优先级中较高的优先级对应的设备作为监控设备。
其中,第一优先级即第一电子设备的优先级,第二优先级即第二电子设备的优先级,其中,优先级包括本申请实施例中的第一级、第二级、第三级或第四级。也即第一优先级可以为第一级、第二级、第三级或第四级。
在本申请实施例中,服务器根据第一优先级和第二优先级,将第一电子设备和第二电子设备中优先级最高的电子设备选为监控设备。具体地,服务器根据第一设备状态信息和第二设备状态信息,将能及时有效地将电子设备告警信息送达用户的电子设备选为监控设备,提升设备监控的用户体验。示例性地,若第一优先级为第一级,第二优先级为第二级,则将第一优先级和第二优先级中优先级最高的第一级所对应的第一电子设备作为监控设备。若第一优先级为第三级,第二优先级为第二级,则将第一优先级和第二优先级中优先级最高的第二级所对应的第二电子设备作为监控设备。
在一些实施例中,第二信息还包括:第二连接设备信息,第二连接设备信息包括第四电子设备的标识,第四电子设备通信连接第二电子设备。其中,第二连接设备信息即 第二电子设备的连接设备信息,其中连接设备信息同上述,在此不再赘述。
在一些实施例中,该设备监控方法还包括:当第一电子设备为监控设备时,将被监控设备信息发送给第一电子设备,其中被监控设备信息包括第二电子设备和第四电子设备的标识。其中,被监控设备信息即本申请实施例中的被监控设备的设备信息(包括设备标识)。
在一些实施例中,将登录服务器的电子设备中,与监控设备的设备拥有者不相同的电子设备确定为无关设备,然后将登录服务器的电子设备中除去无关设备之外的电子设备确定为被监控设备。服务器汇总被监控设备的设备标识,将被监控设备的设备标识发送给监控设备,由此使得监控设备可以获得更为全面的被监控设备的设备标识。
在一些实施例中,该设备监控方法还包括:接收第二电子设备发送的变化后的第二连接设备信息,将变化后的第二连接设备信息发送给第一电子设备。第二连接设备信息发生变化即与第二电子设备通信连接的电子设备发生变化,如原与第二电子设备通信连接的电子设备(如第四电子设备)断开了与第二电子设备的通信连接,则变化后的第二连接设备信息中不包括第四电子设备的标识,或有新电子设备与第二电子设备通信连接,则变化后的第二连接设备信息中包括该新电子设备的标识。
在一些实施例中,该设备监控方法还包括:监测第一设备状态信息和第二设备状态信息,当第一设备状态信息和/或第二设备状态信息变化时,根据当前第一设备状态信息和第二设备状态信息,确定是否重新选出监控设备。其中,第一设备状态信息和/或第二设备状态信息变化,也即第一设备状态信息变化、第二设备状态信息变化或第一设备状态信息和第二设备状态信息变化。
在本申请实施例中,服务器在第一电子设备和第二电子设备中选出监控设备后,服务器监测该两个电子设备的设备状态信息,可以为服务器根据预设时间间隔向该两个电子设备请求其设备状态信息,或在电子设备(第一电子设备和/或第二电子设备)的设备状态信息变化时,电子设备主动向服务器上报其变化的设备状态信息。也即,服务器从M个电子设备中选出监控设备后,服务器就监控该M个电子设备的设备状态信息,M大于或等于1,如服务器从一个电子设备中选出监控设备后,服务器就监控该电子设备的设备状态信息。或服务器从三个电子设备中选出监控设备后,服务器就从该三个电子设备的设备状态信息。
在一些实施例中,该设备监控方法还包括:监测第一电子设备的第一模式和第二电子设备的第一模式,当第一电子设备的第一模式和/或第二电子设备的第一模式变化时,根据当前第一设备状态信息和第二设备状态信息,确定是否重新选出监控设备。其中,第一电子设备的第一模式和/或第二电子设备的第一模式变化,也即第一电子设备的第一模式变化、第二电子设备的第一模式变化或第一电子设备和第二电子设备的第一模式均变化。
可以理解为,服务器在第一电子设备和第二电子设备中选出监控设备后,服务器监测该两个电子设备的第一模式,可以为服务器根据预设时间间隔向该两个电子设备请求其第一模式,或在电子设备(第一电子设备和/或第二电子设备)的第一模式变化时,电子设备主动向服务器上报其变化的第一模式。也即,服务器从M个电子设备中选出监控设备后,服务器就监控该M个电子设备的第一模式,M大于或等于1,如服务器从一个电子设备中选出监控设备后,服务器就监控该电子设备的第一模式。或服务器从三个电子设备中选出监控设备后,服务器就从该三个电子设备的第一模式。
在一些实施例中,该设备监控方法还包括:监测到第五电子设备的第一模式已开启,获取第五电子设备的第三设备状态信息,其中第五电子设备使用第一账户信息登录服务器,根据第一设备状态信息、第二设备状态信息和第三设备状态信息,确定是否重新选出监控设备。其中,第三设备状态信息即第五电子设备的设备状态信息。
在本申请实施例中,服务器在选出监控设备后,服务器还可以监测是否还有新的电子设备(如第五电子设备)使用与监控设备为同一账户信息(如第一账户信息)登录且第一模式已开启,若监测到有新的电子设备使用与监控设备为同一账户信息登录且第一模式已开启,则服务器需要判断是否重新选出监控设备,以确保将当前使用同一账户信息登录且第一模式已开启的多个电子设备中,最能及时有效地将电子设备告警信息送达用户的设备为监控设备。
在一些实施例中,确定是否重新选出监控设备包括:判断当前所选出的监控设备的优先级是否是最高,若是,则不重新选出监控设备,若否,则重新选出监控设备。其中,优先级最高的设备即最能及时有效地将电子设备告警信息送达用户的设备。
第二方面,本申请实施例提供一种设备监控方法,应用于具有第一模式的第一电子设备,该设备监控方法包括:接收第一操作,其中第一操作用于输入第一账户信息,响应于第一操作,使用第一账户信息登录服务器,当检测到第一模式开启时,向服务器发送第一信息,第一信息包括第一设备状态信息,从服务器接收第一指示信息,其中第一指示信息用于指示第一电子设备是否为监控设备,其中,第一指示信息至少根据第一设备状态信息确定。
在一些实施例中,电子设备登录服务器后,电子设备就会将其的设备状态信息、第一模式或第一模式和设备状态信息发送给服务器。电子设备登录服务器后,若电子设备检测到其第一模式开启,则电子设备可以告知服务器其第一模式开启。若电子设备检测到其第一模式未开启,则电子设备可以告知服务器其第一模式未开启,之后,电子设备检测其第一模式开启,则电子设备告知服务器其第一模式开启。
在本申请实施例这种,第一指示信息至少根据第一设备状态信息确定,即第一指示信息至少根据第一电子设备的设备状态信息确定,第一指示信息还可以为服务器根据多个电子设备的设备状态信息确定。
在一些实施例中,当第一指示信息指示第一电子设备是监控设备时,从服务器处接收被监控设备信息,其中,被监控设备信息包括第二电子设备的标识,第二电子设备使用第一账户信息登录服务器,且第二电子设备的第一模式已开启。
在一些实施例中,第一电子设备通信连接第三电子设备,第一信息还包括:第一连接设备信息,第一连接设备信息包括第三电子设备的标识。
在一些实施例中,被监控设备信息还包括第二电子设备的第二连接设备信息,其中第二连接设备信息包括第四电子设备的标识,第四电子设备通信连接第二电子设备。
在一些实施例中,该设备监控方法还包括:当监测到第一模式变化或第一设备状态信息变化时,向服务器发送变化后的第一模式或变化后的第一设备状态信息。
在一些实施例中,设备状态信息包括:是否佩戴,和/或,是否锁屏。
在一些实施例中,当第一指示信息指示第一电子设备是监控设备时,基于第一无线通信协议获取周围设备信息,当周围设备信息包含第四电子设备的标识,确定第四电子设备的标识对应的第一信号的信号强度,其中第一信号基于第一无线通信协议,判断信 号强度是否低于预设阈值,若低于预设阈值,显示第一告警信息。
在一些实施例中,第一信号为蓝牙寻呼信号。
在一些实施例中,第二连接设备信息还包括第四电子设备的信任值,预设阈值包括关于信号强度的第一预设阈值和第二预设阈值,当周围设备信息包含第四电子设备的标识时,该设备监控方法还包括:根据第四电子设备的信任值判断当前所处环境为安全环境或非安全环境,当环境为安全环境,确定第一预设阈值,当环境为非安全环境,确定第二预设阈值,其中,第一预设阈值小于第二预设阈值。
在本申请实施例中,监控设备判断信号强度是否低于预设阈值之前,监控设备先获取预设阈值。其中预设阈值包括默认预设阈值、第一预设阈值和第二预设阈值。监控设备获取预设阈值可以根据当前环境获取到当前环境对应的预设阈值,若当前环境为普通环境,则预设阈值为默认预设阈值,若当前环境为安全环境,则预设阈值为第一预设阈值,若当前环境为非安全环境,则预设阈值为第二预设阈值。
在本申请实施例中,预设阈值包括关于信号强度的阈值和关于距离的阈值,也即预设阈值可以为用于判断信号强度的阈值,也可以为用于判断距离的阈值。若预设阈值为关于信号强度的阈值,则默认预设阈值即本申请实施例中的默认强度阈值,第一预设阈值即本申请实施例中的第一强度阈值,第二预设阈值即本申请实施例中的第二强度阈值,第一强度阈值小于第二强度阈值。若预设阈值为关于距离的阈值,则默认预设阈值即本申请实施例中的默认距离阈值,第一预设阈值即本申请实施例中的第一距离阈值,第二预设阈值即本申请实施例中的第二距离阈值,第一距离阈值大于第二距离阈值。
第三方面,本申请实施例提供一种设备监控方法,应用于设备监控系统,设备监控系统包括服务器和具有第一模式的第一电子设备和第二电子设备,第一电子设备接收第一操作,其中第一操作用于输入第一账户信息,第一电子设备响应于第一操作,使用第一账户信息登录服务器,第二电子设备接收第二操作,其中第二操作用于输入第一账户信息,第二电子设备响应于第二操作,使用第一账户信息登录服务器,第一电子设备检测到第一模式开启时,向服务器发送第一信息,第一信息包括第一设备状态信息,第二电子设备检测到第一模式开启时,向服务器发送第二信息,第二信息包括第二设备状态信息,服务器根据第一设备状态信息和第二设备状态信息确定监控设备,服务器向第一电子设备发送第一指示信息,其中第一指示信息用于指示第一电子设备是否为监控设备,服务器向第二电子设备发送第二指示信息,其中第二指示信息用于指示第二电子设备是否为监控设备。
其中,设备监控系统即本申请实施例中的网络,例如网络100。
在一些实施例中,设备监控系统还包括第三电子设备,第一电子设备通信连接第三电子设备,第一信息还包括:第一连接设备信息,第一连接设备信息包括第三电子设备的标识。
在一些实施例中,该设备监控方法还包括:服务器根据第一设备状态信息确定对应的第一优先级,根据第二设备状态信息确定对应的第二优先级,并将第一优先级和第二优先级中较高的优先级对应的设备作为监控设备。
在一些实施例中,设备监控系统还包括第四电子设备,第四电子设备通信连接第二电子设备,第二信息还包括:第二连接设备信息,第二连接设备信息包括第四电子设备的标识。
在一些实施例中,该设备监控方法还包括:当服务器判断第一电子设备为监控设备时,服务器向第一电子设备发送被监控设备信息,其中被监控设备信息包括第二电子设备的标识。
在一些实施例中,被监控设备信息还包括第四电子设备的标识。
在一些实施例中,设备状态信息包括:是否佩戴,和/或,是否锁屏。
在一些实施例中,当第一指示信息指示第一电子设备是监控设备时,第一电子设备基于第一无线通信协议获取周围设备信息,当周围设备信息包含第四电子设备的标识,第一电子设备确定第四电子设备的标识对应的第一信号的信号强度,其中第一信号基于第一无线通信协议,第一电子设备判断信号强度是否低于预设阈值,若低于预设阈值,第一电子设备显示第一告警信息。
在一些实施例中,第一信号为蓝牙寻呼信号。
在一些实施例中,第二连接设备信息还包括第四电子设备的信任值,预设阈值包括第一预设阈值和第二预设阈值,当周围设备信息包含第四电子设备的标识时,服务器根据第四电子设备的信任值判断当前所处环境为安全环境或非安全环境,当环境为安全环境,确定第一预设阈值,当环境为非安全环境,确定第二预设阈值,其中,第一预设阈值小于第二预设阈值。
在一些实施例中,该设备监控方法还包括:第二电子设备监测到第二连接设备信息变化时,将变化后的第二连接设备信息发送给服务器,服务器将变化后的第二连接设备信息发送给第一电子设备。
在一些实施例中,该设备监控方法还包括:服务器监测第一设备状态信息和第二设备状态信息,当第一设备状态信息和第二设备状态信息变化时,服务器根据当前第一设备状态信息和第二设备状态信息,确定是否重新选出监控设备。
在一些实施例中设备监控系统还包括第五电子设备,该设备监控方法还包括:服务器监测到第五电子设备的第一模式已开启,接收第五电子设备的第三信息,其中第五电子设备使用第一账户信息登录服务器,第三信息包括第三设备状态信息,服务器根据第一设备状态信息、第二设备状态信息和第三设备状态信息,确定是否重新选出监控设备。
在一些实施例中,确定是否重新选出监控设备包括:服务器判断当前所选出的监控设备的优先级是否是最高,若是,则不重新选出监控设备,若否,服务器重新选出监控设备。
第四方面,本申请实施例提供一种设备监控方法,应用于设备监控系统,该设备监控系统包括第一电子设备和第二电子设备,第一电子设备与第二电子设备通信连接,其中第一电子设备与第二电子设备防丢模式已开启且均使用第一账户信息登录,该方法包括:第一电子设备获取第二电子设备的设备状态信息,第一电子设备根据第一电子设备和第二电子设备的设备状态信息,从第一电子设备与第二电子设备中选出优先级最高的第一目标设备作为监控设备,第一电子设备通知第二电子设备第一目标设备为监控设备。
在一些实施例中,第二电子设备接收第一电子设备的设备状态信息,第二电子设备根据第一电子设备和第二电子设备的设备状态信息,从第一电子设备与第二电子设备中选出优先级最高的第一目标设备作为监控设备,第二电子设备通知第一电子设备第一目标设备为监控设备。
在一些实施例中,该设备监控系统还包括第三电子设备,当第三电子设备防丢模式已开启且均使用第一账户信息登录时,第一电子设备和第二电子设备获取第三电子设备的设备状 态信息,第三电子设备接收第一电子设备和第二电子设备的设备状态信息,第一电子设备根据第一电子设备、第二电子设备和第三电子设备的设备状态信息,确定是否重新选出监控设备;第二电子设备根据第一电子设备、第二电子设备和第三电子设备的设备状态信息,确定是否重新选出监控设备;第三电子设备根据第一电子设备、第二电子设备和第三电子设备的设备状态信息,确定是否重新选出监控设备。
在一些实施例中,当第一电子设备为监控设备时,第三电子设备向第一电子设备发送第二连接设备信息,第二连接设备信息包括第四电子设备的标识,第四电子设备通信连接第三电子设备。
在一些实施例中,当第一电子设备为监控设备时,当第三电子设备的第二连接设备信息变化时,第三电子设备向第一电子设备发送的变化后的第二连接设备信息。
在一些实施例中,该方法还包括:第一电子设备监测到其第一模式变化或设备状态信息变化时,向第二电子设备和第三电子设备中的一个或多个发送变化后的第一模式或变化后的设备状态信息。或,第二电子设备监测到其第一模式变化或设备状态信息变化时,向第一电子设备和第三电子设备中的一个或多个发送变化后的第一模式或变化后的设备状态信息。或,第三电子设备监测到其第一模式变化或设备状态信息变化时,向第二电子设备和第一电子设备中的一个或多个发送变化后的第一模式或变化后的设备状态信息。
在一些实施例中,确定是否重新选出监控设备包括:第一电子设备、第二电子设备和第三电子设备判断第一目标设备的优先级是否是最高,若是,则不重新选出监控设备,若否,则选出优先级最高的第二目标设备作为监控设备。第五方面,本申请实施例提供一种电子设备,包括:存储器,用于存储有计算机程序;处理器,用于执行存储器存储的计算机程序,当计算机程序被执行时,处理器用于执行如上任意一项的设备监控方法。
第六方面,本申请实施例提供一种计算机可读存储介质,计算机可读存储介质包括计算机指令,当计算机指令在电子设备上运行时,使得电子设备执行如上任意一项的设备监控方法。
第七方面,本申请实施例提供一种计算机程序产品,计算机程序产品包括计算机程序代码,当计算机程序代码被一个计算机执行的时候,计算机程序代码可以使得计算机执行如上任意一项的设备监控方法。
上述其他方面对应的有益效果,可以参见关于方法方面的有益效果的描述,此处不予赘述。
附图说明
图1为本申请实施例提供的一种应用场景示意图。
图2为本申请实施例提供的一种开启防丢模式示意图。
图3为本申请实施例提供的一种竞选监控设备方法流程示意图。
图4(a)至图4(b)为本申请实施例提供的登录界面示意图。
图5为本申请实施例提供的另一种应用场景示意图。
图6为本申请实施例提供的另一种竞选监控设备方法流程示意图。
图7(a)为本申请实施例提供的一种第一列表展示示意图。
图7(b)为本申请实施例提供的另一种第一列表展示示意图。
图8为本申请实施例提供的监控设备监控的方法流程示意图。
图9为本申请实施例提供的一种位置距离拓扑图。
图10为本申请实施例提供的一种告警界面示意图。
图11为本申请实施例提供的一种电子设备结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请中所涉及的多个,是指两个或两个以上。另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
如上述,在手机对被监控设备实施一对一监控时,会存在手机无法保持对被监控设备的监控或无法将告警信息送达用户的情形。为此本申请实施例提供一种设备监控方法以及相关设备,通过选择监控设备,不限于手机监控被监控设备,实现灵活的设备监控。依据电子设备的设备状态信息,将能及时有效地将电子设备告警信息送达用户的电子设备选为监控设备,提升防丢检测的用户体验。实时监测电子设备的设备状态信息,在当前被选为监控设备的电子设备不能及时有效地将电子设备告警信息送达用户时,重新选出监控设备,保证监控设备的可靠性,从而实现稳定可靠的监控。通过设备发现可以及时可靠且更完整地获得各个电子设备的设备信息。将各个电子设备的设备信息进行汇总得到第一列表,监控设备可以从第一列表中获得各个被监控设备的设备信息,监控设备基于被监控设备的设备信息可以监控各个被监控设备,不限于上述手机监控被监控设备的一对一监控。监控设备获取被监控设备的监控信息(如设备位置、距离以及跌落状态变化等),根据监控信息实时检测被监控设备与监控设备的相对距离,以及被监控设备的状态,根据监控信息与预设阈值输出告警信息,以提醒用户被监控设备处于非安全状态。
本申请实施例所提供的电子设备可以包括手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备。还可以包括数码相机(digital camera)、蜂窝电话(cellular phone)、智能手机(smart phone)、个人数字助理(personal digital assistant,PDA)电脑、蓝牙耳机、平板、蓝牙音箱、平板型电脑、膝上型电脑(laptop computer)、头戴设备、穿戴设备(如手环、智能手表等)、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备等。
选出监控设备
为了便于理解本申请实施例提供的设备监控方法,下面首先介绍一下应用场景。
请参阅图1,图1为本申请实施例提供的一种应用场景示意图。图1仅提供了一个实施例的图示,但不暗示对可以在其中实现不同的实施例的应用场景的任何限制。图1的手表20、手机30、平板40和耳机50的数量以及设备类型仅为示意性举例,电子设备的数量可以为其他任意数量,设备类型可以为其他设备类型。
在所示出的实施例中,网络100包括服务器10、手表20、手机30、平板40和耳机50。手表20、手机30、平板40使用第一账户信息登录服务器10,手表20、手机30、平板40与服务器10通信连接。其中,手表20、手机30或平板40与服务器10的通信连接可以为无线 连接,例如无线局域网(Wireless Local Area Network,WLAN)连接。平板40与耳机50通信连接。其中,手机30和耳机50的通信连接可以为无线连接,例如蓝牙连接。
需要说明的是,本申请实施例中所提供的电子设备与服务器10的通信连接、或电子设备之间的通信连接也可以为有线连接。例如,笔记本电脑(图未示)可以通过光纤或双绞线等有线传输介质与服务器10建立通信连接。又例如,手机30通过转接设备(例如,USB数据线)与笔记本电脑建立通信连接。本申请实施例对电子设备之间的通信连接以及电子设备与服务器10之间的通信连接不作具体限定。
其中,服务器10可以是云服务器,也可以是本地服务器,服务器10可以是一个服务器或者包括多个服务器的服务器集群。
其中,帐号是指电子设备登录到服务器10所使用的凭证。同一个帐号可以在服务器10所管理的两个或两个以上的电子设备(例如手表20、手机30、平板40)上同时登录。服务器10可以管理多个帐号。
其中,账户信息至少包括账号,账户信息还可以包括该账号对应的密码。第一账户信息包括第一账号和第一账号对应的密码。每一账户信息对应一用户。
在一些实施例中,第一账号可以是华为账号或其它设备生产商账号。服务器10可以是设备生产商服务器,例如,可以是华为服务器或其它设备生产商服务器,本申请实施例对此不作具体限定。
其中,手表20、手机30、平板40为具有防丢模式的电子设备。开启防丢模式的电子设备可以与其他同样开启防丢模式的电子设备竞选监控设备。例如,若手表20被服务器10选为监控设备,则监控设备可以监控手机30、平板40。
其中,耳机50为不具有防丢模式的电子设备,不具有防丢模式的电子设备无法参与竞选成为监控设备或无法被选为监控设备。
其中,防丢模式可以实现为电子设备的一个功能,也可以实现为应用的一个子功能,如实现为手机30上“查找设备”应用的一个子功能,本申请对此不作具体限定。
在本申请实施例中,具有防丢模式的电子设备开启防丢模式可以包括但不限于如下可能实施方式:
方式一:具有防丢模式的电子设备默认将其防丢模式开启。
方式二:用户开启电子设备的防丢模式。示例性地,以防丢模式实现为电子设备的一个功能,手机30的设置界面上设置有“防丢模式”开关为例。如图2所示,用户点击手机30的设置界面21上“防丢模式”的开关22,以开启手机30的防丢模式。同理,用户也可以将其他电子设备的防丢模式开启。
方式三:电子设备响应于登录账号相同的其他电子设备防丢模式已开启的信息,开启其防丢模式。示例性地,用户开启手表20和手机30的防丢模式,并使手表20、手机30、平板40以第一账户信息登录服务器10。服务器10检测到以第一账户信息的手表20和手机30的防丢模式开启,服务器10启动同步参数设置功能,向平板40传输同样以第一账号登录的手表20和手机30的防丢模式已开启的信息。平板40响应该信息开启其防丢模式。
在本申请实施例中,具有防丢模式的电子设备可存储并维护一份设备信息列表。电子设备的设备信息列表记录连接设备信息,即记录与其通信连接的其他电子设备的设备信息。例如,手机30与耳机50通信连接,手机30可以向耳机50请求其设备信息,或手机30接收耳机50所发送的设备信息,手机30的设备信息列表中记录的连接设备信息中包括耳机50的设 备信息。
在一些实施例中,电子设备的连接设备信息还可以包括电子设备历史连接过的其他电子设备的设备信息,也即电子设备的设备信息列表还可以记录其历史连接过的电子设备的设备信息,本申请对此不作具体限定。
其中,设备信息可以为设备的属性信息,即是电子设备与其他电子设备有区别的特性信息。设备信息可以包括设备标识、设备名称、设备类型(例如手机或手表等)、设备状态信息、优先级、防丢模式状态信息、信任值以及电子设备所属用户(即设备拥有者)等。其中,设备拥有者可以由用户自行输入。电子设备使用账号登录服务器10时,电子设备可以记录其所登录的账号所对应的用户为其设备拥有者。
上述防丢模式状态信息指电子设备的防丢模式的状态信息,防丢模式的状态信息包括防丢模式开启或未开启。若电子设备的防丢模式已开启,则防丢模式状态信息为防丢模式已开启,若电子设备的防丢模式关闭,则防丢模式状态信息为防丢模式未开启。
上述设备标识用于唯一标识电子设备,网络100中的服务器10可以根据设备标识辨识电子设备,网络100中的电子设备可以根据设备标识辨识其他电子设备。常见的设备标识包括国际移动设备身份码(international mobile equipment identity,IMEI)、国际移动用户识别码(international mobile subscriber identification number,IMSI)、移动设备识别码(mobile equipment identifier,MEID)、序列号(serial number,SN)、集成电路卡识别码(Integrate circuit card identity,ICCID)、以及媒体介入控制层(media access control,MAC)地址、互联网协议地址(Internet Protocol Address,IP地址)、产品识别码(product ID)、无线电发射设备型号核准代码CMIT ID或其他能够唯一标识电子设备的标识符等。示例地,手机30的设备标识为100.4.5.3,网络100中的手表20可以通过设备标识100.4.5.3来识别该设备标识100.4.5.3对应的手机30。
其中电子设备的设备状态信息可以理解为电子设备使用状态的信息。示例性地,对于穿戴设备,其设备状态信息可以包括佩戴状态和非佩戴状态,佩戴状态即指穿戴设备穿戴(佩戴)于人体,非佩戴状态即指穿戴设备未穿戴(佩戴)于人体。对于具有显示屏的电子设备,其设备状态信息可以包括锁屏状态或未锁屏状态,其中锁屏状态是指电子设备的屏幕被锁定的状态,其中未锁屏状态是指电子设备的屏幕未被锁定的状态。
可以理解,设备状态信息还可以为其他用于指示电子设备与用户关联情况的信息,如可以指示电子设备与用户的距离,或指示电子设备与用户的交互的信息。例如设备状态信息可以为正在被用户使用或操作,本申请实施例对此不作具体限定。
下面示例性说明穿戴设备获得其设备状态信息的方法。
以穿戴设备为手表,手表包括处理器和电容传感器。用户将手表开机,手表的处理器开启电容传感器,电容传感器是一种将其他量的变换以电容的变化体现出来的仪器,电容传感器在接触不同材料时,检测到的电容值大小是有所不同的。用户将未佩戴的手表佩戴在自己身上的某一时刻或者某一段时间内,电容传感器检测到的电容值通常都是很高的,当处理器检测到电容传感器在某一瞬间或者某一时间段内获取到的电容值大于一个预设的电容阈值时,认为穿戴设备当前处于佩戴状态,反之,穿戴设备当前处于非佩戴状态。可以理解,穿戴设备获得其设备状态信息不限于上述方式。
下面示例性说明具有显示屏的电子设备获得其设备状态信息的方法。具有显示屏的电子设备可以通过调用判断是否处于锁屏状态的接口函数来判断,或者也可以通过判断具有显示屏的电子设备中的应用程序是否休眠而判断具有显示屏的电子设备是否处于未锁屏状态。可 以理解,具有显示屏的电子设备获得其设备状态信息不限于上述方式。
在本申请实施例中,可以预先设置一优先级列表。该优先级列表包括电子设备的设备状态信息以及所对应的优先级。示例性地,优先级列表如表1所示,穿戴设备穿戴(佩戴)于人体,则穿戴(佩戴)于人体的穿戴设备为第一级。具有显示屏的电子设备处于未锁屏状态,则处于未锁屏状态的具有显示屏的电子设备为第二级。具有显示屏的电子设备处于锁屏状态,则处于锁屏状态的具有显示屏的电子设备为第三级。穿戴设备未穿戴(佩戴)于人体,则未穿戴(佩戴)于人体的穿戴设备为第四级。优先级从高到低的顺序为第一级至第四级。
表1
设备状态信息 优先级
穿戴设备处于穿戴(佩戴)于人体 第一级
具有显示屏的电子设备处于未锁屏状态 第二级
具有显示屏的电子设备处于锁屏状态 第三级
穿戴设备处于未穿戴(佩戴)于人体 第四级
在申请实施例中,在设置优先级列表时,首先列举出可以用于判断电子设备与用户关联情况的设备状态信息,然后再依据电子设备与用户关联的程度设置对应的优先级。例如,设置上述表1时,穿戴设备穿戴(佩戴)于人体,可以认为其与用户关联度最高,设置优先级为第一级。
可以理解,各个电子设备的设备状态信息以及所对应的优先级,可以根据实际情况设定,本申请实施例对此不作具体限定。
在一些实施例中,各个具有防丢模式的电子设备存储并维护该优先级列表,则各个具有防丢模式的电子设备可以基于该优先级列表以及其自身的设备状态信息确定其对应的优先级,则各个电子设备的设备状态信息即为其确定的优先级。也就是说,设备状态信息还可以为电子设备根据优先级列表所确定的优先级。
下面描述图1所示的应用场景的工作过程。
以手机30的连接设备信息包括耳机50设备信息,手表20的设备状态信息为穿戴状态,手机30的设备状态信息为未锁屏状态,平板40的设备状态信息为锁屏状态,用户采用上述方式二开启手表20和手机30的防丢模式为例进行说明。请一并参阅图3,图3为本申请实施例提供的一种竞选监控设备方法流程示意图。应理解,图3示出了竞选监控设备方法的步骤或操作,但这些步骤或操作仅是示例,本申请实施例还可以执行其他操作或者图3中的各个操作的变形。竞选监控设备方法可以包括如下步骤:
步骤31,手表20、手机30、平板40均向服务器10发送登录请求,其中登录请求中携带登录账号和密码。
在本申请实施例中,用户分别在手表20、手机30、平板40上进行操作,以使得手表20、手机30、平板40使用第一账户信息登录服务器10。示例性地,以用户在手机30上进行操作为例。如图4(a)所示,用户点击手机30设置界面21上的“登录华为账号”选项23。如图4(b)所示,手机30上显示账号登录界面24,用户在账号输入框25中输入登录账号(第一账号“HUAWEI-01”),在密码输入框26中输入第一账号对应的密码“HUAWEI111”。用户在输入第一账号和密码完毕后可以点击“登录”选项27。手机30响应用户点击“登录”选项27的操作,手机30向服务器10发送登录请求,其中登录请求中携带用户所输入的第一账号“HUAWEI-01”和密码“HUAWEI111”。同理,用户可以在手表20和平板40进行操作,使 用相同账号“HUAWEI-01”登录服务器10。
步骤32,服务器10验证登录账号和密码。
服务器10接收到手表20、手机30、平板40的第一账户信息后,获得登录请求中的第一账号“HUAWEI-01”和密码“HUAWEI111”后,分别验证手表20、手机30、平板40所发送的登录请求中所携带的第一账号和密码的合法性。
步骤33,服务器10在验证成功后,返回验证成功响应给手表20、手机30、平板40。
在本申请实施例中,在服务器10验证成功后,返回认证成功响应给手表20、手机30、平板40,该认证成功响应指示该手表20、手机30、平板40与该服务器10建立了通信连接,手表20、手机30、平板40成功登录服务器10。
步骤34,服务器10获取防丢模式已开启的电子设备的设备状态信息和连接设备信息。
在本申请实施例中,防丢模式已开启的电子设备包括手表20和手机30,以手表20和手机30分别为第一电子设备和第二电子设备为例。手表20和手机30向服务器10发送各自的设备状态信息和连接设备信息,或服务器10请求手表20、手机30各自的设备状态信息和连接设备信息。其中,手机30的连接设备信息包括耳机50的设备信息,手表20的连接设备信息为无。在一些实施例中,手表20和手机30向服务器10发送各自的设备状态信息和设备信息列表,或服务器10请求手表20、手机30各自的设备状态信息和设备信息列表。服务器10可以从设备信息列表中获得对应的连接设备信息,如手机30的设备信息列表中的连接设备信息记录耳机50的设备信息,手表20的设备信息列表中没有记录连接设备信息。
可以理解,在具有防丢模式的电子设备使用上述方式一或方式三开启防丢模式时,即网络100中具有防丢模式的电子设备的防丢模式均是开启的,手表20、手机30和平板40向服务器10发送各自的设备状态信息和设备信息列表(连接设备信息),或服务器10请求手表20、手机30和平板40各自的设备状态信息和设备信息列表(连接设备信息)。
在本申请实施例中,电子设备成功登录服务器10后,服务器10可以允许电子设备访问服务器10上所存储的与该电子设备对应的数据。例如服务器10为手表20配置存储空间,手表20成功登录服务器10后,服务器10可以允许手表20访问服务器10上为手表20配置的储存空间。手表20也可以将其存储器中的数据(例如设备状态信息、设备信息列表、图片、视频、音频等)发送给服务器10,再由服务器10将接收到的数据保存在为手表20配置的储存空间中。又例如服务器10为账号配置存储空间,不同账号对应不同的存储空间。手表20使用第一账号登录服务器10时,手表20可以将数据存储至服务器10为第一账号所配置的存储空间中,又或者访问为第一账号所配置的存储空间。
步骤35,服务器10根据获得的设备状态信息选择手表20为监控设备。
在步骤34中,服务器10获得电子设备的设备状态信息,即该电子设备的防丢模式已开启。也即,服务器10获得手表20和手机30的设备状态信息,服务器10根据获得的设备状态信息选择监控设备,即在防丢模式已开启的电子设备中选择监控设备。
在本申请实施例中,电子设备登录服务器10时可以携带有其设备信息(如设备标识),或者服务器10在电子设备成功登录后,向电子设备请求其对应的设备信息,以便后续对这些电子设备进行管理。服务器10可以通过不同的设备标识来识别成功登录服务器10的电子设备。
在一些实施例中,服务器10也可以从电子设备的设备信息中获取电子设备防丢模式状态信息,也可以直接接收电子设备发送的其防丢模式状态信息。例如,电子设备登录服务器10 时可以携带有其防丢模式状态信息。服务器10可以从电子设备的设备信息获取电子设备的设备拥有者,也可以根据电子设备登录服务器10时所使用的账号确定电子设备的设备拥有者。
在本申请实施例中,为了确保信息安全,避免监控发生在属于不同设备拥有者的电子设备之间。服务器10从符合第一条件的电子设备中选出监控设备,第一条件为以相同账户信息登录服务器10且防丢模式已开启。
可以理解,符合第一条件的电子设备的数量可以为一个或一个以上。当服务器10监测到一个电子设备成功登录服务器10且其防丢模式已开启,服务器10将该电子设备选为监控设备。当服务器10监测到有两个或两个以上的电子设备符合第一条件,则服务器10从该两个或两个以上的电子设备中选出监控设备。
可以理解,多个(即两个或两个以上)电子设备以同一账户信息登录服务器10,该多个电子设备属于同一个设备拥有者,也即属于该账户对应的设备拥有者。
在一些实施例中,第一条件还可以为属于同一设备拥有者且具有处理能力且防丢模式已开启的电子设备。其中,服务器10可以根据电子设备的设备类型判断该电子设备是否具有相应的处理能力,例如认为手机30、手表20、平板40具有相应的处理能力,认为耳机50、手写笔(图未示)不具有相应的处理能力。
在本申请实施例中,手表20、手机30、平板40使用第一账户信息登录服务器10,手表20、手机30、平板40的设备拥有者均为第一账号信息所对应的用户。基于用户仅将手表20、手机30的防丢模式开启,符合第一条件的电子设备包括手表20和手机30。服务器10存储优先级列表(例如表1),服务器10根据优先级列表和手表20、手机30的设备状态信息,确定手表20的第一优先级为第一级,确定手机30的第二优先级为第二级,服务器10将登录同一账户信息且防丢模式已开启的手表20、手机30中优先级最高的手表20选为监控设备。
在一些实施例中,具有防丢模式的电子设备根据其存储的优先级列表以及其自身的设备状态信息确定其优先级,则步骤34中,服务器10获取防丢模式已开启的电子设备的设备状态信息即获取防丢模式已开启的电子设备的优先级,相应地,在步骤35中,服务器10根据获得的优先级将优先级最高的手表20选为监控设备。
步骤36,服务器10通知防丢模式已开启的电子设备监控设备为手表20。在本申请实施例中,服务器10选出监控设备后,通知参与竞选监控设备的电子设备手表20为监控设备。当前防丢模式已开启的电子设备包括手表20、手机30,服务器10通知手表20、手机30监控设备为手表20。在一些实施例中,服务器10选出监控设备后,服务器10向参与竞选监控设备的电子设备发送指示信息,如服务器10向手表20发送第一指示信息,该第一指示信息用于指示手表20是监控设备,服务器10向手机30发送第二指示信息,该第二指示信息用于指示手机30不是监控设备。
在一些实施例中,服务器10也可以通知使用第一账户信息登录的所有电子设备(包括防丢模式开启或未开启的电子设备)监控设备为手表20,即服务器10通知手表20、手机30和平板40监控设备为手表20。
步骤37,服务器10汇总防丢模式已开启的电子设备的设备信息和连接设备信息得到第一列表。
在本申请实施例中,在步骤34服务器10获得防丢模式已开启的电子设备的连接设备信息后,服务器10还可以获得防丢模式已开启的电子设备的设备信息,将所获得的连接设备信息以及设备信息进行汇总得到第一列表。如服务器10将手表20的设备信息、手表20的连接 设备信息、手机30的设备信息以及手机30的连接设备信息进行汇总得到第一列表,得到如表2。表2中包括手表20、手机30的设备信息以及手机30的连接设备信息中所记录的耳机50的设备信息。
表2
设备拥有者 设备类型 设备名称 设备标识
杰克 手机 A IP地址:100.4.5.3
杰克 手表 B 序列号:C02WKHOP7FFB
杰克 耳机 C CMIIT ID:2019DP11735
在一些实施例中,在步骤34服务器10获得防丢模式已开启的电子设备的设备信息列表后,服务器10还可以获得防丢模式已开启的电子设备的设备信息,将所获得的设备信息列表以及设备信息进行汇总得到第一列表。服务器10汇总手表20、手机30的设备信息以及设备信息列表所得到的第一列表。
在一些实施例中,若手表20通信连接平板40,则手表20的连接设备信息中记录平板40的设备信息,服务器10可以获得手表20、平板40、手机30和耳机50的设备信息,并将手表20、平板40、手机30和耳机50的设备信息得到第一列表。
可以理解,在具有防丢模式的电子设备使用上述方式一或方式三开启防丢模式时,服务器10汇总手表20、手机30和平板40的设备信息以及手机30的设备信息列表,得到第一列表,即第一列表包括手表20、手机30和平板40的设备信息以及手机30的连接设备信息(耳机50的设备信息)。
在一些实施例中,服务器10可以汇总以相同账户信息登录的所有电子设备的设备信息以及设备信息列表,则第一列表包括手表20、手机30和平板40的设备信息以及手机30的连接设备信息(耳机50的设备信息)。
步骤38,服务器10将第一列表发送给监控设备。
在一些实施例中,服务器10可以为每个账号存储该账号对应的第一列表。服务器10将第一列表存储至为该账号配置的存储空间。例如,服务器10将上述第一列表(即表2)存储至第一账号HUAWEI-01对应的存储空间。
在一些实施例中,防丢模式已开启的电子设备的连接设备信息A更新为连接设备信息B,该电子设备向服务器10上报其更新后的连接设备信息B。服务器10根据该更新后的连接设备信息B更新第一列表,并将更新后的第一列表传输给监控设备。
在一些实施例中,防丢模式已开启的电子设备的设备信息列表A更新为设备信息列表B,该电子设备向服务器10上报其更新后的设备信息列表B。服务器10根据该更新后的设备信息列表B更新第一列表,并将更新后的第一列表传输给监控设备。
在一些实施例中,有新电子设备D的防丢模式已开启,该新电子设备D向服务器10发送其设备状态信息和连接设备信息C,服务器10响应于接收到新电子设备的设备状态信息,根据当前符合第一条件的电子设备的设备状态信息确定是否需要重新选出监控设备。服务器10根据连接设备信息C更新第一列表,并将更新后的第一列表传输给当前所确定的监控设备。例如,服务器10响应于接收到新电子设备D的设备状态信息,根据当前符合第一条件的电子设备的设备状态信息确定重新选出监控设备,并且选出的监控设备为新电子设备D。服务器10根据连接设备信息C更新第一列表,并将更新后的第一列表传输给当前所确定的 监控设备(新电子设备D)。
在一些实施例中,当防丢模式已开启的电子设备的防丢模式被关闭,电子设备的防丢模式状态信息由防丢模式已开启变为防丢模式未开启,该关闭了防丢模式的电子设备向服务器10发送其防丢模式未开启,则服务10响应于该电子设备防丢模式未开启的信息,根据当前符合第一条件的电子设备的设备状态信息确定是否需要重新选出监控设备。
在一些实施例中,当符合第一条件的电子设备的设备状态信息变化时,设备状态信息变化的电子设备向服务器10发送其变化后的设备状态信息,服务器10响应于接收到变化后的设备状态信息,根据当前符合第一条件的电子设备的设备状态信息确定是否需要重新选出监控设备。
在本申请实施例中,服务器10确定是否需要重新选出监控设备可以包括判断当前所选出的监控设备的优先级是否是最高;若是,则不重新选出监控设备;若否,则重新选出监控设备。例如,手表20的优先级变为第四级,手机30的优先级为第二级,则当前所选出的监控设备手表20的优先级不是最高的,则将当前优先级最高的手机30选为监控设备。
在一些实施例中,可以由电子设备从防丢模式已开启的N个电子设备中选出监控设备,N为大于或等于2的整数。
请参阅图5,图5为本申请实施例提供的另一种应用场景示意图。图5仅提供了一个实施例的图示,但不暗示对可以在其中实现不同的实施例的应用场景的任何限制。图5的手表20、手机30、平板40和耳机50的数量以及设备类型仅为示意性举例,电子设备的数量可以为其他任意数量,设备类型可以为其他设备类型。
在所示出的实施例中,网络200包括手表20、手机30、平板40和耳机50。上述图1中与手表20、手机30、平板40和耳机50相关的内容(例如设备信息、设备状态信息、连接设备信息、设备信息列表、防丢模式等)均适用于图5所示的应用场景,在此不再赘述。网络200与网络100的区别在于,网络200中可以不需要服务器10参与,手表20、手机30与平板40两两通信连接,且由电子设备在符合第一条件的N个电子设备中选出监控设备。
在本申请实施例中,手表20、手机30与平板40两两通信连接可以为有线连接也可以为无线连接,例如,手表20与手机30为蓝牙连接,手机30通过转接设备(例如,USB数据线)与平板40建立通信连接,手表20与平板40为WIFI点对点连接。手机30和耳机50的通信连接可以为无线连接,例如蓝牙连接,本申请对此不作具体限定。
下面描述图5所示的应用场景的工作过程。
手表20的设备状态信息、手机30的设备状态信息以及平板40的设备状态信息仍以上述图3的示例为例,用户采用述方式二开启手表20、手机30的防丢模式为例,在此不再赘述。请一并参阅图6,图6为本申请实施例提供的另一种竞选监控设备方法流程示意图。应理解,图6示出了竞选监控设备方法的步骤或操作,但这些步骤或操作仅是示例,本申请实施例还可以执行其他操作或者图6中的各个操作的变形。竞选监控设备方法包括如下步骤:
步骤61,通信连接的电子设备彼此传输各自的防丢模式状态信息。
在本申请实施例中,在手表20、手机30与平板40两两通信连接后,手表20、手机30与平板40彼此传输各自的防丢模式状态信息。以手表20与手机30之间传输防丢模式状态信息为例,手表20向手机30请求手机30防丢模式状态信息,或手表20接收手机30发送的手机30的防丢模式已开启的信息。手机30与耳机50彼此传输各自的防丢模式状态信息。手机 30向耳机50请求耳机50防丢模式状态信息,或手机30接收耳机50发送的耳机50防丢模式未开启的信息。其中,耳机50未具有防丢模式,耳机50的防丢模式状态信息为防丢模式未开启。
在一些实施例中,手表20、手机30与平板40可以通过使用相同的账户信息登录服务器,则手表20、手机30与平板40可以从服务器处获取彼此的设备标识(例如IP地址),手表20、手机30与平板40基于所获得的设备标识进行通信连接,例如手机30根据平板40的IP地址与平板40建立通信连接,以此类推,实现两两通信连接。
步骤62,防丢模式已开启的电子设备彼此传输各自的设备状态信息。
如上述说明,防丢模式已开启的电子设备包括手表20、手机30,则手表20、手机30彼此传输各自的设备状态信息。
可以理解,在具有防丢模式的电子设备使用上述方式一或方式三开启防丢模式时,即具有防丢模式的电子设备的防丢模式均是开启的,则步骤62中,手表20、手机30和平板40彼此传输各自的设备状态信息。
在一些实施例中,为了确保信息安全,避免监控发生在属于不同设备拥有者的电子设备之间。需要从符合第一条件的N个电子设备中选出监控设备,N为大于或等于2的整数,第一条件为属于同一设备拥有者且防丢模式已开启。则步骤62可以替换为防丢模式已开启且属于同一设备拥有者的电子设备彼此传输各自的设备状态信息。即在替换后的步骤62中,防丢模式已开启的电子设备彼此传输各自的设备拥有者,属于同一设备拥有者的电子设备再彼此传输各自的设备状态信息。或者,步骤61替换为通信连接的电子设备彼此传输各自的防丢模式状态信息和设备拥有者,相应地。步骤62替换为防丢模式已开启且属于同一设备拥有者的电子设备彼此传输各自的设备状态信息。
在一些实施例中,手表20、手机30、平板40和耳机50可以为同一设备拥有者,本申请对此不作具体限定。
步骤63,防丢模式已开启的电子设备根据设备状态信息选出监控设备。
在本申请实施例中,手表20和手机30获得彼此的优先级,得知手表20和手机30的优先级分别为第一级和第二级。手表20将手表20、手机30中优先级最高的手表20(第一目标设备)选为监控设备。可选地,手机30将手表20、手机30中优先级最高的手表20(第一目标设备)选为监控设备。
在一些实施例中,手表20和手机30存储优先级列表(例如表1)。手表20获得手机30的设备状态信息,手表20基于该优先级列表确定手表20、手机30的优先级分别为第二优先级。手表20将手表20、手机30中优先级最高的手表20选为监控设备。可选地,手机30基于该优先级列表确定手表20、手机30的优先级分别为第一级、第二级。手机30将手表20、手机30中优先级最高的手表20选为监控设备。
步骤64,防丢模式已开启的电子设备相互通知手表20为监控设备。
在本申请实施例中,选出监控设备后,通知当前符合第一条件的N个电子设备第一目标设备(即手表20)为监控设备。在手表20选出监控设备后,手表20通知手机30监控设备为手表20。可选地,在手机30选出监控设备后,手机30通知手表20监控设备为手表20。
步骤65,监控设备汇总防丢模式已开启的电子设备的设备信息和连接设备信息,得到第一列表。
在本申请实施例中,监控设备手表20获取手机30的设备信息和连接设备信息,如手表 20向手机30请求其设备信息和连接设备信息,或在确定监控设备为手表20后,手机30向手表20发送其设备信息和连接设备信息。监控设备手表20将其设备信息以及手机30的设备信息和连接设备信息进行汇总,得到第一列表。
在一些实施例中,监控设备手表20获取手机30的设备信息和设备信息列表,如手表20向手机30请求其设备信息和设备信息列表,或在确定监控设备为手表20后,手机30向手表20发送其设备信息和设备信息列表。监控设备手表20将其设备信息以及手机30的设备信息和设备信息列表进行汇总,得到第一列表。
连接设备信息包括正在连接的电子设备的设备信息时,即手表20的连接设备信息包括手机30、平板40的设备信息,手机30的连接设备信息包括手表20、平板40和耳机50的设备信息,则第一列表可以包括手表20、手机30、平板40和耳机50的设备信息。
在一些实施例中,电子设备的连接设备信息还可以包括电子设备历史连接过的电子设备的设备信息。如手机30曾经连接过笔记本电脑F,则手机30的连接设备信息包括手表20、平板40、笔记本电脑F和耳机50的设备信息,则第一列表可以包括手表20、手机30、平板40、耳机50和笔记本电脑F的设备信息。
在一些实施例中,防丢模式已开启的电子设备中除监控设备之外的电子设备(如手机30)的连接设备信息A更新为连接设备信息B,手机30向监控设备(如手表20)传输其更新后的连接设备信息B。监控设备根据该更新后的连接设备信息B更新第一列表。
在一些实施例中,监控设备的连接设备信息C更新为连接设备信息D,监控设备根据该更新后的连接设备信息D更新第一列表。
在一些实施例中,有新电子设备D的防丢模式已开启,且该新电子设备D与网络200中防丢模式已开启的电子设备(如手机30)通信连接,该新电子设备D向手机30发送其设备状态信息和连接设备信息E,或手机30向该新电子设备D请求其设备状态信息和连接设备信息E。手机30响应于接收到新电子设备D的设备状态信息,手机30向与手机30通信连接的防丢模式已开启的电子设备(如手表20)发送新电子设备D的设备状态信息和连接设备信息E,以使得新电子设备D的设备信息和设备信息列表在网络200中的防丢模式已开启的电子设备间共享。在网络200中防丢模式已开启的电子设备根据当前防丢模式已开启的电子设备的设备状态信息确定是否需要重新选出监控设备。当前的监控设备根据连接设备信息E更新第一列表。例如,当前防丢模式已开启的电子设备响应于接收到新电子设备D的设备状态信息,根据当前防丢模式已开启的电子设备的设备状态信息确定重新选出新电子设备D为监控设备。新电子设备D从手表20中获得未更新的第一列表,并根据连接设备信息E更新第一列表。
在一些实施例中,当防丢模式已开启的电子设备(如手机30)的防丢模式被关闭,手机30的防丢模式状态信息由防丢模式已开启变为防丢模式未开启,该关闭了防丢模式的电子设备手机30向与手机30通信连接的防丢模式已开启的电子设备(如手表20)发送其防丢模式未开启,防丢模式已开启的电子设备响应于该防丢模式未开启的信息,将防丢模式未开启的信息在网络200中的防丢模式已开启的电子设备间共享。当前防丢模式已开启的电子设备响应于该防丢模式未开启的信息,根据当前防丢模式已开启的电子设备的设备状态信息确定是否需要重新选出监控设备。
在一些实施例中,当防丢模式已开启的电子设备的设备状态信息变化时,设备状态信息变化的电子设备向防丢模式已开启的其他电子设备发送其变化后的设备状态信息,当前防丢 模式已开启的电子设备响应于接收到变化后的设备状态信息,将变化后的设备状态信息在网络200中的防丢模式已开启的电子设备间共享。当前防丢模式已开启的电子设备响应于该变化后的设备状态信息,根据当前符合防丢模式已开启的电子设备的设备状态信息确定是否需要重新选出监控设备。
在本申请实施例中,当前防丢模式已开启的电子设备确定是否需要重新选出监控设备可以包括判断当前所选出的监控设备的优先级是否是最高;若是,则不重新选出监控设备;若否,则重新选出监控设备。例如,手表20的优先级变为第四级,手机30的优先级为第二级,则当前所选出的监控设备手表20的优先级不是最高的,则将当前优先级最高的手机30选为监控设备。
确定被监控设备
在本申请实施例中,将第一列表中与监控设备的设备拥有者不相同的电子设备确定为无关设备,然后将第一列表中除去无关设备之外的电子设备确定为被监控设备,包括将第一列表中设备拥有者与监控设备的设备拥有者相同的电子设备作为被监控设备。
在本申请实施例中,监控设备可以将第一列表呈现给用户。用户可以根据自身需求将第一列表中需要监控的电子设备选为被监控设备。又或者,对于设备拥有者未明确的电子设备(假设耳机50的设备拥有者无法确定),确定其为无关设备。或者监控设备可以向用户提供第一列表,以便用户确定设备拥有者未明确的电子设备是否作为被监控设备。
如图7(a)所示,监控设备手表20上显示第一列表(如表2)。杰克不希望监控手机30,则杰克可以将手机30从第一列表中删除,则如图7(b)所示,手表20上显示用户对被监控设备进行选择后的第一列表。
监控设备进行监控
请一并参阅图8,图8为本申请实施例提供的监控设备监控的方法流程示意图。应理解,图8示出了监控设备监控方法的步骤或操作,但这些步骤或操作仅是示例,本申请实施例还可以执行其他操作或者图8中的各个操作的变形。监控设备监控方法包括如下步骤:
步骤80,监控设备获取第一列表。
在本申请实施例中,监控设备获取第一列表的具体内容可以参考图3或图6,在此不再赘述。
在本申请实施例中,监控设备获得第一列表后,可以参考上述确定被监控设备的描述,根据第一列表确定被监控设备。监控设备还可以根据第一列表获取被监控设备的设备标识。
步骤81,监控设备识别所处环境并确定预设阈值。
在本申请实施例中,监控设备识别所处环境,根据所处环境确定预设阈值。在监控设备获得被监控设备的位置信息时,可以得到监控设备与被监控设备之间的距离,预设阈值可以为关于距离的预设阈值,即预设距离阈值,则监控设备可以依据监控设备与被监控设备之间的距离以及预设距离阈值判断是否发送告警信息。在监控设备依据设备标识监测被监控设备的无线信号时,可以得到该无线信号的接收信号强度指示(received signal strength indication,RSSI),预设阈值可以为关于信号强度的预设阈值,即预设强度阈值,则监控设备可以依据无线信号的RSSI以及预设强度阈值判断是否发送告警信息。
在本申请实施例中,根据监控设备当前所处环境确定预设阈值。若监控设备识别到其所 处环境为普通环境,例如将餐厅、咖啡厅设置为普通环境等,则预设距离阈值为默认距离阈值,预设强度阈值为默认强度阈值。若监控设备识别到其所处环境为安全环境,例如,将家里或办公区域或设备拥有者在一天内长期停留的地方设置为安全环境,则当前的预设距离阈值为修改默认距离阈值的数值后得到的第一距离阈值,当前的预设强度阈值为修改默认强度阈值的数值后得到的第一强度阈值。
在一些实施例中,当前所处的环境还可以包括非安全环境,例如将公共场合且人员较多的区域(公园、商场、地铁等)设置为非安全环境。监控设备可以根据被监控设备上报的位置信息或根据其自身的位置信息判断当前是否处于公园、商场或地铁,若是,确认当前环境为非安全环境,则当前的预设距离阈值为修改默认距离阈值的数值后得到的第二距离阈值,当前的预设强度阈值为修改默认强度阈值的数值后得到的第二强度阈值。
以预设阈值为关于距离的预设阈值举例说明,普通环境所对应的默认阈值的取值范围可以为大于5米且小于或等于10米。安全环境对应的第一距离阈值的取值范围可以为大于10米且小于或等于20米。非安全环境对应的第二距离阈值的取值范围可以为大于1米且小于或等于5米。也即对于距离的预设阈值,第一距离阈值大于默认距离阈值,默认距离阈值大于第二距离阈值。而对于强度的预设阈值,第一强度阈值小于默认强度阈值,默认强度阈值小于第二强度阈值。
可以理解,接收端和发送端之间的距离、接收端与发送端的蓝牙寻呼信号的RSSI之间可以通过公式进行换算,此为现有技术在此不再赘述。例如,在设备之间的距离为1m时,设备接收到的RSSI强度大概在-60dbm到-40dbm之间,由此在距离的预设阈值为1m时,则信号强度的预设阈值可以为-60dbm。由此,可以根据普通环境、安全环境和非安全环境对应的距离的预设阈值分别设置普通环境、安全环境和非安全环境对应的信号强度的预设阈值。
在本申请实施例中,用户可以为其所拥有的电子设备设置信任度。电子设备的信任度与预设阈值相关。若电子设备的信任值高,则认为当前所处的环境为安全环境,则第一距离阈值可以比默认距离阈值大,即允许在该电子设备与监控设备之间的距离比默认距离阈值大而不报警提醒。若电子设备的信任值低,则认为当前所处的环境为非安全环境,则第二距离阈值可以比默认距离阈值小,即允许在该电子设备与监控设备之间的距离比默认距离阈值小。
在一些实施例中,设备信息包括电子设备的信任值,则设备信息列表、连接设备信息和第一列表中可以记录各个电子设备的信任值。监控设备获得位于监控设备所处环境的被监控设备的信任值时,读取该被监控设备对应的信任值,若信任值为1,判断当前环境为安全环境。若被监控设备的信任值为0,判断当前环境为普通环境。若被监控设备的信任值为-1,判断当前环境为非安全环境。示例性地,设置耳机50的信任值为1,手表20和耳机50均开启蓝牙。手表20扫描当前环境中的蓝牙寻呼信号,当前环境中蓝牙寻呼信号A所携带的设备标识(CMIIT ID:2019DP11735)与第一列表中的耳机50的设备标识(CMIIT ID:2019DP11735)匹配,则判断耳机50处于监控设备所处环境。监控设备根据手机30的连接设备信息(或第一列表)中读取到耳机50的信任值为1,则认为当前所处环境为安全环境。
在一些实施例中,用户可以将安置于家中不便于携带的家庭设备(例如,智慧屏、电视机)的信任值设置为1。
在一些实施例中,监控设备可以记录其位置信息以及停留时间,若判断其在某一位置区域的停留的时间达到预设时间阈值(例如8小时),则认为当前监控设备所处的环境为安全环境。其中该位置区域可以为某一点,也可以为以某一点为圆心,半径为0.5米的范围。
在一些实施例中,监控设备确认当前环境为安全环境,监控设备可以停止对被监控设备的监控。
步骤82,监控设备收集监控信息。
在本申请实施例中,监控信息是关于被监控设备的信息。监控设备可以根据监控信息判断被监控设备是否丢失。
在本申请实施例中,确定被监控设备后,监控设备启动监控,收集被监控设备的监控信息。监控设备可以通过与被监控设备的通信连接收集被监控设备的监控信息,也可以通过被监控设备的设备标识收集被监控设备的监控信息,即监控设备可以与被监控设备建立通信连接,也可以不建立通信连接。
在本申请实施例中,监控设备与被监控设备建立通信连接,监控信息可以包括被监控设备的位置信息、被监控设备与监控设备之间的距离信息、加速度传感器数据或陀螺仪数据、与跌落状态相关信息。监控设备基于其与被监控设备的通信连接,获得被监控设备的位置信息。监控设备向被监控设备请求其位置信息(例如全球定位系统GPS位置信息),或被监控设备主动向监控设备发送其位置信息。
在一些实施例中,在监控设备获得被监控设备的位置信息后,首先判断被监控设备是否在监控范围内,若当前被监控设备并不位于监控范围内,则不对该被监控设备监控。反之,监控设备基于被监控设备的位置信息监控该被监控设备。其中,监控设备可以在预设时间间隔向被监控设备请求其位置信息,或被监控设备在预设时间间隔向监控设备发送其位置信息,以此保证监控设备可以持续且实时获得被监控设备的位置信息。预设时间间隔可以为默认值,也可以为用户根据实际情况设置的数值,例如5秒、10秒等。
其中,监控范围可以为在确定监控设备后以监控设备所处位置为中心的一个区域范围。监控范围用于判断被监控设备是否在监控设备附近。被监控设备位于监控设备的监控范围内,代表被监控设备在监控设备附近。监控范围的大小可以根据实际情况设定。如监控范围可以为以监控设备所处位置为圆心,半径为50米的圆。监控范围可以设置得足够大,以保证监控设备可以对用户身边足够多的被监控设备进行监控,也可以避免对离用户距离远的被监控电子设备进行监控。
在一些实施例中,被监控设备与监控设备建立通信连接,被监控设备可以向监控设备上报其加速度传感器数据、陀螺仪数据、其他与跌落状态相关的信息等,或监控设备向被监控设备请求被监控设备的加速度传感器数据、陀螺仪数据、其他与跌落状态相关的信息等。例如,被监控设备可以根据加速度传感器数据和陀螺仪数据中的一种或多种判断其处于跌落状态,并向监控设备上报其处于跌落状态。或者,监控设备可以根据加速度传感器数据和陀螺仪数据中的一种或多种判断该被监控设备是否处于跌落状态。监控设备基于被监控设备处于跌落状态监控被监控设备。其中,根据加速度传感器数据或陀螺仪数据判断电子设备是否处于跌落状态为现有技术,在此不再赘述。
被监控设备与监控设备没有建立通信连接。监控信息可以为无线信号的接收信号强度指示(received signal strength indication,RSSI)。监控设备获取被监控设备的设备标识,根据被监控设备的设备标识监测该被监控设备的无线信号(如短距离无线信号),获取该无线信号的RSSI。
在本申请实施例中,在选出监控设备后,监控设备可以自动开启蓝牙。例如,如图3中服务器10告知手表20其为监控设备,或,如图6中,防丢模式已开启的电子设备选出手表 20为监控设备,则手表20将其蓝牙开启。
在一种可能的设计方式中,上述无线信号是蓝牙寻呼信号。则根据设备标识监测被监控设备的无线信号包括:监控设备根据设备标识扫描蓝牙寻呼信号,并接收蓝牙寻呼信号,监测蓝牙寻呼信号的接收信号强度指示RSSI。其中,蓝牙寻呼信号的RSSI用于表征监控设备接收到该蓝牙寻呼信号的信号强度。蓝牙寻呼信号的RSSI与设备之间的距离成反比。监控设备与被监控设备之间距离越远,监控设备监测到的被监控设备的蓝牙寻呼信号的RSSI越小;距离越近,蓝牙寻呼信号的RSSI越大。
具体地,通过设备标识采用测距方式(如感知携带设备标识的无线信号的信号强弱)对被监控设备进行监控。例如,监控设备与被监控设备均开启蓝牙。监控设备扫描当前环境中蓝牙寻呼信号,可以得到蓝牙寻呼信号所携带的设备标识。监控设备检测第一列表中被监控设备的设备标识是否与当前环境中蓝牙寻呼信号所携带的设备标识匹配,若不匹配,则监控设备不监测该蓝牙寻呼信号的RSSI,即不监控该蓝牙寻呼信号对应的电子设备。若匹配,则监控设备监测该蓝牙寻呼信号的RSSI。例如,若当前环境中蓝牙寻呼信号A所携带的设备标识(CMIIT ID:2019DP11735)与第一列表中的耳机50的设备标识(CMIIT ID:2019DP11735)匹配,则该蓝牙寻呼信号A即为该匹配了的设备标识所对应的被监控设备(耳机50)所发出的蓝牙寻呼信号A。监控设备可以监测该蓝牙寻呼信号A的RSSI,或者,监控设备可以依据匹配了的蓝牙寻呼信号A的RSSI评估其与该蓝牙寻呼信号A对应的被监控设备(耳机50)之间的距离,以此实现对耳机50的监控。
可以理解,监控设备根据被监控设备的蓝牙寻呼信号的RSSI强弱评估被监控设备与监控设备之间的距离时,可以预先获取各种蓝牙寻呼信号的RSSI与距离之间的关系,例如在被监控设备与监控设备之间的距离为1m左右的时候,监控设备接收到的被监控设备所发送的蓝牙寻呼信号的RSSI大概在-60dbm到-40dbm之间。在监控设备检测到被监控设备的蓝牙寻呼信号的RSSI为-50dbm,则可以评估该被监控设备与监控设备之间的距离为1米。实际应用中,也可以根据具体情况(例如两个设置的天线、发射接收特性以及当前环境)去设置蓝牙寻呼信号的RSSI与距离之间的关系,本申请对此不作具体限定。
可以理解,监控设备可以灵活使用定位技术例如基于到达时间(time of arrival,ToA)、到达时差(Time Difference of Arrival,TDoA)、接收信号强度(Received Signal Strength,RSS)和到达角度(Angle of Arrival,AoA)确定被监控设备的位置或确定监控设备与被监控设备的距离,本申请对此不作具体限定。
在一些实施例中,被监控设备中包括启动监控的被监控设备。启动监控的被监控设备与监控设备通信连接,监控设备获得的监控信息可以包括被监控设备之间的距离信息、被监控设备的蓝牙寻呼信号的RSSI。启动监控的被监控设备可以根据其所获得的设备标识监控其他被监控设备,获得其他被监控设备的无线信号的RSSI,或启动监控的被监控设备根据其与其他被监控设备的通信,获得其他被监控设备的位置信息或距离信息等。即本申请实施例中不限于仅监控设备进行监控,被监控设备中具有防丢模式的电子设备也可以启动监控,设备间可以灵活组网,实现设备间相互监控。
启动监控的被监控设备将其获得的监控信息上报给监控设备,则监控设备可以获得更全面更完整的监控信息(如位置信息、距离信息等),进而监控设备可以构建设备间位置距离拓扑图,还可以将设备间位置距离拓扑图提供给用户,方便用户查找设备。
可以理解,启动监控的被监控设备在与其他被监控设备无通信连接时,启动监控的被监 控设备也可以参照上述根据其所获得的被监控设备的设备标识监控被监控设备,进而向监控设备上报其监测到的被监控设备的蓝牙寻呼信号的RSSI或根据RSSI评估其与被监控设备的距离。
在本申请实施例中,启动监控的被监控设备可以向监控设备上报其监控到的其他被监控设备的位置信息以及其与其他被监控设备之间的距离。监控设备根据获得的位置信息和距离信息构建设备间位置距离拓扑图。如,根据监控设备、启动监控的被监控设备以及其他被监控设备三者的位置以及三者之间的距离构建设备间位置距离拓扑图。监控设备可以向用户提供设备间位置距离拓扑图,以向用户提供更准确更全面的设备位置距离信息,方便用户查找设备。
如图9所示,以启动监控的被监控设备(手机30)、其他被监控设备(耳机50)和监控设备(手表20)为例。手机30和耳机50通信连接,手机30可以获得耳机50的位置信息(例如全球定位系统GPS位置信息)进而可以得知手机30和耳机50之间的距离A。手表20可以监控手机30和耳机50,进而可以得到手表20与手机30之间的距离B,以及手表20与耳机50之间的距离C。手机30将其位置信息、耳机50的位置信息以及手机30和耳机50之间的距离A上报监控手表20。手表20根据手机30和耳机50的位置信息以及距离A、B和C构建设备间位置距离拓扑图如图9所示。
可以理解,本申请对设备间位置距离拓扑图中设备的数量不作具体限定。监控设备可以根据设备间位置距离变化实时更新设备间位置距离拓扑图。
在本申请实施例中,步骤81和步骤82可以同时执行,如监控设备收集监控信息的同时识别当前所处环境。或者,先执行完步骤82再执行步骤81,如,监控设备收集到被监控设备的位置信息,根据被监控设备的位置信息识别当前所处的环境。或者,先执行完步骤81后再执行步骤82。本申请对此不作具体限定。
可以理解,若本申请实施例固定预设阈值,即默认当前环境为普通环境,则步骤81为可选步骤。
步骤83,监控设备根据预设阈值和监控信息判断是否输出告警信息。
在步骤81中,监控设备获取被监控设备的无线信号的RSSI,当该无线信号的RSSI小于预设阈值,步骤83判断结果为否。当该无线信号的RSSI大于或等于预设阈值,步骤83判断结果为是。
在步骤81中,监控设备获取被监控设备的位置信息,则监控设备可以执行如下步骤:
步骤一,监控设备判断其与被监控设备之间的距离是否超出监控范围。
在本申请实施例中,监控设备根据被监控设备的位置信息判断其与被监控设备的距离是否超出监控范围。
在步骤一的判断结果为是,执行步骤二,结束对该被监控设备监控。
在步骤一的判断结果为否,执行步骤三,监控设备判断其与被监控设备的距离是否超出当前的预设阈值。其中,当前的预设阈值可以为默认预设阈值,也可以是监控设备识别环境后根据环境安全性确定的预设阈值。
步骤三的判断结果为否,则步骤83判断结果为否。
步骤三的判断结果为是,则步骤83判断结果为是。
在本申请实施例中,监控设备可以结合监控设备与被监控设备之间的距离超出当前的预设阈值的时长判断是否输出告警信息。例如,监控设备检测到被监控设备与监控设备之间的 距离达到了当前的预设阈值时,监控设备开始计时,至到达到预设时间阈值,被监控设备与监控设备之间的距离仍超出当前的预设阈值,则监控设备输出告警信息。
在步骤81中,监控设备获得被监控设备的加速度传感器数据、陀螺仪数据或与跌落状态的信息,监控设备可以直接根据加速度传感器数据、陀螺仪数据、跌落状态的信息判断被监控设备是否跌落。若监控设备判断被监控设备跌落,则监控设备输出告警信息。
在一些实施例中,监控设备也可以直接接收被监控设备上报的关于跌落状态的信息。例如,被监控设备向监控设备上报其处于跌落状态。或者,启动监控的被监控设备向监控设备上报其或其他被监控设备处于跌落状态。启动监控的被监控设备接收其他被监控设备上报的加速度传感器数据或陀螺仪数据,并判断该其他被监控设备处于跌落状态。启动监控的被监控设备将被监控设备处于跌落状态的信息上报给监控设备。或者,监控设备接收被监控设备上报的加速度传感器数据或陀螺仪数据,监控设备根据接收到的加速度传感器数据或陀螺仪数据判断被监控设备是否处于跌落状态。监控设备得到被监控设备处于跌落状态时,监控设备输出告警信息。其中,根据加速度传感器数据或陀螺仪数据判断电子设备是否处于跌落状态为现有技术,在此不再赘述。
在一些实施例中,监控设备可以灵活结合上述监控信息判断被监控设备是否丢失。监控设备监控到被监控设备处于跌落状态,且监控到被监控设备在监控设备附近,之后又监控到被监控设备与监控设备的距离逐渐超出预设阈值,则监控设备判断该被监控设备丢失,输出告警信息。以此提高监控设备对被监控设备丢失判断的精确度,避免监控设备误将被监控设备仅是跌落而不是丢失的情况判断为被监控设备丢失,而误输出告警信息。
步骤83的判断结果为否,继续执行步骤82或步骤83。
在本申请实施例中,监控设备根据监控信息判断不输出监控信息,监控设备继续监控被监控设备。若该监控设备未被替换,则可以从步骤82或步骤83开始继续执行设备监控。若该监控设备被替换,被替换后的监控设备可以从步骤81开始继续执行设备监控。
步骤83的判断结果为是,执行步骤84,输出告警信息,告警信息用于提示被监控设备处于非安全状态。
在本申请实施例中,若监控设备判断被监控设备可能丢失,则监控设备向用户输出告警信息。
在一些实施例中,若监控设备向用户输出告警信息的报警次数达到预设次数阈值或报警持续时间达到报警时间阈值,监控设备仍未接收到用户的报警确认,即用户未对监控设备发出的告警信息做出响应,则可以由被监控设备向用户发送告警信息,或者,监控设备与被监控设备联合报警。其中向用户发送告警信息的被监控设备可以为监控设备判定为丢失的被监控设备,也可以为其他未被判定为丢失的被监控设备。监控设备若与被监控设备通信连接,监控设备将告警信息发送给被监控设备,以使得该被监控设备向用户报警。例如监控设备手表20可以控制手机30振动或语音报警。
在本申请实施例中,监控设备可以优先控制被监控设备中与用户关联度高的被监控设备向用户输出告警信息。若被监控设备输出告警信息后告仍未接收到用户响应时,可控制用户周边蓝牙设备(如耳机50等)向用户发送告警信息,从而实现告警信息可达。其中告警信息可以实现为振动、声音或界面呈现,本申请实施例对此不作具体限定。
以监控设备手表20在界面上呈现告警信息为例,请一并参阅图10。监控设备手表20判断手机丢失,则在手表20界面上显示“检测到耳机可能丢失”,或显示“检测到耳机距离超 出预设阈值”等告警信息,或语音播报上述告警信息,以提醒用户耳机可能丢失。同时在手表20界面上还呈现“清除告警”、“暂停告警”、“锁定模式”和“地图查找”等选项,以供用户在了解到该告警信息后做出相应的选择。
其中,“清除告警”选项用于告知监控设备,清除掉当下的告警信息,并告知监控设备该区域是安全环境,以使得监控设备在安全环境内停止设备监控。
其中,“暂停告警”选项用于告知监控设备,解除掉当下的告警信息,并告知监控设备继续监控被监控设备。“暂停告警”与“清除告警”的相同点都是用户认为被判断丢失的设备(如手机)是安全并非真丢失,用户解除当下的告警信息。区别点在于:“清除告警”是用户将当前区域设置为安全环境,在安全环境不进行设备监控。“暂停告警”是用户没有将当前区域设置为安全环境,需要在该区域内进行设备监控。
其中,“锁定模式”选项用于告知监控设备,希望监控设备控制该被监控设备进入锁定模式,不允许该被监控设备被关机,不允许该被监控设备被移动。
其中,“地图查找”选项用于告知监控设备呈现相应的地图信息(如图9)。用户可以在其确认被监控设备丢失时,可以通过监控设备提供的地图信息查找到对应的被监控设备。
可以理解,若由被监控设备向用户输出告警信息,且该被监控设备具有显示屏,则该被监控设备也可以显示如图10所示的界面。
步骤85,监控设备接收用户的确认操作。
在本申请实施例中,在被监控设备或监控设备向用户发送告警信息后,用户基于其对被监控设备的判断,对告警信息进行报警确认。被监控设备或监控设备接收用户的确认操作(如,点击“清除告警”、“暂停告警”、“锁定模式”或“地图查找”),则被监控设备或监控设备可以确认告警信息已经送达至用户。
若用户确认该被判断为丢失的被监控设备当前为安全情况,且当前区域为安全环境,用户可以点击上述“清除告警”选项。若用户确认该被判断为丢失的被监控设备当前为安全状态,但是该位置区域并非是安全环境,则用户可以点击上述“暂停告警”。若用户觉得该被判断为丢失的被监控设备当前为安全状态,但是可能处于不安全状态(例如,无法携带该被判断为丢失的被监控设备),则用户可以点击“锁定模式”。若用户认为该告警信息有效,设备可能真的丢失,则用户可以点击“设备查找”。
步骤86,监控设备响应用户的确认操作进行相应操作。
监控设备检测到用户选择“清除告警”,监控设备解除当下告警信息,且在该区域内不进行设备监控。监控设备记录当前其所处的位置信息,将该位置信息确定为安全环境并保存,以在下一次监控时,监控设备检测到处于该安全环境时,监控设备停止对被监控设备进行设备监控。
在一些实施例中,监控设备检测到该区域为安全环境,可以根据安全环境对应的预设阈值对被监控设备进行监控。
监控设备检测到用户选择“暂停告警”,监控设备解除当下告警信息,且继续对被监控设备进行设备监控,可以继续执行上述步骤82至步骤86。
监控设备检测到用户选择“锁定模式”,监控设备向该被判断为丢失的被监控设备发送锁定指令,如向图10中被判断为丢失的手机发送锁定指令,以使得手机不允许被关机,不允许被移动。若被监控设备检测到其被关机或被移动,则该被监控设备会振动、报警或声音提醒,或该被监控设备向监控设备发送其被关机或移动的信息,则监控设备向用户发送告警信息。
在一些实施例中,监控设备可以通过与被判断为丢失的被监控设备的通信连接发送锁定指令给该被监控设备,或者,通过修改通信协议,例如修改蓝牙协议,新增指令,以在监控设备与被判断为丢失的被监控设备之间传输附加的锁定指令。被监控设备在接收到锁定指令后进入不允许被强制关机不允许被移动的状态。被监控设备可以将其信息(例如,接收到关机操作或加速度传感器数据)发送给监控设备,由监控设备对被监控设备的状态进行判断。在被监控设备的状态变化(例如,被移动或被关机),监控设备报警,还可以控制被监控设备报警。
监控设备检测到用户选择“地图查找”。监控设备将其建立的设备间位置距离拓扑图与监控设备当前所处的位置信息进行整理,构建一个便于用户查找设备的地图,用户可依据该地图查找该被判定为丢失的被监控设备。
在本申请实施例中,在被监控设备向用户报警时,其可以通过与监控设备的通信连接,将用户的确认操作发送给监控设备,由监控设备进行相应操作。示例性,被监控设备接收到用户选择“清除告警”选项,被监控设备告知监控设备的选择,监控设备响应用户的选择,将该位置区域设置为安全环境并停止设备监控。
在一些实施例中,监控设备可以维护一个安全环境列表,监控设备还可以提供安全环境增删功能。即用户可以根据其对各个区域环境的安全性判断,在安全环境列表中添加或删除安全环境。
在一些实施例中,用户选择“暂停告警”后,还可以设置报警的时效性,比如说设置在某一位置区域内未来的预设一段时间内不报警。例如,在区域A,监控设备判断被监控设备丢失,监控设备向用户报警。用户选择“暂停告警”后,并设置在未来5个小时内不报警。则在未来5个小时内,监控设备在该区域内停止对被监控设备进行设备监控,在过了5个小时后,监控设备恢复在该区域内对被监控设备的设备监控。
可以理解,触发重新选为监控设备的情形(具体内容可以参考图3或图6中有关描述)可以发生在图8所示的任一步骤。在出现触发重新选为监控设备的情形时,重新选为监控设备,则重新执行图8所示的设备监控方法的流程。
在一些实施例中,监控设备也可以监控其本身,即可以控制其被锁定,不允许被移动不允许被关机。以监控设备为手机30,被监控设备为耳机50为例,手机30判断其当前处于锁屏状态,手机30与耳机50蓝牙连接,且耳机50上正播放音频,则手机30可以认为耳机50正佩戴于用户上。手机30监控到其与耳机50的距离超出预设阈值,手机30控制耳机50报警提醒用户,且手机30可以自动进入锁定模式。
下面介绍本申请实施例的一种应用场景。
如上述图3的示例,用户佩戴手表20、手机30锁屏。手表20被选为监控设备,手表20未与耳机50建立通信连接,手机30与耳机50建立通信连接。用户将手机30和耳机50装入包内。手机30可以基于其与耳机50的通信连接,监控耳机50。若用户的包丢失,手表20检测当前环境中的蓝牙寻呼信号,检测到蓝牙信号所携带的设备标识与耳机50的设备标识匹配,则根据该蓝牙寻呼信号的RSSI评估其与耳机50的距离。检测到蓝牙寻呼信号所携带的设备标识与手机30的设备标识匹配,则根据该蓝牙寻呼信号的RSSI评估其与手机30的距离。以此,实现手表20对手机30和耳机50的监控。
下面介绍本申请实施例的另一种应用场景。如上述图3的示例,用户在游泳的时候会将不方便携带的电子设备(如手机30)放置运动包中,用户随身携带手表20。手表20选为监 控设备。用户离开运动包,手表20检测其与手机30的距离变化,在手表20与手机30的距离超过预设阈值后,手表20启动报警,用户在手表20上选择“锁定模式”,手表20向手机30发送锁定指令,控制手机30不允许被开机不允许被移动,手机30持续监控其状态(例如,加速度传感器状态或是否接收关机操作),在监控到其状态异常(例如,手机30被移动,或手机30被关机),手机30基于其与手表20的通信通道向手表20发送信息,以使得手表20向用户报警,并通知手机30进行报警。
图11是本申请实施例提供的一种计算设备140的结构示意图。该计算设备140包括处理器141,通信总线142,存储器143以及至少一个通信接口144。
处理器141可以是一个通用中央处理器(Central Processing Unit,CPU),特定应用集成电路(application-specific integrated circuit,ASIC),图形处理器(graphics processing unit,GPU)或其任意组合。处理器141可以包括一个或多个芯片,如昇腾芯片,处理器141可以包括AI加速器,例如:神经网络处理器(neural processing unit,NPU)。
通信总线142可包括在计算设备140各个部件(例如,处理器141、存储器143、通信接口144)之间传送信息的通路。
存储器143可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备,随机存取存储器(random access memory,RAM))或者可存储信息和指令的其它类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质,但不限于此。存储器143可以是独立存在,通过通信总线142与处理器141相连接。存储器143也可以和处理器141集成在一起。存储器143可以存储计算机指令,当存储器143中存储的计算机指令被处理器141执行时,可以实现本申请的设备监控方法。另外,存储器143中还可以存储有处理器在执行上述方法的过程中所需的数据以及所产生的中间数据和/或结果数据。
通信接口144,使用任何收发器一类的装置,用于与其它设备或通信网络通信,如以太网,无线接入网(RAN),无线局域网(Wireless Local Area Networks,WLAN)等。
在具体实现中,作为一种实施例,处理器141可以包括一个或多个CPU。
在具体实现中,作为一种实施例,计算机设备可以包括多个处理器。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。本实施例还提供一种计算机存储介质,该计算机存储介质中存储有计算机指令,当该计算机指令在电子设备上运行时,使得电子设备执行上述各方法实施例中的设备监控。
本实施例还提供了一种计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述相关步骤,以实现上述各方法实施例中的应用程序设备监控。
另外,本申请的实施例还提供一种装置,这个装置具体可以是芯片,组件或模块,该装置可包括相连的处理器和存储器;其中,存储器用于存储计算机执行指令,当装置运行时,处理器可执行存储器存储的计算机执行指令,以使芯片执行上述各方法实施例中的应用程序设备监控。
其中,本实施例提供的电子设备、计算机存储介质、计算机程序产品或芯片均用于执行 上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。该集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。

Claims (36)

  1. 一种设备监控方法,应用于服务器,其特征在于,所述方法包括:
    接收第一电子设备的第一信息,其中所述第一电子设备的第一模式已开启且使用第一账户信息登录所述服务器,所述第一信息包括第一设备状态信息;
    接收第二电子设备的第二信息,其中所述第二电子设备的所述第一模式已开启且使用所述第一账户信息登录所述服务器,所述第二信息包括第二设备状态信息;
    根据所述第一设备状态信息和所述第二设备状态信息确定监控设备;
    向所述第一电子设备发送第一指示信息,其中所述第一指示信息用于指示所述第一电子设备是否为所述监控设备;
    向所述第二电子设备发送第二指示信息,其中所述第二指示信息用于指示所述第二电子设备是否为所述监控设备。
  2. 如权利要求1所述的方法,其特征在于,所述第一信息还包括:
    第一连接设备信息,所述第一连接设备信息包括第三电子设备的标识,其中所述第一电子设备通信连接所述第三电子设备。
  3. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    根据所述第一设备状态信息确定对应的第一优先级;
    根据所述第二设备状态信息确定对应的第二优先级;
    将所述第一优先级和所述第二优先级中较高的优先级对应的设备作为监控设备。
  4. 如权利要求1所述的方法,其特征在于,所述第二信息还包括:
    第二连接设备信息,所述第二连接设备信息包括第四电子设备的标识,所述第四电子设备通信连接所述第二电子设备。
  5. 如权利要求4所述的方法,其特征在于,所述方法还包括:
    当所述第一电子设备为所述监控设备时,将被监控设备信息发送给所述第一电子设备,其中所述被监控设备信息包括所述第二电子设备和所述第四电子设备的标识。
  6. 如权利要求5所述的方法,其特征在于,所述方法还包括:
    接收所述第二电子设备发送的变化后的第二连接设备信息;
    将所述变化后的第二连接设备信息发送给所述第一电子设备。
  7. 如权利要求1至6任一项所述的方法,其特征在于,所述方法还包括:
    监测所述第一设备状态信息和所述第二设备状态信息;
    当所述第一设备状态信息和/或所述第二设备状态信息变化时,根据当前所述第一设备状态信息和所述第二设备状态信息,确定是否重新选出所述监控设备。
  8. 如权利要求1至7任一项所述的方法,其特征在于,所述方法还包括:
    监测到第五电子设备的第一模式已开启,获取所述第五电子设备的第三设备状态信息,其中所述第五电子设备使用所述第一账户信息登录所述服务器;
    根据所述第一设备状态信息、所述第二设备状态信息和所述第三设备状态信息,确定是否重新选出所述监控设备。
  9. 如权利要求7或8所述的方法,其特征在于,所述确定是否重新选出所述监控设备包 括:
    判断当前所选出的监控设备的优先级是否是最高;
    若是,则不重新选出所述监控设备;
    若否,则重新选出所述监控设备。
  10. 如权利要求1至9任一项所述的方法,其特征在于,所述设备状态信息包括:是否佩戴,和/或,是否锁屏。
  11. 一种设备监控方法,应用于具有第一模式的第一电子设备,其特征在于,所述方法包括:
    接收第一操作,其中所述第一操作用于输入第一账户信息;
    响应于所述第一操作,使用所述第一账户信息登录服务器;
    当检测到所述第一模式开启时,向所述服务器发送第一信息,所述第一信息包括第一设备状态信息;
    从所述服务器接收第一指示信息,其中所述第一指示信息用于指示所述第一电子设备是否为监控设备,其中,所述第一指示信息至少根据所述第一设备状态信息确定。
  12. 如权利要求11所述的方法,其特征在于,
    当所述第一指示信息指示所述第一电子设备是所述监控设备时,从所述服务器处接收被监控设备信息;其中,所述被监控设备信息包括第二电子设备的标识,所述第二电子设备使用所述第一账户信息登录所述服务器,且所述第二电子设备的第一模式已开启。
  13. 如权利要求11所述的方法,其特征在于,
    所述第一电子设备通信连接第三电子设备;
    所述第一信息还包括:
    第一连接设备信息,所述第一连接设备信息包括所述第三电子设备的标识。
  14. 如权利要求12所述的方法,其特征在于,
    所述被监控设备信息还包括所述第二电子设备的第二连接设备信息,其中所述第二连接设备信息包括第四电子设备的标识,所述第四电子设备通信连接所述第二电子设备。
  15. 如权利要求11所述的方法,其特征在于,所述方法还包括:
    当监测到所述第一模式变化或所述第一设备状态信息变化时,向所述服务器发送变化后的第一模式或变化后的第一设备状态信息。
  16. 如权利要求11-15任一项所述的方法,其特征在于,
    所述设备状态信息包括:是否佩戴,和/或,是否锁屏。
  17. 如权利要求14-16任一项所述的方法,其特征在于,
    当所述第一指示信息指示所述第一电子设备是监控设备时,基于第一无线通信协议获取周围设备信息;
    当所述周围设备信息包含所述第四电子设备的标识,确定所述第四电子设备的标识对应的第一信号的信号强度,其中所述第一信号基于所述第一无线通信协议;
    判断所述信号强度是否低于预设阈值;
    若低于所述预设阈值,显示第一告警信息。
  18. 如权利要求17所述的方法,其特征在于,所述第一信号为蓝牙寻呼信号。
  19. 如权利要求17所述的方法,其特征在于,所述第二连接设备信息还包括所述第四电子设备的信任值,所述预设阈值包括第一预设阈值和第二预设阈值;
    当所述周围设备信息包含所述第四电子设备的标识时,所述方法还包括:
    根据所述第四电子设备的信任值判断当前所处环境为安全环境或非安全环境;
    当所述环境为所述安全环境,确定第一预设阈值;
    当所述环境为所述非安全环境,确定第二预设阈值;其中,所述第一预设阈值小于所述第二预设阈值。
  20. 一种设备监控方法,应用于设备监控系统,其特征在于,所述设备监控系统包括服务器和具有第一模式的第一电子设备和第二电子设备;
    所述第一电子设备接收第一操作,其中所述第一操作用于输入第一账户信息;
    所述第一电子设备响应于所述第一操作,使用所述第一账户信息登录所述服务器;
    所述第二电子设备接收第二操作,其中所述第二操作用于输入所述第一账户信息;
    所述第二电子设备响应于所述第二操作,使用所述第一账户信息登录所述服务器;
    所述第一电子设备检测到所述第一模式开启时,向所述服务器发送第一信息,所述第一信息包括第一设备状态信息;
    所述第二电子设备检测到所述第一模式开启时,向所述服务器发送第二信息,所述第二信息包括第二设备状态信息;
    所述服务器根据所述第一设备状态信息和所述第二设备状态信息确定监控设备;
    所述服务器向所述第一电子设备发送第一指示信息,其中所述第一指示信息用于指示所述第一电子设备是否为所述监控设备;
    所述服务器向所述第二电子设备发送第二指示信息,其中所述第二指示信息用于指示所述第二电子设备是否为所述监控设备。
  21. 如权利要求20所述的方法,其特征在于,所述设备监控系统还包括第三电子设备,所述第一电子设备通信连接所述第三电子设备;
    所述第一信息还包括:
    第一连接设备信息,所述第一连接设备信息包括所述第三电子设备的标识。
  22. 如权利要求20所述的方法,其特征在于,所述方法还包括:
    所述服务器根据所述第一设备状态信息确定对应的第一优先级,根据所述第二设备状态信息确定对应的第二优先级,并将所述第一优先级和所述第二优先级中较高的优先级对应的设备作为监控设备。
  23. 如权利要求20所述的方法,其特征在于,所述设备监控系统还包括第四电子设备,所述第四电子设备通信连接所述第二电子设备;
    所述第二信息还包括:
    第二连接设备信息,所述第二连接设备信息包括所述第四电子设备的标识。
  24. 如权利要求23所述的方法,其特征在于,所述方法还包括:
    当所述服务器判断所述第一电子设备为所述监控设备时,所述服务器向所述第一电子设备发送被监控设备信息,其中所述被监控设备信息包括所述第二电子设备的标识。
  25. 如权利要求24所述的方法,其特征在于,所述被监控设备信息还包括所述第四电子设备的标识。
  26. 如权利要求20-25任一项所述的方法,其特征在于,
    所述设备状态信息包括:是否佩戴,和/或,是否锁屏。
  27. 如权利要求23-25任一项所述的方法,其特征在于,
    当所述第一指示信息指示所述第一电子设备是监控设备时,所述第一电子设备基于第一无线通信协议获取周围设备信息;
    当所述周围设备信息包含所述第四电子设备的标识,所述第一电子设备确定所述第四电子设备的标识对应的第一信号的信号强度,其中所述第一信号基于所述第一无线通信协议;
    所述第一电子设备判断所述信号强度是否低于预设阈值;
    若低于所述预设阈值,所述第一电子设备显示第一告警信息。
  28. 如权利要求27所述的方法,其特征在于,所述第一信号为蓝牙寻呼信号。
  29. 如权利要求27所述的方法,其特征在于,所述第二连接设备信息还包括所述第四电子设备的信任值,所述预设阈值包括第一预设阈值和第二预设阈值;
    当所述周围设备信息包含所述第四电子设备的标识时,所述服务器根据所述第四电子设备的信任值判断当前所处环境为安全环境或非安全环境,当所述环境为所述安全环境,确定第一预设阈值,当所述环境为所述非安全环境,确定第二预设阈值;其中,所述第一预设阈值小于所述第二预设阈值。
  30. 如权利要求24、25、27至29任一项所述的方法,其特征在于,所述方法还包括:
    所述第二电子设备监测到所述第二连接设备信息变化时,将变化后的第二连接设备信息发送给所述服务器;
    所述服务器将所述变化后的第二连接设备信息发送给所述第一电子设备。
  31. 如权利要求20至30任一项所述的方法,其特征在于,所述方法还包括:
    所述服务器监测所述第一设备状态信息和所述第二设备状态信息;
    当所述第一设备状态信息和所述第二设备状态信息变化时,所述服务器根据当前所述第一设备状态信息和所述第二设备状态信息,确定是否重新选出所述监控设备。
  32. 如权利要求20所述的方法,其特征在于,所述设备监控系统还包括第五电子设备,所述方法还包括:
    所述服务器监测到所述第五电子设备的第一模式已开启,接收所述第五电子设备的第三信息,其中所述第五电子设备使用所述第一账户信息登录所述服务器,所述第三信息包括第三设备状态信息;
    所述服务器根据所述第一设备状态信息、所述第二设备状态信息和所述第三设备状态信息,确定是否重新选出所述监控设备。
  33. 如权利要求31或32所述的方法,其特征在于,所述确定是否重新选出所述监控设备包括:
    所述服务器判断当前所选出的监控设备的优先级是否是最高;
    若是,则不重新选出所述监控设备;
    若否,所述服务器重新选出所述监控设备。
  34. 一种电子设备,其特征在于,包括:
    存储器,用于存储有计算机程序;
    处理器,用于执行所述存储器存储的所述计算机程序,当所述计算机程序被执行时,所述处理器用于执行如权利要求1-10或11-19或20-33任意一项所述的设备监控方法。
  35. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求1-10或11-19或 20-33任意一项所述的设备监控方法。
  36. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码被一个计算机执行的时候,所述计算机程序代码可以使得所述计算机执行如权利要求1-10或11-19或20-33任意一项所述的设备监控方法。
PCT/CN2022/138511 2021-12-15 2022-12-13 设备监控方法及电子设备 WO2023109780A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111539983.2 2021-12-15
CN202111539983.2A CN116264584A (zh) 2021-12-15 2021-12-15 设备监控方法及电子设备

Publications (1)

Publication Number Publication Date
WO2023109780A1 true WO2023109780A1 (zh) 2023-06-22

Family

ID=86722686

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/138511 WO2023109780A1 (zh) 2021-12-15 2022-12-13 设备监控方法及电子设备

Country Status (2)

Country Link
CN (1) CN116264584A (zh)
WO (1) WO2023109780A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848374A (zh) * 2010-04-30 2010-09-29 大唐电信科技股份有限公司 无线视频监控系统及无线视频监控方法
CN104253861A (zh) * 2014-09-12 2014-12-31 腾讯科技(深圳)有限公司 一种终端控制方法、装置及系统
CN112738475A (zh) * 2020-12-30 2021-04-30 杭州海康威视数字技术股份有限公司 播放视频的方法、装置及电子设备
CN112927471A (zh) * 2021-01-20 2021-06-08 南方科技大学 一种防走失监护系统
WO2021164179A1 (zh) * 2020-02-17 2021-08-26 平安科技(深圳)有限公司 一种数据监控方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848374A (zh) * 2010-04-30 2010-09-29 大唐电信科技股份有限公司 无线视频监控系统及无线视频监控方法
CN104253861A (zh) * 2014-09-12 2014-12-31 腾讯科技(深圳)有限公司 一种终端控制方法、装置及系统
WO2021164179A1 (zh) * 2020-02-17 2021-08-26 平安科技(深圳)有限公司 一种数据监控方法及装置
CN112738475A (zh) * 2020-12-30 2021-04-30 杭州海康威视数字技术股份有限公司 播放视频的方法、装置及电子设备
CN112927471A (zh) * 2021-01-20 2021-06-08 南方科技大学 一种防走失监护系统

Also Published As

Publication number Publication date
CN116264584A (zh) 2023-06-16

Similar Documents

Publication Publication Date Title
US11475754B2 (en) Selection of accessory device based on wireless signals
US10462277B2 (en) Method and device for providing function of mobile terminal
KR102521922B1 (ko) 전자 장치 및 전자 장치의 액세스 포인트 정보 운용 방법
CN103826323A (zh) 一种无线网络连接的方法、终端及移动终端
WO2016192356A1 (zh) 终端设备配对连接的方法及系统
US20210320904A1 (en) Controlling Computing Device Virtual Private Network Usage With A Wearable Device
US10356561B2 (en) Tracking a person in a group of people
US10681200B2 (en) Message processing method and system, and related device
US9706380B1 (en) Providing emergency notification and tracking data from a mobile device
US20130267177A1 (en) Terminal coordination system and method therefor
US11622319B2 (en) Electronic device for providing AP list and method for operating electronic device
WO2020200096A1 (zh) Ssb传输指示方法、装置、终端、设备和介质
WO2014027222A1 (en) Methods and apparatus for device information sharing
TW202037199A (zh) 事件處理方法和設備以及系統
CN108012270B (zh) 一种信息处理的方法、设备和计算机可读存储介质
WO2019006732A1 (zh) 一种信息推荐方法及装置
WO2023109780A1 (zh) 设备监控方法及电子设备
US11805560B2 (en) Peer to peer communication system
WO2018227785A1 (zh) 一种更新联系人的名片的方法及终端
CN112689274B (zh) 短距离无线通信连接的提示方法、装置及按摩设备
JP6888881B2 (ja) 通信システム及びコンピュータプログラム
JP2012142682A (ja) 通信システム及び通信方法
CN114143129B (zh) 网关批量入网方法、装置、设备及存储介质
JP2013126003A (ja) 近距離無線通信システム
JP6650845B2 (ja) 通信システム及びコンピュータプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22906525

Country of ref document: EP

Kind code of ref document: A1