CN108701401B - Alarm method, device and system and electronic equipment - Google Patents

Alarm method, device and system and electronic equipment Download PDF

Info

Publication number
CN108701401B
CN108701401B CN201880000643.2A CN201880000643A CN108701401B CN 108701401 B CN108701401 B CN 108701401B CN 201880000643 A CN201880000643 A CN 201880000643A CN 108701401 B CN108701401 B CN 108701401B
Authority
CN
China
Prior art keywords
alarm
byte
information
sensor
alarm signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880000643.2A
Other languages
Chinese (zh)
Other versions
CN108701401A (en
Inventor
彭灵
陈辉萍
钟城广
盘国权
范高如
李鑫
陈清泉
黄立旺
王增均
朱荆莲
李文彬
姚化桥
俞伟良
陈海裕
杨金桂
李文和
李国凯
郭飞锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN LINGKE TECHNOLOGY Co.,Ltd.
Original Assignee
Shenzhen JBT Smart Lighting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen JBT Smart Lighting Co Ltd filed Critical Shenzhen JBT Smart Lighting Co Ltd
Publication of CN108701401A publication Critical patent/CN108701401A/en
Application granted granted Critical
Publication of CN108701401B publication Critical patent/CN108701401B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Emergency Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides an alarm method, an alarm device, an alarm system and electronic equipment, relates to the technical field of data processing, and aims to solve the technical problem that a sensor in the prior art is low in safety coefficient and improve the safety of data transmission of the sensor; the alarm signal is generated by the sensor according to the encryption of a prestored byte encryption table; and then analyzing the alarm signal to obtain alarm information.

Description

Alarm method, device and system and electronic equipment
Technical Field
The present application relates to the field of data processing technologies, and in particular, to an alarm method, an alarm device, an alarm system, and an electronic device.
Background
People must resort to sense organs in order to obtain information from the outside world. The functions of people in the research of natural phenomena and laws and production and life are far from enough by the sense organs of the people. To accommodate this, a sensor is required. Thus, the sensor is an extension of the human five sense organs, also known as the electro five sense organs.
With the continuous development of science and technology, the use of sensors is more and more extensive. For example, the sensor may be applied to the smart home field, and the environment in the home may be monitored by installing the sensor in the smart device or directly installing the sensor, for example, the gas sensor may be installed in the home to monitor and control the gas parameters of each corner in the room, however, while the sensor applied to the smart home field is convenient for people, there are various kinds of external malicious intrusions. The normal operation of the household intelligent equipment or the sensor can be influenced if the safety is low, and the life safety of family members can be threatened if the safety is high. For example, the monitoring data sent by the sensor is tampered, which causes the problem that the alarm is not given out at the time of the alarm, for example, the concentration of carbon dioxide gas and combustible gas is very high, but the life safety of family members can be seriously threatened without the alarm
In summary, data transmitted by a traditional household sensor is not encrypted, and the data is easy to intercept, intercept and tamper, namely, the problem of low safety coefficient exists in data transmission of the existing sensor.
Disclosure of Invention
In view of the above, the present application provides an alarm method, device, system and electronic device to at least alleviate the technical problem of low safety factor of the prior art sensor.
In a first aspect, an embodiment of the present application provides an alarm method, which is applied to a mobile terminal, and includes:
receiving an alarm signal sent by a sensor; the alarm signal is generated by the sensor according to the encryption of a pre-stored byte encryption table;
and analyzing the alarm signal to obtain alarm information.
With reference to the first aspect, an embodiment of the present application provides a first possible implementation manner of the first aspect, where the method further includes:
and outputting the alarm information so as to be convenient for a user to check.
With reference to the first aspect, an embodiment of the present application provides a second possible implementation manner of the first aspect, where an initial state of the alarm information is an unprocessed state, and the initial state represents a state where the alarm information is not processed by a user.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present application provides a third possible implementation manner of the first aspect, where the method further includes:
and receiving processing feedback information of a user, and carrying out state change on the alarm information according to the processing feedback information.
With reference to the first aspect, this example provides a fourth possible implementation manner of the first aspect, where the alarm signal includes a first byte and a second byte, and the first byte represents a sensor class; the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte represents an alarm category; the number of the alarm types is multiple, and each alarm type corresponds to the preset bit of the second byte.
With reference to the fourth possible implementation manner of the first aspect, an embodiment of the present application provides a fifth possible implementation manner of the first aspect, where the alarm signal further includes a third byte, and the third byte is configured to represent quantized monitoring information, and a specific value is analyzed by the mobile terminal.
With reference to the fourth possible implementation manner of the first aspect, an embodiment of the present application provides a sixth possible implementation manner of the first aspect, where the alarm category is pre-divided into multiple levels.
With reference to the sixth possible implementation manner of the first aspect, this application example provides a seventh possible implementation manner of the first aspect, where the alarm signal further includes a fourth byte, and the fourth byte is configured to characterize a level of each alarm category, where each level corresponds to a preset bit of the fourth byte.
In a second aspect, an embodiment of the present application provides an alarm method, applied to a sensor, including:
sending an alarm signal to the mobile terminal; the alarm signal is generated by the sensor according to byte encryption table encryption; so that the mobile terminal analyzes the alarm signal to obtain alarm information.
In a third aspect, an embodiment of the present application provides an alarm device, including:
the receiving module is configured to receive the alarm signal sent by the sensor; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor;
and the analysis module is configured to analyze the alarm signal to obtain alarm information.
With reference to the third aspect, an embodiment of the present application provides a first possible implementation manner of the third aspect, where the apparatus further includes:
and the output module is configured to output the alarm information so as to be convenient for a user to check.
With reference to the third aspect, an example of the present application provides a second possible implementation manner of the third aspect, where an initial state of the alarm information is an unprocessed state, and the initial state represents a state where the alarm information is not processed by a user.
With reference to the second possible implementation manner of the third aspect, the present application provides a third possible implementation manner of the third aspect, where the apparatus further includes:
and the change module is configured to receive processing feedback information of a user and carry out state change on the alarm information according to the processing feedback information.
With reference to the third aspect, an embodiment of the present application provides a fourth possible implementation manner of the third aspect, where the apparatus further includes:
the user management module is configured to receive a password login request of a user.
In a fourth aspect, an embodiment of the present application further provides an alarm system, including: the sensor is in communication connection with the mobile terminal;
the sensor is configured to send an alarm signal to the mobile terminal; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor;
and the mobile terminal analyzes the alarm signal to obtain alarm information.
In combination with the fourth aspect, the present embodiments provide a first possible implementation manner of the fourth aspect, where the number of the sensors is multiple.
In a fifth aspect, an embodiment of the present application provides an alarm method, which is applied to an alarm device, and includes:
receiving monitoring information sent by a sensor;
judging whether the monitoring information meets an alarm condition;
if so, generating and sending an alarm signal to a mobile terminal based on the monitoring information so that the mobile terminal analyzes the alarm signal to obtain alarm information; wherein the alarm signal is generated by the alarm device according to byte encryption table encryption.
In a sixth aspect, an embodiment of the present application further provides an alarm system, including: the alarm device comprises a sensor, an alarm device and a mobile terminal, wherein the sensor is connected with the alarm device, and the alarm device is in communication connection with the mobile terminal;
the sensor is configured to monitor information;
the alarm device is configured to judge whether the monitoring information meets an alarm condition, and if so, generating alarm information based on the monitoring information;
the alarm device encrypts the alarm information according to a prestored byte encryption table to generate an alarm signal;
the alarm device sends an alarm signal to the mobile terminal;
the mobile terminal analyzes the alarm signal to obtain alarm information;
and the mobile terminal outputs the alarm information.
In a seventh aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of the alarm method when executing the computer program.
In an eighth aspect, the present embodiments provide a computer-readable medium having non-volatile program code executable by a processor, where the program code causes the processor to execute the steps of the above-mentioned alarm method.
The beneficial effects brought by the embodiment of the application at least comprise:
the embodiment of the application provides an alarm method, which is applied to a mobile terminal and used for receiving an alarm signal sent by a sensor; the alarm signal is generated by the sensor according to the encryption of a prestored byte encryption table; and then analyzing the alarm signal to obtain alarm information. Therefore, the technical scheme provided by the embodiment of the application can relieve the technical problem of low safety coefficient of the sensor in the prior art, and improve the safety of data transmission.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the detailed description of the present application or the technical solutions in the prior art, the drawings needed to be used in the detailed description of the present application or the prior art description will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of an alarm method according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of another alarm method provided in the embodiments of the present application;
fig. 3 is a schematic diagram of an alarm device according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of an alarm system provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of another alarm method provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of another alarm system provided by an embodiment of the present application;
fig. 7 is a schematic view of an electronic device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
According to the alarm method, the alarm device, the alarm system and the electronic equipment, the technical problem that the safety coefficient of the sensor is low in the prior art can be solved, and the safety coefficient can be improved.
For the convenience of understanding the embodiment, a detailed description will be given to an alarm method disclosed in the embodiment of the present application.
In some embodiments:
as shown in fig. 1, an embodiment of the present application provides an alarm method, which may be applied to a mobile terminal, and the method includes:
step S101, receiving an alarm signal sent by a sensor; the alarm signal is generated by the sensor according to the encryption of a prestored byte encryption table;
specifically, the byte encryption tables include a sensor class encryption table, an alarm type level encryption table, and a monitoring information quantized value encryption table, which correspond to the first byte, the second byte, the third byte, and the fourth byte, respectively. Of course, the byte encryption table may also be a total table including the above-described types of encryption tables.
Said alarm signal comprises a first byte and a second byte, said first byte indicating a sensor class (eight sensors, indicated by 1 per bit); a plurality of sensor types, each sensor type corresponding to a predetermined bit of the first byte; and "0" and "1" of the preset bit indicate an alarm state (alarm or not) of the sensor of the preset bit, respectively.
Typically, a byte comprises 8 bits, so the first byte can represent 8 sensor classes, with a "1" for each bit indicating that a sensor has issued an alarm and a "0" indicating that the sensor has not issued an alarm.
For ease of understanding, the last bit of the first byte is taken as an example for explanation; the last bit represents that the sensor type is a carbon dioxide sensor, and when the last bit (the first bit to the last bit are arranged in the order of left to right, the last bit of the byte means the rightmost bit, and the left first bit represents the first bit of the byte), the carbon dioxide sensor gives out an alarm, and the last bit represents that the carbon dioxide sensor gives out an alarm; when the last bit is "0" indicating that the carbon dioxide sensor is not alarming; other bits define other classes of sensors in the same way.
It is noted that the first byte may also be position information indicating the same category of sensors placed at different positions of the preset place. For example, the first byte indicates the location of 8 carbon dioxide sensors distributed in 8 different locations (e.g., living room, kitchen, main bed, study room, restaurant, balcony, toilet, sub-bed) of the home, which may be identified by numbers (e.g., "1-8" for each of the above locations).
The second byte represents the alarm category (eight categories, represented by 1 per bit); the number of the alarm types is plural, and each of the alarm types corresponds to a preset bit of the second byte.
Similarly, the second byte comprises 8 bits, the second byte can represent eight alarm categories, which are respectively represented by "1" of each bit, and as explained in the above example of the carbon dioxide sensor, the "1" of the last bit of the second byte represents that the carbon dioxide concentration exceeds the standard; a "0" in the last bit of the second byte indicates that the carbon dioxide concentration is not exceeded.
The alarm signal may further include a third byte configured to characterize the quantized monitoring information (e.g., concentration value, electric quantity value), and the specific value is parsed by the mobile terminal.
Since one byte includes 8 bits, the third byte can represent 256 numbers, i.e., from 0 to 255, corresponding to 00000000 to 11111111, respectively, each corresponding to a predetermined quantization value of the monitoring information,
continuing with the above example of a carbon dioxide sensor: the third byte herein may represent a byte of gas concentration; each number may correspond to a preset concentration value, and the concentration value interval between two adjacent numbers is set according to actual detection requirements and sensor detection precision, in this embodiment, the concentration value interval between two adjacent numbers is set to any value between 10 and 60, for example, the preset concentration value corresponding to 000000000000 is 1000ppm (parts per million), the preset concentration value corresponding to 00000001 is 1020ppm, the preset concentration value corresponding to 00000010 is 1040ppm, the preset concentration value corresponding to 00000011 is 1060ppm, … …, that is, the concentration value interval between two adjacent numbers is set to 20 ppm. It should be noted that, in setting the preset concentration value corresponding to each number, how much more than alarm is set by referring to the national standard or the international standard or other experimental standards, for example, in the embodiment, the reference standards are as follows: carbon dioxide concentration value and human physiological reaction: 350-1000 ppm: the air is fresh, and the breath is smooth; 1000-2000 ppm: feeling turbid air and beginning to feel drowsy; 2000-5000 ppm: headache, lethargy, dull, inability to concentrate attention, accelerated heartbeat, mild nausea; greater than 5000 ppm: can lead to severe hypoxia, resulting in permanent brain damage, coma, and even death.
Considering that the alarm category may have a plurality of levels representing degrees, the alarm category may be further divided into a plurality of levels in advance, and the alarm information may further include a fourth byte configured to represent a level of each alarm category, each level corresponding to a preset bit of the fourth byte.
Similarly, the fourth byte comprises 8 bits, where the "1" of each bit represents the alarm level, respectively; the fourth byte may represent eight alert levels; next, as explained in the above example of the carbon dioxide sensor, the "1" of the last bit of the fourth byte indicates that the carbon dioxide concentration exceeds the standard by one level; a "1" in the first bit of the fourth byte indicates that the carbon dioxide concentration exceeds the standard by eight levels.
And S102, analyzing the alarm signal to obtain alarm information.
In a specific implementation, the step S102 includes: and searching the byte encryption table to analyze the alarm signal to obtain alarm information. The byte encryption table is the same as the byte encryption table, and the byte encryption table is stored in a memory of the mobile terminal in advance, so that the mobile terminal can conveniently retrieve and search, and then the alarm information is obtained through analysis.
The following are illustrated by examples of carbon dioxide sensors: when the alarm signal includes a first byte, a second byte, a third byte, and a fourth byte, the alarm signal is generally expressed in the order of the first byte to the fourth byte: "00000001", and the result of the mobile terminal analysis is: sensor type-carbon dioxide sensor alarm, alarm type-concentration exceeding, concentration value-1020 ppm, alarm type grade-first level (concentration exceeding); the result is the alarm information.
The following are illustrated by examples of carbon dioxide sensors: when the alarm signal includes a first byte, a second byte, a third byte, and a fourth byte, the alarm signal is generally expressed in the order of the first byte to the fourth byte: "00000001", and the result of the mobile terminal analysis is: sensor type-carbon dioxide sensor alarm, alarm type-concentration exceeding, concentration value-1020 ppm, alarm type grade-first level (concentration exceeding); the result is the alarm information.
The embodiment of the application provides an alarm method, which is applied to a mobile terminal and used for receiving an alarm signal sent by a sensor; the alarm signal is generated by the sensor according to the encryption of a prestored byte encryption table; and then analyzing the alarm signal to obtain alarm information. Therefore, the technical scheme provided by the embodiment of the application can relieve the technical problem of low safety coefficient of the sensor in the prior art, and improve the safety of data transmission.
Referring to fig. 2, an embodiment of the present application provides another alarm method, where the method further includes:
step S201, outputting the alarm information to facilitate the user to check.
In a specific implementation, the step S201 may be implemented by one of the following manners:
firstly, outputting the alarm information in a voice mode;
outputting the alarm information to a visual interface, where the visual interface may be a display screen of the mobile terminal or a display device connected to the mobile terminal, for example, the visual interface may be a projection device including a projector and a projection screen, and the alarm information may be projected onto the projection screen through the projector; specifically, the alarm information is displayed on the visualization interface in a visualized form, for example, the alarm information is displayed in a form of characters, diagrams, and the like.
Further, the initial state of the alarm information is an unprocessed state, and the initial state represents a state in which the alarm information is unprocessed by a user.
Specifically, the alarm information is marked as an unprocessed state in a preset mark form, for example, when the alarm information is voice information, an unread mark (for example, an asterisk is in a color, and the asterisk can be added with a color mark to be more striking) is set above the voice information to mark the unprocessed state of the voice information; when the alarm information is visual information, the alarm information is marked with characters or diagrams in a preset color (for example, red) so as to identify the unprocessed state of the visual information.
Further, the method further comprises:
step S202, receiving processing feedback information of a user, and changing the state of the alarm information according to the processing feedback information.
Specifically, a user can process the unprocessed alarm information to generate processing feedback information to the mobile terminal, the mobile terminal receives the processing feedback information, and changes the state of the alarm information according to the processing feedback information to change the alarm information from the unprocessed state to the processed state; for example, when the alarm information is voice information, the user clicks unread voice information to process, processing feedback information is generated, and the mobile terminal changes the unprocessed state of the voice information into the processed state according to the received processing feedback information (for example, the asterisk is changed into a round O, and when the asterisk has a color mark, the color is changed at the same time); when the alarm information is visual information, for example, characters, the user needs to click the characters or read the characters to process the characters to generate processing feedback information, and the mobile terminal changes the unprocessed state of the characters into the processed state (for example, changes the characters from red to green) according to the received processing feedback information.
It should be noted that, before the status change of the alarm information according to the processing feedback information, the method further includes: judging whether the user completely acquires the alarm information (namely the mobile terminal can perform content integrity judgment), wherein the specific mobile terminal can judge whether the user completely receives the voice information by monitoring whether the user completely receives the voice information, for example, by comparing the playing time length with the preset time length of the sent alarm information, if the playing time length is consistent with the preset time length, the alarm information is completely acquired, and then the state is changed according to the processing feedback information; otherwise, judging that the alarm information is not completely acquired, and sending a prompt to the user to carry out retreatment (namely listening to the voice information again); or, the mobile terminal monitors whether the user finishes reading the text information content for recognition, for example, the voice information of the text reading information received by the microphone is compared with the text information generated after voice recognition to obtain a similarity value, when the similarity value is greater than a preset threshold value, it is determined that the alarm information is completely acquired, and otherwise, a prompt message is sent to prompt the user to re-process (i.e., read the text information again).
In addition, the embodiment of the present application provides a third alarm method, where the alarm method is applied to a sensor, and the method includes: sending an alarm signal to the mobile terminal; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor; so that the mobile terminal analyzes the alarm signal to obtain alarm information. The alarm information is generated by encrypting the alarm information, and the alarm information refers to monitoring information when the alarm condition is met.
Optional in some embodiments:
as shown in fig. 3, an embodiment of the present application provides an alarm device, which includes:
a receiving module 301, which can be configured to receive the alarm signal sent by the sensor; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor; namely, the alarm signal is expressed in the form of bytes;
and the analysis module 302 is configured to analyze the alarm signal to obtain alarm information.
Further, the apparatus further comprises: and an output module 303 configured to output the alarm information for a user to view.
Further, the initial state of the alarm information is an unprocessed state, and the initial state indicates a state in which the alarm information is unprocessed by a user.
Further, the apparatus further comprises: and the changing module 304 is configured to receive processing feedback information of a user and change the state of the alarm information according to the processing feedback information.
Further, the apparatus further comprises: the user management module 305 is configured to receive a password login request of a user.
And after the user successfully logs in, the user can check the alarm information and change the state of the alarm information.
User management here includes a visual interface (e.g., a display screen).
In some embodiments:
fig. 4 is a schematic diagram illustrating an alarm system provided in an embodiment of the present application, specifically, the system includes: a sensor 400 and a mobile terminal 500, wherein the sensor is in communication connection with the mobile terminal;
wherein the sensor is configured to send an alarm signal to the mobile terminal; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor;
and the mobile terminal analyzes the alarm signal to obtain alarm information.
Specifically, the sensor comprises a wireless communication module, an acquisition module, a storage module and a processing module, wherein the wireless communication module, the acquisition module and the storage module are respectively connected with the processing module; the storage module is configured to store a byte encryption table; the acquisition module is configured to acquire monitoring information (including concentration values, electric quantity values and the like) in real time; the processing module is configured to receive the monitoring information, judge whether the monitoring information meets an alarm condition, and generate alarm information when the alarm condition is met; then encrypting the alarm information according to a pre-stored byte encryption table to generate an alarm signal; the wireless communication module is configured to communicate with the mobile terminal, such as sending an alert signal to the mobile terminal.
Furthermore, a plurality of sensors can collect different monitoring information; for example, the sensor may be a carbon dioxide sensor configured to detect carbon dioxide (collect carbon dioxide information, such as carbon dioxide concentration); or a combustible gas sensor, such as a hydrogen sensor, configured to detect combustible gas (collect combustible gas information, such as a combustible gas concentration value); and may also be a formaldehyde sensor configured to detect formaldehyde (collecting formaldehyde information, such as formaldehyde concentration).
The alarm system is briefly described below with reference to specific application scenarios:
a plurality of sensors, such as sensors for detecting combustible gases, for detecting carbon dioxide, for detecting formaldehyde, etc., may be placed in the home.
When one or more sensors detect that a certain gas concentration exceeds a standard, sending an alarm signal to an APP (application program) of the mobile terminal, wherein in the scheme, the alarm signal comprises at least two bytes, and one byte represents a sensor type, for example, the sensor type is a carbon dioxide sensor; another byte indicates the alarm category; wherein a byte comprises 8 bits, each bit being defined as a category, e.g. concentration over-alarm, low-power alarm, detector damage alarm, etc
In addition, the alarm categories are set in a graded manner, for example, the alarm categories are graded to show that the alarm categories include the first-level concentration exceeding and the second-level concentration exceeding, the same alarm that the electric quantity is insufficient (the electric quantity is less than 30, the first-level electric quantity is insufficient, the electric quantity is less than 25, the second-level electric quantity is insufficient …, the electric quantity information can be collected by an electric quantity management module), the damage alarm of the detection device can also be graded to show that the alarm categories are damaged (the integrity is less than 90 percent, the integrity is less than 85 percent, the second-level damage …, the integrity information can be obtained by carrying out image recognition analysis on the image collected by the image collection device and comparing with the prestored image information of the initial sensor), i.e. essentially pre-ranking each alarm category.
Of course, other bytes, such as a byte of gas concentration and a byte of residual quantity of electricity, can be contained in the transmitted data, and since one byte can represent 256 numbers (0-255), a specific quantity can be represented by one byte, and then the data can be analyzed by the APP.
Data (alarm signal promptly) that send through the sensor are transmitted to APP, and APP analyzes data again, generates alarm information and exports visual interface, can make the user can audio-visually see alarm information (sensor category, warning kind, concentration information and warning grade etc.).
The alarm device and the alarm system provided by the embodiment of the application have the same technical characteristics as the alarm method provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
The device and the system provided by the embodiment of the present application have the same implementation principle and the same technical effect as the foregoing method embodiments, and for the sake of brief description, no mention of the device and the system embodiments may be made to refer to the corresponding contents in the foregoing method embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In certain embodiments:
as shown in fig. 5, an alarm method provided in an embodiment of the present application may be applied to an alarm device, including:
step S501, receiving monitoring information sent by a sensor;
step S502, judging whether the monitoring information meets the alarm condition;
the alarm condition refers to whether the value of the monitoring information is greater than a preset threshold or less than the preset threshold, for example, when the monitoring information is concentration information of gas (such as carbon dioxide, combustible gas, formaldehyde and the like), whether the value of the gas concentration (i.e. the value of the monitoring information) is greater than the preset threshold of the gas concentration is judged; when the threshold value is greater than the preset threshold value, the alarm condition is met; when the monitoring information is electric quantity information, judging whether the electric quantity value (namely the numerical value of the monitoring information) is smaller than a preset threshold value of the electric quantity; when the value is smaller than the preset threshold value, the alarm condition is met, and the method is also suitable for other monitoring information such as temperature, humidity and the like.
If so, perform step S503; if not, returning to the step S501 to continue monitoring;
step S503, generating and sending an alarm signal to the mobile terminal based on the monitoring information, so that the mobile terminal analyzes the alarm signal to obtain alarm information.
Wherein the alarm signal is generated by the alarm device according to the byte encryption table.
Specifically, the alarm device generates alarm information based on the monitoring information, then encrypts the alarm information according to a pre-stored byte encryption table to generate an alarm signal, and sends the alarm signal to the mobile terminal, so that the mobile terminal analyzes the alarm signal to obtain the alarm information;
fig. 6 shows another alarm system provided in the embodiment of the present application, which includes: the system comprises a sensor 400, an alarm device 600 and a mobile terminal 500, wherein the sensor is connected with the alarm device which is in communication connection with the mobile terminal;
the sensor is configured to monitor information; it should be noted that, although the same reference numerals are used for the sensors as those in fig. 4, the sensors herein only have an acquisition module, and the acquisition of the monitoring information can be achieved.
The alarm device is configured to judge whether the monitoring information meets an alarm condition, and when the monitoring information meets the alarm condition, alarm information is generated based on the monitoring information.
When the sensor is a gas sensor, the alarm information can include an alarm concentration value and/or an alarm type;
the alarm device encrypts the alarm information according to a prestored byte encryption table to generate an alarm signal;
specifically, when the sensor is a gas sensor, the sensor type and/or the alarm type grade is added to alarm information including an alarm concentration value and/or an alarm type, and encryption is performed according to a byte encryption table.
The alarm device sends an alarm signal to the mobile terminal;
the mobile terminal analyzes the alarm signal to obtain alarm information;
namely, the alarm information corresponds to at least one of sensor type, alarm type grade and monitoring information value (alarm concentration value).
And the mobile terminal outputs the alarm information.
Specifically, the mobile terminal outputs the alarm information to a display device for displaying in a form of visual information (e.g., characters and diagrams), so that a user can conveniently view the information.
The alarm system provided by the embodiment of the application has the same technical characteristics as the alarm method provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
The system provided by the embodiment of the present application has the same implementation principle and technical effect as the foregoing method embodiment, and for the sake of brief description, no mention is made in the system embodiment, and reference may be made to the corresponding contents in the foregoing method embodiment.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In all examples shown and described herein, any particular value should be construed as merely exemplary, and not as a limitation, and thus other examples of example embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Referring to fig. 7, an embodiment of the present application further provides an electronic device 100, including: a processor 40, a memory 41, a bus 42 and a communication interface 43, wherein the processor 40, the communication interface 43 and the memory 41 are connected through the bus 42; the processor 40 is configured to execute executable modules, such as computer programs, stored in the memory 41.
The Memory 41 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 43 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, etc. may be used.
The bus 42 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 7, but this does not indicate only one bus or one type of bus.
Wherein, the memory 41 is configured to store the program 401, and the processor 40 executes the program 401 after receiving the execution instruction, and the method executed by the apparatus defined by the flow program disclosed in any of the embodiments of the present application may be applied to the processor 40, or implemented by the processor 40.
The processor 40 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 40. The Processor 40 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 41, and the processor 40 reads the information in the memory 41 and completes the steps of the method in combination with the hardware thereof.
In addition, in the description of the embodiments of the present application, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
In the description of the present application, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present application. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The computer program product for performing the alarm method provided in the embodiment of the present application includes a computer-readable storage medium storing a nonvolatile program code executable by a processor, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, and is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Industrial applicability: the embodiment of the application provides an alarm method, which is applied to a mobile terminal and used for receiving an alarm signal sent by a sensor; the alarm signal is generated by the sensor according to the encryption of a prestored byte encryption table; and then analyzing the alarm signal to obtain alarm information. Therefore, the technical scheme provided by the embodiment of the application can relieve the technical problem of low safety coefficient of the sensor in the prior art, and improve the safety of data transmission.

Claims (16)

1. An alarm method is applied to a mobile terminal and comprises the following steps:
receiving an alarm signal sent by a sensor; the alarm signal is generated by the sensor according to the encryption of a pre-stored byte encryption table;
analyzing the alarm signal to obtain alarm information,
the byte encryption tables comprise a sensor class encryption table, an alarm kind level encryption table and a monitoring information quantized value encryption table which respectively correspond to a first byte, a second byte, a third byte and a fourth byte of the alarm signal, the first byte of the alarm signal represents a sensor class, the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte of the alarm signal represents an alarm category, the alarm category being a plurality of, each of the alarm categories corresponding to a preset bit of the second byte, the third byte of the alarm signal configured to characterize quantized monitoring information, the fourth byte of the alarm signal configured to characterize a level of each alarm category, each level corresponding to a preset bit of the fourth byte,
wherein the method further comprises: outputting the alarm information for a user to check; and when the user is judged not to completely acquire the alarm information, prompting the user to re-process the alarm information.
2. The method of claim 1, wherein the initial state of the alert information is an unprocessed state, the initial state representing a state in which the alert information is unprocessed by a user.
3. The method of claim 2, further comprising:
and receiving processing feedback information of a user, and carrying out state change on the alarm information according to the processing feedback information.
4. The method according to claim 1, characterized in that a specific value of the quantized monitoring information characterized by the third byte of the alarm signal is parsed out by the mobile terminal.
5. The method of claim 1, wherein the alarm categories are pre-classified into a plurality of classes.
6. An alarm method, applied to a sensor, comprising:
sending an alarm signal to the mobile terminal; the alarm signal is generated by the sensor according to byte encryption table encryption; so that the mobile terminal analyzes the alarm signal to obtain alarm information, and outputs the alarm information to be viewed by a user, so as to prompt the user to reprocess the alarm information when the user is judged that the user does not completely acquire the alarm information,
the byte encryption tables comprise a sensor class encryption table, an alarm kind level encryption table and a monitoring information quantized value encryption table which respectively correspond to a first byte, a second byte, a third byte and a fourth byte of the alarm signal, the first byte of the alarm signal represents a sensor class, the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte of the alarm signal represents an alarm category, the alarm category being a plurality of alarm categories, each of the alarm categories corresponding to a preset bit of the second byte, the third byte of the alarm signal configured to characterize quantized monitoring information, the fourth byte of the alarm signal configured to characterize a level of each alarm category, each level corresponding to a preset bit of the fourth byte.
7. An alarm device, comprising:
the receiving module is configured to receive the alarm signal sent by the sensor; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor;
an analysis module configured to analyze the alarm signal to obtain alarm information,
the byte encryption tables comprise a sensor class encryption table, an alarm kind level encryption table and a monitoring information quantized value encryption table which respectively correspond to a first byte, a second byte, a third byte and a fourth byte of the alarm signal, the first byte of the alarm signal represents a sensor class, the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte of the alarm signal represents an alarm category, the alarm category being a plurality of, each of the alarm categories corresponding to a preset bit of the second byte, the third byte of the alarm signal configured to characterize quantized monitoring information, the fourth byte of the alarm signal configured to characterize a level of each alarm category, each level corresponding to a preset bit of the fourth byte,
wherein the apparatus further comprises an output module configured to: outputting the alarm information to facilitate the user to check; and when the user is judged not to completely acquire the alarm information, prompting the user to re-process the alarm information.
8. The apparatus of claim 7, wherein the initial state of the alert information is an unprocessed state, the initial state representing a state in which the alert information is unprocessed by a user.
9. The apparatus of claim 8, further comprising:
and the change module is configured to receive processing feedback information of a user and carry out state change on the alarm information according to the processing feedback information.
10. The apparatus of claim 7, further comprising:
the user management module is configured to receive a password login request of a user.
11. An alarm system, comprising: the sensor is in communication connection with the mobile terminal;
the sensor is configured to send an alarm signal to the mobile terminal; the alarm signal is generated by encrypting alarm information according to a pre-stored byte encryption table through the sensor;
the mobile terminal analyzes the alarm signal to obtain alarm information,
the byte encryption tables comprise a sensor class encryption table, an alarm kind level encryption table and a monitoring information quantized value encryption table which respectively correspond to a first byte, a second byte, a third byte and a fourth byte of the alarm signal, the first byte of the alarm signal represents a sensor class, the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte of the alarm signal represents an alarm category, the alarm category being a plurality of, each of the alarm categories corresponding to a preset bit of the second byte, the third byte of the alarm signal configured to characterize quantized monitoring information, the fourth byte of the alarm signal configured to characterize a level of each alarm category, each level corresponding to a preset bit of the fourth byte,
wherein the mobile terminal is configured to: outputting the alarm information for a user to check; and when the user is judged not to completely acquire the alarm information, prompting the user to re-process the alarm information.
12. The warning system of claim 11 wherein the sensor is a plurality of sensors.
13. An alarm method is characterized by being applied to an alarm device and comprising the following steps:
receiving monitoring information sent by a sensor;
judging whether the monitoring information meets an alarm condition;
if yes, generating and sending an alarm signal to a mobile terminal based on the monitoring information so that the mobile terminal analyzes the alarm signal to obtain alarm information, and outputting the alarm information by the mobile terminal for a user to check, so that the user is prompted to reprocess the alarm information when the user is judged that the user does not completely obtain the alarm information; wherein the alarm signal is generated by the alarm device in accordance with byte encryption table encryption,
the byte encryption tables comprise a sensor class encryption table, an alarm kind level encryption table and a monitoring information quantized value encryption table which respectively correspond to a first byte, a second byte, a third byte and a fourth byte of the alarm signal, the first byte of the alarm signal represents a sensor class, the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte of the alarm signal represents an alarm category, the alarm category being a plurality of alarm categories, each of the alarm categories corresponding to a preset bit of the second byte, the third byte of the alarm signal configured to characterize quantized monitoring information, the fourth byte of the alarm signal configured to characterize a level of each alarm category, each level corresponding to a preset bit of the fourth byte.
14. An alarm system, comprising: the alarm device comprises a sensor, an alarm device and a mobile terminal, wherein the sensor is connected with the alarm device, and the alarm device is in communication connection with the mobile terminal;
the sensor is configured to monitor information;
the alarm device is configured to judge whether the monitoring information meets an alarm condition, and if so, generating alarm information based on the monitoring information;
the alarm device encrypts the alarm information according to a prestored byte encryption table to generate an alarm signal;
the alarm device sends an alarm signal to the mobile terminal;
the mobile terminal analyzes the alarm signal to obtain alarm information;
the mobile terminal outputs the alarm information to the mobile terminal,
the byte encryption tables comprise a sensor class encryption table, an alarm kind level encryption table and a monitoring information quantized value encryption table which respectively correspond to a first byte, a second byte, a third byte and a fourth byte of the alarm signal, the first byte of the alarm signal represents a sensor class, the sensor classes are multiple, and each sensor class corresponds to a preset bit of the first byte; the second byte of the alarm signal represents an alarm category, the alarm category being a plurality of, each of the alarm categories corresponding to a preset bit of the second byte, the third byte of the alarm signal configured to characterize quantized monitoring information, the fourth byte of the alarm signal configured to characterize a level of each alarm category, each level corresponding to a preset bit of the fourth byte,
wherein the mobile terminal is configured to: outputting the alarm information for a user to check; and when the user is judged not to completely acquire the alarm information, prompting the user to re-process the alarm information.
15. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any of claims 1 to 6 or 13 when executing the computer program.
16. A computer readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform the method of any one of claims 1 to 6, 13.
CN201880000643.2A 2018-05-31 2018-05-31 Alarm method, device and system and electronic equipment Active CN108701401B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/089205 WO2019227374A1 (en) 2018-05-31 2018-05-31 Alarm method, apparatus and system, and electronic device

Publications (2)

Publication Number Publication Date
CN108701401A CN108701401A (en) 2018-10-23
CN108701401B true CN108701401B (en) 2021-01-15

Family

ID=63841477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880000643.2A Active CN108701401B (en) 2018-05-31 2018-05-31 Alarm method, device and system and electronic equipment

Country Status (2)

Country Link
CN (1) CN108701401B (en)
WO (1) WO2019227374A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111899482B (en) * 2020-07-01 2022-04-26 山西太钢工程技术有限公司 Alarm method and device
CN112148103A (en) * 2020-09-09 2020-12-29 北京中电华大电子设计有限责任公司 Circuit for protecting power supply attack implemented from PAD

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060022819A1 (en) * 2004-07-27 2006-02-02 Nicola Vincent Granny Device and implementation method for citizen notification in well defined geographic regions of homeland security and/or civil defense warnings, alerts and desired protective actions
CN2828961Y (en) * 2005-10-26 2006-10-18 羊贵祥 Networking alarm system using special communication form
JP2007156779A (en) * 2005-12-05 2007-06-21 Hitachi Ltd Sensor network system, base station and relay method for sensing data
JP5534973B2 (en) * 2010-06-28 2014-07-02 東芝エレベータ株式会社 Elevator remote monitoring system
CN102355529B (en) * 2011-09-29 2014-09-10 汉王科技股份有限公司 Method for unified display of short message and mail and device and mobile terminal
CN102413180B (en) * 2011-11-15 2014-08-06 河海大学 Wireless sensor network for monitoring irrigation area and communication protocol of wireless sensor network
CN102797501B (en) * 2012-08-07 2015-03-18 哈尔滨东方报警设备开发有限公司 Wireless portable gas detection alarm control method
CN104022938A (en) * 2013-02-28 2014-09-03 腾讯科技(深圳)有限公司 Message synchronization method, system, server and client end
CN104219370B (en) * 2013-05-30 2017-08-22 腾讯科技(深圳)有限公司 Carry out the method and mobile terminal of short message reading process
CN205121847U (en) * 2015-04-08 2016-03-30 鹰潭嘉坤云计算科技有限公司 Monitor terminal of fire alarm information
CN106100969A (en) * 2016-05-30 2016-11-09 北京三快在线科技有限公司 A kind of do not read the based reminding method of session, device and terminal unit
CN106330687B (en) * 2016-10-17 2019-09-13 腾讯科技(深圳)有限公司 Message treatment method, apparatus and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
火灾自动报警***部件运行状态;绝版小越;《火灾自动报警***数据输出通信协议V1.1(RS485)》;20180302;第4页、第8页以及图4、表4、6 *
线路设备-传感器485传输协议;森瑟尔;《森瑟尔数字传感器通讯协议》;20140507;第1页表1-1、表1-2 *

Also Published As

Publication number Publication date
WO2019227374A1 (en) 2019-12-05
CN108701401A (en) 2018-10-23

Similar Documents

Publication Publication Date Title
CN107346388B (en) Web attack detection method and device
CN109299135B (en) Abnormal query recognition method, recognition equipment and medium based on recognition model
TWI498752B (en) Extracting information from unstructured data and mapping the information to a structured schema using the naive bayesian probability model
CN111669375B (en) Online safety situation assessment method and system for power industrial control terminal
CN112636957B (en) Early warning method and device based on log, server and storage medium
CN103281177A (en) Method and system for detecting hostile attack on Internet information system
JP6780655B2 (en) Log analysis system, method and program
CN107426022A (en) Security incident monitoring method and device, electronic equipment, storage medium
CN108701401B (en) Alarm method, device and system and electronic equipment
CN107016298B (en) Webpage tampering monitoring method and device
CN106932012A (en) The monitoring system and monitoring method of industrial service device working environment
CN107395650B (en) Method and device for identifying Trojan back connection based on sandbox detection file
JP2017538229A (en) Perceptual memory for neuro-language behavior recognition system
WO2018111355A1 (en) Content-level anomaly detection for heterogeneous logs
CN111739243B (en) D-S evidence theory-based fire state detection method
CN110825818A (en) Multi-dimensional feature construction method and device, electronic equipment and storage medium
CN112749058A (en) Fault alarm equipment for computer
CN114205212A (en) Network security early warning method, device, equipment and readable storage medium
CN112565164B (en) Dangerous IP identification method, dangerous IP identification device and computer readable storage medium
CN110650243B (en) Alarm method, alarm device, storage medium and terminal
CN104808775A (en) Device and method for judging effectiveness of authentication information of head-wearing intelligent equipment
CN106713604B (en) Information security prompting method and system
CN111046416B (en) Big health data management system based on block chain
CN113360354A (en) User operation behavior monitoring method, device, equipment and readable storage medium
CN112134723A (en) Network anomaly monitoring method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220402

Address after: 518125 Room 201, building a, No.1 Qianwan 1st Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen City, Guangdong Province

Patentee after: SHENZHEN LINGKE TECHNOLOGY Co.,Ltd.

Address before: 518000 19b, Shidai center, Zhongxin Road, Shajing street, Bao'an District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN ANT-HERO NETWORKING TECHNOLOGY Co.,Ltd.

Patentee before: Shenzhen jiabitai Intelligent Lighting Co., Ltd