WO2024067519A1 - 指示方法、第一设备及第二设备 - Google Patents
指示方法、第一设备及第二设备 Download PDFInfo
- Publication number
- WO2024067519A1 WO2024067519A1 PCT/CN2023/121231 CN2023121231W WO2024067519A1 WO 2024067519 A1 WO2024067519 A1 WO 2024067519A1 CN 2023121231 W CN2023121231 W CN 2023121231W WO 2024067519 A1 WO2024067519 A1 WO 2024067519A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- memory
- memory state
- target
- control command
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 118
- 230000015654 memory Effects 0.000 claims abstract description 629
- 230000009471 action Effects 0.000 claims abstract description 11
- 230000006399 behavior Effects 0.000 claims description 88
- 230000005055 memory storage Effects 0.000 claims description 29
- 101000741965 Homo sapiens Inactive tyrosine-protein kinase PRAG1 Proteins 0.000 claims description 18
- 102100038659 Inactive tyrosine-protein kinase PRAG1 Human genes 0.000 claims description 18
- 238000013507 mapping Methods 0.000 claims description 18
- 230000008859 change Effects 0.000 claims description 17
- 125000004122 cyclic group Chemical group 0.000 claims description 4
- 238000004891 communication Methods 0.000 abstract description 40
- 230000008569 process Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 11
- 230000000694 effects Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 7
- 238000013500 data storage Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 230000002688 persistence Effects 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 3
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 3
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000010187 selection method Methods 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10019—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
- G06K7/10108—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. interrogating only those RFIDs that fulfill a predetermined requirement, e.g. selecting all RFIDs having the same speed and moving in a cloud like fashion, e.g. on the same train; interrogating only RFIDs having a certain predetermined temperature, e.g. in the same fridge, another possibility being the active ignoring of a group of tags that fulfill a predetermined requirement, equivalent to the Boolean NOT operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0722—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips comprising an arrangement for testing the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10118—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step
- G06K7/10138—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step the step consisting of determining the type of record carrier, e.g. to determine if the record carrier is an RFID tag of the long or short range type, or to determine the preferred communication protocol of the RFID tag
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/22—Scatter propagation systems, e.g. ionospheric, tropospheric or meteor scatter
Definitions
- the present application belongs to the field of communication technology, and specifically relates to an indication method, a first device and a second device.
- Backscatter communication is a communication device that uses radio frequency signals from other devices or the environment to modulate signals to transmit information about the backscatter communication device.
- tags with the same memory status are deployed in the same scenario, and the gNB/reader can obtain tag information by inventory.
- tags with multiple capabilities can be deployed in some scenarios. If multiple types of tags are counted according to the existing inventory or selection method, inventory or selection errors will occur, that is, some unnecessary tags will be counted or selected. For example, if the reader only wants to inventory passive tags, and the inventory is taken according to the existing mode, if there are both active and passive tags in the environment, then the active tags will be counted at the same time, resulting in errors in the inventory results.
- the embodiments of the present application provide an indication method, a first device, and a second device, which can solve the problem that the reader/gNB cannot accurately manage tags in various memory status tag scenarios.
- a method for indicating comprising:
- the first device receives a first message sent by the second device
- the first device determines or executes a first action based on the first message
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- an indication method comprising:
- the second device sends a first message to the first device; the first message is used to instruct the first device to determine or execute a first behavior based on the first message;
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- a device for indicating comprising:
- a receiving module configured to receive a first message sent by a second device
- a determination module configured to determine or execute a first action based on the first message
- the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- a device for indicating comprising:
- a sending module configured to send a first message to a first device; the first message is used to instruct the first device to determine or execute a first behavior based on the first message;
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- a first device comprising a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the first aspect are implemented.
- a first device comprising a processor and a communication interface; wherein the communication interface is used to receive a first message sent by a second device, and the processor is used to determine or execute a first behavior based on the first message; wherein the first device comprises a tag or a terminal; the second device comprises a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior comprises operating the memory of the first device, and/or, feedback of information related to the memory status of the first device.
- a second device comprising a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the second aspect are implemented.
- a second device comprising a processor and a communication interface; wherein the communication interface is used to send a first message to a first device; the first message is used to instruct the first device to determine or execute a first behavior based on the first message; wherein the first device comprises a tag or a terminal; the second device comprises a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior comprises operating the memory of the first device, and/or, feedback of information related to the memory status of the first device.
- an indication system comprising: a first device and a second device, wherein the first device can be used to execute the steps of the method described in the first aspect, and the second device can be used to execute the steps of the method described in the second aspect.
- a readable storage medium on which a program or instruction is stored.
- the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method described in the second aspect are implemented.
- a chip comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run a program or instruction to implement the method described in the first aspect, or to implement the method described in the second aspect.
- a computer program/program product is provided, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the steps of the method described in the first aspect, or to implement the steps of the method described in the second aspect.
- the second device sends a first message to the first device. Based on the first message, the first device can determine or execute a first behavior associated with the memory state of the first device.
- the first behavior includes operating the memory of the first device and/or feeding back information related to the memory state of the first device. This enables the second device to select a label of a specific memory state from labels of different memory states and manage it.
- FIG1 is a schematic diagram of a wireless communication system applicable to an embodiment of the present application.
- FIG. 2 is one of the schematic diagrams of interaction between a reader and a tag provided by the prior art
- FIG3 is an intention of information transmission between a reader and a tag provided by the prior art
- FIG4 is a schematic diagram of a flow chart of a reader querying and accessing a single tag provided by the prior art
- FIG5 is a schematic diagram of one of the flow charts of the indication method provided in the embodiment of the present application.
- FIG6 is a second flow chart of the indication method provided by the present invention.
- FIG7 is a schematic diagram of a structure of an indication device provided in an embodiment of the present application.
- FIG8 is a second schematic diagram of the structure of the indicating device provided in an embodiment of the present application.
- FIG9 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
- FIG10 is a schematic diagram of the structure of a first device provided in an embodiment of the present application.
- FIG. 11 is a schematic diagram of the structure of the second device provided in an embodiment of the present application.
- first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
- the first object can be one or more.
- “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
- LTE Long Term Evolution
- LTE-A Long Term Evolution
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal Frequency Division Multiple Access
- SC-FDMA Single-carrier Frequency Division Multiple Access
- NR new radio
- FIG. 1 is a schematic diagram of a wireless communication system to which an embodiment of the present application can be applied.
- the wireless communication system shown in FIG. 1 includes a terminal 11 and a network-side device 12 .
- the terminal 11 can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) equipment, a robot, a wearable device (Wearable Device), a vehicle-mounted device (VUE), a pedestrian terminal (PUE), a smart home (home appliances with wireless communication functions, such as refrigerators, televisions, washing machines or furniture, etc.), a game console, a personal computer (personal computer, PC), an ATM or a self-service
- the network side device 12 may include access network equipment or core network equipment, wherein the access network equipment may also be referred to as wireless access network equipment, wireless access network (RAN), wireless access network function or wireless access network unit.
- the access network equipment may include base stations, WLAN access points or WiFi nodes, etc., and base stations may be referred to as It is a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home B node, a home evolved B node, a transmitting receiving point (Transmitting Receiving Point, TRP) or some other suitable term in the field.
- the base station is not limited to a specific technical vocabulary. It should be noted that in the embodiment of the present application, only the base station in the NR system is introduced as an example, and the specific
- BSC Backscatter Communication
- Backscatter communication refers to the backscatter communication device using the radio frequency signal from other devices or the environment to perform signal modulation to transmit the information of the backscatter communication device.
- the backscatter communication device can be at least one of the following:
- the backscatter communication device in the traditional radio frequency identification (RFID) is generally a tag, which belongs to the passive Internet of Things (Passive-IoT) device;
- Tags with active sending capabilities This type of tag can send information to the reader without relying on the reflection of the incident signal.
- FIG 2 is one of the interaction diagrams between a reader and a tag provided by the prior art.
- a reader sends a command and a continuous wave to a tag, and the tag sends a backscattered signal to the reader.
- connection mode 1 reader to tag
- connection mode 2 tag to reader.
- a simple implementation method is: when the tag needs to send a ‘1’, the tag reflects the incident carrier signal; when the tag needs to send a ‘0’, the tag does not reflect the incident carrier signal.
- Backscatter communication equipment controls the reflection coefficient ⁇ of the circuit by adjusting the internal impedance, thereby changing the amplitude, frequency, phase, etc. of the incident signal to achieve signal modulation; wherein the reflection coefficient ⁇ is expressed by formula (1):
- Z0 is the antenna characteristic impedance
- Z1 is the load impedance
- ⁇ represents the phase
- T represents the period.
- FIG3 is an intention of information transmission between a reader and a tag provided by the prior art.
- the reader operation instructions include: Select, Inventory and Access; wherein,
- Selection The process by which the reader selects a tag for subsequent inventory or cryptographically challenges a tag for subsequent authentication. Selection includes the Select command and the Challenge command.
- Inventory The process by which the reader identifies tags.
- the reader starts an inventory round by sending a query command through one of the four sessions.
- One or more tags can reply to the reader.
- the reader detects the reply from a single tag and requests the protocol control (PC), optional extended protocol control word (XPC), electronic product code (EPC), and cyclic redundancy check 16 (CRC-16) from the tag.
- PC protocol control
- XPC optional extended protocol control word
- EPC electronic product code
- CRC-16 cyclic redundancy check 16
- Access The process by which a reader conducts transactions (read, write, verify, or otherwise) with a single tag. Before accessing, the reader uniquely identifies the tag. Access consists of multiple commands.
- the current UHF (Ultra High Frequency) RFID protocol is designed in inventory mode, requiring the reader to send a query command (Query) and the tag to respond (Reply), that is, the tag generates a 16-bit random number to the reader. After the reader sends the 16-bit sequence to the tag through the ACK command, the tag sends the relevant data to the reader.
- Query query command
- Reply respond
- the tag After the reader sends the 16-bit sequence to the tag through the ACK command, the tag sends the relevant data to the reader.
- FIG4 is a flow chart of a reader query and access to a single tag provided by the prior art.
- the reader sends a query (Query), an adjustment query (Adjust) or a repeated query (QueryRep) to the tag, and the tag has two possible results: 1.
- slot 0: the tag replies with RN16; 2.
- slot is not equal to 0: the tag does not reply.
- the tag sends RN16 to the reader, the reader responds to the tag and sends the same RN16 to the tag, and the tag has two possible results: 1.
- Valid RN16 the tag replies with ⁇ PC/XPC, EPC ⁇ ; 2. Invalid RN16: The tag does not reply.
- the reader sends a random request (Req-RN) to the tag and carries the same RN16 in the random request.
- the tag has two possible results: 1. Valid RN16: the tag replies ⁇ handle ⁇ ; 2. Invalid RN16: the tag does not reply.
- the reader sends an access command to the tag, where each access command uses ⁇ handle ⁇ as a parameter, and the tag verifies the handle.
- the Session parameter in the RFID Gen2 protocol is mainly used to facilitate tag inventory.
- Each tag contains four sessions, S0 to S3, and each session has two inventoried flags, A and B. These flags are not interoperable between different sessions. Multiple readers can use different sessions of the tag to inventory at the same time, such as the A flag of S2 and the B flag of S3.
- the flag of S0 must be A.
- the flag of S0 is only related to whether the power is off.
- the flag of S1 can be A or B. As long as it remains within the range of the last set flag duration, the flag of S1 will remain the previously set flag. If it exceeds the persistence time, it will be restored to the default flag A. Because the flag persistence time in the S1 state is not automatically refreshed, even if the power is on, it may still return to the default flag A due to exceeding the persistence time. The flag of S1 is only related to the persistence time.
- S2 and S3 are basically the same, that is, as long as the battery is in the charging state, the previously set flag is maintained. However, if the battery is powered off and the power-off time exceeds the duration of the tag, the battery returns to the default flag A.
- the flags of S2 and S3 are related to whether the battery is powered off and the duration of the power-off.
- the indication method provided in the embodiment of the present application can be applied to a backscatter communication scenario.
- the second device sends a first message to the first device.
- the first device can determine or execute a first behavior associated with the memory state of the first device based on the first message.
- the first behavior includes operating the memory of the first device and/or feedback of information related to the memory state of the first device. This enables the second device to select a label of a specific memory state from labels of different memory states and manage it.
- FIG. 5 is a flow chart of an indication method according to an embodiment of the present application. As shown in FIG. 5 , the method includes steps 501-502; wherein:
- Step 501 A first device receives a first message sent by a second device
- Step 502 The first device determines or executes a first action based on the first message
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- the embodiments of the present application can be applied to backscatter communication scenarios; the first device includes but is not limited to the types of terminals 11 listed above, and the second device includes but is not limited to the types of network side devices 12 listed above, and the embodiments of the present application are not limited to this.
- the first device includes a device set matching the target memory state; the device set includes at least one device.
- the first device includes a device set that matches the target memory state, and the device set includes at least one device, that is, each device in the device set matches the target memory state.
- the first group of tag sets includes at least one tag with no data in the memory
- the second group of tag sets includes at least one tag with data in the memory
- the third group of tag sets includes at least one tag with data sealed after the detection is completed.
- the association relationship between the first message and the device set is predefined by network configuration or protocol.
- the first device includes a tag or a terminal
- the second device includes a network side device or a terminal.
- the first device is a tag
- the second device may be a terminal or a network side device.
- the first device is a terminal
- the second device may be a network side device.
- the memory state of the first device includes at least one of the following:
- Business type stored in the memory specifically, the business type stored in the memory of the first device, for example, furniture business or medical business.
- Memory data volume specifically, the memory data volume of the first device can be in the order of megabytes (M Byte) or in the order of bytes.
- the device information may be power information, battery information or manufacturer information of the device; for example, the power information may be active, semi-passive or active; the battery information may be button battery or other battery; the manufacturer information may be manufacturer A, manufacturer B or manufacturer C.
- the target memory state includes at least one of the following:
- the target business type stored in the memory specifically, the target business type can be furniture or medical.
- Target memory data volume specifically, the target memory data volume can be in the order of megabytes (M Byte) or in the order of bytes.
- Target device information may be power information, battery information or manufacturer information of the target device; for example, the power information may be active, semi-passive or active; the battery information may be a button battery or other battery; the manufacturer information may be manufacturer A, manufacturer B or manufacturer C.
- the first message includes at least one of the following:
- a first control command is used to select a device whose memory state matches the target memory state
- the first control command is used to select a device whose memory state matches the target memory state; for example, if the target memory state is memory storage data and the first control command is a select command, the select command is used to select a first device whose memory state matches the memory storage data. It is understandable that the first control command may also select a device that matches the target business type or target memory data volume of the memory storage.
- the second control command is used to instruct a device whose memory state matches the target memory state to start an inventory; for example, if the target memory state is the target business type of memory storage, the target business type is furniture business, and the second control command is a query command, then the query command is used to instruct a device whose memory storage business type matches the furniture business to start an inventory. It is understandable that the second control command can also instruct a device that matches the memory storage data or the target memory data volume to start an inventory.
- the third control command is used to instruct a device whose memory state matches the target memory state to read the memory; for example, the target memory state is the target memory data volume, the target memory data volume is in the order of M Byte, and the third control command is a read command, then the read command is used to instruct a device whose memory data volume matches the order of M Byte to read the memory. It is understandable that the third control command may also instruct a device that matches the memory storage data or the target service type to read the memory.
- a fourth control command used to instruct a device whose memory state matches the target memory state to set or change a memory value
- the fourth control command is used to instruct a device whose memory state matches the target memory state to set or change a memory value; for example, the target memory state is the target business type of memory storage, the target business type is medical business, and the fourth control command is a write command, then the write command is used to instruct a device whose memory storage business type matches the medical business to set or change a memory value. It is understandable that the fourth control command can also instruct a device that matches the memory storage data or the target memory data volume to read, set, or change a memory value.
- the fifth control command is used to instruct a device whose memory state matches the target memory state to lock the memory; for example, if the target memory state is the target memory data volume and the fifth control command is a lock command, the lock command is used to instruct a device whose memory data volume is greater than or equal to the target memory data volume to lock the memory. It is understandable that the fifth control command may also instruct a device whose memory stores data to lock the memory.
- first control command, the second control command, the third control command, the fourth control command and the fifth control command in the present application respectively refer to commands with the same functions, and do not specifically limit the specific naming and implementation methods of the first control command and the second control command.
- a first instruction used to instruct a device supporting the target device information to execute the first behavior.
- the target device information may be power information, battery information or manufacturer information of the target device
- the first indication is used to indicate that a device supporting any one of the power information, battery information or manufacturer information of the target device can perform the first behavior. It is understandable that the device information stored in the memory of the first device can determine that the first device supporting the target device information performs the first behavior.
- the first device determines or executes a first behavior based on the first message; wherein the first behavior includes operating the memory of the first device, and/or feeding back information related to the memory status of the first device.
- the second device sends a first message to the first device, and the first device can determine or execute a first behavior associated with the memory state of the first device based on the first message.
- the first behavior includes operating the memory of the first device and/or feedback of information related to the memory state of the first device, which enables the second device to select a label of a specific memory state from labels of different memory states and manage it.
- the operating the memory of the first device includes at least one of the following:
- the first device can read the memory content of the first device and make a further response. For example, if the memory of the first device stores data, the first device can read the memory content of the first device.
- the first device can set a memory value for the first device, or change the memory value of the first device. For example, when the memory of the first device stores the target service type, the first device can rewrite other service types in the memory of the first device.
- the first device can lock the first device and prohibit the first device from performing read and write operations.
- the information related to the memory status of the first device includes any one of the following:
- the first information includes at least one of the following:
- the first device feeds back an ACK to the second device.
- a negative acknowledgement NACK used to indicate that the memory state of the first device does not match the target memory state
- the first device feeds back NACK to the second device, or the first device may not feed back, and not feeding back indicates NACK, that is, the memory state of the first device does not match the target memory state.
- the first device feeds back the second information to the second device;
- the second information can be represented by 1-bit information, and the 1-bit information can also represent ACK.
- the first device feeds back third information to the second device; for example, the third information can be represented by 0-bit information, and 0-bit information can also represent NACK.
- the following describes a specific implementation method in which the first device determines or executes the first behavior based on the first message in an embodiment of the present application.
- step 502 includes the following steps:
- the first device can determine the target memory state based on the first message.
- Step 2) The first device determines or executes the first behavior based on the target memory state and the memory state of the first device.
- the first device may determine or execute the first behavior according to the target memory state and the memory state of the first device.
- the first device determines the target memory state based on any one of the first control command, the second control command, the third control command, the fourth control command, and the fifth control command, and then determines or executes the first behavior based on the target memory state and the memory state of the first device, so that the second device can inventory and manage the first device according to the first behavior of the first device that matches the target memory state.
- step 1) above includes at least one of the following:
- Mode a when any one of the first control command, the second control command, the third control command, the fourth control command and the fifth control command includes second information, the first device determines the target memory state based on the second information; the second information is used to directly indicate the target memory state;
- the first device may determine the target memory state based on the second information.
- the first control command is a select command
- the second information is used to directly indicate the selection of memory without data storage.
- the first device can determine that the target memory state is memory without data storage based on the second information, and the first device with memory without data storage is selected, so that the first device with memory without data storage can determine or execute the first behavior.
- the first device determines the target memory state based on a first mapping relationship and a cyclic redundancy check (CRC) type in the first control command;
- the first mapping relationship includes a mapping relationship between a device memory state and a CRC type;
- the first mapping relationship includes a mapping relationship between a device memory state and a CRC type
- the first device can determine the target memory state according to the first mapping relationship and the CRC type in the first control command.
- the first type of device uses the first type of CRC type scrambling in the select command
- the second type of device uses the second type of CRC type scrambling in the select command
- the Nth type of device uses the Nth type of CRC type scrambling in the select command, thereby determining the target memory state.
- the first mapping relationship is predefined by network configuration or protocol.
- the first device determines the target memory state based on the second information; the second information is used to directly indicate the target memory state; or, the first device determines the target memory state based on the first mapping relationship and the CRC type in the first control command; the first mapping relationship includes a mapping relationship between the device memory state and the CRC type; and then the first device determines or executes the first behavior based on the determined target memory state and the memory state of the first device, so that the second device can inventory and manage the first device according to the first behavior determined or executed by the first device.
- step 2) above includes at least one of the following:
- Mode 1 When the memory state of the first device matches the target memory state and the first message includes the first control command and the second control command, the first device determines or performs at least one of the following: feeding back an ACK to the second device; feeding back second information to the second device;
- the first device that matches the target memory state can determine or execute at least one of the following based on the first control command and the second control command: feedback ACK to the second device; feedback second information to the second device; for example, the second information is 1-bit information.
- the network side device needs to select a tag with a target memory state, and the target memory state is that there is no stored data in the memory, that is, the network needs to select a tag that currently has no data stored.
- the network sends a select command to the tag, and the select command includes information for selecting a tag with no data storage.
- the tag After the tag receives the select command sent by the network side device, the tag reads the memory information according to the select command.
- the tag can feedback at least one of the following according to the memory state: the tag with no data in the memory sends the first information (ACK) to the network side device; feedbacks the second information to the second device; the second information is 1-bit information; the tag with data in the memory does not feedback.
- ACK first information
- Mode 2 When the memory state of the first device matches the target memory state and the first message includes the third control command, the fourth control command and the fifth control command, the first device determines or executes at least one of the following: reading the memory content of the first device; setting or changing the memory value of the first device; locking the memory of the first device;
- the fourth control command and the fifth control command that is, the first device that matches the target memory state can determine or execute at least one of the following based on the third control command, the fourth control command and the fifth control command: read the memory content of the first device; set or change the memory value of the first device; lock the memory of the first device.
- the first device that matches the target memory state can determine or execute the first behavior based on the read command, the write command, and the lock command, including at least one of the following: reading the memory of the first device and responding; setting or changing the memory value of the first device; locking the memory of the first device.
- the first device writes data, deletes data, or locks the memory of the first device in the memory, prohibiting read and write operations.
- the first device that matches the target memory state can determine or execute the first behavior based on the read command, the write command, and the lock command, including at least one of the following: reading the memory of the first device and responding; setting or changing the memory value of the first device; locking the memory of the first device.
- the first device rewrites the business type in the memory or locks the memory of the first device, prohibiting read and write operations.
- the first behavior determined or executed by the first device based on the read command, the write command, and the lock command includes: reading the memory of the first device and responding to or locking the memory of the first device, and prohibiting read and write operations.
- the size of the first data volume is predefined by the network configuration or protocol, and the size of the first data volume is related to the business type and memory size of the memory storage of the first device.
- the network-side device needs to select a tag with a target memory status, where the target memory status is the target business type stored in the memory.
- the memory status of medical tags can be divided into two types: “to be repaired” and “repaired”. All medical tags need to be repaired again, so the "repaired" status needs to be changed to the "to be repaired” status.
- the network-side device sends a write command to the tag. After the tag receives the write command sent by the network-side device, the tag can set or change the memory value of the tag according to the memory status, that is, it can determine the execution of the write behavior. For example, if the memory status of tag A is "repaired", tag A will change the memory value after receiving the write command. Thereby changing the memory status; if the memory status of tag B is "pending repair", tag B will not respond after receiving the write command.
- Method 3 When the memory state of the first device does not match the target memory state, the first device determines or executes at least one of the following: feedback the memory state of the first device to the second device; feedback NACK to the second device; feedback third information to the second device.
- the first device may determine or execute at least one of the following: feedback the memory state of the first device to the second device; feedback NACK to the second device; feedback third information to the second device.
- the network side device needs to select a tag with a target memory state, and the target memory state is that there is stored data in the memory, that is, the network needs to select a tag with data stored in the memory, and the network side device sends a select command to the tag, and the select command contains information for selecting a tag with data storage; after the tag receives the select command sent by the network side device, the tag reads the memory information according to the select command to determine that there is no data stored in the tag's memory, then the memory state of the tag does not match the target memory state, and at this time the tag can determine or execute at least one of the following: feedback the memory state of the first device (no data stored in the memory) to the second device; feedback NACK to the second device; feedback third information to the second device; at this time the third information can be 0bit information.
- the first device determines or executes at least one of the following: feedback ACK to the second device; feedback second information to the second device; or, when the memory state of the first device matches the target memory state and the first message includes the third control command, the fourth control command and the fifth control command, the first device determines or executes at least one of the following: reads the memory content of the first device; sets or changes the memory value of the first device; locks the memory of the first device; or, when the memory state of the first device does not match the target memory state, the first device determines or executes at least one of the following: feedback the memory state of the first device to the second device; feedback NACK to the second device; feedback third information to the second device, so that the second device can inventory and manage the first device according to the first behavior of the first device.
- step 502 further includes:
- the first device determines or executes at least one of the following based on the first indication: reading the memory of the first device; and feeding back the first information to the second device.
- the first device based on the target device information indicated by the first indication, the first device supporting the target device information can determine or execute at least one of the following: reading the memory of the first device; and feeding back the first information to the second device.
- the target bit in the first indication is used to indicate target device information; the target bit is predefined by network configuration or protocol.
- the target bit in the first indication can be represented by n bit, where n is greater than 0; the target bit is used to indicate target device information, and the target bit is predefined by the network configuration or protocol and stored in the memory of the first device.
- the reader will read or write the tag's memory. Therefore, different types of tags can be distinguished by the target device information of the tag predefined by the network configuration or protocol. For example, 2-bit identifier information is added to distinguish the tags, and the 2-bit identifier information can be stored in the tag's memory.
- the reader can obtain the type of the tag through the read operation during access, so that the reader can further determine the subsequent operation.
- the first device when the first message is the first indication, can determine or execute at least one of the following based on the target device information of the first indication: read the memory of the first device; feedback the first information to the second device, so that the second device inventories and manages the first device according to the first behavior determined or executed by the first device that can support the target device information.
- FIG. 6 is a second flow chart of the indication method provided by the present invention. As shown in FIG. 6 , the method includes step 601, wherein:
- Step 601 The second device sends a first message to the first device; the first message is used to instruct the first device to determine or execute a first behavior based on the first message;
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- the first device includes a device set matching the target memory state; the device set includes at least one device.
- the first device includes a device set that matches the target memory state, and the device set includes at least one device, that is, each device in the device set matches the target memory state.
- the association relationship between the first message and the device set is predefined by network configuration or protocol.
- the first device includes a tag or a terminal
- the second device includes a network side device or a terminal.
- the first device is a tag
- the second device may be a terminal or a network side device
- the first device is a terminal
- the second device may be a network side device.
- the memory state of the first device includes at least one of the following:
- Business type stored in the memory specifically, the business type stored in the memory of the first device, for example, furniture business or medical business.
- Memory data volume specifically, the memory data volume of the first device may be in the order of megabytes (M Byte) or in the order of bytes.
- the device information may be power information, battery information or manufacturer information of the device; for example, the power information may be active, semi-passive or active; the battery information may be button battery or other battery; the manufacturer information may be manufacturer A, manufacturer B or manufacturer C.
- the target memory state includes at least one of the following:
- the target business type stored in the memory specifically, the target business type can be furniture or medical.
- Target memory data volume specifically, the target memory data volume can be in the megabyte (M Byte) level or in the Byte level.
- Target device information may be power information, battery information or manufacturer information of the target device; for example, the power information may be active, semi-passive or active; the battery information may be a button battery or other battery; the manufacturer information may be manufacturer A, manufacturer B or manufacturer C.
- the first message includes at least one of the following:
- a first control command is used to select a device whose memory state matches the target memory state
- the first control command is used to select a device whose memory state matches the target memory state; for example, if the target memory state is memory storage data and the first control command is a select command, the select command is used to select a first device whose memory state matches the memory storage data. It is understandable that the first control command may also select a device that matches the target business type or target memory data volume of the memory storage.
- the second control command is used to instruct a device whose memory state matches the target memory state to start an inventory; for example, if the target memory state is the target business type of memory storage, the target business type is furniture business, and the second control command is a query command, then the query command is used to instruct a device whose memory storage business type matches the furniture business to start an inventory. It is understandable that the second control command can also instruct a device that matches the memory storage data or the target memory data volume to start an inventory.
- the third control command is used to instruct a device whose memory state matches the target memory state to read the memory; for example, the target memory state is the target memory data volume, the target memory data volume is in the order of M Byte, and the third control command is a read command, then the read command is used to instruct a device whose memory data volume matches the order of M Byte to read the memory. It is understandable that the third control command may also instruct a device that matches the memory storage data or the target service type to read the memory.
- a fourth control command used to instruct a device whose memory state matches the target memory state to set or change a memory value
- the fourth control command is used to instruct a device whose memory state matches the target memory state to set or change a memory value; for example, the target memory state is the target business type of memory storage, the target business type is medical business, and the fourth control command is a write command, then the write command is used to instruct a device whose memory storage business type matches the medical business to set or change a memory value. It is understandable that the fourth control command can also instruct a device that matches the memory storage data or the target memory data volume to read, set, or change a memory value.
- the fifth control command is used to instruct a device whose memory state matches the target memory state to lock the memory; for example, if the target memory state is the target memory data volume and the fifth control command is a lock command, the lock command is used to instruct a device whose memory data volume is greater than or equal to the target memory data volume to lock the memory. It is understandable that the fifth control command may also instruct a device whose memory stores data to lock the memory.
- a first instruction used to instruct a device supporting the target device information to execute the first behavior.
- the target device information may be power information, battery information or manufacturer information of the target device
- the first indication is used to indicate that a device supporting any one of the power information, battery information or manufacturer information of the target device can perform the first behavior. It is understandable that the device information stored in the memory of the first device can determine that the first device supporting the target device information performs the first behavior.
- the second device sends a first message to the first device, and the first message is used to instruct the first device to determine or execute a first behavior based on the first message; wherein the first behavior is associated with the memory state of the first device; the first behavior includes operating the memory of the first device, and/or, feedback of information related to the memory state of the first device; after the first device receives the first message sent by the second device, the first device determines or executes the first behavior according to the first message, so that the second device can inventory the first device according to the first behavior determined or executed by the first device.
- the second device sends a first message to the first device, and the first device can determine or execute a first behavior associated with the memory state of the first device based on the first message.
- the first behavior includes operating the memory of the first device and/or feedback of information related to the memory state of the first device, which enables the second device to select a label of a specific memory state from labels of different memory states and manage it.
- the operating the memory of the first device includes at least one of the following:
- the first device can read the memory content of the first device and make a further response. For example, if the memory of the first device stores data, the first device can read the memory content of the first device.
- the first device may set a memory value for the first device, or may change the memory value of the first device.
- the first device may rewrite other service types in the memory of the first device.
- the first device can lock the first device and prohibit the first device from performing read and write operations.
- the information related to the memory status of the first device includes any one of the following:
- the first information includes at least one of the following:
- the first device feeds back an ACK to the second device.
- a negative acknowledgement NACK used to indicate that the memory state of the first device does not match the target memory state
- the first device feeds back NACK to the second device, or the first device may not feed back, and not feeding back indicates NACK, that is, the memory state of the first device does not match the target memory state.
- the first device feeds back the second information to the second device;
- the second information can be represented by 1-bit information, and the 1-bit information can also represent ACK.
- the first device feeds back third information to the second device; for example, the third information can be represented by 0-bit information, and 0-bit information can also represent NACK.
- the instruction method provided in the embodiment of the present application can be executed by an instruction device.
- the instruction method executed by an instruction device is taken as an example to illustrate the instruction device provided in the embodiment of the present application.
- FIG. 7 is one of the structural schematic diagrams of the indication device provided in the embodiment of the present application. As shown in FIG. 7 , the indication device 700 is applied to the first device, and includes:
- the receiving module 701 is used to receive a first message sent by a second device
- a determination module 702 configured to determine or execute a first action based on the first message
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- a first behavior associated with the memory state of the first device can be determined or executed based on the first message.
- the first behavior includes operating the memory of the first device and/or feedback of information related to the memory state of the first device. This enables the second device to select a label of a specific memory state from labels of different memory states and manage it.
- the first message includes at least one of the following:
- a first control command is used to select a device whose memory state matches a target memory state
- a second control command is used to instruct a device whose memory state matches the target memory state to start an inventory
- a third control command is used to instruct a device whose memory state matches the target memory state to read the memory
- a fourth control command used to instruct a device whose memory state matches a target memory state to set or change a memory value
- a fifth control command used to instruct a device whose memory state matches the target memory state to lock the memory
- the first indication is used to instruct a device supporting the target device information to execute the first behavior.
- the operating the memory of the first device includes at least one of the following:
- the memory of the first device is locked.
- the information related to the memory status of the first device includes any one of the following:
- first information used to indicate whether the memory state of the first device matches the target memory state
- the memory status of the first device is the memory status of the first device.
- the first information includes at least one of the following:
- Acknowledgement ACK used to indicate that the memory state of the first device matches the target memory state
- Negative acknowledgement NACK used to indicate that the memory state of the first device does not match the target memory state
- second information used to indicate that a memory state of the first device matches a target memory state
- the third information is used to indicate that the memory state of the first device does not match the target memory state.
- the determining module 702 is specifically configured to:
- the first message includes any one of the first control command, the second control command, the third control command, the fourth control command, and the fifth control command, determining the target memory state based on the first message;
- the first behavior is determined or executed based on the target memory state and the memory state of the first device.
- the determining module 702 is specifically configured to perform at least one of the following:
- any one of the first control command, the second control command, the third control command, the fourth control command and the fifth control command includes second information, determining the target memory state based on the second information; the second information is used to directly indicate the target memory state;
- the target memory state is determined based on a first mapping relationship and a cyclic redundancy check CRC type in the first control command; the first mapping relationship includes a mapping relationship between a device memory state and a CRC type.
- the first mapping relationship is predefined by network configuration or protocol.
- the determining module 702 is specifically configured to perform at least one of the following:
- the memory state of the first device matches the target memory state and the first message includes the first control command and the second control command, determining or executing at least one of the following: feeding back an ACK to the second device; feeding back second information to the second device;
- the first message includes the third control command, the fourth control command, and the fifth control command, determining or executing at least one of the following: reading the memory content of the first device; setting or changing the memory value of the first device; locking the memory of the first device;
- the memory state of the first device determine or execute at least one of the following: feedback the memory state of the first device to the second device; feedback NACK to the second device; feedback third information to the second device.
- the determining module 702 is specifically configured to:
- the first message is the first indication
- the target bit in the first indication is used to indicate target device information; the target bit is predefined by network configuration or protocol.
- the memory state of the first device includes at least one of the following:
- the device information of the first device is the device information of the first device.
- the target memory state includes at least one of the following:
- the size of the target memory data volume is predefined by network configuration or protocol.
- the first device includes a device set matching the target memory state; the device set includes at least one device.
- the association relationship between the first message and the device set is predefined by network configuration or protocol.
- FIG8 is a second structural schematic diagram of an indication device provided in an embodiment of the present application. As shown in FIG8 , the indication device 800 is applied to a second device and includes:
- a sending module 801 is configured to send a first message to a first device; the first message is configured to instruct the first device to determine or execute a first behavior based on the first message;
- the first device includes a tag or a terminal; the second device includes a network side device or a terminal; the first behavior is associated with the memory status of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory status of the first device.
- the first device by sending a first message to a first device, the first device can determine or execute a first behavior associated with the memory state of the first device based on the first message, and the first behavior includes operating the memory of the first device and/or feedback of information related to the memory state of the first device, which enables the second device to select a label of a specific memory state from labels of different memory states and manage it.
- the first message includes at least one of the following:
- a first control command is used to select a device whose memory state matches a target memory state
- a second control command is used to instruct a device whose memory state matches the target memory state to start an inventory
- a third control command is used to instruct a device whose memory state matches the target memory state to read the memory
- a fourth control command used to instruct a device whose memory state matches a target memory state to set or change a memory value
- a fifth control command used to instruct a device whose memory state matches the target memory state to lock the memory
- the first indication is used to instruct a device supporting the target device information to execute the first behavior.
- the operating the memory of the first device includes at least one of the following:
- the memory of the first device is locked.
- the information related to the memory status of the first device includes any one of the following:
- first information used to indicate whether the memory state of the first device matches the target memory state
- the memory status of the first device is the memory status of the first device.
- the first information includes at least one of the following:
- Acknowledgement ACK used to indicate that the memory state of the first device matches the target memory state
- Negative acknowledgement NACK used to indicate that the memory state of the first device does not match the target memory state
- second information used to indicate that a memory state of the first device matches a target memory state
- the third information is used to indicate that the memory state of the first device does not match the target memory state.
- the memory state of the first device includes at least one of the following:
- the device information of the first device is the device information of the first device.
- the target memory state includes at least one of the following:
- the size of the target memory data volume is predefined by network configuration or protocol.
- the first device includes a device set matching the target memory state; the device set includes at least one device.
- the association relationship between the first message and the device set is predefined by network configuration or protocol.
- the indicating device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
- the electronic device may be a terminal, or may be other devices other than a terminal.
- the terminal may include but is not limited to the types of terminal 11 listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
- the indication device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 5 or Figure 6 and achieve the same technical effect. To avoid repetition, it will not be described here.
- FIG9 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
- the communication device 900 includes a processor 901 and a memory 902.
- the memory 902 stores a program or instruction that can be run on the processor 901.
- the program or instruction is executed by the processor 901 to implement the various steps of the above-mentioned indication method embodiment, and can achieve the same technical effect.
- the communication device 900 is a second device, the program or instruction is executed by the processor 901 to implement the various steps of the above-mentioned indication method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
- the embodiment of the present application also provides a first device, including a processor and a communication interface, the communication interface is used to receive a first message sent by a second device, and the processor is used to determine or execute a first behavior based on the first message; wherein the first device includes a tag or a terminal; the second device includes a network-side device or a terminal; the first behavior is associated with the memory state of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory state of the first device.
- This first device embodiment corresponds to the above-mentioned first device side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to this first device embodiment, and can achieve the same technical effect.
- FIG10 is a schematic diagram of the structure of a first device provided in an embodiment of the present application.
- the first device 1000 includes but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, sensor 1005, display unit 1006, user input unit 1007, interface unit 1008, memory 1009, and processor 1010, etc., at least some of the components.
- the first device 1000 can also include a power supply (such as a battery) for supplying power to each component, and the power supply can be logically connected to the processor 1010 through a power management system, so as to implement functions such as charging, discharging, and power consumption management through the power management system.
- a power supply such as a battery
- the first device structure shown in FIG10 does not constitute a limitation on the first device, and the first device can include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
- the input unit 1004 may include a graphics processing unit (GPU) 10041 and a microphone 10042, and the graphics processor 10041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
- the display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
- the user input unit 1007 includes a touch panel 10071 and at least one of other input devices 10072.
- the touch panel 10071 is also called a touch screen.
- the touch panel 10071 may include two parts: a touch detection device and a touch controller.
- Other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
- the RF unit 1001 can transmit the data to the processor 1010 for processing; in addition, the RF unit 1001 can send uplink data to the network side device.
- the RF unit 1001 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
- the memory 1009 can be used to store software programs or instructions and various data.
- the memory 1009 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
- the memory 1009 may include a volatile memory or a non-volatile memory, or the memory 1009 may include both volatile and non-volatile memories.
- the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
- Volatile memory can be random access memory (RAM), static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (DDRSDRAM), enhanced synchronous dynamic random access memory (ESDRAM), synchronous link dynamic random access memory (SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- DDRSDRAM double data rate synchronous dynamic random access memory
- ESDRAM enhanced synchronous dynamic random access memory
- SLDRAM synchronous link dynamic random access memory
- Direct Rambus RAM Direct Rambus RAM
- the processor 1010 may include one or more processing units; optionally, the processor 1010 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1010.
- the embodiment of the present application also provides a second device, including a processor and a communication interface, the communication interface is used to send a first message to a first device; the first message is used to instruct the first device to determine or execute a first behavior based on the first message; wherein the first device includes a tag or a terminal; the second device includes a network-side device or a terminal; the first behavior is associated with the memory state of the first device; the first behavior includes operating the memory of the first device, and/or feedback of information related to the memory state of the first device.
- This second device embodiment corresponds to the above-mentioned second device-side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to this network-side device embodiment, and can achieve the same technical effect.
- FIG11 is a schematic diagram of the structure of the second device provided in an embodiment of the present application.
- the second device 1100 includes: an antenna 1101, a radio frequency device 1102, a baseband device 1103, a processor 1104, and a memory 1105.
- the antenna 1101 is connected to the radio frequency device 1102.
- the radio frequency device 1102 receives information through the antenna 1101 and sends the received information to the baseband device 1103 for processing.
- the baseband device 1103 processes the information to be sent and sends it to the radio frequency device 1102.
- the radio frequency device 1102 processes the received information and sends it out through the antenna 1101.
- the method executed by the network-side device in the above embodiment may be implemented in the baseband device 1103, which includes a baseband processor.
- the baseband device 1103 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 11, one of which is, for example, a baseband processor, which is connected to the memory 1105 through a bus interface to call the program in the memory 1105 and execute the network device operations shown in the above method embodiment.
- the network side device may also include a network interface 1106, which is, for example, a common public radio interface (CPRI).
- a network interface 1106, which is, for example, a common public radio interface (CPRI).
- CPRI common public radio interface
- the second device 1100 of the embodiment of the present invention also includes: instructions or programs stored in the memory 1105 and executable on the processor 1104.
- the processor 1104 calls the instructions or programs in the memory 1105 to execute the method shown in Figure 8 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
- An embodiment of the present application also provides an indication system, including: a first device and a second device, wherein the first device can be used to execute the steps of the indication method on the first device side as described above, and the second device can be used to execute the steps of the indication method on the second device side as described above.
- the embodiment of the present application also provides a readable storage medium, which can be volatile or non-volatile, and stores a program or instruction on the readable storage medium.
- the program or instruction is processed When the device is executed, each process of the above-mentioned indication method embodiment is implemented and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
- the processor is the processor in the terminal described in the above embodiment.
- the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
- An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned indication method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
- the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
- the embodiments of the present application further provide a computer program/program product, which is stored in a storage medium.
- the computer program/program product is executed by at least one processor to implement the various processes of the above-mentioned indication method embodiment and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
- the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in each embodiment of the present application.
- a storage medium such as ROM/RAM, a magnetic disk, or an optical disk
- a terminal which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种指示方法、第一设备及第二设备,属于通信技术领域,本申请实施例的指示方法包括:第一设备接收第二设备发送的第一消息;所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一设备基于所述第一消息,确定或执行第一行为;其中,所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
Description
相关申请的交叉引用
本申请要求享有于2022年9月29日提交的名称为“指示方法、第一设备及第二设备”的中国专利申请202211205054.2的优先权,该申请的全部内容通过引用并入本文中。
本申请属于通信技术领域,具体涉及一种指示方法、第一设备及第二设备。
反向散射通信是反向散射通信设备利用其它设备或者环境中的射频信号进行信号调制来传输反向散射通信设备的信息。传统的反向散射通信系统中包含阅读器
(reader)(发送信号)和标签(tag)(反射信号)。
相关技术中,在同一场景下部署了相同内存状态的标签,gNB/reader可以通过盘点的方式获取标签信息。为了增强反向散射通信的灵活性,可在某些场景下部署多种能力的标签,如果按照现有的盘点或选择方式去盘点多种类型的标签就会出现盘点或选择错误,也就是盘点或选择到了一些不需要的标签,比如说reader只想盘点无源tag,按照现有的模式盘点,如果环境中同时存在有源无源的tag,那么就会同时盘点到有源tag,造成盘点结果的错误。
发明内容
本申请实施例提供一种指示方法、第一设备及第二设备,能够解决多种内存状态标签场景下reader/gNB无法准确管理标签的问题。
第一方面,提供了一种指示方法,该方法包括:
第一设备接收第二设备发送的第一消息;
所述第一设备基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
第二方面,提供了一种指示方法,该方法包括:
第二设备向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
第三方面,提供了一种指示的装置,该装置包括:
接收模块,用于接收第二设备发送的第一消息;
确定模块,用于基于所述第一消息,确定或执行第一行为;
其中,所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
第四方面,提供了一种指示的装置,该装置包括:
发送模块,用于向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
第五方面,提供了一种第一设备,该第一设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第六方面,提供了一种第一设备,包括处理器及通信接口;其中,所述通信接口用于接收第二设备发送的第一消息,所述处理器用于基于所述第一消息,确定或执行第一行为;其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
第七方面,提供了一种第二设备,该第二设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。
第八方面,提供了一种第二设备,包括处理器及通信接口;其中,所述通信接口用于向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
第九方面,提供了一种指示系统,包括:第一设备及第二设备,所述第一设备可用于执行如第一方面所述的方法的步骤,所述第二设备可用于执行如第二方面所述的方法的步骤。
第十方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。
第十一方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第二方面所述的方法。
第十二方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤。
在本申请实施例中,第二设备向第一设备发送第一消息,第一设备基于第一消息可以确定或执行与第一设备的内存状态关联的第一行为,第一行为包括对第一设备的内存进行操作和/或反馈与第一设备的内存状态相关的信息,这就使得第二设备能够从不同内存状态的标签中选择出特定内存状态的标签并进行管理。
图1是本申请实施例可应用的无线通信系统的示意图;
图2是现有技术提供的阅读器与标签之间的交互示意图之一;
图3是现有技术提供的Reader和Tag之间的信息传输之意图;
图4是现有技术提供的阅读器查询和接入单个标签的流程示意图;
图5是本申请实施例提供的指示方法的流程示意图之一;
图6是本发明提供的指示方法的流程示意图之二;
图7是本申请实施例提供的指示装置的结构示意图之一;
图8是本申请实施例提供的指示装置的结构示意图之二;
图9是本申请实施例提供的通信设备的结构示意图;
图10是本申请实施例提供的第一设备的结构示意图;
图11是本申请实施例提供的第二设备的结构示意图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申
请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的通信系统,如第6代(6th Generation,6G)通信系统。
图1是本申请实施例可应用的无线通信系统的示意图,图1示出的无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(VUE)、行人终端(PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。
网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、WLAN接入点或WiFi节点等,基站可被称
为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。
为了便于更加清晰地理解本申请各实施例,首先对一些相关的技术知识进行如下介绍。
一、反向散射通信(Backscatter Communication,BSC)
反向散射通信是指反向散射通信设备利用其它设备或者环境中的射频信号进行信号调制来传输反向散射通信设备的信息。反向散射通信设备,可以是以下至少一项:
(1)传统的无线射频识别(Radio Frequency Identification,RFID)中的反向散射通信设备,一般是一个标签(tag),属于无源物联网设备(Passive Internet of Things,Passive-IoT);
(2)半无源标签(semi-passive tag),这类tag的下行接收或者上行反射具备一定的方法能力;
(3)具备主动发送能力的标签(active tag),这类tag可以不依赖对入射信号的反射,向reader发送信息。
图2是现有技术提供的阅读器与标签之间的交互示意图之一,如图2所示,阅读器(reader)向标签(tag)发送命令(command)和连续波(Continuous Wave),标签向阅读器发送反向散射信号;其中,包括两种连接方式:连接方式1、阅读器至标签;连接方式2、标签至阅读器。
一种简单的实现方式为:当tag需要发送‘1’时,tag对入射载波信号进行反射;当tag需要发送‘0’时,tag对入射载波信号不进行反射。
反向散射通信设备通过调节内部阻抗来控制电路的反射系数Γ,从而改变入射信号的幅度、频率、相位等,实现信号的调制;其中,反射系数Γ采用公式(1)表示:
其中,Z0为天线特征阻抗,Z1为负载阻抗,θ表示相位,T表示周期。
假设入射信号为Sin(t),则输出信号为Sout(t),因此,通过合理的控制反射系数可实现对应的幅度调制、频率调制或相位调制。
二、RFID中Reader和Tag之间的信息传输
图3是现有技术提供的Reader和Tag之间的信息传输之意图,如图3所示,阅读器操作指令包括:选择(Select)、盘点(Inventory)和接入(Access);其中,
a.选择:阅读器为后续盘点选择一个标签,或以密码学的方式质询一个标签以进行后续身份验证的过程。选择包括选择(Select)命令和质询(Challenge)命令。
b.盘点:阅读器识别标签的过程。阅读器通过四个会话中的一个会话发送查询(Query)命令开始一个盘点回合。一个或多个标签可以回复阅读器。阅读器检测到单个标签的回复,并向标签请求协议控制(Protocol Control,PC)、可选扩展协议控制字(Extended Protocol Control,XPC)、电子产品代码(Electronic Product Code,EPC)和循环冗余校验16(Cyclic Redundancy Check-16,CRC-16)。阅读器的每一轮盘点中每次只在一个会话中进行盘点。阅读器由多个命令组成。
c.接入:阅读器与单个标签进行事务处理(读、写、验证,或以其他方式)的过程。阅读器在接入之前,对标签进行单独唯一的标识。接入由多个命令组成。
Reader阅读器操作的指令:
Select:
Inventory:
Access:
Tag标签的状态
现在特高频(Ultra High Frequency,UHF)RFID的协议设计在盘点模式下,要求阅读器发送查询指令(Query)后,标签Tag响应回应(Reply),即标签产生一个16bit的随机数给阅读器,阅读器将该16-bit序列通过ACK指令发给标签后,标签将相关的数据发送给阅读器。
图4是现有技术提供的阅读器查询和接入单个标签的流程示意图,如图4所示,阅读器发送查询(Query)、调节查询(Adjust)或者重复查询(QueryRep)至标签,标签存在两种可能的结果:1、slot=0:标签回复RN16;2、slot不等于0:标签不回复。标签向阅读器发送RN16,阅读器应答标签并将相同的RN16发送至标签,标签存在两种可能的结果:1、有效的RN16:标签回复{PC/XPC,EPC};2、无效的RN16:
标签不回复。阅读器向标签发送随机请求(Req-RN)并将相同的RN16携带在随机请求中,标签存在两种可能的结果:1、有效的RN16:标签回复{handle};2、无效的RN16:标签不回复。阅读器向标签发送接入命令,其中,每个接入命令使用{handle}作为参数,标签验证handle。
三、session协议
1、协议总结
(1)RFID Gen2协议中Session参数主要是为了方便标签盘点。
(2)每个标签都包含S0至S3总计4种Session,每种Session中又各有A和B两种已盘标记(inventoried flag),这些标记在不同Session之间不互通。多个阅读器可以使用标签的不同session同时盘点,例如S2的A标记和S3的B标记。
(3)不同session对应标签的标记A或标记B的转换方式是不同的。
2、标签上电时的盘点旗标(inventoried flag)
可以理解为不同Session的flag断电再次充电后的保持情况都是不同的。
(1)S0的flag必定为A。S0的flag只和是否断电有关。
(2)S1的flag可以为A或者B,只要还保持在上一次设定的flag持续时间范围之内,S1的flag就保持之前所设置的flag;如果超出了持续时间(persistence time),就复原回默认flag A,因为在S1的状态中flag的持续时间并不会自动刷新,即便在一直上电的情况下,还是可能因为超出了持续时间回到默认flag A。S1的flag只和持续时间有关。
(3)S2和S3情况基本一致,即只要一直处于充电状态中,就保持之前设置的flag。但如果中途断电并且断电时间超过标签的持续时间,那么就回到默认flag A。S2和S3的flag与是否断电有关,也和断电后的持续时间有关。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的指示方法进行详细地说明。
本申请实施例提供的指示方法,可应用于反向散射通信场景中,第二设备向第一设备发送第一消息,第一设备基于第一消息可以确定或执行与第一设备的内存状态关联的第一行为,第一行为包括对第一设备的内存进行操作和/或反馈与第一设备的内存状态相关的信息,这就使得第二设备能够从不同内存状态的标签中选择出特定内存状态的标签并进行管理。
图5是本申请实施例提供的指示方法的流程示意图之一,如图5所示,该方法包括步骤501-502;其中:
步骤501、第一设备接收第二设备发送的第一消息;
步骤502、所述第一设备基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
需要说明的是,本申请实施例可应用于反向散射通信场景中;第一设备包括但不限于上述所列举的终端11的类型,第二设备包括但不限于上述所列举的网络侧设备12的类型,本申请实施例对此并不限定。
可选地,所述第一设备包括一组与目标内存状态相匹配的设备集;所述设备集包括至少一个设备。
具体地,第一设备包括一组与目标内存状态相匹配的设备集,设备集包括至少一个设备,即设备集中的每个设备均与目标内存状态相匹配。例如,第一组标签集包括至少一个内存无数据的标签,第二组标签集包括至少一个内存有数据的标签,第三组标签集包括至少一个检测完成后数据封存的标签。
可选地,所述第一消息与所述设备集之间的关联关系由网络配置或协议预定义。
可选地,所述第一设备包括标签tag或终端,第二设备包括网络侧设备或终端。当第一设备为tag时,第二设备可以为终端或网络侧设备。当第一设备为终端时,第二设备可以为网络侧设备。
可选地,所述第一设备的内存状态包括以下至少一项:
1)内存是否存储数据;具体地,第一设备的内存中存储数据或者内存中没有存储数据。
2)内存存储的业务类型;具体地,第一设备的内存中存储的业务类型,例如,家具业务或者医疗业务。
3)内存数据量;具体地,第一设备的内存数据量可以为兆字节(M Byte)量级,也可以为Byte量级。
4)所述第一设备的设备信息。具体地,设备信息可以为设备的电源信息、电池信息或者厂家信息;例如,电源信息可以为有源、半无源或有源;电池信息为纽扣电池或者其他电池;厂家信息可以为厂家A、厂家B或厂家C。
可选地,所述目标内存状态包括以下至少一项:
1)内存是否存储数据;具体地,内存有数据或者内存无数据。
2)内存存储的目标业务类型;具体地,目标业务类型可以为家具,也可以为医疗。
3)目标内存数据量;具体地,目标内存数据量可以为兆字节(M Byte)量级,也可以为Byte量级。
4)目标设备信息。具体地,目标设备信息可以为目标设备的电源信息、电池信息或者厂家信息;例如,电源信息可以为有源、半无源或有源;电池信息可以为纽扣电池或者其他电池;厂家信息可以为厂家A、厂家B或者厂家C。
可选地,所述第一消息,包括以下至少一项:
1)第一控制命令,用于选取内存状态与目标内存状态相匹配的设备;
具体地,第一控制命令用于选取内存状态与目标内存状态相匹配的设备;例如,目标内存状态为内存存储数据,第一控制命令为select命令,则select命令用于选取内存状态与内存存储数据相匹配的第一设备。可以理解的是,第一控制命令也可以选取与内存存储的目标业务类型或目标内存数据量相匹配的设备。
2)第二控制命令,用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;
具体地,第二控制命令用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;例如,目标内存状态为内存存储的目标业务类型,目标业务类型为家具业务,第二控制命令为query命令,则query命令用于指示内存存储的业务类型与家具业务相匹配的设备启动一次盘点。可以理解的是,第二控制命令也可以指示与内存存储数据或目标内存数据量相匹配的设备启动一次盘点。
3)第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;
具体地,第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;例如,目标内存状态为目标内存数据量,目标内存数据量为M Byte量级,第三控制命令为read命令,则read命令用于指示内存数据量与M Byte量级相匹配的设备读取内存。可以理解的是,第三控制命令也可以指示与内存存储数据或目标业务类型相匹配的设备读取内存。
4)第四控制命令,用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;
具体地,第四控制命令用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;例如,目标内存状态为内存存储的目标业务类型,目标业务类型为医疗业务,第四控制命令为write命令,则write命令用于指示内存存储的业务类型与医疗业务相匹配的设备设置或改变内存数值。可以理解的是,第四控制命令也可以指示与内存存储数据或目标内存数据量相匹配的设备读取设置或改变内存数值。
5)第五控制命令,用于指示内存状态与目标内存状态相匹配的设备锁定内存;
具体地,第五控制命令用于指示内存状态与目标内存状态相匹配的设备锁定内存;例如,目标内存状态为目标内存数据量,第五控制命令为lock命令,则lock命令用于指示内存数据量大于或等于目标内存数据量的设备锁定内存。可以理解的是,第五控制命令也可以指示内存存储数据的设备锁定内存。
需要说明的是,本申请中的第一控制命令、第二控制命令、第三控制命令、第四控制命令和第五控制命令分别只是指代相同功能的命令,并不具体限定第一控制命令和第二控制命令的具体命名和实现方式。
6)第一指示,用于指示支持目标设备信息的设备执行所述第一行为。
具体地,目标设备信息可以为目标设备的电源信息、电池信息或者厂家信息,则第一指示用于指示支持目标设备的电源信息、电池信息或者厂家信息中的任一项的设备可以执行第一行为。可以理解的是,通过第一设备的内存存储的设备信息可以确定支持目标设备信息的第一设备执行第一行为。
实际中,在第一设备接收第二设备发送的第一消息后,第一设备根据第一消息确定或执行第一行为;其中,第一行为包括包括对第一设备的内存进行操作,和/或,反馈与第一设备的内存状态相关的信息。
本申请实施例提供的指示方法中,第二设备向第一设备发送第一消息,第一设备基于第一消息可以确定或执行与第一设备的内存状态关联的第一行为,第一行为包括对第一设备的内存进行操作和/或反馈与第一设备的内存状态相关的信息,这就使得第二设备能够从不同内存状态的标签中选择出特定内存状态的标签并进行管理。
可选地,所述对所述第一设备的内存进行操作,包括以下至少一项:
a)读取所述第一设备的内存内容;
具体地,在第一设备接收到第二设备发送的第一消息后,第一设备可以读取第一设备的内存内容,并做进一步响应。例如,在第一设备的内存存储有数据的情况下,第一设备可以对第一设备的内存内容进行读取。
b)设置或改变所述第一设备的内存数值;
具体地,在第一设备接收到第二设备发送的第一消息后,第一设备可以对第一设备设置一个内存数值,也可以改变第一设备的内存数值。例如,在第一设备的内存保存目标业务类型的情况下,第一设备可以在第一设备的内存中可以重新写入其他业务类型。
c)锁定所述第一设备的内存;
具体地,在第一设备接收到第二设备发送的第一消息后,在第一设备的内存数据量大于或等于目标数据量的情况下,第一设备可以对第一设备进行锁定,禁止第一设备进行读写操作。
可选地,所述与所述第一设备的内存状态相关的信息,包括以下任意一项:
1)第一信息,用于指示所述第一设备的内存状态与目标内存状态是否匹配;
2)第一设备的内存状态。
可选地,所述第一信息包括以下至少一项:
a)确认ACK,用于指示所述第一设备的内存状态与目标内存状态匹配;
具体地,在第一设备的内存状态与目标内存状态匹配的情况下,第一设备向第二设备反馈ACK。
b)否定确认NACK,用于指示所述第一设备的内存状态与目标内存状态不匹配;
具体地,在第一设备的内存状态与目标内存状态不匹配的情况下,第一设备向第二设备反馈NACK,或者第一设备也可以不反馈,不反馈表示NACK,即第一设备的内存状态与目标内存状态不匹配。
c)第二信息,用于指示所述第一设备的内存状态与目标内存状态匹配;
具体地,在第一设备的内存状态与目标内存状态匹配的情况下,第一设备向第二设备反馈第二信息;例如,第二信息可以使用1bit信息表示,1bit信息也可以表示ACK。
d)第三信息,用于指示所述第一设备的内存状态与目标内存状态不匹配。
具体地,在第一设备的内存状态与目标内存状态不匹配的情况下,第一设备向第二设备反馈第三信息;例如,第三信息可以使用0bit信息表示,0bit信息也可以表示NACK。
下面对本申请实施例中第一设备基于所述第一消息,确定或执行第一行为的具体实现方式进行说明。
可选地,上述步骤502的具体实现方式包括以下步骤:
步骤1)在所述第一消息包括所述第一控制命令、所述第二控制命令、所述第三控制命令、所述第四控制命令及所述第五控制命令中任一项的情况下,所述第一设备基于所述第一消息,确定所述目标内存状态;
具体地,在第一消息包括第一控制命令、第二控制命令、第三控制命令、第四控制命令及第五控制命令中任一项的情况下,第一设备基于第一消息,可以确定目标内存状态。
步骤2)所述第一设备基于所述目标内存状态及所述第一设备的内存状态,确定或执行所述第一行为。
具体地,第一设备在确定第二设备指示的目标内存状态之后,根据目标内存状态和第一设备的内存状态,可以确定或执行第一行为。
本申请实施例提供的指示方法中,在第一消息包括第一控制命令、第二控制命令、第三控制命令、第四控制命令及第五控制命令中任一项的情况下,第一设备基于第一控制命令、第二控制命令、第三控制命令、第四控制命令及第五控制命令中任一项确定目标内存状态,再根据目标内存状态和第一设备的内存状态,确定或执行第一行为,从而使得第二设备能够根据与目标内存状态匹配的第一设备的第一行为对第一设备进行盘点并进行管理。
可选地,上述步骤1)的具体实现方式包括以下至少一项:
方式a)、在所述第一控制命令、所述第二控制命令、所述第三控制命令、所述第四控制命令及所述第五控制命令中的任一项包括第二信息的情况下,所述第一设备基于所述第二信息,确定所述目标内存状态;所述第二信息用于直接指示所述目标内存状态;
具体地,在第一控制命令、第二控制命令、第三控制命令、第四控制命令及第五控制命令中的任一项包括第二信息的情况下,第一设备可以基于第二信息,确定目标内存状态。
例如,第一控制命令为select命令,第二信息用于直接指示选择内存无数据存储,则第一设备可以基于第二信息确定目标内存状态为内存无数据存储,则内存无数据存储的第一设备被选取,从而内存无数据存储的第一设备可以确定或执行第一行为。
方式b)、第一设备基于第一映射关系以及所述第一控制命令中的循环冗余校验(Cyclic Redundancy Check,CRC)类型,确定所述目标内存状态;所述第一映射关系包括设备内存状态与CRC类型的映射关系;
具体地,第一映射关系包括设备内存状态与CRC类型的映射关系,则第一设备可以根据第一映射关系以及第一控制命令中的CRC类型,确定目标内存状态。例如,第一类设备使用select命令中的第一类CRC类型加扰,第二类设备使用select命令中的第二类CRC类型加扰,第N类设备使用select命令中的第N类CRC类型加扰,从而确定目标内存状态。
可选地,所述第一映射关系由网络配置或协议预定义。
本申请实施例提供的指示方法中,在第一控制命令、第二控制命令、第三控制命令、第四控制命令及第五控制命令中的任一项包括第二信息的情况下,第一设备基于第二信息确定目标内存状态;第二信息用于直接指示目标内存状态;或者,第一设备基于第一映射关系以及第一控制命令中的CRC类型确定目标内存状态;第一映射关系包括设备内存状态与CRC类型的映射关系;进而使得第一设备基于确定的目标内存状态与第一设备的内存状态,确定或执行第一行为,从而使得第二设备能够根据第一设备确定或执行的第一行为对第一设备进行盘点并进行管理。
可选地,上述步骤2)的具体实现方式包括以下至少一项:
方式1、在所述第一设备的内存状态与所述目标内存状态匹配,且所述第一消息包括所述第一控制命令及所述第二控制命令的情况下,所述第一设备确定或执行以下至少一项:向所述第二设备反馈ACK;向所述第二设备反馈第二信息;
具体地,在第一设备的内存状态与目标内存状态匹配,且第一消息包括第一控制命令及第二控制命令的情况下,即与目标内存状态匹配的第一设备可以基于第一控制命令及第二控制命令确定或执行以下至少一项:向第二设备反馈ACK;向第二设备反馈第二信息;例如,第二信息为1bit信息。
例如,网络侧设备需要选择目标内存状态的标签,目标内存状态为内存无存储数据,即网络需要选择目前暂无数据存储的标签,网络向标签发送select命令,select命令包含选择无数据存储标签的信息;标签接收网络侧设备发送的select命令之后,标签根据select命令读取内存信息,此时标签根据内存状态可以分别反馈以下至少一项:内存无数据的标签向网络侧设备发送第一信息(ACK);向第二设备反馈第二信息;第二信息为1bit信息;内存有数据的标签则不反馈。
方式2、在所述第一设备的内存状态与所述目标内存状态匹配,且所述第一消息包括所述第三控制命令、所述第四控制命令及所述第五控制命令的情况下,所述第一设备确定或执行以下至少一项:读取所述第一设备的内存内容;设置或改变所述第一设备的内存数值;锁定所述第一设备的内存;
具体地,在第一设备的内存状态与目标内存状态匹配,且第一消息包括第三控制命令、第四控制命令及第五控制命令的情况下,即与目标内存状态匹配的第一设备可以基于第三控制命令、第四控制命令及第五控制命令确定或执行以下至少一项:读取第一设备的内存内容;设置或改变第一设备的内存数值;锁定第一设备的内存。
实际中,当目标内存状态为内存有数据时,第一消息包括read命令、write命令和lock命令的情况下,与目标内存状态匹配的第一设备可以基于read命令、write命令和lock命令,确定或执行的第一行为包括以下至少一项:读取第一设备的内存并响应;设置或改变第一设备的内存数值;锁定第一设备的内存。具体地,第一设备在内存中写入数据、删除数据或锁定第一设备的内存,禁止读写操作。当目标内存状态为内存保存目标业务类型时,第一消息包括read命令、write命令和lock命令的情况下,与目标内存状态匹配的第一设备可以基于read命令、write命令和lock命令,确定或执行的第一行为包括以下至少一项:读取第一设备的内存并响应;设置或改变第一设备的内存数值;锁定第一设备的内存。具体地,第一设备在内存中重新写入业务类型或锁定第一设备的内存,禁止读写操作。当目标内存状态为目标内存数据量时,且第一设备的内存数据量大于或等于第一数据量时,第一设备基于read命令、write命令和lock命令确定或执行的第一行为包括:读取第一设备的内存并响应或锁定第一设备的内存,禁止读写操作。第一数据量的大小由网络配置或协议预定义,第一数据量的大小与第一设备的内存存储的业务类型和内存大小有关。
例如,网络侧设备需要选择目标内存状态的标签,目标内存状态为内存存储的目标业务类型;以医疗标签为例,医疗标签的内存状态可以分为“待修理”和“已修理”两种。所有医疗标签需要全部重新维修,因此需要将“已修理”状态改为“待修理”状态。网络侧设备向标签发送write命令,标签接收到网络侧设备发送的write命令后,标签根据内存状态可以设置或改变标签的内存数值,即可以确定执行写入行为,如标签A的内存状态为“已修理”,则标签A接收write命令后改变内存数值,
从而改变内存状态;标签B内存状态为“待修理”,则标签B接收write命令后不响应。
方式3、在所述第一设备的内存状态与所述目标内存状态不匹配的情况下,所述第一设备确定或执行以下至少一项:向所述第二设备反馈所述第一设备的内存状态;向所述第二设备反馈NACK;向所述第二设备反馈第三信息。
具体地,在第一设备的内存状态与目标内存状态不匹配的情况下,第一设备可以确定或执行以下至少一项:向第二设备反馈第一设备的内存状态;向第二设备反馈NACK;向第二设备反馈第三信息。
例如,网络侧设备需要选择目标内存状态的标签,目标内存状态为内存有存储数据,即网络需要选择内存有数据存储的标签,网络侧设备向标签发送select命令,select命令包含选择有数据存储标签的信息;标签接收网络侧设备发送的select命令之后,标签根据select命令读取内存信息确定标签的内存无数据存储,则标签的内存状态与目标内存状态不匹配,此时标签可以确定或执行以下至少一项:向第二设备反馈第一设备的内存状态(内存无数据存储);向第二设备反馈NACK;向第二设备反馈第三信息;此时第三信息可以为0bit信息。
本申请实施例提供的指示方法中,在第一设备的内存状态与目标内存状态匹配,且第一消息包括第一控制命令及第二控制命令的情况下,第一设备确定或执行以下至少一项:向第二设备反馈ACK;向第二设备反馈第二信息;或者,在第一设备的内存状态与目标内存状态匹配,且第一消息包括第三控制命令、第四控制命令及第五控制命令的情况下,第一设备确定或执行以下至少一项:读取第一设备的内存内容;设置或改变第一设备的内存数值;锁定第一设备的内存;或者,在第一设备的内存状态与目标内存状态不匹配的情况下,第一设备确定或执行以下至少一项:向第二设备反馈第一设备的内存状态;向第二设备反馈NACK;向第二设备反馈第三信息,从而使得第二设备能够根据第一设备的第一行为对第一设备进行盘点并进行管理。
可选地,上述步骤502的具体实现方式还包括:
在所述第一消息为所述第一指示的情况下,所述第一设备基于所述第一指示,确定或执行以下至少一项:读取所述第一设备的内存;向所述第二设备反馈所述第一信息。
具体地,在第一消息为第一指示的情况下,第一设备基于第一指示所指示的目标设备信息,则支持目标设备信息的第一设备可以确定或执行以下至少一项:读取第一设备的内存;向第二设备反馈第一信息。
可选地,所述第一指示中的目标比特位,用于指示目标设备信息;所述目标比特位由网络配置或协议预定义。
具体地,第一指示中的目标比特位可以使用n bit表示,n大于0;目标比特位用于指示目标设备信息,目标比特位由网络配置或协议预定义,存储在第一设备的内存中。
例如,在阅读器接入过程中,阅读器会对标签的内存进行读或者写的操作,因此,可以通过网络配置或协议预定义的标签的目标设备信息标识区分不同类型的标签。比如,增加2bit标识符信息以区分标签,该2bit标识符信息可以存储在标签的内存中。阅读器通过接入时的读操作即可获取该标签的类型,从而阅读器可以进一步确定后续操作。
本申请实施例提供的指示方法中,在第一消息为第一指示的情况下,第一设备基于第一指示的目标设备信息,可以确定或执行以下至少一项:读取第一设备的内存;向第二设备反馈第一信息,从而使得第二设备根据能够支持目标设备信息的第一设备确定或执行的第一行为对第一设备进行盘点并进行管理。
图6是本发明提供的指示方法的流程示意图之二,如图6所示,该方法包括步骤601,其中:
步骤601、第二设备向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
可选地,所述第一设备包括一组与目标内存状态相匹配的设备集;所述设备集包括至少一个设备。
具体地,第一设备包括一组与目标内存状态相匹配的设备集,设备集包括至少一个设备,即设备集中的每个设备均与目标内存状态相匹配。
可选地,所述第一消息与所述设备集之间的关联关系由网络配置或协议预定义。
可选地,所述第一设备包括标签tag或终端,第二设备包括网络侧设备或终端。当第一设备为tag时,第二设备可以为终端或网络侧设备;当第一设备为终端时,第二设备可以为网络侧设备。
可选地,所述第一设备的内存状态包括以下至少一项:
1)内存是否存储数据;具体地,第一设备的内存中存储数据或者内存中没有存储数据。
2)内存存储的业务类型;具体地,第一设备的内存中存储的业务类型,例如,家具业务或者医疗业务。
3)内存数据量;具体地,第一设备的内存数据量可以为兆字节(M Byte)量级,也可以为Byte量级。
4)所述第一设备的设备信息。具体地,设备信息可以为设备的电源信息、电池信息或者厂家信息;例如,电源信息可以为有源、半无源或有源;电池信息为纽扣电池或者其他电池;厂家信息可以为厂家A、厂家B或厂家C。
可选地,所述目标内存状态包括以下至少一项:
1)内存是否存储数据;具体地,内存有数据或者内存无数据。
2)内存存储的目标业务类型;具体地,目标业务类型可以为家具,也可以为医疗。
3)目标内存数据量;具体地,目标内存数据量可以为兆字节(M Byte)量级,也可以为Byte量级。
4)目标设备信息。具体地,目标设备信息可以为目标设备的电源信息、电池信息或者厂家信息;例如,电源信息可以为有源、半无源或有源;电池信息可以为纽扣电池或者其他电池;厂家信息可以为厂家A、厂家B或者厂家C。
可选地,所述第一消息,包括以下至少一项:
1)第一控制命令,用于选取内存状态与目标内存状态相匹配的设备;
具体地,第一控制命令用于选取内存状态与目标内存状态相匹配的设备;例如,目标内存状态为内存存储数据,第一控制命令为select命令,则select命令用于选取内存状态与内存存储数据相匹配的第一设备。可以理解的是,第一控制命令也可以选取与内存存储的目标业务类型或目标内存数据量相匹配的设备。
2)第二控制命令,用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;
具体地,第二控制命令用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;例如,目标内存状态为内存存储的目标业务类型,目标业务类型为家具业务,第二控制命令为query命令,则query命令用于指示内存存储的业务类型与家具业务相匹配的设备启动一次盘点。可以理解的是,第二控制命令也可以指示与内存存储数据或目标内存数据量相匹配的设备启动一次盘点。
3)第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;
具体地,第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;例如,目标内存状态为目标内存数据量,目标内存数据量为M Byte量级,第三控制命令为read命令,则read命令用于指示内存数据量与M Byte量级相匹配的设备读取内存。可以理解的是,第三控制命令也可以指示与内存存储数据或目标业务类型相匹配的设备读取内存。
4)第四控制命令,用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;
具体地,第四控制命令用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;例如,目标内存状态为内存存储的目标业务类型,目标业务类型为医疗业务,第四控制命令为write命令,则write命令用于指示内存存储的业务类型与医疗业务相匹配的设备设置或改变内存数值。可以理解的是,第四控制命令也可以指示与内存存储数据或目标内存数据量相匹配的设备读取设置或改变内存数值。
5)第五控制命令,用于指示内存状态与目标内存状态相匹配的设备锁定内存;
具体地,第五控制命令用于指示内存状态与目标内存状态相匹配的设备锁定内存;例如,目标内存状态为目标内存数据量,第五控制命令为lock命令,则lock命令用于指示内存数据量大于或等于目标内存数据量的设备锁定内存。可以理解的是,第五控制命令也可以指示内存存储数据的设备锁定内存。
6)第一指示,用于指示支持目标设备信息的设备执行所述第一行为。
具体地,目标设备信息可以为目标设备的电源信息、电池信息或者厂家信息,则第一指示用于指示支持目标设备的电源信息、电池信息或者厂家信息中的任一项的设备可以执行第一行为。可以理解的是,通过第一设备的内存存储的设备信息可以确定支持目标设备信息的第一设备执行第一行为。
实际中,第二设备向第一设备发送第一消息,第一消息用于指示第一设备基于第一消息,确定或执行第一行为;其中,第一行为与第一设备的内存状态关联;第一行为包括对第一设备的内存进行操作,和/或,反馈与第一设备的内存状态相关的信息;第一设备在接收第二设备发送的第一消息后,第一设备根据第一消息确定或执行第一行为,从而使得第二设备可以根据第一设备确定或执行的第一行为对第一设备进行盘点。
本申请实施例提供的指示方法中,第二设备向第一设备发送第一消息,第一设备基于第一消息可以确定或执行与第一设备的内存状态关联的第一行为,第一行为包括对第一设备的内存进行操作和/或反馈与第一设备的内存状态相关的信息,这就使得第二设备能够从不同内存状态的标签中选择出特定内存状态的标签并进行管理。
可选地,所述对所述第一设备的内存进行操作,包括以下至少一项:
a)读取所述第一设备的内存内容;
具体地,在第一设备接收到第二设备发送的第一消息后,第一设备可以读取第一设备的内存内容,并做进一步响应。例如,在第一设备的内存存储有数据的情况下,第一设备可以对第一设备的内存内容进行读取。
b)设置或改变所述第一设备的内存数值;
具体地,在第一设备接收到第二设备发送的第一消息后,第一设备可以对第一设备设置一个内存数值,也可以改变第一设备的内存数值。例如,在第一设备的内存保
存目标业务类型的情况下,第一设备可以在第一设备的内存中可以重新写入其他业务类型。
c)锁定所述第一设备的内存;
具体地,在第一设备接收到第二设备发送的第一消息后,在第一设备的内存数据量大于或等于目标数据量的情况下,第一设备可以对第一设备进行锁定,禁止第一设备进行读写操作。
可选地,所述与所述第一设备的内存状态相关的信息,包括以下任意一项:
1)第一信息,用于指示所述第一设备的内存状态与目标内存状态是否匹配;
2)第一设备的内存状态。
可选地,所述第一信息包括以下至少一项:
a)确认ACK,用于指示所述第一设备的内存状态与目标内存状态匹配;
具体地,在第一设备的内存状态与目标内存状态匹配的情况下,第一设备向第二设备反馈ACK。
b)否定确认NACK,用于指示所述第一设备的内存状态与目标内存状态不匹配;
具体地,在第一设备的内存状态与目标内存状态不匹配的情况下,第一设备向第二设备反馈NACK,或者第一设备也可以不反馈,不反馈表示NACK,即第一设备的内存状态与目标内存状态不匹配。
c)第二信息,用于指示所述第一设备的内存状态与目标内存状态匹配;
具体地,在第一设备的内存状态与目标内存状态匹配的情况下,第一设备向第二设备反馈第二信息;例如,第二信息可以使用1bit信息表示,1bit信息也可以表示ACK。
d)第三信息,用于指示所述第一设备的内存状态与目标内存状态不匹配。
具体地,在第一设备的内存状态与目标内存状态不匹配的情况下,第一设备向第二设备反馈第三信息;例如,第三信息可以使用0bit信息表示,0bit信息也可以表示NACK。
本申请实施例提供的指示方法,执行主体可以为指示装置。本申请实施例中以指示装置执行指示方法为例,说明本申请实施例提供的指示装置。
图7是本申请实施例提供的指示装置的结构示意图之一,如图7所示,该指示装置700,应用于第一设备,包括:
接收模块701,用于接收第二设备发送的第一消息;
确定模块702,用于基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
本申请实施例提供的指示装置中,通过接收第二设备发送的第一消息,基于第一消息可以确定或执行与第一设备的内存状态关联的第一行为,第一行为包括对第一设备的内存进行操作和/或反馈与第一设备的内存状态相关的信息,这就使得第二设备能够从不同内存状态的标签中选择出特定内存状态的标签并进行管理。
可选地,所述第一消息,包括以下至少一项:
第一控制命令,用于选取内存状态与目标内存状态相匹配的设备;
第二控制命令,用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;
第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;
第四控制命令,用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;
第五控制命令,用于指示内存状态与目标内存状态相匹配的设备锁定内存;
第一指示,用于指示支持目标设备信息的设备执行所述第一行为。
可选地,所述对所述第一设备的内存进行操作,包括以下至少一项:
读取所述第一设备的内存内容;
设置或改变所述第一设备的内存数值;
锁定所述第一设备的内存。
可选地,所述与所述第一设备的内存状态相关的信息,包括以下任意一项:
第一信息,用于指示所述第一设备的内存状态与目标内存状态是否匹配;
所述第一设备的内存状态。
可选地,所述第一信息包括以下至少一项:
确认ACK,用于指示所述第一设备的内存状态与目标内存状态匹配;
否定确认NACK,用于指示所述第一设备的内存状态与目标内存状态不匹配;
第二信息,用于指示所述第一设备的内存状态与目标内存状态匹配;
第三信息,用于指示所述第一设备的内存状态与目标内存状态不匹配。
可选地,所述确定模块702,具体用于:
在所述第一消息包括所述第一控制命令、所述第二控制命令、所述第三控制命令、所述第四控制命令及所述第五控制命令中任一项的情况下,基于所述第一消息,确定所述目标内存状态;
基于所述目标内存状态及所述第一设备的内存状态,确定或执行所述第一行为。
可选地,所述确定模块702,具体用于以下至少一项:
在所述第一控制命令、所述第二控制命令、所述第三控制命令、所述第四控制命令及所述第五控制命令中的任一项包括第二信息的情况下,基于所述第二信息,确定所述目标内存状态;所述第二信息用于直接指示所述目标内存状态;
基于第一映射关系以及所述第一控制命令中的循环冗余校验CRC类型,确定所述目标内存状态;所述第一映射关系包括设备内存状态与CRC类型的映射关系。
可选地,所述第一映射关系由网络配置或协议预定义。
可选地,所述确定模块702,具体用于以下至少一项:
在所述第一设备的内存状态与所述目标内存状态匹配,且所述第一消息包括所述第一控制命令及所述第二控制命令的情况下,确定或执行以下至少一项:向所述第二设备反馈ACK;向所述第二设备反馈第二信息;
在所述第一设备的内存状态与所述目标内存状态匹配,且所述第一消息包括所述第三控制命令、所述第四控制命令及所述第五控制命令的情况下,确定或执行以下至少一项:读取所述第一设备的内存内容;设置或改变所述第一设备的内存数值;锁定所述第一设备的内存;
在所述第一设备的内存状态与所述目标内存状态不匹配的情况下,确定或执行以下至少一项:向所述第二设备反馈所述第一设备的内存状态;向所述第二设备反馈NACK;向所述第二设备反馈第三信息。
可选地,所述确定模块702,具体用于:
在所述第一消息为所述第一指示的情况下,基于所述第一指示,确定或执行以下至少一项:读取所述第一设备的内存;向所述第二设备反馈所述第一信息。
可选地,所述第一指示中的目标比特位,用于指示目标设备信息;所述目标比特位由网络配置或协议预定义。
可选地,所述第一设备的内存状态包括以下至少一项:
内存是否存储数据;
内存存储的业务类型;
内存数据量;
所述第一设备的设备信息。
可选地,所述目标内存状态包括以下至少一项:
内存是否存储数据;
内存存储的目标业务类型;
目标内存数据量;
目标设备信息。
可选地,所述目标内存数据量的大小由网络配置或协议预定义。
可选地,所述第一设备包括一组与目标内存状态相匹配的设备集;所述设备集包括至少一个设备。
可选地,所述第一消息与所述设备集之间的关联关系由网络配置或协议预定义。
图8是本申请实施例提供的指示装置的结构示意图之二,如图8所示,该指示装置800,应用于第二设备,包括:
发送模块801,用于向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;
其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
本申请实施例提供的指示装置中,通过向第一设备发送第一消息,第一设备基于第一消息可以确定或执行与第一设备的内存状态关联的第一行为,第一行为包括对第一设备的内存进行操作和/或反馈与第一设备的内存状态相关的信息,这就使得第二设备能够从不同内存状态的标签中选择出特定内存状态的标签并进行管理。
可选地,所述第一消息,包括以下至少一项:
第一控制命令,用于选取内存状态与目标内存状态相匹配的设备;
第二控制命令,用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;
第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;
第四控制命令,用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;
第五控制命令,用于指示内存状态与目标内存状态相匹配的设备锁定内存;
第一指示,用于指示支持目标设备信息的设备执行所述第一行为。
可选地,所述对所述第一设备的内存进行操作,包括以下至少一项:
读取所述第一设备的内存内容;
设置或改变所述第一设备的内存数值;
锁定所述第一设备的内存。
可选地,所述与所述第一设备的内存状态相关的信息,包括以下任意一项:
第一信息,用于指示所述第一设备的内存状态与目标内存状态是否匹配;
所述第一设备的内存状态。
可选地,所述第一信息包括以下至少一项:
确认ACK,用于指示所述第一设备的内存状态与目标内存状态匹配;
否定确认NACK,用于指示所述第一设备的内存状态与目标内存状态不匹配;
第二信息,用于指示所述第一设备的内存状态与目标内存状态匹配;
第三信息,用于指示所述第一设备的内存状态与目标内存状态不匹配。
可选地,所述第一设备的内存状态包括以下至少一项:
内存是否存储数据;
内存存储的业务类型;
内存数据量;
所述第一设备的设备信息。
可选地,所述目标内存状态包括以下至少一项:
内存是否存储数据;
内存存储的目标业务类型;
目标内存数据量;
目标设备信息。
可选地,所述目标内存数据量的大小由网络配置或协议预定义。
可选地,所述第一设备包括一组与目标内存状态相匹配的设备集;所述设备集包括至少一个设备。
可选地,所述第一消息与所述设备集之间的关联关系由网络配置或协议预定义。
本申请实施例中的指示装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的指示装置能够实现图5或图6的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
图9是本申请实施例提供的通信设备的结构示意图,如图9所示,该通信设备900,包括处理器901和存储器902,存储器902上存储有可在所述处理器901上运行的程序或指令,例如,该通信设备900为第一设备时,该程序或指令被处理器901执行时实现上述指示方法实施例的各个步骤,且能达到相同的技术效果。该通信设备900为第二设备时,该程序或指令被处理器901执行时实现上述指示方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种第一设备,包括处理器和通信接口,通信接口用于接收第二设备发送的第一消息,处理器用于基于所述第一消息,确定或执行第一行为;其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。该第一设备实施例与上述第一设备侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该第一设备实施例中,且能达到相同的技术效果。
图10是本申请实施例提供的第一设备的结构示意图,如图10所示,该第一设备1000包括但不限于:射频单元1001、网络模块1002、音频输出单元1003、输入单元
1004、传感器1005、显示单元1006、用户输入单元1007、接口单元1008、存储器1009以及处理器1010等中的至少部分部件。
本领域技术人员可以理解,第一设备1000还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图10中示出的第一设备结构并不构成对第一设备的限定,第一设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1004可以包括图形处理单元(Graphics Processing Unit,GPU)10041和麦克风10042,图形处理器10041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1006可包括显示面板10061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板10061。用户输入单元1007包括触控面板10071以及其他输入设备10072中的至少一种。触控面板10071,也称为触摸屏。触控面板10071可包括触摸检测装置和触摸控制器两个部分。其他输入设备10072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1001接收来自网络侧设备的下行数据后,可以传输给处理器1010进行处理;另外,射频单元1001可以向网络侧设备发送上行数据。通常,射频单元1001包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1009可用于存储软件程序或指令以及各种数据。存储器1009可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1009可以包括易失性存储器或非易失性存储器,或者,存储器1009可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,
DRRAM)。本申请实施例中的存储器1009包括但不限于这些和任意其它适合类型的存储器。
处理器1010可包括一个或多个处理单元;可选的,处理器1010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1010中。
本申请实施例还提供一种第二设备,包括处理器和通信接口,通信接口用于向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。该第二设备实施例与上述第二设备侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
图11是本申请实施例提供的第二设备的结构示意图,如图11所示,该第二设备1100包括:天线1101、射频装置1102、基带装置1103、处理器1104和存储器1105。天线1101与射频装置1102连接。在上行方向上,射频装置1102通过天线1101接收信息,将接收的信息发送给基带装置1103进行处理。在下行方向上,基带装置1103对要发送的信息进行处理,并发送给射频装置1102,射频装置1102对收到的信息进行处理后经过天线1101发送出去。
以上实施例中网络侧设备执行的方法可以在基带装置1103中实现,该基带装置1103包括基带处理器。
基带装置1103例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图11所示,其中一个芯片例如为基带处理器,通过总线接口与存储器1105连接,以调用存储器1105中的程序,执行以上方法实施例中所示的网络设备操作。
该网络侧设备还可以包括网络接口1106,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本发明实施例的第二设备1100还包括:存储在存储器1105上并可在处理器1104上运行的指令或程序,处理器1104调用存储器1105中的指令或程序执行图8所示方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供了一种指示系统,包括:第一设备及第二设备,所述第一设备可用于执行如上所述的第一设备侧的指示方法的步骤,所述第二设备可用于执行如上所述的第二设备侧的指示方法的步骤。
本申请实施例还提供一种可读存储介质,所述可读存储介质可以是以易失性的,也可以是非易失性的,所述可读存储介质上存储有程序或指令,该程序或指令被处理
器执行时实现上述指示方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述指示方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述指示方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。
Claims (31)
- 一种指示方法,包括:第一设备接收第二设备发送的第一消息;所述第一设备基于所述第一消息,确定或执行第一行为;其中,所述第一设备包括标签tag或终端;所述第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
- 根据权利要求1所述的指示方法,其中,所述第一消息,包括以下至少一项:第一控制命令,用于选取内存状态与目标内存状态相匹配的设备;第二控制命令,用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;第四控制命令,用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;第五控制命令,用于指示内存状态与目标内存状态相匹配的设备锁定内存;第一指示,用于指示支持目标设备信息的设备执行所述第一行为。
- 根据权利要求1或2所述的指示方法,其中,所述对所述第一设备的内存进行操作,包括以下至少一项:读取所述第一设备的内存内容;设置或改变所述第一设备的内存数值;锁定所述第一设备的内存。
- 根据权利要求1或2所述的指示方法,其中,所述与所述第一设备的内存状态相关的信息,包括以下任意一项:第一信息,用于指示所述第一设备的内存状态与目标内存状态是否匹配;所述第一设备的内存状态。
- 根据权利要求4所述的指示方法,其中,所述第一信息包括以下至少一项:确认ACK,用于指示所述第一设备的内存状态与目标内存状态匹配;否定确认NACK,用于指示所述第一设备的内存状态与目标内存状态不匹配;第二信息,用于指示所述第一设备的内存状态与目标内存状态匹配;第三信息,用于指示所述第一设备的内存状态与目标内存状态不匹配。
- 根据权利要求2所述的指示方法,其中,所述第一设备基于所述第一消息,确定或执行第一行为,包括:在所述第一消息包括所述第一控制命令、所述第二控制命令、所述第三控制命令、所述第四控制命令及所述第五控制命令中任一项的情况下,所述第一设备基于所述第一消息,确定所述目标内存状态;所述第一设备基于所述目标内存状态及所述第一设备的内存状态,确定或执行所述第一行为。
- 根据权利要求6所述的指示方法,其中,所述第一设备基于所述第一消息,确定所述目标内存状态,包括以下至少一项:在所述第一控制命令、所述第二控制命令、所述第三控制命令、所述第四控制命令及所述第五控制命令中的任一项包括第二信息的情况下,所述第一设备基于所述第二信息,确定所述目标内存状态;所述第二信息用于直接指示所述目标内存状态;所述第一设备基于第一映射关系以及所述第一控制命令中的循环冗余校验CRC类型,确定所述目标内存状态;所述第一映射关系包括设备内存状态与CRC类型的映射关系。
- 根据权利要求7所述的指示方法,其中,所述第一映射关系由网络配置或协议预定义。
- 根据权利要求6所述的指示方法,其中,所述第一设备基于所述目标内存状态及所述第一设备的内存状态,确定或执行所述第一行为,包括以下至少一项:在所述第一设备的内存状态与所述目标内存状态匹配,且所述第一消息包括所述第一控制命令及所述第二控制命令的情况下,所述第一设备确定或执行以下至少一项:向所述第二设备反馈ACK;向所述第二设备反馈第二信息;在所述第一设备的内存状态与所述目标内存状态匹配,且所述第一消息包括所述第三控制命令、所述第四控制命令及所述第五控制命令的情况下,所述第一设备确定或执行以下至少一项:读取所述第一设备的内存内容;设置或改变所述第一设备的内存数值;锁定所述第一设备的内存;在所述第一设备的内存状态与所述目标内存状态不匹配的情况下,所述第一设备确定或执行以下至少一项:向所述第二设备反馈所述第一设备的内存状态;向所述第二设备反馈NACK;向所述第二设备反馈第三信息。
- 根据权利要求2所述的指示方法,其中,所述第一设备基于所述第一消息,确定或执行第一行为,包括:在所述第一消息为所述第一指示的情况下,所述第一设备基于所述第一指示,确定或执行以下至少一项:读取所述第一设备的内存;向所述第二设备反馈所述第一信息。
- 根据权利要求10所述的指示方法,其中,所述第一指示中的目标比特位,用于指示目标设备信息;所述目标比特位由网络配置或协议预定义。
- 根据权利要求1至11任一项所述的指示方法,其中,所述第一设备的内存状态包括以下至少一项:内存是否存储数据;内存存储的业务类型;内存数据量;所述第一设备的设备信息。
- 根据权利要求2至12任一项所述的指示方法,其中,所述目标内存状态包括以下至少一项:内存是否存储数据;内存存储的目标业务类型;目标内存数据量;目标设备信息。
- 根据权利要求13所述的指示方法,其中,所述目标内存数据量的大小由网络配置或协议预定义。
- 根据权利要求1至14任一项所述的指示方法,其中,所述第一设备包括一组与目标内存状态相匹配的设备集;所述设备集包括至少一个设备。
- 根据权利要求1至15任一项所述的指示方法,其中,所述第一消息与所述设备集之间的关联关系由网络配置或协议预定义。
- 一种指示方法,包括:第二设备向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;其中,所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
- 根据权利要求17所述的指示方法,其中,所述第一消息,包括以下至少一项:第一控制命令,用于选取内存状态与目标内存状态相匹配的设备;第二控制命令,用于指示内存状态与目标内存状态相匹配的设备启动一次盘点;第三控制命令,用于指示内存状态与目标内存状态相匹配的设备读取内存;第四控制命令,用于指示内存状态与目标内存状态相匹配的设备设置或改变内存数值;第五控制命令,用于指示内存状态与目标内存状态相匹配的设备锁定内存;第一指示,用于指示支持目标设备信息的设备执行所述第一行为。
- 根据权利要求17或18所述的指示方法,其中,所述对所述第一设备的内存进行操作,包括以下至少一项:读取所述第一设备的内存内容;设置或改变所述第一设备的内存数值;锁定所述第一设备的内存。
- 根据权利要求17或18所述的指示方法,其中,所述与所述第一设备的内存状态相关的信息,包括以下任意一项:第一信息,用于指示所述第一设备的内存状态与目标内存状态是否匹配;所述第一设备的内存状态。
- 根据权利要求20所述的指示方法,其中,所述第一信息包括以下至少一项:确认ACK,用于指示所述第一设备的内存状态与目标内存状态匹配;否定确认NACK,用于指示所述第一设备的内存状态与目标内存状态不匹配;第二信息,用于指示所述第一设备的内存状态与目标内存状态匹配;第三信息,用于指示所述第一设备的内存状态与目标内存状态不匹配。
- 根据权利要求17至21任一项所述的指示方法,其中,所述第一设备的内存状态包括以下至少一项:内存是否存储数据;内存存储的业务类型;内存数据量;所述第一设备的设备信息。
- 根据权利要求18至22任一项所述的指示方法,其中,所述目标内存状态包括以下至少一项:内存是否存储数据;内存存储的目标业务类型;目标内存数据量;目标设备信息。
- 根据权利要求23所述的指示方法,其中,所述目标内存数据量的大小由网络配置或协议预定义。
- 根据权利要求17至24任一项所述的指示方法,其中,所述第一设备包括一组与目标内存状态相匹配的设备集;所述设备集包括至少一个设备。
- 根据权利要求17至25任一项所述的指示方法,其中,所述第一消息与所述设备集之间的关联关系由网络配置或协议预定义。
- 一种指示装置,包括:接收模块,用于接收第二设备发送的第一消息;确定模块,用于基于所述第一消息,确定或执行第一行为;其中,第二设备包括网络侧设备或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
- 一种指示装置,包括:发送模块,用于向第一设备发送第一消息;所述第一消息用于指示所述第一设备基于所述第一消息,确定或执行第一行为;其中,所述第一设备包括标签tag或终端;所述第一行为与所述第一设备的内存状态关联;所述第一行为包括对所述第一设备的内存进行操作,和/或,反馈与所述第一设备的内存状态相关的信息。
- 一种第一设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至16任一项所述的指示方法的步骤。
- 一种第二设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求17至26任一项所述的指示方法的步骤。
- 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至16任一项所述的指示方法,或者实现如权利要求17至26任一项所述的指示方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211205054.2A CN117829173A (zh) | 2022-09-29 | 2022-09-29 | 指示方法、第一设备及第二设备 |
CN202211205054.2 | 2022-09-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024067519A1 true WO2024067519A1 (zh) | 2024-04-04 |
Family
ID=90476308
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/121231 WO2024067519A1 (zh) | 2022-09-29 | 2023-09-25 | 指示方法、第一设备及第二设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117829173A (zh) |
WO (1) | WO2024067519A1 (zh) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101976362A (zh) * | 2010-09-30 | 2011-02-16 | 中兴通讯股份有限公司 | 基于位图的射频识别标签访问方法及设备 |
EP2339503A1 (en) * | 2009-12-21 | 2011-06-29 | Nxp B.V. | System and method for interrogating an RFID tag using an RFID reader |
CN103440202A (zh) * | 2013-08-07 | 2013-12-11 | 华为技术有限公司 | 一种基于rdma的通信方法、系统及通信设备 |
CN107423176A (zh) * | 2017-06-30 | 2017-12-01 | 郑州云海信息技术有限公司 | 一种内存的测试方法、控制终端、服务器及系统 |
CN109918217A (zh) * | 2019-03-21 | 2019-06-21 | 联想(北京)有限公司 | 一种控制方法及终端 |
WO2022160265A1 (zh) * | 2021-01-29 | 2022-08-04 | 华为技术有限公司 | 通信方法和通信装置 |
-
2022
- 2022-09-29 CN CN202211205054.2A patent/CN117829173A/zh active Pending
-
2023
- 2023-09-25 WO PCT/CN2023/121231 patent/WO2024067519A1/zh unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2339503A1 (en) * | 2009-12-21 | 2011-06-29 | Nxp B.V. | System and method for interrogating an RFID tag using an RFID reader |
CN101976362A (zh) * | 2010-09-30 | 2011-02-16 | 中兴通讯股份有限公司 | 基于位图的射频识别标签访问方法及设备 |
CN103440202A (zh) * | 2013-08-07 | 2013-12-11 | 华为技术有限公司 | 一种基于rdma的通信方法、系统及通信设备 |
CN107423176A (zh) * | 2017-06-30 | 2017-12-01 | 郑州云海信息技术有限公司 | 一种内存的测试方法、控制终端、服务器及系统 |
CN109918217A (zh) * | 2019-03-21 | 2019-06-21 | 联想(北京)有限公司 | 一种控制方法及终端 |
WO2022160265A1 (zh) * | 2021-01-29 | 2022-08-04 | 华为技术有限公司 | 通信方法和通信装置 |
Also Published As
Publication number | Publication date |
---|---|
CN117829173A (zh) | 2024-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9516489B2 (en) | Method of searching for device between electronic devices | |
EP3614570A1 (en) | Near filed communication (nfc) device and system | |
WO2023236962A1 (zh) | 资源分配方法、装置、通信设备、系统及存储介质 | |
WO2024067519A1 (zh) | 指示方法、第一设备及第二设备 | |
WO2023231920A1 (zh) | 反向散射通信方法及设备 | |
WO2024067443A1 (zh) | 指示方法、第一设备及第二设备 | |
WO2024149180A1 (zh) | 供能时间的确定方法、装置、通信设备及可读存储介质 | |
WO2024149181A1 (zh) | 设备盘点方法、装置、通信设备及可读存储介质 | |
WO2024149103A1 (zh) | 一种盘点处理方法、装置及设备 | |
WO2023236907A1 (zh) | 信息指示方法、终端、网络侧设备及可读存储介质 | |
WO2023231908A1 (zh) | 反向散射通信的信息传输方法、装置、终端及网络侧设备 | |
WO2023236868A1 (zh) | 反向散射通信配置方法、装置、网络侧设备和终端 | |
WO2024149127A1 (zh) | 信息获取、发送方法、装置及通信设备 | |
WO2024032496A1 (zh) | 通信、资源配置方法、装置、阅读器、标签和网络侧设备 | |
WO2023236826A1 (zh) | 反向散射通信的接入方法、装置、终端及网络侧设备 | |
WO2024061111A1 (zh) | 资源处理方法、装置及通信设备 | |
WO2023241449A1 (zh) | 测量处理方法、装置及设备 | |
WO2023185963A1 (zh) | 发起bsc链路建立的方法、终端及网络侧设备 | |
WO2024125390A1 (zh) | 传输方法、装置、网络侧设备及终端 | |
WO2024114607A1 (zh) | 传输控制方法、装置及通信设备 | |
WO2024160153A1 (zh) | 定位方法、装置、通信设备及可读存储介质 | |
WO2024061110A1 (zh) | 传输处理方法、装置及设备 | |
CN118433866A (zh) | 资源获取、确定方法及通信设备 | |
WO2024125456A1 (zh) | 信息交互方法及设备 | |
WO2023186088A1 (zh) | 发起bsc链路建立的方法、终端及网络侧设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23870748 Country of ref document: EP Kind code of ref document: A1 |