Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Configurable wireless application design and development method

A wireless, configuration file technology, applied in electrical components, transmission systems, etc., can solve problems such as cost, loss of human and material resources, and increase

Active Publication Date: 2013-11-13
江苏恒卫防护器材制造有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For these applications, if the traditional method is adopted (for example, separate development for each application scenario), the cost and loss of manpower and material resources will inevitably increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configurable wireless application design and development method
  • Configurable wireless application design and development method
  • Configurable wireless application design and development method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0092] Application of the present invention realizes family anti-theft.

[0093] Peripheral modules required: monitoring the thief is ready to enter the module, monitoring the thief has entered the module, voice module, camera module.

[0094] Realized function: When the thief is about to enter the room, he calls the owner, and the owner controls the voice module to work through the mobile phone, and plays the preset warning audio. You can also choose to call the police at this time. After the thief enters the room, he calls the owner, and the owner controls the camera module to take pictures through the mobile phone. You can also choose to call the police at this time.

[0095] 1. Create a plan

[0096] Open the website system and enter the program setting interface to create a program and give a brief description. For example, the program name can be written as home security, and the description information can be written as home security monitoring using a configurable w...

example 2

[0108] The invention is applied to realize anti-theft of automobiles.

[0109] Peripheral modules required: monitor the thief is ready to enter the module, monitor the thief has entered the module, voice module, camera module, control the car flameout module.

[0110] Realized function: When the thief tries to steal, call the owner's mobile phone, the owner controls the voice module through the mobile phone, and plays the preset alarm audio. After the hardware platform dials the owner's number, the owner can call the police.

[0111] Create a plan

[0112] The process of creating a scheme is the same as Example 1.

[0113] 2. Hardware configuration

[0114] Due to the similarity with Example 1, the settings for Solution 1 can be directly borrowed, and a button control input button 3 is added to enable the control of the car flameout module.

[0115] 3. Download configuration information

[0116] same example one

[0117] 4. Install the hardware system

[0118] same exam...

example 3

[0124] The monitoring of river sewage is realized by applying the invention.

[0125]Realized function: Use relevant water pattern monitoring sensor modules (such as water temperature, PH value, phosphorus content, etc.) to monitor the sewage status of the river for 24 hours, and collect river water temperature data in real time. When the data is abnormal, the data can be reported and the preset mobile phone can be called at the same time. Users can view the historical collection data information through the computer. At the same time, multiple points can be set for monitoring the entire river. Solve the difficult problem of obtaining evidence for river sewage.

[0126] 1. Create a plan

[0127] The process of creating a scheme is the same as Example 1.

[0128] 2.1 Configure hardware

[0129] For this program, it takes 24 hours to collect. Assume that the program needs to collect information once an hour. Then you should set the trigger time setting in the hardware co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a configurable wireless application design and development method which comprises the following steps: 1) a user establishes and describes a scheme on the PC of a terminal device, and then uploads the scheme to a server so as to store the scheme in the database of the server; 2) the server carries out hardware configuration according to the scheme to obtain a configuration file, and simultaneously, if data reported by a hardware platform is related in the scheme, the server carries out feature management on the scheme; 3) the configuration file is downloaded from the server to the hardware platform; and 4) the hardware platform reads configuration information, and controls equipment connected to an external interface by means of the external interface according to the scheme. The method of the invention has the main characteristics of generality, practicability and usability.

Description

technical field [0001] The invention relates to the field of industrial control, specifically, a configurable wireless application design and development method. Background technique [0002] The Internet of Things uses radio frequency identification (RFID), infrared sensors, global positioning systems, laser scanners and other information sensing devices to connect any item with the Internet according to the agreed protocol for information exchange and communication to achieve intelligent identification. , location, tracking, monitoring and management of a network. This technology, which was proposed around 1999, is divided into three layers: perception layer, network layer and application layer. Relying on various sensing devices at the perception layer and reliable data transmission at the network layer, through corresponding data processing methods, the predetermined function. [0003] At present, there are many applications around the Internet of Things, such as Shang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 刘豫东朱启文周望玮赵成龙
Owner 江苏恒卫防护器材制造有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products