Internet-of-things security and protection sensor network searching method, device, equipment and storage medium

An Internet of Things and sensor technology, applied in the computer field, can solve problems such as large battery power loss, shorten battery life cycle, and safety hazards, and achieve the effect of improving user experience, avoiding shortening battery life cycle, and avoiding excessive power consumption.

Active Publication Date: 2020-11-10
上海顺舟智能科技股份有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, when the intelligent gateway or the zigbee wireless network routing node is in the case of power failure, failure or poor signal, the security sensor will be in the state of constantly searching for the network for a long time, resulting in a large loss of battery power and shortening the battery life cycle , affect the user experience, and even accidentally cause the security sensor equipment to work abnormally, bringing serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet-of-things security and protection sensor network searching method, device, equipment and storage medium
  • Internet-of-things security and protection sensor network searching method, device, equipment and storage medium
  • Internet-of-things security and protection sensor network searching method, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 It is a flow chart of a method for finding a network of an Internet of Things security sensor provided by Embodiment 1 of the present invention. The embodiment of the present invention can be applied to the situation where the security sensor detects an abnormal network connection and needs to find the network efficiently. The method can be executed by the Internet of Things security sensor network finding device provided by the embodiment of the present invention. It is implemented in the form of hardware, and generally can be integrated in computer equipment. For example, security sensor devices. Such as figure 1 As shown, the method of the embodiment of the present invention specifically includes:

[0026] Step 101. When an abnormal network connection is detected, a network search is triggered, and the network search includes sending a beacon request to a target network node at least once.

[0027] Among them, abnormal network connection includes network...

Embodiment 2

[0051] figure 2 It is a flow chart of a method for finding a network of an Internet of Things security sensor provided by Embodiment 2 of the present invention. The embodiment of the present invention can be combined with each optional solution in the above-mentioned one or more embodiments. In the embodiment of the present invention, the first network hunting interval is 0.5 seconds, and the first time node is the first network hunting After 1 minute, the second network hunting interval is 1 minute, the second time node is 15 minutes after the first time node, and the third network hunting interval is 30 minutes.

[0052] Such as figure 2 As shown, the method of the embodiment of the present invention specifically includes:

[0053] Step 201. When an abnormal network connection is detected, a network search is triggered, and the network search includes sending a beacon request to a target network node at least once.

[0054] Step 202, if the network search fails, repeat ...

Embodiment 3

[0064] image 3 A schematic structural diagram of an Internet of Things security sensor network finding device provided by Embodiment 3 of the present invention, as shown in image 3 As shown, the device includes: a network hunting trigger module 301 , a first network hunting module 302 , a second network hunting module 303 and a third network hunting module 304 .

[0065] Wherein, the network hunting trigger module 301 is configured to trigger a network hunting when an abnormal network connection is detected, and the network hunting includes sending at least one beacon request to the target network node; the first network hunting module 302 is used to If the network fails, repeat the operation of entering the dormant state and start timing, and search the network again after the first network search interval until the network search succeeds before the first time node; the second network search module 303 is used to If there is no successful network search before the time no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an Internet-of-things security sensor network searching method, a device, equipment and a storage medium. The method comprises the following steps: triggeringnetwork searching once when detecting that network connection is abnormal, the network searching comprising sending at least one beacon request to a target network node; if the network searching fails, repeatedly executing the operation of entering the dormant state and searching the network again after the first network searching interval until the network searching succeeds before the first time node; if not, repeatedly executing the operation of entering the dormant state and searching the network again after the second network searching interval until the network searching succeeds beforethe second time node; and if not, repeatedly executing the operation of entering the dormant state and searching the network again after the third network searching interval until the network searching succeeds or a network searching request is detected. According to the method of the invention, the security sensor achieves the purpose of successful network searching with a higher success rate, the problems that the power consumption of the security sensor is too high and the service cycle of the battery is shortened are avoided, and the user experience is improved.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technology, and in particular, to a method, device, device, and storage medium for finding a network of an Internet of Things security sensor. Background technique [0002] The smart home security system based on the Zigbee protocol (zigbee) is divided into three parts: security sensor equipment, smart gateway and client. The security sensor device collects the home environment information, and sends the monitored information to the smart gateway through the zigbee wireless network security sensor after processing; the smart gateway judges whether the home environment is safe after receiving the data, and passes the reported data through the smart gateway The WAN sends it to the client; the client completes the storage and display of the data after receiving the data information sent by the WAN, and sends an alarm when any abnormal situation (foreign intrusion, fire, gas leakage, etc....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/38H04W48/16H04W52/02H04W76/10G16Y10/80G16Y30/00
CPCG16Y10/80G16Y30/00H04W48/16H04W52/0261H04W4/38H04W76/10Y02D30/70
Inventor 陈建江王志磊
Owner 上海顺舟智能科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products