Disclosure of Invention
In view of the above, the invention provides a multi-device collaborative management and optimization system based on a soft bus, which makes up for the defects in terms of device compatibility and resource management, and further improves the capability and user experience of multi-device collaborative.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
A multi-device collaborative management and optimization system based on a soft bus comprises a device access identification module, a collaborative task scheduling module, a resource management optimization module, a safety protection module and a user experience enhancement module;
the device access identification module is used for scanning known devices and unknown devices through a soft bus and various communication protocols, and correspondingly configuring a driver to realize device access;
The collaborative task scheduling module is used for receiving a task request sent by a user, obtaining a task allocation scheme based on the task request and the comprehensive score of the access equipment, monitoring the execution condition of the task allocation scheme and dynamically adjusting the execution condition;
The resource management optimizing module is used for giving a resource attribute value to the access equipment, and optimizing and resource adjustment distributing the task distributing scheme based on the task request and the resource attribute value;
The safety protection module is used for verifying the identities of the access equipment and the user, encrypting and verifying the integrity of transmission data between the access equipment, classifying and storing the transmission data, monitoring the safety state of the access equipment and carrying out abnormal early warning;
The user experience enhancement module is used for setting a unified operation interface, adjusting the operation interface based on equipment characteristics, realizing synchronous execution of tasks and unified display of prompt information between the access equipment, and providing online support.
Preferably, the equipment access identification module comprises a communication protocol processing unit, an equipment information extraction unit, a dynamic identification unit, an intelligent connection unit and a drive management unit;
The communication protocol processing unit is used for scanning and identifying signals of various known devices and unknown devices in different network environments based on integrated various communication protocols and soft buses;
the device information extraction unit is used for classifying signal types based on communication protocol features corresponding to the identified known device signals and extracting corresponding known device information based on the classified known device signals;
The dynamic identification unit is used for classifying based on the universal features of the identified unknown equipment, and performing interactive test based on the classified unknown equipment to obtain the functional characteristics of the unknown equipment as the unknown equipment information;
The intelligent connection unit is used for dynamically selecting corresponding communication protocols and connection parameters based on the known equipment information and the unknown equipment information to realize equipment access;
the drive management unit is used for matching corresponding drive programs for the access equipment based on the built-in equipment drive library, generating temporary drive based on interface specifications and function descriptions of the access equipment if the matched drive programs are not available, and performing optimization adjustment until the access equipment stably operates.
Preferably, the collaborative task scheduling module comprises a task analysis unit, a task template matching unit, a device selection and task allocation unit and a task execution monitoring and adjusting unit;
The task analysis unit is used for receiving and analyzing the task request of the user to obtain task information;
The task template matching unit is used for comparing the task information with the attributes of the task templates to obtain matched task templates, and selecting the corresponding access equipment based on the task templates;
The device selection and task allocation unit is used for obtaining the comprehensive score based on the selected access device obtaining the matching degree score, the resource idle score, the communication efficiency score and the history evaluation score, and selecting the corresponding access device based on the comprehensive score to perform task allocation to obtain the task allocation scheme;
The task execution monitoring and adjusting unit is used for monitoring the execution condition of the task allocation scheme in real time, adjusting the corresponding task execution state based on the task progress, and dynamically adjusting the task allocation scheme based on the abnormal condition of the access equipment.
Preferably, the equipment selection and task allocation unit comprises a function matching degree evaluation subunit, a resource idleness evaluation subunit, a communication efficiency evaluation subunit, a historical task performance evaluation subunit and a multi-factor task allocation subunit;
the function matching degree evaluation subunit is used for determining the function attribute of the equipment based on the access equipment, obtaining a function vector based on the function attribute, obtaining a demand vector based on the task information, and performing dot product operation with the function vector to obtain the matching degree score;
The resource idle degree evaluation subunit is configured to obtain real-time resource information of each access device and convert the real-time resource information into a resource idle vector, determine a corresponding demand weight based on the task information, and obtain the resource idle score based on the demand weight and the resource idle vector weight;
the communication efficiency evaluation subunit is used for establishing a communication efficiency matrix based on measuring network delay and packet loss rate among all access devices and obtaining a communication efficiency score based on the communication efficiency matrix;
The historical task performance evaluation subunit is used for obtaining the historical evaluation score based on the completion condition of the access equipment in the same type of task;
The multi-factor task allocation subunit is configured to obtain the comprehensive score based on the matching degree score, the resource idle score, the communication efficiency score and the historical evaluation score, and select the access device with the comprehensive score greater than a threshold to perform task allocation, so as to obtain the task allocation scheme.
Preferably, the task execution monitoring and adjusting unit comprises a task execution adjusting subunit and an abnormality adjusting subunit;
The task execution adjustment subunit is used for monitoring the execution condition of the task allocation scheme in real time, acquiring a corresponding task progress report, and dynamically updating the overall execution state of the task based on the task progress report;
The abnormal adjustment subunit is used for acquiring an abnormal report when the access equipment executing the task allocation scheme has abnormal conditions, updating and evaluating the task conditions based on the abnormal report, and dynamically adjusting the task allocation scheme based on the rest available access equipment and the task execution progress.
Preferably, the resource management optimization module comprises a resource attribute confirmation unit, a cooperative task allocation unit and a resource state monitoring unit;
the resource attribute confirmation unit is used for collecting the resource state data of the access equipment in real time, evaluating the hardware parameters of the access equipment based on the resource state data, and endowing the access equipment with the corresponding resource attribute value based on the evaluation result;
The collaborative task allocation unit is used for optimizing the task allocation scheme by adopting a resource scheduling algorithm based on the task information and the resource attribute value;
The resource state monitoring unit is used for carrying out resource adjustment on the task allocation scheme based on the resource state data in the task execution process, determining task priority based on the task information and carrying out resource allocation on the task allocation scheme based on the task priority.
Preferably, the resource scheduling algorithm specifically includes:
acquiring a demand vector of a task on a resource based on the task information;
acquiring the resource idle rate of the access equipment based on the resource attribute value;
Obtaining a resource idle vector based on the resource idle rate and calculating similarity with the demand vector;
selecting the access equipment which is most matched with the task resource based on the similarity;
determining the resource utilization efficiency of the access equipment for processing a task of a specific type based on historical task execution data of the access equipment;
Determining the dependency degree of the task on the resource based on the task information;
Setting corresponding resource weight vectors for different types of tasks based on the dependency degree;
Acquiring a resource state vector of the access equipment based on the resource state data;
obtaining an expected resource utilization rate of task execution on the access device based on the resource weight vector and the resource status vector;
Predicting the resource change condition in the future preset time based on the resource history data of the access equipment;
And optimizing the task allocation scheme based on the similarity, the resource utilization efficiency, the expected resource utilization rate and the resource change condition.
Preferably, the safety protection module comprises a safety authentication unit, a user authentication unit, a transmission encryption unit, a data storage unit, a data integrity verification unit and an equipment state monitoring unit;
The security authentication unit is used for acquiring the unique identifier of the access device and comparing the unique identifier with a stored legal device list, issuing a corresponding digital certificate for the legal device, and verifying the validity of the corresponding digital certificate when the device is connected;
the user authentication unit is used for setting a plurality of authentication modes to verify the identity of the user;
The transmission encryption unit is used for selecting a corresponding encryption algorithm according to the sensitivity and the transmission environment of the transmission data to encrypt the transmission data, and storing and managing encryption keys;
The data storage unit is used for setting corresponding security levels based on different types of the transmission data, and classifying and storing the transmission data based on the security levels and equipment storage capacity;
The data integrity verification unit is used for generating a first hash value based on the transmission data at a data sending end and sending or storing the first hash value and the transmission data together, generating a second hash value when the receiving end reads the transmission data and comparing the second hash value with the first hash value, and carrying out early warning if the second hash value is inconsistent with the first hash value;
the equipment state monitoring unit is used for monitoring the safety state of the access equipment in real time, taking corresponding protective measures and carrying out early warning prompt when the access equipment is abnormal.
Preferably, the equipment state monitoring unit comprises an operation process monitoring subunit, a network flow monitoring subunit and an exception handling subunit;
The running process monitoring subunit is used for establishing a process black-and-white list, monitoring the running state of the access equipment and comparing the running state with the black-and-white list to obtain a process comparison result;
The network flow monitoring subunit is used for monitoring the network flow of the access equipment, and identifying the network flow based on the established network flow model and an abnormality detection algorithm to obtain an abnormal network flow mode;
And the exception handling subunit is used for taking corresponding protective measures and carrying out early warning prompt based on the process comparison result and the exception network flow mode.
Preferably, the user experience enhancement module comprises a universal interface unit, a synchronous operation unit, a self-adapting unit, a feedback prompting unit and an interface optimizing unit;
The universal interface unit is used for setting unified interface elements and operation buttons and optimizing the interface elements based on the characteristics of the access equipment;
the synchronous operation unit is used for transmitting the execution operation on the access equipment to other cooperative equipment for synchronous execution;
The self-adapting unit is used for carrying out self-adapting adjustment on the interface elements and the operation modes based on the screen size, the resolution and the input modes of the access equipment;
the feedback prompt unit is used for displaying prompt information on all the cooperative devices in the cooperative task in a unified mode and providing corresponding help feedback and online support;
the interface optimizing unit is used for evaluating the user behavior based on the prompt information and optimizing along with the interface element and the operation button based on the evaluation result.
Compared with the prior art, the invention discloses a multi-device collaborative management and optimization system based on a soft bus, which has the following beneficial effects:
1. The system has excellent device compatibility, and can be compatible with various types and brands of intelligent devices by means of rich communication protocol processing units and dynamic identification mechanisms, and is a device conforming to a standard communication protocol (such as Bluetooth, wi-Fi, zigbee and the like) or a special device adopting a custom protocol. The wide compatibility breaks through the limitation of the existing distributed collaboration framework on equipment, eliminates the worry of users on the problem of incompatibility of the equipment, and enables the users to freely construct personalized multi-equipment collaboration environments. For example, the user can easily link the equipment such as intelligent audio amplifier, intelligent TV, intelligent sensor of different manufacturers together, realizes unified cooperative control and function interaction, improves the utilization efficiency of equipment and user's convenience by a wide margin.
2. The system can accurately evaluate the resource condition of each device by collecting and analyzing the device resource information in real time and constructing a fine resource model, in a collaborative task allocation stage, the system comprehensively considers the idle degree, the utilization efficiency, the dependence of the task on the resource and the dynamic change trend of the resource of the device resource to reasonably allocate the task to each device so as to maximize the resource utilization efficiency, in the task execution process, the system continuously monitors the resource change, if the condition of shortage or low utilization efficiency is found, the system can timely start a resource adjustment mechanism to ensure the smooth completion of the task and avoid the task failure or the jam phenomenon caused by the shortage of the resource, and the optimization strategy not only improves the execution efficiency of the collaborative task, but also prolongs the battery endurance time of the mobile device and reduces the device heating problem caused by the excessive use of the resource, thereby further improving the overall performance and the service life of the device.
3. Safety protection is one of the core advantages of the system. The system effectively prevents illegal equipment from accessing unauthorized users from a multi-level security authentication mechanism (including equipment identity verification and digital certificate technology) accessed by the equipment, various modes (such as passwords, fingerprints, facial recognition, iris recognition and the like) of user identity authentication and support of a multi-factor authentication mode, and in the data transmission process, the system selects a proper high-strength encryption algorithm (such as AES, RSA and the like) according to the sensitivity of the data, strictly manages encryption keys and ensures confidentiality and integrity of the data in the transmission process. For data storage, the system sets hierarchical security protection strategies for different types of data, reasonably distributes the data according to the storage security capability of the equipment, and prevents the data from being tampered through data integrity verification technologies (such as hash functions and digital signatures). The comprehensive safety protection mechanism effectively guarantees the safety of private data (such as personal health information, bank account information and the like) of the user, so that the user can be carefree when using the system.
4. The user experience enhancement module provides unified, convenient and comfortable operation experience for the collaborative system. The universal user interface design framework ensures consistent visual effect and operation logic on different types of equipment, reduces the learning cost of users and improves the operation efficiency. The operation synchronization mechanism enables operations performed by a user on one device to be synchronized to other devices participating in collaboration, and seamless operation experience is achieved. For example, when the multimedia content is played by multiple devices, the user can realize the functions of synchronous playing, pause and the like without operating each device one by one. The device adaptation technology adaptively adjusts the user interface and the operation mode according to the screen size, resolution, input mode and other characteristics of the device, and ensures that excellent use experience can be obtained on various devices. In addition, the unified feedback and prompt information processing mechanism enables a user to know the task execution condition and the operation result in time, and clear and visual information feedback can be obtained no matter the task normally runs or is abnormal. And the satisfaction degree and usability of the user to the system are further improved by adding the perfect user help file and the online support function.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
As shown in FIG. 1, the embodiment of the invention discloses a multi-device collaborative management and optimization system based on a soft bus, which comprises a device access identification module, a collaborative task scheduling module, a resource management optimization module, a safety protection module and a user experience enhancement module;
the device access identification module is used for scanning known devices and unknown devices through a soft bus and various communication protocols, and correspondingly configuring a driver to realize device access;
The collaborative task scheduling module is used for receiving a task request sent by a user, obtaining a task allocation scheme based on the task request and the comprehensive score of the access equipment, monitoring the execution condition of the task allocation scheme and performing active adjustment;
the resource management optimizing module is used for giving a resource attribute value to the access equipment, and optimizing and distributing the task distribution scheme and resource adjustment based on the task request and the resource attribute value;
The safety protection module is used for verifying the identities of the access equipment and the user, encrypting and verifying the integrity of transmission data between the access equipment, storing the transmission data in a classified mode, monitoring the safety state of the access equipment and carrying out abnormal early warning;
and the user experience enhancement module is used for setting a unified operation interface, adjusting the operation interface based on the equipment characteristics, realizing the synchronous execution of tasks and the unified display of prompt information among access equipment, and providing online support.
Example 2
The embodiment of the invention discloses a multi-device collaborative management and optimization system based on a soft bus, which comprises a device access identification module, a collaborative task scheduling module, a resource management optimization module, a safety protection module and a user experience enhancement module.
The device access identification module is used for scanning the known device and the unknown device through the soft bus and various communication protocols, and correspondingly configuring a driver to realize device access.
Preferably, existing distributed collaboration frameworks have limitations in terms of device compatibility. Devices of different brands and types often employ different communication protocols, data formats, and operating systems. When these devices attempt to access a generic distributed collaboration framework, the framework may not properly identify or parse the relevant protocols, resulting in device failure or limited functionality. Even if devices successfully access the collaborative system, there may be significant differences in the running effects of applications on different devices due to differences in the operating systems. New devices have new functionality and features, collaborative frameworks are often difficult to update in time to support them, and users need to wait for system upgrades or device manufacturers to provide adaptation drivers to achieve full compatibility. The design of soft buses is mainly oriented to local area network environments, and the communication capability of the soft buses is difficult to cross-domain or cross-network environments. This limitation limits the application scenario extension of distributed collaboration systems to a greater extent, especially in trans-regional device collaboration and remote operation.
Preferably, the invention sets up based on the above-mentioned problems that as shown in FIG. 2, the device access identification module comprises a communication protocol processing unit, a device information extraction unit, a dynamic identification unit, an intelligent connection unit and a drive management unit;
The communication protocol processing unit is used for scanning and identifying signals of various known devices and unknown devices in different network environments based on the integrated various communication protocols and soft buses;
the device information extraction unit is used for classifying signal types based on communication protocol features corresponding to the identified known device signals and extracting corresponding known device information based on the classified known device signals;
the dynamic identification unit is used for classifying based on the identified general characteristics of the unknown equipment, and performing interactive test based on the classified unknown equipment to obtain the functional characteristics of the unknown equipment as the information of the unknown equipment;
The intelligent connection unit is used for dynamically selecting corresponding communication protocols and connection parameters based on known equipment information and unknown equipment information to realize equipment access;
The drive management unit is used for matching corresponding drive programs for the access equipment based on the built-in equipment drive library, generating temporary drive based on interface specifications and function descriptions of the access equipment if no matched drive program exists, and carrying out optimization adjustment until the access equipment stably operates.
Preferably, the plurality of communication protocols include, but are not limited to, bluetooth protocol stacks, wi-Fi driven protocols, zigbee protocols, and other common and custom communication protocols.
And a plurality of communication protocols integrated in the communication protocol processing unit run simultaneously, for example, a Bluetooth protocol stack searches Bluetooth equipment signals in a specified frequency band, a Wi-Fi driving and protocol processing subunit scans surrounding Wi-Fi networks and equipment, and a Zigbee protocol analysis subunit searches equipment in a Zigbee network frequency band.
Preferably, for implementation of the bluetooth protocol stack, existing bluetooth chipsets and associated Software Development Kits (SDKs) are utilized based on the bluetooth standard specification. In the device scanning stage, the surrounding Bluetooth devices are searched by configuring the scanning parameters (such as scanning frequency, scanning mode: active scanning or passive scanning) of the Bluetooth chip. After receiving the broadcast data packet of the Bluetooth device, each field of the data packet is analyzed, including information such as device name, MAC address, service UUID and the like. Through analysis of the fields, basic information of the device and Bluetooth service types supported by the device are acquired. Meanwhile, according to the connection establishment flow of the Bluetooth protocol, pairing and connection with the target equipment are realized. In this process, a security mechanism of bluetooth is involved, including exchange and authentication of mating keys to ensure security of the connection.
Preferably, the Wi-Fi driving and protocol processing subunit relies on a Wi-Fi chip of the device and a Wi-Fi driving program provided by an operating system. When the Wi-Fi network and the device are scanned, network and device information is acquired by sending a probe request frame and receiving a Wi-Fi beacon frame. The SSID, BSSID, signal strength, frequency band, supported rates, etc. fields in the beacon frame are parsed to determine the status of the surrounding Wi-Fi network. For devices supporting Wi-Fi direct, the connection is implemented through a specific Wi-Fi direct protocol. In this process, the module handles various connection parameter settings, such as IP address assignment (via DHCP protocol or static IP configuration), negotiation of network encryption modes (e.g., WPA2, WPA 3) to establish a stable Wi-Fi connection.
Preferably, the Zigbee protocol parsing subunit is developed based on the Zigbee protocol stack. Devices of the Zigbee network communicate by transmitting and receiving signals in a specific frequency band (e.g., the 2.4GHz global universal frequency band). The sub-unit first scans the frequency band, searches for node devices in the Zigbee network, and distinguishes between different Zigbee networks by identifying a network identifier (PAN ID) in the Zigbee beacon frame. For devices in each network, the module parses its device type, endpoint information, and supported Zigbee clusters. Endpoint information is used to determine the functional role of the device in the network, e.g., one endpoint may be dedicated to temperature sensor data transmission and another endpoint is used to control device switch status. By analyzing the Zigbee clusters, specific application functions supported by the device, such as an illumination control cluster, a sensor data acquisition cluster and the like, can be further known. When connection is established with the Zigbee equipment, the module follows the topological structure (such as star type, tree type or net type) and the communication rule of the Zigbee network, so that accurate data transfer between the equipment is ensured.
Preferably, the communication protocol processing unit is internally integrated with long-distance low-power consumption communication protocols such as LoRa, NB-IoT and the like, and protocols such as Modbus and CAN bus and the like suitable for industrial scenes, so that more types of equipment such as remote monitoring equipment, environmental sensors and industrial controllers CAN be accessed, and seamless access of diversified application scenes is realized.
Preferably, the newly added soft bus cross-domain communication capability provides greater flexibility for device access. Conventional device access is typically limited to local area network environments, and the cross-domain communication characteristics of the soft bus break through this limitation. The system supports access and collaboration of remote devices by introducing distributed network services. For example, a user may connect home devices over a public network, and the devices may be efficiently discovered and accessed even though they are located in different geographic locations. The system uses the security gateway to carry out identity authentication and encryption communication on the remote equipment, so as to ensure the security of cross-domain communication.
Preferably, the device information extraction unit accurately distinguishes different types of device signals by analyzing characteristics of different protocol signals, such as frequency bands and modulation modes of Bluetooth signals, frame structures and Service Set Identifiers (SSIDs) of Wi-Fi signals, network identifiers and node information of Zigbee signals and the like, and extracts corresponding known device information based on the classified known device signals, wherein the known device information comprises unique identifiers of devices, device types (such as intelligent household appliances, intelligent wearable devices, mobile devices and the like), function lists supported by the devices and communication protocol versions used by the device information extraction unit.
Preferably, in intelligent signal analysis, a dedicated signal processing algorithm is used for demodulation and decoding of bluetooth signals. The received radio frequency signals are converted into digital signals by identifying the frequency band characteristics of the Bluetooth signals (such as 79 channels with Bluetooth basic rate/enhanced data rate (BR/EDR) in the frequency band of 2.402-2.480 GHz), and the digital signals are demodulated according to the modulation mode of Bluetooth (such as GFSK modulation) to extract data packets. When the data packet is analyzed, the parts such as the packet header, the device address, the data load and the like are analyzed according to the format of the Bluetooth protocol, and the device name, the MAC address and the supported service information are extracted.
And for Wi-Fi signals, analyzing the received Wi-Fi beacon frames and data frames by adopting a signal processing function and a software algorithm which are built in a Wi-Fi chip. The type (e.g., beacon frame, data frame, or management frame) and source of the frame are determined by analyzing information in the frame header, such as a frame control field, a duration field, and an address field. And the Wi-Fi equipment and the network state are comprehensively known by combining analysis of fields such as SSID, frequency band and signal strength.
For Zigbee signals, the signals are processed in accordance with the physical layer and MAC layer protocols of Zigbee. The unique preamble and the synchronization word of the Zigbee signal are converted into a processable digital signal by identifying them. Then, the frame control field, the sequence number, the target address, the source address and other information in the MAC layer frame are analyzed, and the position and the function of the device in the Zigbee network are clarified by combining the network identifier and the endpoint information.
Preferably, the dynamic identification unit is configured to classify the unknown device based on the identified general features of the unknown device, for example, if the signal includes a radio frequency signal with a specific frequency band and a packet header with a specific format, the module may primarily determine that the device belongs to a certain type of communication protocol, and perform an interactive test (such as sending a query instruction and analyzing a response) based on the classified unknown device, so as to obtain the functional characteristics of the unknown device as the information of the unknown device. In addition, the device access identification module introduces the cross-domain communication capability of the soft bus, so that even if devices are distributed in different network environments, device discovery and communication can be realized through a unified soft bus interface, and the coverage range of a collaborative system is effectively expanded.
Preferably, the dynamic recognition mechanism starts first with the basic features of the signal when an unknown device is encountered. For example, if the signal band is in the Bluetooth range, but the device information is not in the known Bluetooth device database, the system may further analyze the special pattern in the signal. For example, when the signal contains certain custom data formats or specific combinations of communication parameters, a preliminary determination may be made that the device is likely to be a specially tailored Bluetooth device. The system then sends a series of generic inquiry instructions to the device, which are based on the bluetooth standard inquiry procedure, but extended for unknown devices. For example, an instruction to query a list of device functions may be sent, and the device may return a block of data containing the function code. By analyzing these function codes and combining experience with similar devices and predefined function classification rules, the possible functions of the devices are inferred.
For unknown devices (such as unknown Zigbee devices) of other protocols, the system acquires endpoint information of the devices and supported cluster types by using a general query mechanism in the Zigbee protocol. By analyzing the number of endpoints and the type of cluster (e.g., whether it is associated with a common sensor or controller), the function of the device is inferred. In this process, the system continuously accumulates information of new devices and feeds it back to the device identification knowledge base so that similar devices can be identified more quickly and accurately in the future.
Preferably, the intelligent connection unit is configured to dynamically select the most suitable communication protocol and connection parameters according to the distance, signal strength, type of the device and personalized settings of the user by adopting an intelligent connection policy based on the known device information and the unknown device information, so as to implement device access. For example, for a device with a short distance and a low data transmission rate (such as a connection between a smart watch and a smart phone), a Bluetooth Low Energy (BLE) connection is preferentially adopted, and the transmitting power and the connection interval of bluetooth are automatically adjusted according to the signal receiving condition, so as to optimize the battery endurance and the connection stability. For devices requiring high-speed stable data transmission (such as connection between the smart television and the media server), wi-Fi is preferably selected, and frequency bands (2.4 GHz or 5 GHz) and Wi-Fi standards (such as 802.11n, 802.11ac, etc.) are dynamically adjusted according to the congestion degree and the device performance of surrounding Wi-Fi networks.
Preferably, in the implementation of the intelligent connection policy, the device distance is determined based on the signal strength information. For example, in a bluetooth connection, device distance is estimated from Received Signal Strength Indication (RSSI) values of bluetooth signals, and a mapping model of RSSI values versus distance is built in conjunction with experimental and calibration data. When the RSSI value is higher, the equipment is closer, the low-power consumption Bluetooth connection is preferentially adopted, and the transmitting power and the connection interval of the Bluetooth are dynamically adjusted according to the RSSI value. If the RSSI value fluctuates greatly, the equipment is indicated to have interference in the moving or environment, the monitoring frequency of the signal quality is increased, and the connection parameters are optimized in time.
For Wi-Fi connection, besides the device distance, the congestion of surrounding Wi-Fi networks needs to be evaluated. And selecting the optimal frequency band and channel connection by scanning the Wi-Fi channel utilization rate and the signal interference condition of each frequency band. If the 2.4GHz frequency band is severely congested, and the equipment supports the 5GHz frequency band and the signal strength meets the requirements, the 5GHz frequency band is preferentially selected. On the selection of Wi-Fi standards, matching is performed according to Wi-Fi chip capability and network support conditions of the device. For new devices supporting high speed transmissions, 802.11ac or higher level standards are preferred to ensure high speed and stability of data transmissions.
For Zigbee devices, the connection policy needs to combine the topology of the Zigbee network with the roles of the devices in the network. In a mesh Zigbee network, if a device is a routing node, connection stability between the device and a plurality of neighboring nodes needs to be ensured. By optimizing the routing algorithm and the signal transmission parameters, the system can effectively reduce the data transmission delay and the packet loss rate, thereby improving the overall network performance.
Preferably, the drive management unit is used for matching corresponding drive programs for the access device based on a built-in device drive library, automatically loading and configuring the drive programs if the matched drive programs are found, enabling the access device to normally communicate, generating temporary drive based on interface specifications, function descriptions and universal drive templates of the access device if the matched drive programs are not available, and performing optimization adjustment (through continuous interaction with the device, such as sending test data and analyzing feedback) until the access device stably operates.
Preferably, the official drivers of a large number of common devices are collected and optimized and integrated. Through strict test, compatibility and stability with the system are ensured, and then a device driver library is obtained.
Preferably, the generic driver templates are designed based on generic functionality and interface specifications for the device type. For example, for a sensor class device, the templates define the basic functions of the data acquisition interface, the data format conversion function, and the device initialization function.
And the collaborative task scheduling module is used for receiving a task request sent by a user, obtaining a task allocation scheme based on the task request and the comprehensive score of the access equipment, monitoring the execution condition of the task allocation scheme and performing active adjustment.
Preferably, as shown in FIG. 3, the collaborative task scheduling module comprises a task analysis unit, a task template matching unit, a device selection and task allocation unit and a task execution monitoring and adjusting unit;
The task analysis unit is used for receiving and analyzing the task request of the user to obtain task information;
The task template matching unit is used for comparing the task information with the attributes of the task templates to obtain matched task templates, and selecting corresponding access equipment based on the task templates;
the device selection and task allocation unit is used for obtaining a comprehensive score based on the matching degree score, the resource idle score, the communication efficiency score and the historical evaluation score of the selected access device, selecting the corresponding access device based on the comprehensive score to perform task allocation, and obtaining a task allocation scheme;
the task execution monitoring and adjusting unit is used for monitoring the execution condition of the task allocation scheme in real time, adjusting the corresponding task execution state based on the task progress, and dynamically adjusting the task allocation scheme based on the abnormal condition of the access equipment.
Preferably, the task parsing unit is configured to receive and parse a task request of a user, and if the task request is initiated through an application program interface, for example, the user selects a song in a multimedia playing application and designates a playing device, the application program sends related information to the task parsing unit in a specific format (for example, JSON format). The task parsing unit parses the JSON data to extract key information including song file path, format, target playlist and playback mode (e.g., synchronous playback, sequential playback, etc.). For task requests initiated by voice instructions, voice is converted to text using voice recognition techniques, and text content is analyzed based on Natural Language Processing (NLP) techniques. For example, the user speaks "play music on the speaker and television in living room", after the voice recognition system converts the voice into text, the NLP module parses out that the task type is multimedia play, the target device is the speaker and television in living room, and the task content is play music.
Preferably, the task templates are stored in a task knowledge base in a structured form, and the multimedia playing task templates are taken as an example, and the templates comprise a task type identifier (such as 'multimedia_play'), a participation device type requirement (such as 'audio_device' indicating an audio playing device and 'video_device' indicating a video playing device), a device function requirement (such as that the audio device needs to support a specific audio format, the video device needs to have a specific resolution and video decoding capability), a task execution flow (such as connecting the device first, transmitting media data, and playing at last) and a possible interaction mode (such as playing control operation).
Preferably, the task template matching unit is configured to compare the task information with the attribute of the task template, and if the task type in the task information matches with the task type identifier of a certain task template and the type and function of the target device meet the template requirement, the matching is successful.
Preferably, as shown in FIG. 4, the device selection and task allocation unit comprises a function matching degree evaluation subunit, a resource idleness evaluation subunit, a communication efficiency evaluation subunit, a historical task performance evaluation subunit and a multi-factor task allocation subunit;
A function matching degree evaluation subunit, configured to determine, based on the access device, a function attribute of the device, such as an audio output function, a video decoding function, a network connection function, and so on, where each attribute is represented by a boolean value or a numerical value, for example, for a smart speaker, the attribute value of the audio output function is 1 (indicating that the function is provided), and the attribute value of the video decoding function is 0 (indicating that the function is not provided). And obtaining a function vector based on the function attribute, obtaining a demand vector based on the task information, and performing dot product operation with the function vector to obtain a matching degree score, wherein the higher the score is, the more the equipment meets the task requirement in function.
And the resource idle degree evaluation subunit is used for acquiring the real-time resource information of each access device and converting the real-time resource information into a resource idle vector, for example, for CPU resources, calculating the complement (1-CPU utilization) of the current CPU utilization as a CPU resource idle degree value, for memory resources, calculating the proportion of the residual memory to the total memory as a memory resource idle degree value, and combining the resource idle degree values into the resource idle vector. Corresponding demand weights are determined based on task information, and resource idleness scores are obtained based on the demand weights and the resource idleness vector weights, for example, CPU resource weights are higher for computationally intensive tasks, and memory and storage resources are higher for data storage tasks.
And the communication efficiency evaluation subunit is used for establishing a communication efficiency matrix based on measuring network delay and packet loss rate between each access device, obtaining a communication efficiency score based on the communication efficiency matrix, and if the devices are connected through high-speed stable Wi-Fi, the network delay is low, the packet loss rate is close to zero, the communication efficiency score is higher, and meanwhile, the suitability of a communication protocol between the devices is considered. Communication efficiency may also be improved if the devices all support the bluetooth protocol or other efficient communication protocol.
And the historical task performance evaluation subunit is used for obtaining a historical evaluation score based on the completion condition of the statistical access equipment in the same type of task, for example, recording data such as the number of times of clamping the equipment in a multimedia playing task, audio quality evaluation and the like, and integrating the historical data to form a comprehensive evaluation score.
The multi-factor task allocation subunit is configured to obtain a comprehensive score based on the matching degree score, the resource idle score, the communication efficiency score and the historical evaluation score, select an access device with the comprehensive score greater than a threshold value to perform task allocation, obtain a task allocation scheme, and ensure efficiency and stability of task execution.
Preferably, the task execution monitoring and adjusting unit comprises a task execution adjusting subunit and an abnormality adjusting subunit;
The task execution adjustment subunit is used for monitoring the execution condition of the task allocation scheme in real time, acquiring a corresponding task progress report and dynamically updating the overall execution state of the task based on the task progress report;
The abnormal adjustment subunit is used for acquiring an abnormal report when the access equipment executing the task allocation scheme has abnormal conditions, updating and evaluating the task conditions based on the abnormal report, and dynamically adjusting the task allocation scheme based on the rest available access equipment and the task execution progress.
Preferably, the task execution adjustment subunit continuously monitors the execution of the task through a communication interface with the device. The task progress report sent by each device when executing the subtasks is obtained periodically, for example, in a multimedia playing task, the intelligent sound box reports the current playing time stamp and the audio playing state (if normal playing and blocking occur) at fixed time intervals (such as every second), and the intelligent television reports the information of video playing progress, picture quality and the like.
Preferably, the task execution adjustment subunit is further configured to synchronize delivery to all access devices participating in the task based on the user's interaction (e.g., the user pausing playing on the smartphone). Through the operation synchronization mechanism and the device communication interface, all devices are ensured to synchronously execute the pause operation, and seamless coordination of tasks is realized.
Preferably, the anomaly adjustment subunit immediately senses the problem through anomaly reporting or communication interruption and re-evaluates the task situation. And adjusting task allocation according to the current remaining available equipment and task execution progress. For example, if the smart speaker is disconnected, the anomaly adjustment subunit may find other available audio playback devices (if any), and redistribute the audio playback subtasks to the new device, and adjust the playback control logic to ensure that the new device can correctly respond to the playback, pause, and other operation instructions. If no other audio playback devices are available, video playback is paused (in the case of an audio-video synchronized playback task) and a prompt is sent to the user that the device connection is abnormal.
And the resource management optimization module is used for giving a resource attribute value to the access equipment, and optimizing and distributing the task distribution scheme and resource adjustment based on the task request and the resource attribute value.
Preferably, the resource management optimization module comprises a resource attribute confirmation unit, a cooperative task allocation unit and a resource state monitoring unit;
The resource attribute confirmation unit is used for collecting the resource state data of the access equipment in real time, evaluating the hardware parameters of the access equipment based on the resource state data, and giving corresponding resource attribute values to the access equipment based on the evaluation result;
The collaborative task allocation unit is used for optimizing a task allocation scheme by adopting a resource scheduling algorithm based on the task information and the resource attribute value;
and the resource state monitoring unit is used for carrying out resource adjustment on the task allocation scheme based on the resource state data in the task execution process, determining the task priority based on the task information and carrying out resource allocation on the task allocation scheme based on the task priority.
Preferably, the resource attribute confirmation unit is configured to collect resource status data of the access device in real time, for example, for CPU utilization, the device operating system kernel periodically counts the usage time of each CPU core, calculates the current utilization, and records the CPU occupation condition of each process, so as to analyze which applications or tasks are consuming resources. For memory occupancy, the system tracks memory allocation conditions in real time, including the size of memory blocks allocated to the application, addresses, and the amount of remaining available memory, thereby comprehensively knowing the memory state of the device and evaluating the risk of potential memory starvation.
Preferably, the resource attributes include CPU usage, memory usage, network bandwidth usage, device power and heat dissipation capacity level.
For monitoring CPU usage, a performance monitoring tool provided by the operating system kernel is utilized. In the Linux system, time statistical information of the CPU is obtained by reading a "/proc/stat" file, including user mode time, kernel mode time, idle time, and the like. By calculating the ratio of these times, the CPU utilization is obtained. Meanwhile, the CPU use time of each process can be obtained through the "/proc/[ pid ]/stat" file, so that the CPU resource consumption of which processes can be analyzed.
Preferably, for monitoring the memory occupation amount, in the Linux system, the overall information of the memory, such as the total memory, the available memory, the cache memory and the like, is obtained by reading the "/proc/meminfo" file. Meanwhile, the memory block size and the address occupied by each process can be determined by analyzing the memory mapping information in the memory management system.
For storage resources, monitoring is performed at the file system layer and the storage device driver layer of the operating system. Parameters such as storage capacity, residual capacity, read-write speed and the like are obtained by reading attribute information (such as capacity, rotating speed and the like of a hard disk obtained through a SCSI command) of the storage device and metadata (such as inode information, file size, read-write time and the like) of a file system. Meanwhile, by tracking the I/O operation of the file system, the hot spot area of the data storage is determined.
Preferably, for monitoring network bandwidth usage, the functionality provided by the network driver is utilized at the network interface layer of the device. In Linux systems, basic information of a network interface, such as an IP address, a MAC address, a network connection state, etc., may be acquired using an "ifconfig" or "IP" command. The uploading and downloading speed, network delay, packet loss rate and other indexes of the network interface can be monitored in real time through a network flow monitoring tool (such as iftop, nethogs and the like).
For monitoring the power of the device, it cooperates with the power management system of the device. In mobile devices such as smartphones, the power management chip may report information such as battery power and state of charge to the operating system in real time.
For some temperature sensitive devices, temperature data of critical components inside the device is acquired by hardware temperature sensors. The temperature sensors convert the temperature values into digital signals, and the digital signals are transmitted to an operating system through a hardware interface (such as a bus interface of I2C, SPI and the like) of the equipment, and then transmitted to the resource management optimization module through the operating system.
Preferably, the resource attribute values include performance level, current state and network connection quality, for example, for CPU resources, the performance level is determined in combination with hardware parameters such as model number, core number, main frequency, etc., and the current state is evaluated in combination with real-time CPU utilization. And for network bandwidth resources, evaluating network connection quality and available bandwidth by monitoring indexes such as uploading and downloading speeds, network delay, packet loss rate and the like of a network interface of the equipment. For CPU resources, the performance level of the CPU is determined according to hardware parameters (such as model number, core number, main frequency and the like) of the CPU. For example, the benchmark software is used to perform performance tests on different types of CPUs, and the CPUs are classified into different performance levels (such as high performance, medium performance and low performance) according to the test results. And establishing quantitative representation of CPU resource state by combining the real-time CPU utilization rate data. For example, if the CPU is of a high performance level and the utilization is low, this indicates that the CPU resources are adequate, and if the utilization is high, this indicates that the resources are strained.
And for the memory resources, determining the scale of the memory resources according to the memory capacity of the equipment. Meanwhile, the idle proportion of the memory resources is calculated by combining the memory occupation condition. And combining the memory resource scale and the idle proportion into a quantized representation of the memory resource.
And for the storage resource, determining the characteristics of the storage resource according to the parameters such as the total capacity, the read-write speed and the like of the storage device. For example, the read-write speed of a storage device is compared with the average read-write speed of an industry standard or similar device, and is classified into a high-speed, medium-speed, and low-speed storage device. And establishing a quantized representation of the storage resource by combining the storage capacity and the residual capacity. And for the network bandwidth resource, determining the quality of the network resource according to the connection type of the network interface and the measured indexes such as network bandwidth, delay, packet loss rate and the like. For example, wi-Fi networks are classified into different classes (e.g., premium Wi-Fi, regular Wi-Fi, poor Wi-Fi) based on their bandwidth and stability.
For device charge, a quantized representation is established based on the current battery charge percentage and state of charge. For example, a battery charge above 80% and being charged indicates a sufficient charge and a sustainable increase, and a battery charge below 20% and uncharged indicates a shortage of charge. And comparing the heat radiation state of the temperature sensitive equipment with the safety temperature range of the equipment according to the temperature data acquired by the temperature sensor. If the temperature approaches or exceeds the upper safe temperature limit, indicating an unsatisfactory heat dissipation condition, measures may be taken (e.g., reducing device performance to reduce heat generation).
Preferably, in the collaborative task allocation stage, the resource management optimization module performs intelligent allocation by using an advanced algorithm according to the resource requirements of the tasks and the resource model of the equipment, and comprehensively considers the following factors:
1. and (5) analyzing the ratio of unoccupied resources of the equipment. For example, for computationally intensive tasks, a device with low CPU usage is preferentially selected, fully utilizing its idle resources.
2. Resource utilization efficiency-the efficiency of the device in performing similar tasks is assessed. For example, some devices may be preferred due to their high efficiency (e.g., devices with dedicated GPUs handle video decoding tasks) even though the resource utilization is high.
3. Task resource dependency, and adjusting allocation strategies according to the dependency degree of tasks on resources. For example, the data storage task preferably selects a device with large storage capacity and high read/write speed, and the real-time communication task preferably selects a device with high network bandwidth and low delay.
4. And (3) analyzing and predicting the dynamic change trend of the resources by historical data, and predicting the future change of the equipment resources. For example, the power resource of the charging device is gradually increased, more power dependent subtasks can be allocated, and the power-down device needs to reduce the task load and transfer the high-consumption task to the device with sufficient power.
In the task execution process, the resource management optimization module continuously monitors the equipment resource change, and ensures that the task is stably carried out. If the resource is found to be tense or the utilization efficiency is low, the module immediately starts an adjustment mechanism:
1. CPU overload, namely analyzing the running subtasks on the device and transferring the computationally intensive tasks to the device with lower CPU utilization rate.
2. And (3) the memory is insufficient, namely, the buffer data is released, the non-critical background task is suspended to free the memory, or the task with larger memory occupation is distributed to the equipment with rich memory resources.
3. The electric quantity is insufficient, the working mode of the equipment (such as screen brightness reduction, background service reduction and CPU frequency reduction) is adjusted to save the electric quantity, and meanwhile, the high-energy consumption task is transferred to the equipment with sufficient electric quantity.
4. And when the network congestion causes low transmission speed or frequent packet loss, re-evaluating task allocation and transferring partial data transmission tasks to equipment with better network conditions.
Through the measures, the resource management optimization module ensures the efficient utilization of equipment resources, supports the stable operation of collaborative tasks, and improves the overall performance and user experience of the system.
Preferably, the resource scheduling algorithm specifically includes:
Acquiring a demand vector of a task on a resource based on task information;
acquiring the resource idle rate of the access equipment based on the resource attribute value;
obtaining a resource idle vector based on the resource idle rate and calculating similarity with the demand vector;
selecting an access device which is most matched with the task resource based on the similarity;
Determining the resource utilization efficiency of the access device for processing the task of the specific type based on the historical task execution data of the access device;
Determining the dependency degree of the task on the resource based on the task information;
Setting corresponding resource weight vectors for different types of tasks based on the dependency degree;
acquiring a resource state vector of the access equipment based on the resource state data;
Obtaining an expected resource utilization rate of task execution on the access device based on the resource weight vector and the resource state vector;
Predicting the resource change condition in the future preset time based on the resource history data of the access equipment;
And optimizing the task allocation scheme based on the similarity, the resource utilization efficiency, the expected resource utilization rate and the resource change condition.
Preferably, in the task execution process, when the resource of a certain device is found to be in a shortage condition (such as too high CPU utilization rate, insufficient memory, too low electric quantity, etc.) or the resource utilization efficiency is low, the resource scheduling algorithm starts a corresponding adjustment mechanism. For the case of excessive CPU usage, the algorithm first analyzes the level of CPU resource demand for the subtasks being performed on the device. By looking at the type of subtask (e.g., compute intensive subtask, I/O intensive subtask) and historical CPU resource occupancy data, it is determined which subtasks can be transferred. Then, other devices with enough CPU free resources are searched, and the appropriate devices are selected for subtask transfer according to the communication efficiency between the devices and the migration cost (such as data transmission amount, reinitialization cost and the like) of the subtasks. When the memory is insufficient, the algorithm evaluates the frequency and importance of use of each data block in the memory. For cached data, a portion of the cache space may be freed up according to a cache eviction policy (e.g., least recently used algorithm LRU). Under the condition of too low electric quantity, the algorithm can determine the subtasks to be adjusted according to the electric quantity consumption model of the equipment and the consumption condition of the current subtasks to the electric quantity. When it is found that the resource utilization efficiency of a certain device is low in the task execution process, for example, when the certain device processes a network data transmission task, the algorithm can re-evaluate the network resource condition of the device due to low transmission speed and frequent packet loss caused by network congestion.
And the safety protection module is used for verifying the identities of the access equipment and the user, encrypting and verifying the integrity of the transmission data between the access equipment, storing the transmission data in a classified mode, monitoring the safety state of the access equipment and carrying out abnormal early warning.
Preferably, as shown in fig. 5, the security protection module comprises a security authentication unit, a user authentication unit, a transmission encryption unit, a data storage unit, a data integrity verification unit and a device state monitoring unit;
The security authentication unit is used for acquiring the unique identifier of the access device and comparing the unique identifier with a stored legal device list, issuing a corresponding digital certificate for the legal device, verifying the validity of the corresponding digital certificate when the device is connected, and precisely matching the identifier with information in a database when a new device tries to access. If the match fails, the device will be denied access and can be granted by additional authorization procedures (e.g., manual addition by an administrator or advanced authentication).
Digital certificate technology further enhances the security of device authentication. Each legal device obtains a unique digital certificate, and the certificate contains key contents such as a public key of the device, a device information abstract, a signature of a certificate authority and the like. When the device is connected, the system performs comprehensive verification on the certificate, including checking whether the signature is legal (using the public key of the certificate authority to verify the consistency of the signature so as to ensure that the certificate is not tampered with), whether the certificate is in the validity period, and whether the device information (such as the type and the model) in the certificate accords with the actual access device, so that the certificate is prevented from being falsified.
The user authentication unit is used for setting a plurality of authentication modes to verify the identity of the user;
the transmission encryption unit is used for selecting a corresponding encryption algorithm according to the sensitivity and the transmission environment of the transmission data, encrypting the transmission data and carrying out storage management on an encryption key;
the data storage unit is used for setting corresponding security levels based on different types of transmission data and storing the transmission data in a classified mode based on the security levels and the equipment storage capacity;
The data integrity verification unit is used for generating a first hash value based on the transmission data at the data transmitting end and transmitting or storing the first hash value and the transmission data together, generating a second hash value when the receiving end reads the transmission data and comparing the second hash value with the first hash value, and if the first hash value and the second hash value are inconsistent, indicating that the data is tampered, carrying out early warning and taking corresponding measures, such as requesting retransmission or attempting data restoration.
The equipment state monitoring unit is used for monitoring the safety state of the access equipment in real time, taking corresponding protective measures and carrying out early warning prompt when the access equipment is abnormal.
Preferably, the user authentication unit selects an appropriate authentication mode according to the function and the setting of the user equipment. For example, on a smart phone supporting password input and fingerprint recognition, a user may select one of the authentication modes, or multi-factor authentication (such as password and fingerprint combination) is adopted according to the system requirements. For highly sensitive operations (e.g., financial transfers, viewing health privacy data, etc.), the system may impose multiple authentication methods. For example, in password and fingerprint combined authentication, the system processes a password input by a user through a hash algorithm to generate a hash value of a fixed length. The generated hash value is then compared to a pre-stored value stored in a protected memory area (e.g., a device's cryptographic chip or secure memory). Meanwhile, the fingerprint sensor collects user fingerprints, extracts characteristic points through a fingerprint identification algorithm and matches the characteristic points with a registration template. Only two ways are authenticated, and the user can obtain the access right.
Preferably, the transport encryption unit employs a symmetric encryption algorithm (e.g., AES) for general collaborative task data (e.g., device configuration parameter synchronization, plain text message). The encryption mode realizes data encryption and decryption through the shared key, has high efficiency, and is suitable for fast processing of large data volume. For highly sensitive data (e.g., bank account information, health data), an asymmetric encryption algorithm (e.g., RSA) is employed. The sender encrypts data by using the public key of the receiver, and the receiver decrypts by using the private key, so that even if the encrypted data is intercepted, the encrypted data cannot be decrypted without the private key. In the key management, a symmetric key is distributed through a security protocol, so that direct transmission of the key is avoided, the leakage risk is reduced, and the private key of the asymmetric key is stored in a high-security area (such as a hardware encryption module) of the equipment and only legal access is allowed.
Preferably, during data transmission, the transmission encryption unit generates a secure symmetric key based on a cryptographically secure pseudo-random number generator (PRNG), ensuring randomness and unpredictability of the key. The length of the key is selected based on the security level required (e.g., 128 bits, 256 bits, etc.). The keys are transferred between devices participating in the data transfer via a secure key exchange protocol, such as the Diffie-Hellman key exchange protocol. In the Diffie-Hellman protocol, the two parties of the device each calculate a shared symmetric key by exchanging some public parameters (based on a mathematical discrete logarithm problem) in an unsafe network environment. In this process, the key itself is not directly transmitted in the network, thus avoiding the risk of theft.
When the sender is to transmit data, the data is encrypted using the generated symmetric key. The AES algorithm converts plaintext data into ciphertext data by performing operations such as substitution, permutation, confusion, etc. on the data in multiple rounds. The encrypted ciphertext data is transmitted to the receiver via the network. The receiving party uses the same symmetric key to restore the ciphertext data into plaintext data according to the decryption flow of the AES algorithm. For asymmetric encryption algorithms (such as RSA), each device has its own public and private key pair. The public key is public and may be obtained by other devices, while the private key is strictly secret. When the sender is to transmit highly sensitive data, such as the user's bank account information, the data is encrypted using the public key of the receiver. The encryption process is based on the mathematical principle of RSA algorithm, and converts data into ciphertext by performing power operation and modular operation on the data. After receiving the ciphertext, the receiver decrypts the ciphertext by using the private key of the receiver and restores the data through corresponding mathematical inverse operation.
Preferably, the data storage unit classifies security levels according to data types. Highly sensitive data (e.g., user privacy information) is stored only in high-level security devices, such as devices equipped with hardware encryption chips or security isolation areas. These chips can encrypt data when written and decrypt when read, and even if the storage device is stolen, the data cannot be accessed. General user data (such as personalized settings and application caches) are stored in an encrypted mode through the encryption function of the device operating system, and data leakage caused by loss or malicious attacks is prevented.
Preferably, the device state monitoring unit monitors the running process, the network traffic and the file access behavior through the security software or the device self-provided protection mechanism, for example, identifies abnormal process start-up, unauthorized application access to sensitive data, or abnormal network traffic (such as large-scale data transmission or suspected network attack). Upon finding an anomaly, the module immediately takes measures such as quarantining the device, disconnecting the network connection, notifying the user, and providing a solution to ensure the security and stability of the collaborative system.
Preferably, the equipment state monitoring unit comprises an operation process monitoring subunit, a network flow monitoring subunit and an exception handling subunit;
And the running process monitoring subunit is used for establishing a process black-and-white list, wherein the processes in the white list are authorized legal processes, such as a system core process, a process of a regular application program installed by a user and the like. The process in the black list is a known malicious process, such as virus, trojan horse and the like, and the running state of the access equipment is monitored and compared with the black and white list to obtain a process comparison result;
The network traffic monitoring subunit is configured to monitor network traffic of the access device, and identify the network traffic based on the established network traffic model and the anomaly detection algorithm to obtain an anomaly network traffic mode, for example, if the device suddenly appears a large number of connections to external strange IP addresses, and the data transmission amount is abnormally large, it may indicate that the device is under network attack or is controlled by malicious software. At this point, the system may take measures such as cutting off suspicious network connections, initiating firewall rules to limit this type of network traffic, scanning the device for viruses, etc. Meanwhile, for the file access condition of the equipment, the read-write operation of the software tracking file is monitored. And acquiring relevant information of file access, including file paths, access types (read, write, execute), access processes and the like, through a file system monitoring interface of an operating system. If abnormal file access behavior is found, such as an unauthorized process attempting to access a sensitive file (e.g., a system configuration file, a user privacy data file, etc.), the system may block the access behavior and record the relevant information for subsequent analysis.
And the exception handling subunit is used for taking corresponding protective measures and carrying out early warning prompt based on the process comparison result and the abnormal network traffic mode, and if the process is in the blacklist, the system can immediately take measures, such as terminating the process, isolating related files and network connection, and notifying a user and an administrator. If the process is in the white list, further analysis is performed on the process, for example, access behaviors of the process to system resources, network communication behaviors and the like are observed through a behavior analysis technology, and whether malicious tendency exists is judged.
And the user experience enhancement module is used for setting a unified operation interface, adjusting the operation interface based on the equipment characteristics, realizing the synchronous execution of tasks and the unified display of prompt information among access equipment, and providing online support.
Preferably, as shown in fig. 6, the user experience enhancement module comprises a universal interface unit, a synchronous operation unit, a self-adapting unit, a feedback prompting unit and an interface optimizing unit;
The universal interface unit is used for setting unified interface elements and operation buttons and optimizing the interface elements based on the characteristics of the access equipment;
The synchronous operation unit is used for transmitting the execution operation on the access equipment to other cooperative equipment for synchronous execution;
The self-adapting unit is used for carrying out self-adapting adjustment on interface elements and operation modes based on the screen size, resolution and input modes of the access equipment;
The feedback prompt unit is used for displaying prompt information on all the cooperative devices in the cooperative task in a unified mode and providing corresponding help feedback and online support;
And the interface optimization unit is used for carrying out user behavior evaluation based on the prompt information and carrying out optimization along with the interface element and the operation button based on the evaluation result.
Preferably, the universal interface unit employs standardized color schemes, icon designs, and font styles to present a consistent visual style across a variety of devices. For example, the play control icon is on the small screen of the smart phone or the large screen of the smart television, the play button always adopts a uniform right triangle pattern, and the pause button is in two vertical lines. The size proportion and visual effect of the icons are kept consistent as much as possible on different devices, so that the icons are convenient for a user to quickly identify. A standardized operational flow is employed. For example, in a multimedia playback scenario, a user performs a playback operation on any device following the same procedure of selecting a media file- > selecting a playback device (if there are multiple selectable devices) - > performing playback. On a touch screen device, the main operation buttons (play, pause, fast forward/backward, volume adjustment, etc.) are laid out at the screen edge or bottom area that is easily reached by the user. On a device operated by a remote controller (such as a smart television), the functions of the operation buttons are mapped to corresponding keys on the remote controller, so that the function consistency is maintained. For example, play/pause buttons of the remote control have the same function as corresponding buttons on the touch screen, enabling a consistent user experience across devices.
Preferably, the synchronization operation unit is configured to quickly propagate the execution operation on the access device to other cooperative devices through an efficient messaging network for synchronous execution, where the network ensures that the instruction accurately and quickly reaches the target device based on a reliable communication protocol and an optimized mechanism. For example, in a multi-device playback scenario, a user clicking a pause button on a smart phone, instructions may be sent to a smart speaker and a smart television with very low latency. After receiving the instruction, the devices almost pause playing at the same time, so that seamless operation synchronization is realized. In order to further optimize the synchronization effect, the system adopts a time synchronization technology (such as Network Time Protocol (NTP)), so as to ensure that the time references of different devices are consistent, and the operation execution is more accurate.
Preferably, the implementation of the operational synchronization mechanism relies on efficient network communication and accurate time synchronization techniques. In terms of network communication, the synchronous operating units establish a reliable transport protocol based messaging network. For device collaboration within a local area network, a custom message protocol based on the TCP/IP protocol may be used. When a user performs an operation on one device, the operation instructions are first encapsulated into a message of a particular format. This message contains information about the type of operation (e.g., play, pause), the object of the operation (e.g., a particular multimedia file or device), the operation time stamp, etc. The message is then sent into the network through the network interface of the device. The message is transmitted to other devices participating in the collaboration in the network through network devices such as routers. In order to ensure reliable delivery of messages, a retransmission mechanism and an acknowledgement mechanism of the TCP protocol are employed. If the message is not received by the receiver device or an error occurs in the transmission process of the message, the sender resends the message until the receiver successfully receives and acknowledges the message.
In terms of time synchronization, the system employs Network Time Protocol (NTP) or other similar high precision time synchronization methods. Each device has a local time in the network that is synchronized with the standard time server. By periodically performing a time calibration with the time server, it is ensured that the time error between the devices is within a very small range (e.g. a few milliseconds). The operation time stamp is used to precisely control the execution time of the operation when the operation instruction is transferred between the devices. For example, when the user clicks a pause button at a certain point in time on the smartphone, the timestamp of this operation is sent with the message to the other device. After receiving the message, the other devices execute the pause operation at almost the same time according to the comparison of the time stamp and the local time, thereby realizing seamless operation synchronization. Meanwhile, in order to solve the problems of network delay, equipment processing speed difference and the like, the system sets a certain time tolerance in an operation synchronization mechanism. For example, if a device experiences little delay in operation execution due to network congestion or low performance, operation synchronization is still considered successful within a time tolerance range.
Preferably, the user interface automatically adjusts the layout for devices of different screen sizes and resolutions. On small screen devices (such as smartwatches), only key information and operating buttons, such as song title, play/pause buttons and volume sliders, are displayed and reasonably laid out according to the screen shape, avoiding congestion. On large screen devices (e.g., smart televisions), space is fully utilized to display more rich content such as lyrics, album art, and playlists. For different input modes, the system is optimized in a targeted manner. For example, on a touch device, the accuracy of touch response is improved by adjusting the size of a touch hot zone, on a voice control device, the recognition rate of instructions and the understanding capability of natural language are improved by a voice recognition technology, such as the correct execution of a "play next" instruction or a "pause play" instruction sent by a user, and for a key operation device (such as a control panel), the size, the spacing and the touch feeling of keys are reasonably designed, so that comfortable operation and difficult false touch are ensured.
Preferably, the feedback prompt unit is configured to display prompt information on all cooperative devices in the cooperative task in a unified manner, and when the task is abnormally executed (such as a device connection is interrupted, and a resource is insufficient to cause a task to be blocked), the system may display concise prompt information on the screens of all the participating devices. For example, if the device is disconnected, the prompt may be "device X has been disconnected, please check the network or device status", accompanied by a visual representation of the red fork overlay device icon. For user operation feedback, the system responds in time. For example, when the user successfully adjusts the volume, the user briefly displays "volume adjusted" on each device, and if the operation is invalid (such as clicking "next" but no more songs), then "no more songs" is prompted. And corresponding help feedback and online support are provided, and a user can access a local help document through a help menu of the equipment to acquire a system using method, common problem solutions and task operation guidelines. The online support function allows the user to connect with the manufacturer server, acquire the latest technical support and software update information, communicate with customer service, and solve the complex problem in use.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.