CN109255937B - Alarm processing method and terminal equipment - Google Patents

Alarm processing method and terminal equipment Download PDF

Info

Publication number
CN109255937B
CN109255937B CN201811016892.9A CN201811016892A CN109255937B CN 109255937 B CN109255937 B CN 109255937B CN 201811016892 A CN201811016892 A CN 201811016892A CN 109255937 B CN109255937 B CN 109255937B
Authority
CN
China
Prior art keywords
alarm
information
text information
text
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811016892.9A
Other languages
Chinese (zh)
Other versions
CN109255937A (en
Inventor
骆水明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811016892.9A priority Critical patent/CN109255937B/en
Publication of CN109255937A publication Critical patent/CN109255937A/en
Application granted granted Critical
Publication of CN109255937B publication Critical patent/CN109255937B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements

Abstract

The invention is applicable to the technical field of data processing, and provides an alarm processing method, terminal equipment and a computer readable storage medium, wherein the alarm processing method comprises the following steps: establishing communication connection with a plurality of client devices, and acquiring geographic position information and a first verification text sent by the client devices; encrypting the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration of the client device, storing the geographic position information; acquiring alarm text information, and performing text analysis on the alarm text information to obtain target position information in the alarm text information; and respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment. The invention simplifies the alarm flow and improves the efficiency of alarm processing.

Description

Alarm processing method and terminal equipment
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to an alarm processing method, terminal equipment and a computer readable storage medium.
Background
In order to ensure the property and life safety of people and maintain good response speed to emergencies, a perfect alarm system needs to be established. Nowadays, with the maturity of information technology, a complete alarm flow of an alarm person, a wire connector, a command center and a police is formed, and the alarm person only needs to dial a fixed alarm telephone to alarm.
However, in the existing process, after receiving a call for reporting a case, the operator needs to report the case to the master command center, the master command center issues an alarm instruction to the command center of the parcel where the case is located, and the command center of the parcel finally issues the alarm instruction to the police. In summary, in the prior art, the alarm information is mostly transmitted manually, and the process is complex, which results in low efficiency of alarm processing.
Disclosure of Invention
In view of this, embodiments of the present invention provide an alarm processing method, a terminal device, and a computer-readable storage medium, so as to solve the problems of long alarm flow and low alarm processing efficiency in the prior art.
A first aspect of an embodiment of the present invention provides an alarm processing method, including multiple client devices, where each client device corresponds to a preset feedback duration, and the alarm processing method includes:
establishing communication connection with the plurality of client devices, and acquiring geographic position information and a first verification text sent by the client devices, wherein the first verification text is a result obtained by performing hash encryption on the geographic position information by the client devices;
performing hash encryption on the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, storing the geographic position information;
acquiring alarm text information, and performing text analysis on the alarm text information to obtain target position information in the alarm text information;
respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment.
A second aspect of the embodiments of the present invention provides a terminal device, further including a plurality of client devices, where each client device corresponds to a preset feedback duration, the terminal device includes a memory, a processor, and a computer program stored in the memory and operable on the processor, and the processor implements the following steps when executing the computer program:
establishing communication connection with the plurality of client devices, and acquiring geographic position information and a first verification text sent by the client devices, wherein the first verification text is a result obtained by performing hash encryption on the geographic position information by the client devices;
performing hash encryption on the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, storing the geographic position information;
acquiring alarm text information, and performing text analysis on the alarm text information to obtain target position information in the alarm text information;
respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment.
A third aspect of embodiments of the present invention provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of:
establishing communication connection with the plurality of client devices, and acquiring geographic position information and a first verification text sent by the client devices, wherein the first verification text is a result obtained by performing hash encryption on the geographic position information by the client devices;
performing hash encryption on the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, storing the geographic position information;
acquiring alarm text information, and performing text analysis on the alarm text information to obtain target position information in the alarm text information;
respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
according to the embodiment of the invention, the plurality of pieces of geographical position information sent by the plurality of pieces of client equipment are received, the target position information in the alarm text information is analyzed after the alarm text information is received, then the geographical position information closest to the target position information is calculated, and the alarm text information is sent to the client equipment corresponding to the geographical position information.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an implementation of an alarm processing method according to an embodiment of the present invention;
fig. 2 is a flowchart of an implementation of an alarm processing method according to a second embodiment of the present invention;
fig. 3 is a flowchart of an implementation of an alarm processing method according to a third embodiment of the present invention;
fig. 4 is a flowchart of an implementation of an alarm processing method according to a fourth embodiment of the present invention;
fig. 5 is a flowchart of an implementation of an alarm processing method according to a fifth embodiment of the present invention;
fig. 6 is an architecture diagram of an alarm processing method according to a sixth embodiment of the present invention;
fig. 7 is a block diagram of a terminal device according to a seventh embodiment of the present invention;
fig. 8 is a schematic diagram of a terminal device according to an eighth embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 shows an implementation flow of the alarm processing method provided by the embodiment of the present invention, which is detailed as follows:
in S101, a communication connection is established with the plurality of client devices, and geographic location information and a first verification text sent by the client devices are obtained, where the first verification text is a result obtained by performing hash encryption on the geographic location information by the client devices.
In the embodiment of the present invention, the System includes a terminal device (server device) and a plurality of client devices, each client device corresponds to a preset feedback duration, and the client devices are preloaded with a Global Positioning System (GPS) module, and obtain geographical location information of the client device itself through the GPS module, where the geographical location information may be obtained in real time or at regular time intervals. After the client device obtains the geographic position information, the client device carries out hash encryption on the geographic position information to generate a first verification text. In order to enable the terminal device to obtain the geographic position information and the first verification text of the plurality of client devices, the terminal device is firstly established with the plurality of client devices in a communication connection mode. For example, the client device may be a portable bracelet, a watch, a police badge, an interphone, or the like, and the client device implements communication connection with the terminal device based on a Message Queue Telemetry Transport (MQTT) protocol, and specifically, after sending a CONNECT Message based on the MQTT protocol to the terminal device, if a CONNECT acknowledgement (nack) Message corresponding to the CONNECT Message returned by the terminal device is received, the establishment of the communication connection is completed, where the MQTT protocol uses binary format encoding and decoding, has low communication overhead, and can support transmission of geographic location information, and is suitable for low power consumption and low speed scenes in the embodiments of the present invention; in another mode, the client device is a mobile terminal such as a mobile phone, and an application program is installed on the client device, and a communication connection is established with the terminal device based on a HyperText Transfer Protocol (HTTP), so that the client device can transmit the acquired geographic location information of the client device and the generated first verification text to the terminal device. It should be noted that the sending frequency of the client device sending the geographic location information and the first verification text to the terminal device may be set according to an actual application scenario.
Optionally, the identification information, the geographic location information and the first verification text sent by the client device are received. In the embodiment of the invention, the client device can also be set to transmit the identification information (such as a machine number), the geographic position information and the first verification text of the client device to the terminal device in a matching manner, so that the terminal device can conveniently identify the source of the data, and the normalization of information transmission is improved.
In S102, performing hash encryption on the received geographic location information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic location information is within the feedback duration, storing the geographic location information.
After the communication connection between the terminal equipment and the plurality of client-side equipment is established, if the terminal equipment receives the geographical position information and the first verification text sent by the client-side equipment, the geographical position information is subjected to Hash encryption locally at the terminal equipment to obtain a second verification text, the first verification text is compared with the second verification text, and if the first verification text is the same as the second verification text, the fact that the geographical position information sent by the client-side equipment is consistent with the geographical position information received by the terminal equipment is proved, namely the geographical position information is not damaged in the transmission process.
In addition to verifying the geographical location information, in the embodiment of the present invention, the sending time of the client device sending the geographical location information is also obtained, and the sending time is verified, and specifically, when the geographical location information and the first verification text are added to the data packet, the client device may be set to add the sending time (current time) to the data packet, so that after receiving the data packet, the terminal device may extract the sending time from the data packet. Because each client device corresponds to a preset feedback time length, the feedback time length can be set as the shift schedule time length of the police holding the client device, for example, the shift schedule time length of a certain police is eight monday morning to eight night, and the feedback time length corresponding to the police client device can also be set as eight monday morning to eight night. When the terminal equipment verifies the sending time, judging whether the sending time is positioned in the feedback time length of the client equipment corresponding to the sending time, and if the sending time is positioned in the feedback time length, successfully verifying; if the client device is not in the feedback duration (for example, the police forget to turn off the geographic location information sending function of the client device after work), the verification fails.
If the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, the terminal equipment determines that the geographic position information is valid and stores the geographic position information; and if the first verification text is different from the second verification text and/or the sending time of the geographical position information is not within the feedback duration, the terminal equipment deletes the received geographical position information, and invalid geographical position information is prevented from occupying storage resources. In addition, in order to further save the storage space of the terminal device, the terminal device can only store the effective geographic position information which is sent by the client device last time.
Optionally, if the geographic location information and the first verification text are not received in a preset time period, sending a reminding message to the client device. In the embodiment of the present invention, the terminal device obtains the current time, and uses the feedback time length of the current time as the current feedback time length (different client devices may have different feedback time lengths, so that there may be a plurality of feedback time lengths), thereby determining the client device corresponding to the current feedback time length. On the basis, a preset time period is obtained, if the terminal device does not receive the geographical position information and the first verification text sent by the client device corresponding to the current feedback duration within the preset time period, the terminal device sends a reminding message to the client device corresponding to the current feedback duration, and the preset time period can be set according to an actual application scene, for example, the preset time period can be 5 minutes. By the method, the police officer holding the client equipment can be reminded of uploading the geographic position information and the first verification text, and the data efficiency in the terminal equipment is improved.
In S103, alarm text information is obtained, and text analysis is performed on the alarm text information to obtain target location information in the alarm text information.
The terminal equipment acquires the alarm text information besides the geographical position information, wherein the alarm text information can be manually compiled by personnel in an alarm center, and can also be an alarm short message sent by an alarm person. After the terminal device obtains the alarm text information, text analysis is carried out on the alarm text information, and the text analysis can be realized based on an open-source python semantic analysis module such as a BosonNLP module. In addition, in the embodiment of the present invention, a location data dictionary is established in advance in the terminal device, and specifically, an open-source electronic map interface is called, so that all location information in the electronic map is imported into the newly-established location data dictionary. When the terminal equipment performs text analysis on the alarm text information, checking whether the alarm text information contains position information in a position data dictionary, and if the alarm text information contains the position information in the position data dictionary, using the position information appearing in the alarm text information as target position information; and if the alarm text information does not contain the position information in the position data dictionary, outputting the alarm text information to personnel in the alarm center for manual judgment. For example, the alarm text information is 'Shenzhen City xx village occurrence killer event', the position data dictionary contains position information of 'Shenzhen city xx village', and the target position information is determined to be 'Shenzhen city xx village'.
In S103, a plurality of location distances between the target location information and the plurality of stored geographic location information are respectively calculated, the client device corresponding to the location distance having the smallest numerical value is used as a target device, and the alert text information is sent to the target device.
After obtaining the target position information, the terminal device respectively calculates a plurality of position distances between the target position information and a plurality of geographical position information stored by the terminal device, and similarly, the electronic map interface can be used to calculate the position distances, namely, the target position information is used as an end point, the geographical position information is used as a starting point, and thus, the position distance between the starting point and the end point is calculated. After the calculation is finished, the position distances are compared, the client device corresponding to the position distance with the minimum numerical value is used as the target device, and the terminal device sends the alarm text information to the target device, so that a policeman holding the target device can quickly arrive at the site of the alarm person after receiving the alarm text information.
Optionally, a target path between the target location information and the geographical location information of the user equipment is calculated, and the target path is sent to the user equipment. After determining the user device, the terminal device may further calculate a target path between the target location information and the geographical location information of the user device, the target path preferably being a shortest path between the target location information and the geographical location information of the user device. After the calculation is finished, the terminal device sends the target path to the target device, wherein the target path can be sent in a text form, and data corresponding to the target path can also be sent to the user device on the basis that the electronic map application program is loaded on the user device, so that the target path is displayed in the electronic map application program of the user device in a graphic form, and the intuitiveness of target path display is improved.
Optionally, a communication connection is established between a plurality of client devices. In the embodiment of the invention, the communication connection can be established between the plurality of client devices besides the communication connection between the terminal device and the plurality of client devices, so that police officers holding the client devices can inform other client devices when discovering emergency events, and the cooperativity of alarm processing is improved.
As can be seen from the embodiment shown in fig. 1, in the embodiment of the present invention, a terminal device establishes communication connection with a plurality of client devices, and obtains geographic location information and a first verification text sent by the client device, where the first verification text is a result obtained by hash-encrypting the geographic location information by the client device, then the terminal device performs hash-encrypting the received geographic location information to obtain a second verification text, if the first verification text is the same as the second verification text and the sending time of the geographic location information is within the feedback duration of the client device, the geographic location information is stored, after obtaining alarm text information, the terminal device performs text analysis on the alarm text information to obtain target location information, and calculates a plurality of location distances between the target location information and the stored plurality of geographic location information respectively, the client device corresponding to the position distance with the minimum numerical value is used as the target device, and the alarm text information is sent to the target device.
Fig. 2 is a diagram illustrating a method obtained by refining a process after obtaining the alarm text information based on the first embodiment of the present invention. The embodiment of the invention provides an implementation flow chart of an alarm processing method, and as shown in the figure, the alarm processing method can comprise the following steps:
in S201, it is determined whether a shielding vocabulary exists in the alarm text information, where the shielding vocabulary is obtained by performing cluster analysis on a plurality of harassment text information in a preset harassment information set.
In an actual alarm scene, a false alarm condition exists, so in the embodiment of the invention, a preset harassment information set is obtained, and the harassment information set comprises a plurality of harassment text messages. The harassment text information can be obtained by screening a plurality of alarm text information on the terminal equipment, and specifically can be manually screened by personnel in an alarm center. After the terminal equipment acquires the harassment information set, clustering analysis is carried out on a plurality of harassment text information in the harassment information set, the harassment text information is decomposed into a plurality of vocabularies for each harassment text information, then the vocabulary with the highest occurrence frequency in the harassment text information is extracted as a shielding vocabulary, the shielding vocabulary can be one or more, and the specific number can be set according to the practical application scene. It is worth mentioning that, besides clustering analysis is performed on a plurality of harassment text information to obtain a shielding vocabulary, the shielding vocabulary can be customized, for example, the shielding vocabulary can be defined as advertising words such as "promotion" or "discount".
In S202, if the number of the shielding words existing in the alarm text information exceeds a preset threshold, the alarm text information is shielded, and the alarm text information is added to the harassment information set.
After the shielding vocabulary is obtained, performing text analysis on the alarm text information, and checking whether the shielding vocabulary appears in the alarm text information, in the embodiment of the invention, in order to prevent the alarm text information which is not harassing text information from being shielded by mistake, after checking whether the shielding vocabulary appears in the alarm text information, further counting the number of the shielding vocabulary existing in the alarm text information, comparing the number of the shielding vocabulary with a preset threshold, if the number exceeds the preset threshold, shielding the alarm text information, judging the alarm text information as harassing text information, and adding the harassing text information into a harassing information set; and if the quantity does not exceed the preset threshold value, performing text analysis on the alarm text information to obtain the target position information in the alarm text information. The preset threshold value can be self-defined, the number of the shielding words appearing in the harassment text information in the harassment information set can also be analyzed, and the number of the shielding words appearing in all the harassment text information is subjected to mean processing to obtain the preset threshold value.
As can be seen from the embodiment shown in fig. 2, in the embodiment of the present invention, it is determined whether a shielding vocabulary exists in the alarm text information, the shielding vocabulary is obtained by performing cluster analysis on a plurality of harassment text information in a preset harassment information set, and if the number of the shielding vocabulary existing in the alarm text information exceeds a preset threshold, the alarm text information is shielded, and the alarm text information is added to the harassment information set.
Fig. 3 is a method obtained by refining a process of acquiring an alarm text message on the basis of the first embodiment of the present invention and on the basis of further including an alarm phone. An embodiment of the present invention provides an implementation flowchart of an alarm processing method, and as shown in fig. 3, the alarm processing method may include the following steps:
in S301, when it is detected that the alarm phone is in a preset call state, alarm voice information related to the call state is collected.
In the traditional alarm process, an alarm person needs to dial a fixed alarm number such as 110 to alarm, so in the embodiment of the invention, the alarm phone of the alarm center is detected, and when the alarm phone is detected to be in a preset call state, the voice related to the call state is collected as the alarm voice information, wherein the call state is the state from the connection of the alarm phone to the disconnection of the alarm phone. Specifically, a sensing module may be disposed in the alarm phone to sense a received action of the alarm phone, a voice module may be disposed on a microphone of the alarm phone, and when the sensing module senses that the alarm phone is in a call state, a signal is sent to the voice module, so that the voice module collects voice transmitted from the microphone and sends the collected voice as alarm voice information to the terminal device (the sending mode of the alarm voice information may be set to a wireless mode or a wired mode, and in the embodiment of the present invention, it is assumed that the voice module includes a communication module for communicating with the terminal device), where the sensing module may be an infrared sensing module or a gravity sensing module, and the like.
In S302, the alarm voice information is converted into alarm text information, the alarm text information is added to a message queue, and when the alarm text information is located at the head of the message queue, the alarm text information is taken out from the message queue.
The terminal device converts the alarm voice information into alarm Text information after receiving the alarm voice information, and specifically, the terminal device may call a Speech To Text (STT) service of an open source To complete conversion from Speech To Text. After the alarm text information is obtained, the terminal equipment inserts the alarm text information into the tail of a preset message queue, and when the alarm text information is arranged to the head of the message queue, the alarm text information is taken out from the message queue for text analysis, wherein the message queue conforms to the principle of first-in first-out. Optionally, the message queue is a kafka message queue. The kafka message queue can support larger data throughput, and is suitable for a scene with a plurality of alarm text messages, so the kafka message queue can be applied to the message queue. It should be understood that the message queue is set in the terminal device, on one hand, to adapt to a scene where multiple alarm text messages exist (for example, multiple alarm persons dial an alarm number to alarm at a time), and on the other hand, to facilitate the next text analysis, that is, to complete the initialization of the text analysis engine when the alarm text messages are in the message queue.
Fig. 6 is an architecture diagram of an alarm processing method according to an embodiment of the present invention, and as shown in fig. 6, a plurality of client devices obtain geographical location information of themselves through a global positioning system module and send the geographical location information to a terminal device. When the sensing module of the alarm phone senses that the alarm phone is in a call state, the sensing module sends a signal to the voice module, so that the voice module receives alarm voice information of an alarm person, and the voice module transmits the alarm voice information to the terminal equipment. And the terminal equipment converts the received alarm voice information into alarm text information, performs text analysis on the alarm text information to obtain target position information in the alarm text information, determines geographical position information with the minimum position distance from the target position information, and sends the alarm text information to client equipment corresponding to the geographical position information to complete an alarm processing flow.
As can be seen from the embodiment shown in fig. 3, in the embodiment of the present invention, when it is detected that the alarm phone is in the preset call state, the alarm voice information related to the call state is collected, the alarm voice information is converted into the alarm text information, the converted alarm text information is added to the message queue, and when the alarm text information is located at the head of the message queue, the alarm text information is taken out from the message queue.
Fig. 4 is a method obtained by refining a process of performing text analysis on the alarm text information to obtain target location information in the alarm text information on the basis of the first embodiment of the present invention. The embodiment of the present invention provides an implementation flowchart of an alarm processing method, and as shown in fig. 4, the alarm processing method may include the following steps:
in S401, a plurality of preset event vocabularies are obtained, where each event vocabulary corresponds to an alarm number, and the event vocabulary is used to indicate a type of an alarm event.
In the embodiment of the invention, a plurality of event vocabularies are preset, and the event vocabularies are used for indicating the types of the alarm events, for example, the types of the alarm events comprise theft events, robbery events and killer events, and the corresponding event vocabularies can be respectively set as theft, robbery and killer. It is worth mentioning that for one type of alarm event, a plurality of event vocabularies can be set, for example, for a theft event, the corresponding event vocabularies can be set as "theft" and "something stolen". In addition, different alarm numbers are set for different types of alarm events, namely, each event vocabulary corresponds to one alarm number, and the alarm numbers can be set according to the severity of each type of alarm event, for example, the alarm number of a theft event can be set to be 2, and the alarm number of a killer event can be set to be 10.
In S402, the alarm text information is subjected to text analysis, the event vocabulary appearing in the alarm text information is determined, and the alarm output number corresponding to the event vocabulary is used as a target number.
After a plurality of preset event vocabularies are obtained, the terminal equipment performs text analysis on the alarm text information, and the text analysis performed in the embodiment of the invention aims to determine the event vocabularies appearing in the alarm text information and take the alarm output number corresponding to the event vocabularies as the target number.
In S403, a plurality of target distances with the smallest numerical value are determined from the plurality of location distances, the number of the target distances is the target number, the client device corresponding to the target distance is used as the target device, and the alarm text information is sent to the target device.
After a plurality of position distances between the target position information and the stored plurality of geographic position information are calculated, a plurality of target distances with the minimum numerical value are determined from the plurality of position distances, wherein the total number of the target distances is the target number. And then, the terminal device takes the client device corresponding to the target data as the target device and sends the alarm text information to the target device.
As can be seen from the embodiment shown in fig. 4, in the embodiment of the present invention, the terminal device obtains a plurality of preset event vocabularies, each event vocabulary corresponds to an alarm number, the event vocabulary is used for indicating the type of the alarm event, then the text analysis is carried out on the alarm text information, the event vocabulary appearing in the alarm text information is determined, the alarm output number corresponding to the event vocabulary is taken as the target number, and determining a plurality of target distances with the minimum value from the plurality of position distances, wherein the number of the target distances is the target number, the client equipment corresponding to the target distances is taken as target equipment, and sends the alert text message to the target device, the embodiment of the present invention determines the event vocabulary in the alert text message, and the alarm is issued according to the alarm issuing number corresponding to the event vocabulary, so that the effectiveness of alarm processing is improved, and the alarm issuing condition is suitable for the alarm condition.
Fig. 5 is a diagram illustrating a method obtained by refining a process of sending alarm text information to a target device on the basis of a fourth embodiment of the present invention, where each event vocabulary corresponds to multiple capture places, and the capture places are places where criminal suspects related to an alarm event are captured in the past. An embodiment of the present invention provides an implementation flowchart of an alarm processing method, and as shown in fig. 5, the alarm processing method may include the following steps:
in S501, the capture point closest to the target position information is determined among the plurality of capture points corresponding to the event vocabulary in which the alarm text information appears.
In the embodiment of the present invention, each event vocabulary corresponds to a plurality of capture locations, where the capture locations are locations where criminal suspects related to previous alarm events are captured (capture locations are usually recorded in a background database for archiving), and specifically, previous alarm text information may be queried in the background database of the terminal device, and the event vocabulary and the plurality of capture locations corresponding to the previous alarm text information are determined. After receiving the current alarm text information and analyzing the event vocabulary and the target position information in the alarm text information, determining a capture place closest to the target position information from a plurality of capture places corresponding to the event vocabulary, namely, the capture place and the target position information have the smallest position distance (named as capture position distance for convenience of distinguishing).
Similarly, there may be a plurality of determined capture places closest to the target location information, so as to cover a plurality of places where the criminal suspect may flee. For example, if the Place is capturedAThe distance between the target position information and the capturing position is five hundred meters, and the Place is capturedBThe distance between the target position information and the capturing position is one kilometer, and the Place of the capturing position is obtainedCIf the distance between the target position information and the capturing position is one thousand, five or hundred meters, the number of the determined capturing places can be preset, and the capturing places are determined according to the sequence of the distances from the capturing position to the capturing position from small to large, for example, if the number of the determined capturing places is 2, the determined capturing Place is PlaceAAnd PlaceB(ii) a Another way is to set a distance threshold of the capture position distance and determine the capture location corresponding to the capture position distance which does not exceed the distance threshold.
In S502, a capture path is calculated based on the capture location and the geographical location information of the user equipment, and the capture path is sent to the target equipment.
After the capture place closest to the target position is determined, a capture path is calculated based on the capture place and the geographic position information of the user equipment, and the capture path is sent to the target equipment, so that a police officer holding the target equipment can conveniently carry out capture action deployment.
As can be seen from the embodiment shown in fig. 5, in the embodiment of the present invention, the capture location closest to the target location information is determined from the plurality of capture locations corresponding to the event vocabulary in which the alarm text information appears, the capture path is calculated based on the capture location and the geographic location information of the user equipment, and the capture path is sent to the target equipment.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 7 shows a block diagram of a terminal device according to an embodiment of the present invention, where the terminal device includes units for executing steps in the embodiment corresponding to fig. 1. Please refer to fig. 1 and fig. 1 for the corresponding description of the embodiment. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 7, the terminal device includes:
an obtaining unit 71, configured to establish communication connection with the multiple client devices, and obtain geographic location information and a first verification text sent by the client devices, where the first verification text is a result obtained by performing hash encryption on the geographic location information by the client devices;
the storage unit 72 is configured to perform hash encryption on the received geographic location information to obtain a second verification text, and store the geographic location information if the first verification text is the same as the second verification text and the sending time of the geographic location information is within the feedback duration;
the text analysis unit 73 is configured to acquire alarm text information, perform text analysis on the alarm text information, and obtain target position information in the alarm text information;
a sending unit 74, configured to calculate a plurality of location distances between the target location information and the stored plurality of geographic location information, respectively, use the client device corresponding to the location distance with the smallest value as a target device, and send the alert text information to the target device.
Optionally, the text analysis unit 73 further includes:
the judging unit is used for judging whether shielding vocabularies exist in the alarm text information, and the shielding vocabularies are obtained by clustering and analyzing a plurality of harassment text information in a preset harassment information set;
and the shielding unit is used for shielding the alarm text information and adding the alarm text information to the harassment information set if the number of the shielding words in the alarm text information exceeds a preset threshold value.
Optionally, an alarm phone is further included, and the text analysis unit 73 includes:
the acquisition unit is used for acquiring alarm voice information related to a preset call state when the alarm phone is detected to be in the preset call state;
and the conversion unit is used for converting the alarm voice information into alarm text information, adding the alarm text information into a message queue, and taking out the alarm text information from the message queue when the alarm text information is positioned at the head of the message queue.
Optionally, the text analysis unit 73 further includes:
the system comprises a vocabulary acquisition unit, a judgment unit and a processing unit, wherein the vocabulary acquisition unit is used for acquiring a plurality of preset event vocabularies, each event vocabulary corresponds to one alarm output number, and the event vocabularies are used for indicating the types of alarm events;
the analysis subunit is used for performing text analysis on the alarm text information, determining the event vocabulary appearing in the alarm text information, and taking the alarm output number corresponding to the event vocabulary as a target number;
the sending unit 74 includes:
and the sending subunit is configured to determine, from the plurality of location distances, a plurality of target distances with a smallest numerical value, where the number of the target distances is the target number, use the client device corresponding to the target distance as the target device, and send the alarm text information to the target device.
Optionally, each event vocabulary corresponds to a plurality of capture places, where the capture places are places where criminal suspects related to past alarm events are captured, and the sending unit 74 further includes:
a determination unit configured to determine, among the plurality of capture places corresponding to the event vocabulary in which the alarm text information appears, the capture place closest to the target position information;
and the calculation unit is used for calculating a capture path based on the capture place and the geographical position information of the user equipment and sending the capture path to the target equipment.
Therefore, the terminal device provided by the embodiment of the invention has the advantages that the alarm text information is sent to the client device closest to the target position information in the alarm text information, the alarm process is simplified, and the alarm processing efficiency is improved.
Fig. 8 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 8, the terminal device 8 of this embodiment includes: a processor 80, a memory 81 and a computer program 82, such as an alarm handling program, stored in said memory 81 and operable on said processor 80. The processor 80, when executing the computer program 82, implements the steps in the various alarm processing method embodiments described above, such as the steps S101 to S104 shown in fig. 1. Alternatively, the processor 80, when executing the computer program 82, implements the functions of the units in the terminal device embodiments described above, such as the functions of the units 71 to 74 shown in fig. 7.
Illustratively, the computer program 82 may be divided into one or more units, which are stored in the memory 81 and executed by the processor 80 to accomplish the present invention. The one or more units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 82 in the terminal device 8. For example, the computer program 82 may be divided into an acquisition unit, a storage unit, a text analysis unit, and a transmission unit, and each unit functions as follows:
the acquisition unit is used for establishing communication connection with the plurality of client devices and acquiring geographic position information and a first verification text sent by the client devices, wherein the first verification text is a result obtained by carrying out hash encryption on the geographic position information by the client devices;
the storage unit is used for carrying out hash encryption on the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, the geographic position information is stored;
the text analysis unit is used for acquiring alarm text information and performing text analysis on the alarm text information to obtain target position information in the alarm text information;
and the sending unit is used for respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment.
The terminal device 8 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 80, a memory 81. Those skilled in the art will appreciate that fig. 8 is merely an example of a terminal device 8 and does not constitute a limitation of terminal device 8 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 80 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 81 may be an internal storage unit of the terminal device 8, such as a hard disk or a memory of the terminal device 8. The memory 81 may also be an external storage device of the terminal device 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 8. Further, the memory 81 may also include both an internal storage unit and an external storage device of the terminal device 8. The memory 81 is used for storing the computer program and other programs and data required by the terminal device. The memory 81 may also be used to temporarily store data that has been output or is to be output.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of each functional unit is merely illustrated, and in practical applications, the foregoing function distribution may be performed by different functional units according to needs, that is, the internal structure of the terminal device is divided into different functional units to perform all or part of the above-described functions. Each functional unit in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units are only used for distinguishing one functional unit from another, and are not used for limiting the protection scope of the application. The specific working process of the units in the system may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed terminal device and method may be implemented in other ways. For example, the above-described terminal device embodiments are merely illustrative, and for example, the division of the units is only one logical function division, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (7)

1. An alarm processing method is characterized by comprising a plurality of client devices, wherein each client device corresponds to a preset feedback time length, and the alarm processing method comprises the following steps:
establishing communication connection with the plurality of client devices, and acquiring geographic position information and a first verification text sent by the client devices, wherein the first verification text is a result obtained by performing hash encryption on the geographic position information by the client devices;
performing hash encryption on the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, storing the geographic position information;
acquiring alarm text information, and performing text analysis on the alarm text information to obtain target position information in the alarm text information;
respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment;
the text analysis is performed on the alarm text information to obtain target position information in the alarm text information, and the method further includes:
acquiring a plurality of preset event vocabularies, wherein each event vocabulary corresponds to one alarm output number and is used for indicating the types of alarm events;
performing text analysis on the alarm text information, determining the event vocabulary appearing in the alarm text information, and taking the alarm output number corresponding to the event vocabulary as a target number;
the step of using the client device corresponding to the position distance with the minimum numerical value as a target device and sending the alarm text information to the target device includes:
determining a plurality of target distances with the smallest numerical value from the plurality of position distances, wherein the number of the target distances is the target number, taking the client equipment corresponding to the target distances as the target equipment, and sending the alarm text information to the target equipment;
each event vocabulary corresponds to a plurality of capture places, the capture places are places where criminal suspects related to the alarm event are captured in the past, and the sending of the alarm text information to the target device further comprises:
determining the capturing place closest to the target position information from a plurality of capturing places corresponding to the event vocabulary in which the alarm text information appears;
and calculating a capturing path based on the capturing place and the geographic position information of the target equipment, and sending the capturing path to the target equipment.
2. The alert processing method of claim 1, after obtaining the alert text information, further comprising:
judging whether shielding vocabularies exist in the alarm text information, wherein the shielding vocabularies are obtained by carrying out cluster analysis on a plurality of harassment text information in a preset harassment information set;
and if the number of the shielding words in the alarm text information exceeds a preset threshold value, shielding the alarm text information, and adding the alarm text information to the harassment information set.
3. The alarm handling method of claim 1, further comprising an alarm phone, wherein the obtaining the alarm text information comprises:
when detecting that the alarm phone is in a preset call state, acquiring alarm voice information related to the call state;
and converting the alarm voice information into alarm text information, adding the alarm text information into a message queue, and taking out the alarm text information from the message queue when the alarm text information is positioned at the head of the message queue.
4. A terminal device, characterized in that, it further includes a plurality of client devices, each of the client devices corresponds to a preset feedback duration, the terminal device includes a memory, a processor and a computer program stored in the memory and capable of running on the processor, and the processor implements the following steps when executing the computer program:
establishing communication connection with the plurality of client devices, and acquiring geographic position information and a first verification text sent by the client devices, wherein the first verification text is a result obtained by performing hash encryption on the geographic position information by the client devices;
performing hash encryption on the received geographic position information to obtain a second verification text, and if the first verification text is the same as the second verification text and the sending time of the geographic position information is within the feedback duration, storing the geographic position information;
acquiring alarm text information, and performing text analysis on the alarm text information to obtain target position information in the alarm text information;
respectively calculating a plurality of position distances between the target position information and the stored plurality of geographical position information, taking the client equipment corresponding to the position distance with the minimum numerical value as target equipment, and sending the alarm text information to the target equipment;
the text analysis is performed on the alarm text information to obtain target position information in the alarm text information, and the method further includes:
acquiring a plurality of preset event vocabularies, wherein each event vocabulary corresponds to one alarm output number and is used for indicating the types of alarm events;
performing text analysis on the alarm text information, determining the event vocabulary appearing in the alarm text information, and taking the alarm output number corresponding to the event vocabulary as a target number;
the step of using the client device corresponding to the position distance with the minimum numerical value as a target device and sending the alarm text information to the target device includes:
determining a plurality of target distances with the smallest numerical value from the plurality of position distances, wherein the number of the target distances is the target number, taking the client equipment corresponding to the target distances as the target equipment, and sending the alarm text information to the target equipment;
each event vocabulary corresponds to a plurality of capture places, the capture places are places where criminal suspects related to the alarm event are captured in the past, and the sending of the alarm text information to the target device further comprises:
determining the capturing place closest to the target position information from a plurality of capturing places corresponding to the event vocabulary in which the alarm text information appears;
and calculating a capturing path based on the capturing place and the geographic position information of the target equipment, and sending the capturing path to the target equipment.
5. The terminal device of claim 4, wherein after obtaining the alert text message, further comprising:
judging whether shielding vocabularies exist in the alarm text information, wherein the shielding vocabularies are obtained by carrying out cluster analysis on a plurality of harassment text information in a preset harassment information set;
and if the number of the shielding words in the alarm text information exceeds a preset threshold value, shielding the alarm text information, and adding the alarm text information to the harassment information set.
6. The terminal device of claim 4, further comprising an alarm phone, wherein said obtaining alarm text information comprises:
when detecting that the alarm phone is in a preset call state, acquiring alarm voice information related to the call state;
and converting the alarm voice information into alarm text information, adding the alarm text information into a message queue, and taking out the alarm text information from the message queue when the alarm text information is positioned at the head of the message queue.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the alarm processing method according to any one of claims 1 to 3.
CN201811016892.9A 2018-09-03 2018-09-03 Alarm processing method and terminal equipment Active CN109255937B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811016892.9A CN109255937B (en) 2018-09-03 2018-09-03 Alarm processing method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811016892.9A CN109255937B (en) 2018-09-03 2018-09-03 Alarm processing method and terminal equipment

Publications (2)

Publication Number Publication Date
CN109255937A CN109255937A (en) 2019-01-22
CN109255937B true CN109255937B (en) 2021-10-26

Family

ID=65050070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811016892.9A Active CN109255937B (en) 2018-09-03 2018-09-03 Alarm processing method and terminal equipment

Country Status (1)

Country Link
CN (1) CN109255937B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110459043A (en) * 2019-08-12 2019-11-15 视联动力信息技术股份有限公司 A kind of alarm processing method and device
CN112447033B (en) * 2019-09-05 2024-03-19 比亚迪股份有限公司 Security data processing method, system, computer equipment and storage medium
CN110990562B (en) * 2019-10-29 2022-08-26 新智认知数字科技股份有限公司 Alarm classification method and system
CN111641757A (en) * 2020-05-15 2020-09-08 北京青牛技术股份有限公司 Real-time quality inspection and auxiliary speech pushing method for seat call
CN112383756B (en) * 2020-11-13 2021-08-17 珠海大横琴科技发展有限公司 Video monitoring alarm processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886707A (en) * 2014-03-04 2014-06-25 深圳市敢为软件技术有限公司 Method and system for alarm reminding
CN104574873A (en) * 2014-12-29 2015-04-29 天维尔信息科技股份有限公司 Police dispatching method and device
CN108305450A (en) * 2017-12-26 2018-07-20 中国电信股份有限公司新疆分公司 That converges a variety of alarm sources connects method and system of dealing with emergencies and dangerous situations
CN108444485A (en) * 2018-03-22 2018-08-24 浙江科澜信息技术有限公司 A kind of automatic night watching method, apparatus, equipment and computer readable storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170013464A1 (en) * 2014-07-10 2017-01-12 Gila FISH Method and a device to detect and manage non legitimate use or theft of a mobile computerized device
US10176805B2 (en) * 2016-09-21 2019-01-08 John A. Carlin Networked audible and visual alarm light system and method with voice command control and base station having alarm for smoke, carbon monoxide and gas

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886707A (en) * 2014-03-04 2014-06-25 深圳市敢为软件技术有限公司 Method and system for alarm reminding
CN104574873A (en) * 2014-12-29 2015-04-29 天维尔信息科技股份有限公司 Police dispatching method and device
CN108305450A (en) * 2017-12-26 2018-07-20 中国电信股份有限公司新疆分公司 That converges a variety of alarm sources connects method and system of dealing with emergencies and dangerous situations
CN108444485A (en) * 2018-03-22 2018-08-24 浙江科澜信息技术有限公司 A kind of automatic night watching method, apparatus, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN109255937A (en) 2019-01-22

Similar Documents

Publication Publication Date Title
CN109255937B (en) Alarm processing method and terminal equipment
EP2805316B1 (en) Emergency messaging system and method of responding to an emergency
CN101548506B (en) Apparatus and a security node for use in determining security attacks
US8275096B2 (en) System and method for security monitoring and response delivery
KR20140088836A (en) Methods and systems for searching utilizing acoustical context
CN109922206B (en) Intelligent alarm method and device for mobile phone and system comprising intelligent alarm device
US20160070010A1 (en) System and methods for remote monitoring
CN103338362B (en) A kind of event-handling method based on video monitoring system and system
CN110881211A (en) Power saving method, device, storage medium and terminal
CN105453069A (en) Situational crowd-sourced response system
CN105744071A (en) One-key emergency help system and method based on fingerprint identification
CN114168420A (en) Data warning method, system, electronic equipment and storage medium
CN115103157A (en) Video analysis method and device based on edge cloud cooperation, electronic equipment and medium
CN115719635A (en) Ambulance scheduling method, device, equipment and storage medium
CN109451439B (en) Loss prevention method and device based on terminal, terminal and storage medium
KR101793630B1 (en) Method for cooperating with smart devices and cloud server therof
CN110602161A (en) Alarm sending method and device and electronic equipment
WO2001059736A3 (en) System and method of facilities and operations monitoring and remote management support
CN113094002B (en) Message processing method, device, electronic equipment and computer medium
CN101807313A (en) Method and device for sending checking-in data
US11037430B1 (en) System and method for providing registered sex offender alerts
CN111372197A (en) Early warning method and related device
CN101783744A (en) Network alarm-canceling wired alarm reporting system
CN110867035A (en) Alarm method and equipment
CN111047229A (en) Order distribution information processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant