WO2009097781A1 - 监控主机的方法、监控装置及主机 - Google Patents
监控主机的方法、监控装置及主机 Download PDFInfo
- Publication number
- WO2009097781A1 WO2009097781A1 PCT/CN2009/070188 CN2009070188W WO2009097781A1 WO 2009097781 A1 WO2009097781 A1 WO 2009097781A1 CN 2009070188 W CN2009070188 W CN 2009070188W WO 2009097781 A1 WO2009097781 A1 WO 2009097781A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- host
- monitoring
- monitored
- module
- monitoring device
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 185
- 238000000034 method Methods 0.000 title claims abstract description 117
- 238000012806 monitoring device Methods 0.000 title claims abstract description 81
- 238000004891 communication Methods 0.000 claims description 142
- 230000006870 function Effects 0.000 claims description 84
- 230000008569 process Effects 0.000 claims description 39
- 238000012545 processing Methods 0.000 claims description 32
- 230000004044 response Effects 0.000 claims description 16
- 238000003860 storage Methods 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 4
- 208000033748 Device issues Diseases 0.000 claims description 2
- 230000010365 information processing Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 26
- 230000005236 sound signal Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000005855 radiation Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present invention relates to the field of communications, and in particular, to a method, a monitoring device, and a host for monitoring a host. Background technique
- the embodiment of the invention provides a method, a monitoring device and a host for monitoring a host, so as to implement monitoring of the host.
- the monitoring device pages the host within the valid range, and the host that is paged returns the device information of the page; the device information returned by the at least one host confirms that the at least one host is the monitored host; respectively, and the at least one monitored The monitoring connection relationship of the host;
- the monitoring device includes a control module, a communication module and a query module, wherein the control module is configured to control communication between the communication module and the query module;
- a communication module configured to establish a monitoring connection relationship with the monitored host
- the query module is configured to send a search command to the monitored host to send a request for returning the host device information to the monitored host during the process of establishing a monitoring connection relationship with the monitored host, or after establishing a monitoring connection relationship with the monitored host, The incident of the monitored host and querying the working state of the monitored host.
- the host includes a communication module, a detection module, and a control response module, wherein the communication module is configured to establish a monitoring connection relationship with the monitoring device that performs the monitoring task; a detecting module, configured to detect, in a process of establishing a monitoring connection relationship with the monitoring device, whether there is a search instruction sent by the monitoring device; or after establishing a monitoring connection relationship with the monitoring device, detecting whether the monitoring is received A list of monitoring event queries sent by the device or whether there is an emergency event;
- a control response module configured to: when the detecting module detects that the monitoring device issues a search command, send the device information to the monitoring device through the communication module; and the detecting module detects that the monitoring event sent by the monitoring device is received When querying the list, querying and collecting the working status information of the own device, and transmitting the working status information of the device to the monitoring device through the communication module; or when the detecting module detects that an emergency event occurs, the emergency event information is generated.
- the monitoring device is sent by the communication module.
- the method, the monitoring device and the host for monitoring the host provided by the embodiment of the present invention, when the monitoring device wants to monitor the host, first page the host within the valid range to request the host to return its own device information; once the host returns to the host Device information, the monitoring device can confirm the monitored host according to the device information returned by the host, and establish a monitoring connection relationship with the host; once the monitoring device establishes a monitoring connection relationship with the host, the monitoring device can monitor the host Send an event and query the working status of the monitored host.
- FIG. 1 is a flowchart of a method for monitoring a host by a slave according to an embodiment of the present invention.
- FIG. 2 is a flow chart of the monitoring of the host side in the host reporting method provided by the embodiment.
- FIG. 4 is a flowchart of a monitoring operation performed by a host side in a sub-machine query method according to an embodiment of the present invention.
- FIG. 5 is a flowchart of a monitoring operation performed by the slave side in the slave inquiry method according to the embodiment of the present invention.
- FIG. 6 is a schematic diagram of a system of a child monitoring host provided by an embodiment of the present invention.
- FIG. 7 is a structural block diagram of a slave according to an embodiment of the present invention.
- FIG. 8 is a schematic diagram showing the display of a slave according to an embodiment of the present invention.
- FIG. 9 is a structural block diagram of a host according to an embodiment of the present invention.
- FIG. 10 is a flowchart of a method for dynamically setting a monitoring event menu of a slave according to an embodiment of the present invention.
- FIG. 11 is a structural block diagram of a child machine according to an embodiment of the present invention.
- FIG. 12 is a structural block diagram of a host according to an embodiment of the present invention.
- FIG. 13 is a flowchart of a method for communication authentication between a host and a slave according to an embodiment of the present invention.
- FIG. 14 is a flowchart of binding a host to a slave according to an embodiment of the present invention.
- FIG. 15 is a flowchart of setting communication authentication authority of a host to a slave according to an embodiment of the present invention.
- FIG. 16 is a schematic diagram of an interface for granting a subroutine permission by a host according to an embodiment of the present invention.
- FIG. 17 is a flowchart of a method for communication authentication between a slave and a host in a process of placing a call by a child machine according to an embodiment of the present invention.
- FIG. 18 is a structural block diagram of a host according to an embodiment of the present invention.
- FIG. 19 is a structural block diagram of a first embodiment of a mobile phone state monitoring slave according to the present invention.
- FIG. 20 is a structural block diagram of a second embodiment of a mobile phone state monitoring slave according to the present invention.
- FIG. 21 is a structural block diagram of a third embodiment of a mobile phone state monitoring slave according to the present invention.
- FIG. 22 is a flowchart of a first embodiment of a mobile phone state monitoring method provided by the present invention.
- FIG. 23 is a flowchart of a second embodiment of a mobile phone state monitoring method provided by the present invention.
- FIG. 24 is a structural block diagram of a first embodiment of a multimedia player provided by the present invention.
- Figure 25 is a block diagram showing the structure of a second embodiment of the multimedia player provided by the present invention.
- 26 is a structural block diagram of a third embodiment of a multimedia player provided by the present invention.
- FIG. 27 is a flowchart of a method for a multimedia player to monitor and play a mobile phone audio and video file according to an embodiment of the present invention. Mode for carrying out the invention
- the monitoring device pages the host in the valid range to request the host to return its own device information; and confirms that the at least one host is the monitored host according to the device information returned by the at least one host; Establishing a monitoring connection relationship with the at least one monitored host, and monitoring the incident of the at least one monitored host and querying the working status of the at least one monitored host by using the established monitoring connection relationship.
- the monitoring device monitors an emergency event and a query corresponding to the monitored function item information of each monitored host according to the monitored function item information of each monitored host. The working status of each monitored host corresponding to the monitored function item information.
- the monitoring device establishes a monitoring connection relationship with one or more monitored hosts, and respectively uses the monitoring connection relationship established with the one or more monitored hosts to pass the host
- the reporting method and the sub-machine query method respectively perform multi-channel monitoring operations for processing the one or more monitored host emergencies and querying the working state of the one or more monitored hosts.
- the host may be an electronic device with strong functions, such as a notebook computer equipped with a corresponding monitoring function module, a palmtop computer, a smart phone, and a digital camera equipped with communication capabilities.
- the monitoring device can be a simple, portable, electronic device that monitors other hosts, such as a mobile communication electronic product such as a multimedia player.
- the monitoring device in order to correspond to the "host", the monitoring device may also be referred to as a "slave".
- the "host” and the "slave” can actually be two independent terminal devices.
- a terminal device in an actual application can be used as a host in some occasions, monitored by other terminal devices, and used as a slave device in some occasions to monitor other terminal devices.
- FIG. 1 is a flowchart of a method for monitoring a host by a slave according to an embodiment of the present invention. As shown in Figure 1, the method includes the following steps:
- Step 101 The slave searches for a host within the valid range, and sends a request for returning the host device information. At this time, all the hosts that are within the effective communication range and the communication module is started may be searched by the slave. The slave communicates with each host in accordance with a unified, shared command that does not reveal host content. Step 102: The searched host sends its own device information to the slave.
- the device information may include a device category or a device number, such as indicating whether the host is a laptop or a smart phone.
- Step 103 The slave saves the device information of the host to identify each host, thereby communicating with each host.
- Step 104 The user selects and confirms the monitored host through the slave device, and simultaneously sends a pairing connection request to the monitored host.
- paired connection is hereinafter referred to as “monitoring connection”.
- Step 105 After receiving the pair connection request, the monitored host determines whether it is set to the monitoring mode. If yes, go to step 107; otherwise, go to step 106.
- Step 106 The monitored host rejects the pairing connection request of the child machine, and ends the process.
- Step 107 The monitored host accepts the pairing connection request of the slave, and returns a connection response signal to the slave. After receiving the connection response signal, the handset connects to the monitored host.
- Step 108 The slave establishes a monitoring connection relationship with the monitored host, and sets a monitoring event menu for the monitored host. At this point, the process ends.
- the host reporting method can be used to complete the monitoring operation.
- the monitored incidents are different depending on the type of host being monitored.
- a smartphone's emergency can be a user's incoming call, a new incoming SMS, an alarm, etc.
- the laptop's emergency can be a new email, a system timer switch, and the like.
- the monitored event menu set for the monitored host includes the monitored function item information of the monitored host.
- the slave monitors the monitored host according to the monitored function item information of the monitored host.
- monitoring event menu is actually a human-machine operation interface, and the function thereof is to monitor the monitored function item information of the monitored host and the sudden response corresponding to the monitored function item information returned by the monitored host. Event information and work status are displayed to the user.
- FIG. 2 is a flowchart of a monitoring operation performed by a host side in a host reporting method according to an embodiment of the present invention. As shown in Figure 2, in the reporting method of the host, the monitoring operations performed by the monitored host side are as follows:
- Step 201 The host starts the monitoring task program according to the content of the set monitoring event menu.
- Step 202 The host determines whether an emergency event occurs. When no incident is detected, the monitoring task program is transferred to the background; when an unexpected event is detected, the event is reported to the operating system.
- Step 203 The host sends the emergency event and its own device information to the slave to process, and waits for the result of the reply processing.
- Step 204 The host determines whether the reply of the slave is timed out. If the slave responds with a timeout, step 205 is performed; otherwise, step 206 is performed.
- Step 205 The host resends the emergency to the slave. If the transmission is not successful within the set number of retransmissions, the transmission is discarded, and the process proceeds to step 202 to wait for the next emergency.
- Step 206 The host feeds back its own state information to the slave, so that the host completes the reporting of the emergency.
- the host returns, and step 202 waits for the arrival of the next emergency.
- Step 301 The child machine starts the monitoring task program.
- Step 302 The slave determines whether an emergency event sent by the monitored host is received.
- Step 303 Determine, according to the host device information received at the same time, which monitored host is sent by the monitored host.
- step 303 may be executed instead of step 304.
- Step 304 Display the received emergency, and notify the user to process by sound or vibration.
- the slave can establish a corresponding page for each host. Once an incident is received from a host, the incident is displayed on the page corresponding to the host. This will alert the user more intuitively.
- Step 305 Wait for the user to input the processing result of the emergency.
- Step 306 Determine whether the user reply processing result is timed out. If the user reply processing result times out, step 307 is performed; otherwise, step 308 is performed.
- Step 307 The slave returns the default processing result to the monitored host corresponding to the emergency. After completing this step, you can end the process directly or go to step 309.
- Step 308 The slave returns the processing result of the user reply to the monitored host corresponding to the emergency.
- Step 309 Display the status information of the received monitored host, as displayed on the page corresponding to the monitored host. In this way, the handset completes the processing of this emergency, and returns to step 302 to wait for the next emergency.
- the slave When the slave wants to query the working status of the monitored host, it can use the slave query method to complete the monitoring operation.
- the working status to be queried is also different.
- the working status to be queried may be signal strength, caller number, battery margin, etc.
- the working state to be queried may be storage space, battery margin, and the like.
- FIG. 4 is a flowchart of a monitoring operation performed by a host side in a sub-machine query method according to an embodiment of the present invention. As shown in Figure 4, in the sub-machine query method, the monitoring steps performed by the host side are as follows:
- Step 401 The host starts the monitoring task program.
- Step 402 Determine whether to establish a monitoring connection relationship with the child machine. If yes, step 404 is performed, and if no, step 403 is performed.
- Step 403 Waiting or actively establishing a monitoring connection relationship with the child machine.
- Step 404 Determine whether the slave sends a monitoring event query list. If the child machine sends a monitoring event query list, step 405 is performed.
- Step 405 Receive and parse the monitoring event query list.
- Step 406 Collect work status information to be queried according to the received monitoring event query list.
- Step 407 The packaged work status information is packaged and sent to the slave machine, and the current query ends, and the process returns to step 402 to wait for the next query.
- FIG. 5 is a flowchart of a monitoring operation performed by a slave side in a slave inquiry method according to an embodiment of the present invention.
- the monitoring operation performed on the slave side is as follows:
- Step 501 Start the monitoring task program of the child machine according to the user's needs.
- Step 502 Select a host to be queried according to the user's needs.
- Step 503 Establish a monitoring connection relationship with the host to be queried.
- Step 504 Determine whether the establishment of the monitoring connection relationship is successful. If yes, go to step 506, otherwise go to step 505.
- Step 505 Re-establish a monitoring connection relationship with the queried host. If the establishment is not successful within the set number of repetitions, return to step 502.
- Step 506 Send a monitoring event query list to the host.
- Step 507 Receive a working status information packet sent by the host.
- Step 508 Decompress the received working status information packet, and display the working status information of the queried host for the user to view.
- the working status information of the queried host can be displayed on the page corresponding to the queried host.
- the query ends and returns to step 502 to wait for the next query.
- the method for monitoring the host by using the slave machine provided by the embodiment of the present invention realizes monitoring the host through a split type slave, which is convenient to operate and enhances the human-computer interaction performance.
- the embodiment of the present invention further provides a system for a child monitoring host, including a single child machine and at least one host, and the single child machine realizes concentration of at least one host through a wired or wireless network by using the method provided in the foregoing embodiment.
- a child monitoring host including a single child machine and at least one host
- the single child machine realizes concentration of at least one host through a wired or wireless network by using the method provided in the foregoing embodiment. Monitoring and simple control, the specific structure is shown in Figure 6.
- the embodiment of the present invention further provides a system for monitoring a host by another seed machine, including at least one slave and a single host. That is, each slave can implement monitoring and simple control of one host through a wired or wireless network by using the method provided in the above embodiment.
- FIG. 7 is a structural block diagram of a slave according to an embodiment of the present invention.
- the slave device provided by the embodiment of the present invention includes a control module 701, a communication module 702, a display module 703, a query module 704, and a warning module 705.
- the communication module 702, the display module 703, the query module 704, and the alert module 705 are electrically connected to the control module 701, respectively.
- the control module 701 is configured to control communication between modules in the slave.
- control module 701 is further configured to perform information processing on information input by the user through an input module such as a keyboard operation.
- the communication module 702 is configured to establish a monitoring connection relationship with the monitored host to transmit and receive information.
- the display module 703 is configured to display working state information or emergency event information fed back by the monitored host.
- the display module 703 can be a display screen, and can display the monitoring information of each monitored host according to the host name of each monitored host, that is, the monitoring information of each monitored host is displayed on a separate page.
- FIG. 8 is a schematic diagram of display of a slave according to an embodiment of the present invention. As shown in FIG. 8 , the top of the screen of the slave is a property page named by the monitored host name, and the user can switch the display of the monitoring information page of each monitored host by pressing the left and right direction buttons or by clicking a different property page name.
- the screen width may be smaller than the total width of the property page.
- a multi-page prompt will be displayed on both sides of the property page, and the display of other host monitoring information can be switched through related operations.
- the querying module 704 is configured to send a search command to the monitored host to send a request for returning the host device information during the process of establishing a monitoring connection relationship with the monitored host, or to notify the monitored host after establishing a monitoring connection relationship with the monitored host.
- the host issues a list of monitoring event queries.
- the warning module 705 when receiving the working status information or the emergency event information fed back by the monitored host, issues an alert to remind the user, such as issuing a specific prompt sound or blinking light or vibration to remind the user.
- the slave device provided by the embodiment of the present invention may include only the control module 701, the communication module 702, and the query module 704.
- FIG. 9 is a structural block diagram of a host according to an embodiment of the present invention.
- the host provided by the embodiment of the present invention includes: a communication module 901, a detection module 902, and a control response module 903. These three modules are electrically connected to each other.
- the communication module 901 is configured to establish a monitoring connection relationship with the slave device that performs the monitoring task to transmit and receive information.
- the detecting module 902 is configured to detect, in a process of establishing a monitoring connection relationship with the slave machine that performs the monitoring task, whether there is a search instruction sent by the child machine; or, after establishing a monitoring connection relationship with the child machine, detecting whether the monitoring sent by the child machine is received The event query list or its own occurrence of an unexpected event.
- the control response module 903 is configured to: when the detecting module 902 detects that a slave sends a search command, send the device information to the slave through the communication module 901; and the detecting module 902 detects that the monitoring event is sent by the slave. In the case of a list, the working status information of the device is queried and collected, and the working status information of the device is sent to the slave through the communication module 901. When the detecting module 902 detects that an emergency event occurs, the event information is passed. The communication module 901 transmits to the slave.
- the slave can only monitor the monitoring items set in advance, and cannot monitor the content other than the previously set monitoring items, that is, It is not possible to set monitoring items according to user requirements.
- an embodiment of the present invention further provides a method for dynamically setting a monitoring event menu matching a host on a child machine.
- FIG. 10 is a flowchart of a method for dynamically setting a monitoring event menu of a slave according to an embodiment of the present invention. As shown in FIG. 10, the method specifically includes the following steps:
- Step 1001 The slave sends a search command to search all monitored hosts in the valid range to support the client tool development tool (CTK, Customer ToolKit) function, and prepares to establish a matching monitoring link channel with each monitored host.
- the slave records the device information of each monitored host to distinguish the type and model of each monitored host.
- Step 1002 According to the user's needs, the slave sends a function item query command to the monitored host, and requests the monitored host to feed back its own function item information and corresponding ID number.
- the functional items to be monitored are also different.
- the function items to be monitored may be signal strength, caller ID, battery margin, new short message, etc.;
- the function items to be monitored may be storage space, battery capacity, etc.
- the function items to be monitored may be whether new mail, battery remaining, host storage space, etc. are received.
- the sub-machine may not have the ability to monitor a certain function item of the host in advance. For example, the sub-machine may not be able to monitor whether the laptop receives new mail beforehand.
- Step 1003 After the monitored host obtains the function item query instruction, collect the function items of the machine, and generate a unique ID number for each item, and package the data to the slave machine.
- Step 1004 The slave machine parses the received function item information of the monitored host, selects one or more items from the function item information of the monitored host to perform monitoring, and creates a corresponding monitoring event menu according to the selected function item. Select according to the ID number of the function item.
- the monitored host is a laptop computer
- the monitored function items returned by the notebook computer to the slave device and the corresponding ID numbers are as follows: ID1000 indicates the battery power of the notebook computer, ID number 1002 indicates the CPU temperature of the notebook computer, and ID number 1004 indicates the notebook computer.
- the computer receives the mail function item.
- the handset can select the ID number 1004, which represents the receiving mail function of the notebook, and add it to the handset to create a monitoring event menu that matches the laptop.
- the "Receive Mail" menu option is displayed on the "Notebook" monitor page of the handset screen, and the handset system records the corresponding ID number to identify each function item in the menu.
- Step 1005 After the monitoring link channel is established, the slave machine processes the monitored event reported by each monitored host and actively queries related information of the monitored host according to the monitoring event menu, thereby completing the monitoring task.
- the slave can set different monitoring event menus for different monitored hosts according to the type and function of the monitored host, or set different monitoring for the same monitored host according to different usage scenarios. Event menu.
- the slave machine and the host can complete the monitoring process of the slave to the host through the host reporting method and the slave query method.
- the slave machine can send the ID number corresponding to the function item to be queried to the monitored host.
- the monitored host collects information according to the received ID number, and feeds the collected data back to the slave.
- FIG. 11 is a structural block diagram of a child machine according to an embodiment of the present invention.
- the slave device provided by the embodiment of the present invention includes: a control module 701, a communication module 702, a display module 703, a query module 704, a warning module 705, and a storage module 706.
- the control module 701, the communication module 702, the display module 703, and the alert module 705 have the same functions as the corresponding modules in the slave shown in FIG.
- the query module 704 is further configured to send a function item query command to the monitored host, receive function item information returned by the monitored host, and set a monitoring event according to the function item information returned by the monitored host. menu.
- the storage module 706 is configured to store related event information such as a monitoring event menu and monitoring data of each monitored host.
- the sub-machine provided by the embodiment of the present invention may further include a control module 701, a communication module 702, a display module 703, a query module 704, and an alert module 705 in the sub-machine shown in FIG. 7, and further includes a monitoring event menu setting module.
- Storage module 706 The monitoring event menu setting module is used to The monitored host sends a function item query command, receives the function item information returned by the monitored host, and sets a monitoring event menu according to the function item information returned by the monitored host.
- the storage module 706 is configured to store related event information such as a monitoring event menu and monitoring data of each monitored host.
- FIG. 12 is a structural block diagram of a host according to an embodiment of the present invention.
- the host provided by the embodiment of the present invention includes: a communication module 901, a detection module 902, a control response module 903, and a monitoring item matching module 904.
- the communication module 901 and the control response module 903 are the same as the embodiment shown in FIG.
- the detecting module 902 is further configured to detect whether a function item query command issued by the slave is received.
- the monitoring item matching module 904 is configured to return the function item that needs to be monitored to the slave machine when the detecting module receives the function item query command sent by the slave machine, so as to complete the setting of the monitoring event menu with the child machine.
- the method for monitoring the host by using the slave device provided by the embodiment of the present invention by using a client application development tool (CTK, Customer ToolKit) or software to perform monitoring menu matching setting between the slave device and the monitored host, the new function on the monitored host can be performed.
- CTK Customer ToolKit
- the project is added to the monitoring event menu in the sub-machine, which greatly enhances the flexible operation of the system and facilitates the upgrade of system functions.
- the embodiment of the present invention provides a method for communication authentication between a seed machine and a host, and performs authentication binding between the host and the child machine in the connection process, and gives the child machine specific function rights, so that different child machines can be obtained. Different certifications enable different functions.
- FIG. 13 is a flowchart of a method for communication authentication between a host and a slave according to an embodiment of the present invention. As shown in Figure 13, the method for communication authentication between the host and the sub-machine includes the following steps:
- Step 1301 The host sets communication authentication authority to the slave.
- Step 1302 The host determines, according to the set communication authentication authority, whether the application request sent by the slave device to the host is within the range allowed by the communication authentication authority; if yes, the process proceeds to step 1303, otherwise, the process proceeds to step 1304.
- Step 1303 The host executes the application request of the child machine, and ends the process.
- Step 1304 The host disconnects from the child machine and ends the process.
- the method provided by the embodiment of the present invention further includes: binding the host to the slave and establishing a connection with the slave after the binding.
- the binding process between the host and the slave can be initiated by the host or by the slave.
- the following describes how the host actively initiates binding with the child.
- FIG. 14 is a schematic flowchart of binding a host to a slave according to an embodiment of the present invention. As shown in Figure 14, the process of binding a host to a child includes the following steps:
- Step 1401 The host initializes the wireless communication module to prepare for the wireless communication connection between the host and the slave.
- Step 1402 The host queries a sub-machine that can establish a link key in a certain range.
- the specific process is as follows: The host initiates a device query by actively initiating a search command, and the sub-machine is in a state of waiting for a search command. Through the device query, the host can find the slaves within the valid range.
- the query message does not include any message of the query device, but can specify two query methods: DIAC (Dedicated Inquiry Access Code) and GIAC (Global Information Assurance Certification).
- Step 1403 The host determines whether the slave is queried within the valid range; if the slave is queried, the process proceeds to step 1404; otherwise, the process proceeds to step 1402.
- each device has a globally unique device identifier
- the host can use the device ID to query the slaves in the valid range.
- Step 1404 The user inputs the link key in the child machine, and the host checks the link key to verify the legality of the child device. The host determines whether the key input by the user is correct. After the user inputs the correct key, the host and the host The binding of the child machine is successful. After the binding is completed, the connection request can be initiated by either the slave or the host, and there is no fixed master-slave device.
- the user when using the host and slave systems for the first time, the user needs to enter the correct PIN code on the host side to create a link key.
- the child machine In the process of the child machine actively initiating the binding, the child machine initializes the wireless communication module to prepare for the wireless communication connection between the host and the child machine; and the slave machine actively queries the host within a certain range.
- FIG. 15 is a schematic flowchart of setting communication authentication authority of a host to a slave according to an embodiment of the present invention. As shown in Figure 15, the process of setting the communication authentication authority for the slave to the slave includes the following steps:
- Step 1501 The host selects the service and permission granted to the slave machine with which the binding is successful.
- the user selects the service and authority of the slave that is successfully bound to the host through the host.
- an interface may be set to facilitate the user to select the services and permissions granted to the child machine, and an embodiment of the interface may be as shown in FIG. 16.
- Step 1502 According to the service and permission granted for the child machine selection, the host generates a trust domain to record the correspondence between the services and rights of each child machine and each child machine.
- the record slave 1 can make and receive calls through the host, and can also send and receive short messages; the slave 2 can only send and receive short messages; other similar wireless communication devices can only exchange data, and can only send data to Host, etc.
- the host can find out whether each sub-machine has a certain service and permission by looking up the trust domain.
- the services and permissions granted to the host in the trusted domain can be granted to the sub-machine, including but not limited to: dialing, answering calls, sending and receiving text messages, caller ID, and synchronizing contacts, text messages, call logs, note-taking, alarm reminders, and so on.
- Step 1503 The host sends the service and permission granted to the child machine to the child machine;
- Step 1504 The host is disconnected from the slave.
- the following is an example of making a call by a slave, which specifies the process of communication authentication between the split host and the slave.
- FIG. 17 is a flowchart of a method for communication authentication between a slave and a host in a process of placing a call by a child machine according to an embodiment of the present invention.
- the communication authentication process between the host and the slave includes the following steps: Step 1701: The slave initializes the wireless communication module to prepare for the wireless communication connection between the slave and the host.
- Step 1702 The handset inputs the phone number through the keyboard and displays it on the display, and presses the "Call" button.
- Step 1703 The sub-machine queries the host within a certain range, the sub-machine initiates the device query, and the host performs the query scan. Through the device query, the sub-machine can find the host bound to the valid range.
- Step 1704 The slave determines whether the host bound to the host is queried. If the determination is yes, go to step 1705. If the determination is no, go to step 1703.
- Step 1705 After the sub-machine queries the host bound to it, establish a data and voice connection with the host.
- Step 1707 The host determines whether the application request sent by the slave is recorded in the trust domain of the host. If the trust domain indicates that the handset has the function of making a call, that is, the application request sent by the slave is recorded in the trusted domain of the host, go to step 1709, otherwise, go to step 1708. .
- Step 1708 The slave does not get the call authorization of the host, and the function of dialing out the call is not performed.
- the host disconnects the wireless communication connection with the slave and ends the process.
- Step 1709 The host executes the application request of the slave, dials the phone number, and communicates the call status to the slave display in response mode. After this situation, there will be at least three cases in the following, that is, the other party hangs up the phone, the handset answers the call, and the handset hangs up.
- Step 1710 Determine whether the other party hangs up the call at this time, or the handset answers the call, or the handset hangs up. If the other party hangs up, go to step 1711; if the handset answers the call, go to step 1712; if the handset actively hangs up, go to step 1715.
- Step 1711 The host notifies the slave that the other party has hanged the call and disconnects the wireless connection between the host and the slave, and the process ends.
- Step 1712 The voice signal is transmitted between the host and the slave through the communication module.
- Step 1713 The host determines whether to continue to hold the call. If yes, go to step 1712, otherwise proceed to step 1714.
- Step S1714 The host determines whether the other party hangs up the phone, or the child machine hangs up the phone actively. If the other party hangs up, go to step 1711. If the slave actively hangs up, go to step 1715.
- Step 1715 The slave requests the host to hang up.
- Step 1716 The host disconnects the wireless communication connection with the child machine, and the process ends.
- FIG. 18 is a structural block diagram of a host according to an embodiment of the present invention.
- the host includes a host control module 2 and a communication judging module 4.
- the host control module 2 further includes a selection granting unit 22, an authority recording unit 24, and a rights transmitting unit 26 that are connected to each other.
- the communication judging module 4 further includes a request receiving unit 42 and a request judging unit 44 which are connected to each other.
- the host control module 2 is configured to set communication authentication authority for the slave device successfully bound to the host.
- the selection granting unit 22 is configured to select the services and permissions granted to the guest.
- the authority record unit 24 is configured to generate a trust domain to record the services and rights granted for the child machine selection.
- a permission sending unit 26, for granting a selection The service and permissions are sent to the slave.
- the communication judging module 4 is configured to determine, according to the communication authentication authority set by the host control module 2 for the slave device, whether the application request sent by the slave device is within the range allowed by the communication authentication authority of the slave device, and if yes, executing the slave device to send Application request, otherwise, disconnected from the child machine.
- the request receiving unit 42 is configured to receive an application request sent by the slave.
- the request judging unit 44 is configured to determine, according to the communication authentication authority set by the host control module 2 for the slave device, whether the application request sent by the slave device is within the range allowed by the communication authentication authority of the slave device, and if yes, executing the slave device to send Apply the request, otherwise, disconnect from the child.
- the host may also include a binding module 6 and a communication module 8.
- the binding module 6 includes a host initial unit 62, a query unit 64, and a binding determination unit 66.
- Binding module 6 is used to bind to the child machine.
- the host initial unit 62 is used to initialize the communication module, and is ready to establish a monitoring connection with the child machine.
- the query unit 64 is configured to query whether there is a child in the valid range.
- the binding determining unit 66 is configured to determine, according to the password input by the user, whether to establish a link key connection with the queried sub-machine if the queried module 64 queries the sub-machine, and if so, with the queried sub-ent. The machine is bound.
- the communication module 8 is configured to establish a communication connection with the slave machine that is bound to the host.
- the host shown in this embodiment may further include a control response module 903, a monitoring item matching module 904, and a detecting module 902, and the functions of the communication module 8 may be the same as those of the communication module 901.
- the invention establishes a trust domain at the host through the method and host for communication authentication between the host and the slave, and assigns different rights to the slave and other wireless connection modules, so that the slaves and other wireless connection modules can only be within the scope permitted by the permission. Communication between the inside and the host. Authorize the slaves to allow the slaves to work within their allowed range to avoid interference between multiple slaves. At the same time, the host can change the permissions of the slave to increase flexibility.
- a method for monitoring a host by a slave is described below by taking a host as a mobile phone as an example.
- the host computer is a mobile terminal having communication functions such as a palmtop computer or a PDA.
- FIG. 19 is a structural block diagram of a first embodiment of a mobile phone state monitoring slave according to the present invention.
- the slave includes a control module (central processing module) 701, a query communication module 1902, a display module 703, a storage module 706, an input module 707, and an authentication module 708.
- the control module 701 is configured to process various types of data information, data operations, and process execution instructions input by the user through the input module 703.
- the display module 703 is connected to the control module 701 and is configured to output various types of status information of the mobile phone obtained from the query communication module 1902.
- the display module 703 can be a display screen or a voice mode.
- the input module 707 is connected to the control module 701 for inputting an operation instruction of the user and sent to the control module 701.
- the input module 707 can be a keyboard, a touch screen, or an audio input module.
- the storage module 706 is connected to the control module 701 for storing data files.
- the memory module 706 can be a dynamic memory, a read only memory, or a static memory.
- the authentication module 708 is connected to the control module 701, and is used to establish a communication connection between the slave and the mobile phone. When connected, the identity security is authenticated to the mobile phone.
- the query communication module 1902 is connected to the control module 701 for interactive communication with the mobile phone to obtain various status information or data of the mobile phone.
- the query communication module 1902 may include a wired communication module or a wireless communication module.
- query communication module 1902 in this embodiment actually has the functionality of both the communication module 702 and the query module 704 in the embodiment of FIG.
- the query communication module 1902 can be a USB, serial port, parallel port or network port interface.
- the query communication module 1902 When the query communication module 1902 includes a wireless communication module, the query communication module 1902 is also coupled to an antenna. Specifically, the query communication module 1902 can use any one of 2.4G, 5.8G, DECT, GSM, GPRS, CDMA, TD-SCDMA, WCDMA. In the specific product application, the low-power wireless communication module is the best, such as digital spread spectrum technology, UWB, Wi-Fi, IrDA, NFC, ZigBee, which can greatly reduce the radiation damage to the human body.
- the query communication module 1902 can use any one of 2.4G, 5.8G, DECT, GSM, GPRS, CDMA, TD-SCDMA, WCDMA.
- the low-power wireless communication module is the best, such as digital spread spectrum technology, UWB, Wi-Fi, IrDA, NFC, ZigBee, which can greatly reduce the radiation damage to the human body.
- each module may be an independent module or an integrated module.
- the slave device provided by the embodiment of the present invention can read the state change information or data of the mobile phone by querying the communication module 1902, and display the mobile phone state information through the display module 703 for the user to browse.
- the user can further control the mobile phone through the input module 707, such as answering or making a call, reading or replying to a short message, creating a new schedule, and the like.
- the slave provided by the foregoing embodiment may include only the control module 701, the query communication module 1902, the display module 703, and the input module 707 in the simplest case. It may also include only the control module 701, the query communication module 1902, the display module 703, the input module 707, and the authentication module 708, and may also include only the control module 701, the query communication module 1902, the display module 703, the storage module 706, and the input module. 707.
- FIG. 20 is a structural block diagram of a second embodiment of a mobile phone state monitoring slave according to the present invention.
- the slave in addition to the control module (also referred to as the main control module) 701, the communication module (in particular, a proximity transceiver module) 702, the display module 703, and the input module 707, the slave further includes Power source 710 and audio module 709.
- the power source 710 is configured to supply power to each module of the control module 701, the query communication module 1902, the display module 703, the input module 707, and the audio module 709 in the slave device, and can complete the charging function.
- the power source 710 can be used in a manner that can be used. It is a power management mode such as a low dropout regulator (LDO, Low Drop Out) or a DC/DC converter (DC/DC, Direct Current/Direct Current).
- LDO low dropout regulator
- DC/DC Direct Current/Direct Current
- the audio module 709 is configured to receive the voice information of the user, and send the voice information input by the user to the control module 701 for processing to be sent to the host by querying the communication module 1902.
- the voice signal from the host is received by the query communication module 1902 and the control module 701. And output to the user.
- the audio module 709 includes a microphone 791 and a receiver 792.
- the audio signal from the microphone 791 is processed by the control module 701, and then sent out by the query communication module 1902 in the slave; the query communication module 1902 receives the audio signal from the host, and demodulates the audio under the control of the control module 701. The signal is output to the user by the receiver 792.
- FIG. 21 is a structural block diagram of a third embodiment of a mobile phone state monitoring sub-machine provided by the present invention.
- the host has the circuit structure shown in Fig. 20, and the extension function can be set for the slave.
- a voice recognition module 711 is provided between the microphone 791 and the control module 701.
- the voice recognition module 711 is used to identify the voice information input by the audio module 709, and realize the identity recognition of the user by the slave.
- the slave can also be equipped with a motor 712 according to actual needs.
- the motor 712 is connected to the control module 701 and is controlled to vibrate according to the control module 701. When an audio signal or control signal is returned from the host to the handset by querying the communication module 1902, the motor can vibrate to alert the user.
- motor 712 herein can be considered an embodiment of alert module 705.
- FIG. 22 is a flowchart of a first embodiment of a mobile phone state monitoring method provided by the present invention. As shown in Fig. 22, the handset that monitors the state of the handset is recorded as a mobile device, and the method includes the following steps:
- Step 2201 The mobile device sends a request to establish a communication connection to the mobile phone.
- Step 2202 After receiving the connection request of the mobile device, the mobile phone performs identity authentication on the mobile terminal.
- Step 2204 Establish a communication connection between the mobile device and the mobile phone.
- Step 2205 The mobile device reads status information of the mobile phone.
- the reading operation may be that the mobile device actively reads the parameters according to the parameters set by the user, or after receiving the trigger signal of the mobile phone (for example, when a call or a short message is sent).
- the status information of the mobile phone includes the status of the communication function or the status of the information.
- the communication function status includes call status, short message status, and information status including schedule reminder, travel reminder, alarm reminder, power prompt, network status, storage status, notepad, contact, and call history.
- the mobile device needs to read all state data information of the mobile phone.
- Step 2206 The mobile device displays status information of the output mobile phone through its display module.
- Step 2207 According to the status information of the mobile phone, the user controls the mobile phone through the mobile device, for example, performing a communication function such as answering or making a call, sending and receiving a short message, or performing an operation function of establishing a schedule, a trip, a contact, and the like.
- a communication function such as answering or making a call
- sending and receiving a short message or performing an operation function of establishing a schedule, a trip, a contact, and the like.
- FIG. 23 is a flowchart of a second embodiment of a mobile phone state monitoring method provided by the present invention. As shown in FIG. 23, the difference between this embodiment and the embodiment shown in FIG. 22 is that the triggering situation of the mobile device reading the mobile phone state is different, that is, a step 2305 is further included between step 2204 and step 2205, and the remaining steps are The execution is the same as in Fig. 22.
- Step 2305 The mobile device detects whether the mobile phone status changes. If the mobile phone status changes, step 2205 is performed. If the mobile phone status does not change, step 2204 is returned.
- the device for monitoring the state of the mobile phone may also be a multimedia player.
- the device should also include functional components with multimedia playback.
- FIG. 24 is a structural diagram of a multimedia player for monitoring a state of a mobile phone according to an embodiment of the present invention. As shown in FIG. 24, the multimedia player includes not only the module shown in FIG. 19 but also an audio processing module 713. Audio output module 714.
- the audio processing module 713 is connected to the control module 701 and is used for encoding and decoding the audio signal.
- the audio processing module 713 may include an audio codec for audio encoding and decoding of multimedia files such as audio; and a digital to analog converter for converting between digital signals and analog signals.
- the audio processing module 713 may further include an audio power amplifier module for amplifying the audio analog signal.
- the audio processing module 713 can be a stand-alone module or integrated with other modules, such as the control module 701. In the embodiment shown in Fig. 20, the audio processing module can be integrated in the control module 701.
- the audio output module 714 is connected to the audio processing module 713 for outputting the audio signal after the audio processing module 713 is coded and processed.
- the audio output module 714 can be a speaker, a microphone 792, or an audio interface, such as a headphone jack.
- the voice signal (audio and video signal) from the other party is transmitted to the query communication module 1902 of the multimedia player via the mobile phone, and then processed by the control module 701 and the audio processing module 713, and then transmitted to the audio.
- the output module 714 is in turn transmitted to the user.
- FIG. 25 is a block diagram showing the structure of a second embodiment of the multimedia player provided by the present invention.
- the multimedia player further includes an audio input module 715 connected to the audio processing module 713 for receiving audio and video signals input by the user.
- the audio processing module 713 processes and transmits to the query communication module 1902.
- the user can not only receive the mobile phone information through the multimedia play, but also send the voice information to other users through the mobile phone through the audio input module 715.
- the voice signal (audio and video signal) sent by the user is transmitted to the audio processing module 713 via the audio input module 715 for processing, and then transmitted to the query communication module 1902 via the control module 701.
- the query communication module 1902 finally transmits the voice signal. To the phone, and then to other users.
- 26 is a structural block diagram of a third embodiment of a multimedia player provided by the present invention.
- the audio processing module 713 may not be needed at this time, and the audio input module 715 and the audio output module 714 are both connected to the query communication module 1902.
- the voice signal (audio and video signal) sent by the user to the outside is transmitted to the inquiry communication module 1902 via the audio input module 715, and then the voice signal is transmitted to the mobile phone via the inquiry communication module 1902, thereby being transmitted to the other party.
- the voice signal from the other party also needs to be directly output to the audio output module 714 after being processed by the query communication module 1902.
- the player connects to the mobile phone through a wired connection to realize data interaction.
- the user can hang the player on the neck or the jacket pocket, and put the mobile phone in the bag or the trouser pocket, so that the mobile phone state can be conveniently and accurately monitored. And control the phone through the input module.
- the operation of answering or making a call to the mobile phone through the player can greatly reduce the radiation damage of the mobile phone signal to the human body.
- the size of the multimedia player can be made small, and the mobile phone user can place the multimedia player close to the head, such as hanging around the neck or in the jacket pocket, and enjoying through the device.
- the player establishes a communication connection with the mobile phone by querying the communication module 1902, The status change information or data of the mobile phone is read, and the status information of the mobile phone is displayed through the display module 703.
- the mobile phone user can control the mobile phone through the input module 707, such as answering or making a call, reading or replying to a short message, creating a new schedule, and the like.
- the audio module shown in FIG. 20 may also be composed of the audio processing module 713 and the audio output module 714 shown in FIG. 24, or the audio processing module 713 and the audio output module 714 shown in FIG.
- the audio input module 715 is composed of, or only the audio input unit shown in FIG.
- FIG. 27 is a flowchart of a method for a multimedia player to monitor and play a mobile phone audio and video file according to an embodiment of the present invention. As shown in FIG. 27, the method for the multimedia terminal to monitor and play the audio and video files of the mobile phone includes the following steps:
- Step 2701 After receiving the operation instruction for sharing the audio and video files in the mobile phone, the multimedia player sends a request for establishing a communication connection to the mobile phone.
- Step 2702 After receiving the connection request of the multimedia player, the mobile phone requests identity authentication.
- Step 2703 If the multimedia player passes the identity authentication of the mobile phone, go to step 2704. Otherwise, return to step 2702 to request re-authentication. Alternatively, the authentication may be closed, the program is terminated, and the connection request needs to be re-initiated.
- Step 2704 Establish a communication connection between the mobile phone and the multimedia player.
- Step 2705 The multimedia player searches for all the audio and video file information in the mobile phone, and displays it by means of a list.
- the audio and video files can be arranged in the audio and video format type, or in the order of the file names.
- Step 2706 According to the user's selection, in the multimedia player, select an audio and video file to be played in the mobile phone, and select a single file or multiple files. At the same time, you can also select a playback mode, such as automatically playing all the files. Or selected audio and video files, or looping and so on.
- Step 2707 The multimedia player receives and plays the selected audio and video file.
- the multimedia player receives and plays the multimedia file of the mobile phone from the mobile phone, and can be a real-time streaming mode, and after receiving the audio and video file and buffering, the multimedia file is played, and the receiving and playing are processed in parallel; or the multimedia player first starts from the mobile phone.
- step 2706 the audio and video files to be played in step 2706 are not necessary. If step 2706 is not performed, after the communication connection is established, the multimedia player plays the searched audio and video stored in the mobile phone one by one. file.
- the above method can also bring a beneficial effect, that is, the multimedia player can share and play the multimedia files stored in the mobile phone, so that even if the multimedia player with a very small storage space is used, the mass storage in the host such as the mobile phone can be shared. Audio and video information. It is worth noting that in the specific industrial application, the multimedia player and the mobile phone of the present invention do not need to be bundled for production or sale, and the multimedia player and the mobile phone are two separate products, and the user can purchase the mobile phone separately from different manufacturers. The multimedia player enables the communication and connection between the two to establish a corresponding relationship between monitoring and manipulation.
- this method can be extended to a broader scope, that is, the slave can share all the resources in the host that it is monitoring, such as text information, audio, video, and so on.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009801038959A CN101919184B (zh) | 2008-02-02 | 2009-01-16 | 监控主机的方法、监控装置及主机 |
US12/848,902 US20100302002A1 (en) | 2008-02-02 | 2010-08-02 | Method for Monitoring Main Machine, Monitoring Apparatus and Main Machine |
Applications Claiming Priority (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810065217.5 | 2008-02-02 | ||
CNA2008100652175A CN101227199A (zh) | 2008-02-02 | 2008-02-02 | 一种监控手机状态的装置及方法 |
CN200820091929.X | 2008-02-02 | ||
CNU200820091929XU CN201181963Y (zh) | 2008-02-02 | 2008-02-02 | 一种多媒体播放器 |
CNA2008100660970A CN101232535A (zh) | 2008-02-15 | 2008-02-15 | 一种共享播放多媒体文件的方法及多媒体播放器 |
CN200810066097.0 | 2008-02-15 | ||
CNU2008200483469U CN201213280Y (zh) | 2008-05-27 | 2008-05-27 | 分体式移动终端子机电路结构 |
CN200820048346.9 | 2008-05-27 | ||
CN200810028530.1 | 2008-06-04 | ||
CN2008100285301A CN101286806B (zh) | 2008-06-04 | 2008-06-04 | 一种单个子机监控多个主机的方法、系统及设备 |
CN200810029166.0 | 2008-07-01 | ||
CN2008100291660A CN101304571B (zh) | 2008-07-01 | 2008-07-01 | 分体式移动终端主机和子机间通信认证的方法及移动装置 |
CN200810030017.6 | 2008-08-05 | ||
CN2008100300176A CN101335575B (zh) | 2008-08-05 | 2008-08-05 | 一种单个子机选择监控多个主机的方法及系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/848,902 Continuation US20100302002A1 (en) | 2008-02-02 | 2010-08-02 | Method for Monitoring Main Machine, Monitoring Apparatus and Main Machine |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009097781A1 true WO2009097781A1 (zh) | 2009-08-13 |
WO2009097781A8 WO2009097781A8 (zh) | 2009-11-19 |
Family
ID=40951778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/070188 WO2009097781A1 (zh) | 2008-02-02 | 2009-01-16 | 监控主机的方法、监控装置及主机 |
Country Status (2)
Country | Link |
---|---|
US (1) | US20100302002A1 (zh) |
WO (1) | WO2009097781A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103167406A (zh) * | 2011-12-19 | 2013-06-19 | 中国移动通信集团天津有限公司 | 一种全球定位系统监控方法、设备及系统 |
CN106068013A (zh) * | 2016-07-25 | 2016-11-02 | 乐视控股(北京)有限公司 | 监控方法和装置以及移动终端 |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10862994B1 (en) | 2006-11-15 | 2020-12-08 | Conviva Inc. | Facilitating client decisions |
US9549043B1 (en) | 2004-07-20 | 2017-01-17 | Conviva Inc. | Allocating resources in a content delivery environment |
US8874725B1 (en) * | 2006-11-15 | 2014-10-28 | Conviva Inc. | Monitoring the performance of a content player |
US8751605B1 (en) | 2006-11-15 | 2014-06-10 | Conviva Inc. | Accounting for network traffic |
US9264780B1 (en) | 2006-11-15 | 2016-02-16 | Conviva Inc. | Managing synchronized data requests in a content delivery network |
US9124601B2 (en) | 2006-11-15 | 2015-09-01 | Conviva Inc. | Data client |
US8402494B1 (en) | 2009-03-23 | 2013-03-19 | Conviva Inc. | Switching content |
US9203913B1 (en) | 2009-07-20 | 2015-12-01 | Conviva Inc. | Monitoring the performance of a content player |
US9032413B2 (en) | 2011-09-01 | 2015-05-12 | Microsoft Technology Licensing, Llc | Decoupling background work and foreground work |
US9063775B2 (en) * | 2011-09-01 | 2015-06-23 | Microsoft Technology Licensing, Llc | Event aggregation for background work execution |
US9164803B2 (en) | 2012-01-20 | 2015-10-20 | Microsoft Technology Licensing, Llc | Background task resource control |
US10148716B1 (en) | 2012-04-09 | 2018-12-04 | Conviva Inc. | Dynamic generation of video manifest files |
CN103389691A (zh) * | 2012-05-11 | 2013-11-13 | 鸿富锦精密工业(深圳)有限公司 | 远端监控系统 |
US9246965B1 (en) | 2012-09-05 | 2016-01-26 | Conviva Inc. | Source assignment based on network partitioning |
US10182096B1 (en) | 2012-09-05 | 2019-01-15 | Conviva Inc. | Virtual resource locator |
US9489236B2 (en) | 2012-10-31 | 2016-11-08 | Microsoft Technology Licensing, Llc | Application prioritization |
CN103685676B (zh) * | 2013-11-29 | 2016-02-10 | 宇龙计算机通信科技(深圳)有限公司 | 蓝牙子机、分体式移动终端及蓝牙子机的信息处理方法 |
US10178043B1 (en) | 2014-12-08 | 2019-01-08 | Conviva Inc. | Dynamic bitrate range selection in the cloud for optimized video streaming |
US10305955B1 (en) | 2014-12-08 | 2019-05-28 | Conviva Inc. | Streaming decision in the cloud |
CN110294372B (zh) * | 2018-03-23 | 2023-02-28 | 奥的斯电梯公司 | 一种无线信号装置、电梯服务请求系统和方法 |
CN110164436A (zh) * | 2019-05-22 | 2019-08-23 | 深圳市智乐创科技有限公司 | 便携式多点智能语音控制家居的系统及方法 |
CN114125390B (zh) * | 2021-11-22 | 2022-11-25 | 深圳市博尔特科技发展有限公司 | 一种模块化分布式音视频处理系统及方法 |
CN115242359B (zh) * | 2022-07-22 | 2023-08-01 | 重庆邮电大学 | 一种面向智慧养老的监护系统及其实现方法 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6891838B1 (en) * | 1998-06-22 | 2005-05-10 | Statsignal Ipc, Llc | System and method for monitoring and controlling residential devices |
CN1777326A (zh) * | 2004-11-19 | 2006-05-24 | 乐金电子(中国)研究开发中心有限公司 | 移动通信终端通话状态监控系统及其工作方法 |
CN1901707A (zh) * | 2006-07-04 | 2007-01-24 | 高金铎 | 监控手机及其远程监控方法 |
CN101227199A (zh) * | 2008-02-02 | 2008-07-23 | 宇龙计算机通信科技(深圳)有限公司 | 一种监控手机状态的装置及方法 |
CN101232535A (zh) * | 2008-02-15 | 2008-07-30 | 宇龙计算机通信科技(深圳)有限公司 | 一种共享播放多媒体文件的方法及多媒体播放器 |
CN101286806A (zh) * | 2008-06-04 | 2008-10-15 | 宇龙计算机通信科技(深圳)有限公司 | 一种单个子机监控多个主机的方法、系统及设备 |
CN101304571A (zh) * | 2008-07-01 | 2008-11-12 | 宇龙计算机通信科技(深圳)有限公司 | 分体式移动终端主机和子机间通信认证的方法及移动装置 |
CN101335575A (zh) * | 2008-08-05 | 2008-12-31 | 宇龙计算机通信科技(深圳)有限公司 | 一种单个子机选择监控多个主机的方法及系统 |
CN201181963Y (zh) * | 2008-02-02 | 2009-01-14 | 宇龙计算机通信科技(深圳)有限公司 | 一种多媒体播放器 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6915337B1 (en) * | 2000-03-07 | 2005-07-05 | Ricoh Co. Ltd. | Method and system for updating the device driver of a business office appliance |
US20050136988A1 (en) * | 2003-12-19 | 2005-06-23 | Villamil Camilo E. | Method for reporting personal status of a mobile communication device user and method therefor |
US8028038B2 (en) * | 2004-05-05 | 2011-09-27 | Dryden Enterprises, Llc | Obtaining a playlist based on user profile matching |
US7881832B2 (en) * | 2006-06-09 | 2011-02-01 | Garmin International, Inc. | Automatic speech recognition system and method for aircraft |
-
2009
- 2009-01-16 WO PCT/CN2009/070188 patent/WO2009097781A1/zh active Application Filing
-
2010
- 2010-08-02 US US12/848,902 patent/US20100302002A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6891838B1 (en) * | 1998-06-22 | 2005-05-10 | Statsignal Ipc, Llc | System and method for monitoring and controlling residential devices |
CN1777326A (zh) * | 2004-11-19 | 2006-05-24 | 乐金电子(中国)研究开发中心有限公司 | 移动通信终端通话状态监控系统及其工作方法 |
CN1901707A (zh) * | 2006-07-04 | 2007-01-24 | 高金铎 | 监控手机及其远程监控方法 |
CN101227199A (zh) * | 2008-02-02 | 2008-07-23 | 宇龙计算机通信科技(深圳)有限公司 | 一种监控手机状态的装置及方法 |
CN201181963Y (zh) * | 2008-02-02 | 2009-01-14 | 宇龙计算机通信科技(深圳)有限公司 | 一种多媒体播放器 |
CN101232535A (zh) * | 2008-02-15 | 2008-07-30 | 宇龙计算机通信科技(深圳)有限公司 | 一种共享播放多媒体文件的方法及多媒体播放器 |
CN101286806A (zh) * | 2008-06-04 | 2008-10-15 | 宇龙计算机通信科技(深圳)有限公司 | 一种单个子机监控多个主机的方法、系统及设备 |
CN101304571A (zh) * | 2008-07-01 | 2008-11-12 | 宇龙计算机通信科技(深圳)有限公司 | 分体式移动终端主机和子机间通信认证的方法及移动装置 |
CN101335575A (zh) * | 2008-08-05 | 2008-12-31 | 宇龙计算机通信科技(深圳)有限公司 | 一种单个子机选择监控多个主机的方法及系统 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103167406A (zh) * | 2011-12-19 | 2013-06-19 | 中国移动通信集团天津有限公司 | 一种全球定位系统监控方法、设备及系统 |
CN106068013A (zh) * | 2016-07-25 | 2016-11-02 | 乐视控股(北京)有限公司 | 监控方法和装置以及移动终端 |
Also Published As
Publication number | Publication date |
---|---|
WO2009097781A8 (zh) | 2009-11-19 |
US20100302002A1 (en) | 2010-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009097781A1 (zh) | 监控主机的方法、监控装置及主机 | |
CN107277754B (zh) | 一种蓝牙连接的方法及蓝牙外围设备 | |
US8892088B2 (en) | Systems and methods for handling incoming calls on a media device | |
WO2021114952A1 (zh) | 数据处理方法、终端设备、蓝牙设备及存储介质 | |
JP5396863B2 (ja) | ワイヤレスネットワークシステム | |
CN105163366B (zh) | 无线网络连接方法和装置 | |
WO2019090726A1 (zh) | 选择蓝牙设备的方法、终端和系统 | |
KR20140124304A (ko) | 통신 제어 방법 및 이를 지원하는 전자 장치 | |
WO2016127795A1 (zh) | 业务处理方法、服务器及终端 | |
EP3160110B1 (en) | File transmission method, apparatus and storage medium | |
WO2021129529A1 (zh) | 设备切换方法及相关设备 | |
JP2018523176A (ja) | 車載インフォテインメントとデータを交換するための方法、サーバ、モバイル端末、及び装置 | |
CN104054389B (zh) | 用于在便携式终端之间建立无线局域网链路的方法和装置 | |
WO2015032249A1 (zh) | 多媒体播放设备网络初始化的方法、系统、设备与终端 | |
CN106203035A (zh) | 一种数据访问控制方法及移动终端 | |
CN108710486A (zh) | 音频播放方法、装置、耳机及计算机可读存储介质 | |
JP5849857B2 (ja) | 近距離無線通信装置 | |
CN112165704A (zh) | 信息共享方法、耳机盒及计算机可读存储介质 | |
TW201019625A (en) | Slave device fitting bluetooth communication protocol and communication connecting method | |
JP2007053728A (ja) | 情報端末管理装置、表示装置、および情報端末管理方法 | |
CN107046595A (zh) | 通知信息处理方法、装置及移动终端 | |
CN114928831B (zh) | 一种通信方法及电子设备 | |
JP4683652B2 (ja) | 画像データ送受信システム及び画像データ送信デバイス及びその制御方法、並びに、コンピュータプログラム | |
JP2012039282A (ja) | 電子機器、その情報表示プログラム及びその情報表示方法 | |
US20070207796A1 (en) | Wireless voice operated system and method for portable communication device and wireless earphones thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980103895.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09707182 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 221210 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09707182 Country of ref document: EP Kind code of ref document: A1 |