CN112329899B - Efficient and accurate anti-lost positioning method - Google Patents

Efficient and accurate anti-lost positioning method Download PDF

Info

Publication number
CN112329899B
CN112329899B CN202011228307.9A CN202011228307A CN112329899B CN 112329899 B CN112329899 B CN 112329899B CN 202011228307 A CN202011228307 A CN 202011228307A CN 112329899 B CN112329899 B CN 112329899B
Authority
CN
China
Prior art keywords
old
information
code
access
lost
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011228307.9A
Other languages
Chinese (zh)
Other versions
CN112329899A (en
Inventor
杨志刚
罗代忠
罗万成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Arts and Sciences
Original Assignee
Chongqing University of Arts and Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Arts and Sciences filed Critical Chongqing University of Arts and Sciences
Priority to CN202011228307.9A priority Critical patent/CN112329899B/en
Publication of CN112329899A publication Critical patent/CN112329899A/en
Application granted granted Critical
Publication of CN112329899B publication Critical patent/CN112329899B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an efficient and accurate anti-lost positioning method. It uses the anti-lost system as follows to update the lost person's location: the anti-lost system consists of a subsystem and a public platform interface; the subsystem comprises user account management, user authority management, two-dimensional code distribution, statistical analysis, loss judgment and the like. The anti-lost positioning method is more efficient, more accurate and safer in lost judgment of specific personnel.

Description

Efficient and accurate anti-lost positioning method
The application is a divisional application with the application number of 201810201865.2 and the invention name of 'a two-dimensional code anti-lost method and system based on public platform'.
Technical Field
The invention relates to a positioning method, in particular to an efficient and accurate anti-lost positioning method.
Background
The problem of the loss of a specific group of people in life, such as the loss of children, the loss of patients with mental diseases, the loss of the elderly with alzheimer's disease, etc., is a security problem of great social concern. At present, the lost prevention technology and means have the defects that the recorded information is limited and difficult to update, the price is high, the positioning is inaccurate, the standby time is short, the application is easy to break down, the personnel position information is difficult to update in time, or the problems that the popularization of a report end is difficult, the identity of a reporter is difficult to verify and the like exist, and great inconvenience is brought to the work of searching lost personnel. However, the work of finding lost personnel must be efficient and accurate, otherwise the consequences are not reasonable.
Disclosure of Invention
The invention aims to provide an efficient and accurate anti-lost positioning method, which is more efficient, more accurate and safer in lost judgment of specific personnel.
The purpose of the invention is realized by the following technical scheme:
an efficient and accurate anti-lost positioning method is characterized by being carried out by adopting an anti-lost system as follows: the anti-lost system consists of a subsystem and a public platform interface; the subsystem comprises user account management, user authority management, two-dimensional code distribution, statistical analysis, missing judgment and the like; the user account management is used for completing user registration and user account management; the user authority management is used for finishing the security classification and management of the information of the old people and finishing the management of the user access authority and the access behavior; the two-dimension code distribution is used for completing the generation and distribution of the inner code two-dimension code and the outer code two-dimension code; the statistical analysis is used for completing the statistics of activity routes and access behaviors of the old and malicious behavior detection; the lost judgment is used for finishing the judgment of the lost state of the old; the public platform interface completes interaction with a public platform, including message pushing, user information acquisition, user information reporting and the like;
wherein, the statistical analysis subsystem comprises the following functional modules:
old people route statistics: recording the daily activity route of the old by means of the position of the code scanner provided by a positioning device or a public platform;
and (3) access behavior statistics: when the access behavior occurs, the module acquires and records the account number and the geographic position information of the visitor through a public platform;
malicious behavior detection: when the following situation occurs, the access behavior of the visitor can be judged to be malicious, and the visitor cannot acquire any information through the system; (1) the access frequency is greater than a threshold value; (2) reporting by others, and checking the fact of the property; (3) actively reporting the loss for many times, but proving to be misinformed afterwards; (4) acquiring bad records of the visitor from other channels;
the specific method for carrying out the anti-lost positioning comprises the following steps: the method comprises an information access control method and an old people missing judgment method;
the information access control method allocates one or more roles for a user, sets corresponding access authority for each role, independently sets security for each piece of information of the old, only allows users with the role access authority greater than or equal to the information security, and allows a system and an information creator to dynamically adjust the information security of the old; the method comprises two information access modes of external code access and internal code access; the security level and the access authority are represented by integers of 0-8, and the larger the number is, the higher the required access authority is and the higher the access authority is;
the external code access is performed by scanning a two-dimensional code exposed in the air (such as a two-dimensional code printed on clothes, badges, T-shirts and other articles), wherein the two-dimensional code comprises plaintext information, hidden ciphertext information and an anti-lost platform link, and the anti-lost platform link corresponds to an old man information number and an external code identifier;
the internal code access is realized by actively showing a two-dimensional code by a code scanning old man, the two-dimensional code comprises plaintext information, hidden ciphertext information and a loss prevention platform link, and the loss prevention platform link corresponds to an old man information number and an internal code identifier;
the dynamic adjustment of the information security level of the old people reduces the security level of main information when the old people are lost, is convenient for more visitors to read and provides help; the main information security level reduction comprises names of the old people, contact ways of guardians, telephone numbers of community dispatching places of residential cities of the old people, physical health conditions of the old people and cautionary matters;
the method for judging the missing of the old people adopts the following strategy to judge:
when the guardian registers the missing of the old, the old is judged to be missing; when the user accesses the internal code, the old man is judged to be lost; when a police or volunteer with real-name authentication accesses the code through the external code and actively reports the loss, the old is judged to be lost; when the external code access address exceeds the daily activity range of the old, the external code access frequency is higher than the daily access frequency, and the external code access time is abnormal, the system judges whether the old is lost or not through a loss judgment model;
the loss judgment model is a support vector machine model which is trained offline, and the input vector is composed of the action ability, the cognitive ability, the deviation distance and the code scanning frequency; wherein, the first and the second end of the pipe are connected with each other,
the mobility is represented by numbers of 0-100, wherein 100 represents normal mobility, 0 represents complete loss of mobility, and the evaluation score is given by a guardian;
cognitive ability, wherein the strength of the cognitive ability is represented by numbers of 0-100, the cognitive ability is normal by 100, the cognitive ability is almost lost by 0, and evaluation scores are given by a guardian after testing the old;
the deviation distance represents the distance of the code scanning place deviating from the daily activity range of the old; the initial value of the daily activity range of the old is set by a guardian or is measured by positioning equipment, and the daily activity range of the old is dynamically updated subsequently along with the application of the system;
the code scanning frequency, N, represents the number of times a certain period is scanned.
More preferably, the threshold value for malicious behavior detection is 20 times per day; other channels in the malicious behavior detection include information platforms of public security agencies and local governments.
The information access control method is characterized in that the system classifies the information of the old and guardians and sets the security level of each piece of information. The security level of the information is represented by a number, with a larger number indicating higher access rights to the information. For example, the security level of the name of the city community where the old people live is 0, the default security level of the call sent by the community is 2, the default security level of the contact call of the guardian is 3, the default security level of the number of the identity card of the old people is 5, and the default security level of the return payment is 8.
If and only if the authority of a role or group of roles is greater than or equal to the information security level, the user owning that role or group of roles has the right to access the information. For example, if the authority of the visitor to the plaintext information of the external code is 0, which is smaller than the security level 3 of the contact phone of the guardian, the visitor to the plaintext information of the external code cannot read the contact phone of the guardian, i.e. the system cannot write the contact phone of the guardian into the plaintext of the external code. The visiting authority of the internal code link visitor is 3, and is more than or equal to the security level 3 of the contact telephone of the guardian, the internal code link visitor allows the access to the contact telephone of the guardian; meaning that a user logged into the public platform through an internal code link is allowed access to the guardian's contact phone. The creator of the information has the highest authority 8 on the information it creates, and the creator of the information can also define roles or groups of roles and grant them temporary access, such as the authority granted to the parent role group 7.
Table 1 partial roles or groups of roles and corresponding permissions
Character or group of characters Access rights
Outer code plaintext information visitor 0
Visitor of hidden information of outer code 2
Outer code link visitor 2
Visitor to plaintext information of internal code 2
Internally coded ciphertext message visitor 4
Intercode chaining visitor 3
Information creator 8
Real name authentication volunteer 4
Real name authentication policeman 5
Self-defining Self-defining
The invention has the following beneficial effects:
the invention provides an efficient and accurate anti-lost positioning method, which adopts the separated setting of an outer code two-dimensional code and an inner code two-dimensional code, has a greater promotion on the anti-lost function of specific personnel (such as the old) and the protection of user privacy compared with the prior system, and has multiple judgment strategies of a lost judgment method, so that the lost judgment of the specific personnel is quicker, more accurate and safer, and the purposes of no need of registration, convenient statistical analysis and wide popularization and use are achieved by combining communication resources widely used by the society, such as a WeChat public platform.
Drawings
Fig. 1 is a schematic flow chart of an anti-lost system used in the efficient and accurate anti-lost positioning method in embodiment 1 of the present invention.
Fig. 2 is a schematic diagram of subsystems in the anti-lost system shown in fig. 1.
Detailed Description
The present invention will now be described in detail by way of examples, and it should be understood that the following examples are illustrative only and are not to be construed as limiting the scope of the invention, as the invention extends to other variations, modifications and substitutions of the methods, steps or conditions disclosed herein, which fall within the scope of the invention.
An efficient and accurate anti-lost positioning method specifically adopts an anti-lost system shown in the attached figures 1 and 2 and comprises the following steps:
step 1: a guardian registers as a user of the system through a public platform, inputs related information of the old people into the system, and automatically distributes information numbers of the old people through a loss prevention platform;
step 2: the system generates an outer code two-dimensional code by using the old man information number, the outer code identification and the anti-lost platform link; generating an inner code two-dimensional code by using the old people information number, the inner code identification and the anti-lost platform link;
step 3, the guardian prints the outer code two-dimensional code on clothes or badges of the old people to expose the outer code two-dimensional code in the air, so that the old people can conveniently access the outer code two-dimensional code, and prints the inner code two-dimensional code on a card to facilitate the collection of the old people;
step 4, when the guardian reports the missing of the old people to the system, the system judges that the old people are missing, and the access authority of specific information is reduced, such as the community name of the living city of the old people and the contact way of the guardian;
step 5, when the visitor visits through the internal code two-dimensional code, the system judges that the old people are lost, and sends specific information to the visitor to know, such as the community name of the living city of the old people and the contact way of a guardian; and sending the visitor information to the guardian, such as the current position of the visitor and the contact way of the visitor;
step 6, when a real-name authentication volunteer or a police accesses through the internal code two-dimensional code or the external code two-dimensional code, the system judges that the old people are lost, and sends specific information to the visitor to know, such as the name of the community of the living city of the old people and the contact way of a guardian; the visitor information is sent to the guardian, such as the current position of the visitor and the contact information of the visitor;
step 7, when an visitor accesses through the outer code two-dimensional code, the system judges the missing of the old man according to whether the outer code access address exceeds the ordinary activity range of the old man, whether the outer code access frequency is higher than the daily outer code scanning access frequency of the old man or whether the outer code access time is in the daily outer code scanning access time period of the old man; and if the old people are judged to be lost, the latest visitor position and the latest contact way are sent to the guardian.

Claims (2)

1. An efficient and accurate anti-lost positioning method is characterized by adopting an anti-lost system to perform the following steps: the anti-lost system consists of a subsystem and a public platform interface; the subsystem comprises user account management, user authority management, two-dimensional code distribution, statistical analysis and loss judgment; the user account management is used for completing user registration and user account management; the user authority management is used for finishing the security classification and management of the information of the old people and finishing the management of the user access authority and the access behavior; the two-dimension code distribution is used for completing the generation and distribution of the inner code two-dimension code and the outer code two-dimension code; the statistical analysis is used for completing the statistics of activity routes and access behaviors of the old and malicious behavior detection; the lost judgment is used for finishing the judgment of the lost state of the old; the public platform interface finishes the interaction with the public platform, and comprises the steps of pushing messages, collecting user information and reporting the information by a user;
the statistical analysis subsystem comprises the following functional modules:
old people route statistics: recording the daily activity route of the old by means of the position of the code scanner provided by a positioning device or a public platform;
and (3) access behavior statistics: when the access behavior occurs, the module acquires and records the account number and the geographic position information of the visitor through a public platform;
malicious behavior detection: when the following situation occurs, the access behavior of the visitor can be judged to be malicious, and the visitor cannot acquire any information through the system; (1) the access frequency is greater than a threshold value; (2) reporting by others, and checking the fact; (3) actively reporting the loss for many times, but proving to be misinformed afterwards; (4) acquiring bad records of the visitor from other channels;
the specific method for carrying out the anti-lost positioning comprises the following steps: the method comprises an information access control method and an old man missing judgment method;
the information access control method allocates one or more roles for a user, sets corresponding access authority for each role, independently sets security for each piece of information of the old, only allows users with the role access authority greater than or equal to the information security, and allows a system and an information creator to dynamically adjust the information security of the old; the method comprises two information access modes of external code access and internal code access; the security level and the access authority are represented by integers of 0-8, and the larger the number is, the higher the required access authority is and the higher the access authority is;
the external code access is performed by scanning a two-dimensional code exposed in the air, the two-dimensional code comprises plaintext information, hidden ciphertext information and a loss prevention platform link, and the loss prevention platform link corresponds to an old man information number and an external code identifier;
the internal code access is realized by actively showing a two-dimensional code by a code scanning old man, the two-dimensional code comprises plaintext information, hidden ciphertext information and a loss prevention platform link, and the loss prevention platform link corresponds to an old man information number and an internal code identifier;
the dynamic adjustment of the information security level of the old people reduces the security level of main information when the old people are lost, is convenient for more visitors to read and provides help; the main information security level reduction comprises names of the old people, contact ways of guardians, telephone numbers of community dispatching places of residential cities of the old people, physical health conditions of the old people and cautionary matters;
the method for judging the missing of the old people adopts the following strategy to judge:
when the guardian registers the missing of the old, the old is judged to be missing; when the user accesses the internal code, the old man is judged to be lost; when a police or volunteer with real-name authentication accesses the code through the external code and actively reports the loss, the old is judged to be lost; when the external code access address exceeds the daily activity range of the old, the external code access frequency is higher than the daily access frequency, and the external code access time is abnormal, the system judges whether the old is lost or not through a loss judgment model;
the loss judgment model is a support vector machine model which is trained offline, and the input vector is composed of the action ability, the cognitive ability, the deviation distance and the code scanning frequency; wherein the content of the first and second substances,
the mobility is represented by numbers of 0-100, wherein 100 represents normal mobility, 0 represents complete loss of mobility, and the evaluation score is given by a guardian;
cognitive ability, wherein the strength of the cognitive ability is represented by numbers of 0-100, the cognitive ability is normal by 100, the cognitive ability is almost lost by 0, and evaluation scores are given by a guardian after testing the old;
the deviation distance represents the distance of the code scanning place deviating from the daily activity range of the old; the initial value of the daily activity range of the old is set by a guardian or is measured by positioning equipment, and the daily activity range of the old is dynamically updated subsequently along with the application of the system;
the code scanning frequency, N, represents the number of times a certain period is scanned.
2. The efficient and accurate anti-lost positioning method as set forth in claim 1, wherein: the threshold value in the malicious behavior detection is 20 times per day; other channels in the malicious behavior detection comprise public security organs and local government information platforms.
CN202011228307.9A 2018-03-12 2018-03-12 Efficient and accurate anti-lost positioning method Active CN112329899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011228307.9A CN112329899B (en) 2018-03-12 2018-03-12 Efficient and accurate anti-lost positioning method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011228307.9A CN112329899B (en) 2018-03-12 2018-03-12 Efficient and accurate anti-lost positioning method
CN201810201865.2A CN108491902B (en) 2018-03-12 2018-03-12 Two-dimensional code anti-lost method and system based on public platform

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810201865.2A Division CN108491902B (en) 2018-03-12 2018-03-12 Two-dimensional code anti-lost method and system based on public platform

Publications (2)

Publication Number Publication Date
CN112329899A CN112329899A (en) 2021-02-05
CN112329899B true CN112329899B (en) 2022-09-13

Family

ID=63338935

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011228307.9A Active CN112329899B (en) 2018-03-12 2018-03-12 Efficient and accurate anti-lost positioning method
CN201810201865.2A Active CN108491902B (en) 2018-03-12 2018-03-12 Two-dimensional code anti-lost method and system based on public platform

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810201865.2A Active CN108491902B (en) 2018-03-12 2018-03-12 Two-dimensional code anti-lost method and system based on public platform

Country Status (1)

Country Link
CN (2) CN112329899B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111540161A (en) * 2020-04-16 2020-08-14 北京小神兔天网科技有限公司 Search and rescue system and method for personnel loss

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007280296A (en) * 2006-04-11 2007-10-25 Shoki Kk Information management apparatus and method, and computer program
CN105577749A (en) * 2015-12-07 2016-05-11 广东省心血管病研究所 An anti-lost method and system based on two-dimension codes
CN105639888A (en) * 2014-11-26 2016-06-08 谭奇 Anti-lost two-dimensional code chest badge
CN106530178A (en) * 2016-11-03 2017-03-22 福建任我行科技发展有限公司 Two-dimensional-code-technology-based system for identifying and localizing lost people
CN106650869A (en) * 2016-10-18 2017-05-10 重庆文理学院 Information hiding method based on two-dimensional code
CN206480008U (en) * 2016-06-17 2017-09-08 赵凯泽 A kind of intelligent contact calling system based on Quick Response Code
CN206672518U (en) * 2017-03-17 2017-11-24 无锡市第二人民医院 A kind of anti-patient of clinical care, which wanders away, uses paster
CN206863920U (en) * 2017-07-11 2018-01-09 象山兑鹏电子科技有限公司 Old man's bracelet

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050061890A1 (en) * 2003-09-10 2005-03-24 Hinckley C. Martin Apparatus, system, and method for identification and tracking
JP4002939B1 (en) * 2006-07-13 2007-11-07 正雄 吉田 Laser marking method
CN103870471B (en) * 2012-12-11 2018-01-05 腾讯科技(深圳)有限公司 Two degree of good friend's inquiry systems, method and apparatus
FR2999757A1 (en) * 2012-12-13 2014-06-20 Patrick Coudert METHOD FOR SECURE ACCESS TO CONFIDENTIAL MEDICAL DATA, AND STORAGE MEDIUM FOR SAID METHOD
CN104780502A (en) * 2014-08-25 2015-07-15 李杨 Portable equipment and anti-lost and positioning method and system thereof
CN105429999B (en) * 2015-12-17 2018-09-25 北京荣之联科技股份有限公司 Unified single sign-on system based on cloud platform
CN106685977B (en) * 2017-01-03 2019-11-08 武汉虹信技术服务有限责任公司 A kind of system of account building method based on intelligence community cloud platform
CN107480308A (en) * 2017-09-26 2017-12-15 四川长虹电器股份有限公司 Barcode scanning login method based on wechat public number band ginseng Quick Response Code

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007280296A (en) * 2006-04-11 2007-10-25 Shoki Kk Information management apparatus and method, and computer program
CN105639888A (en) * 2014-11-26 2016-06-08 谭奇 Anti-lost two-dimensional code chest badge
CN105577749A (en) * 2015-12-07 2016-05-11 广东省心血管病研究所 An anti-lost method and system based on two-dimension codes
CN206480008U (en) * 2016-06-17 2017-09-08 赵凯泽 A kind of intelligent contact calling system based on Quick Response Code
CN106650869A (en) * 2016-10-18 2017-05-10 重庆文理学院 Information hiding method based on two-dimensional code
CN106530178A (en) * 2016-11-03 2017-03-22 福建任我行科技发展有限公司 Two-dimensional-code-technology-based system for identifying and localizing lost people
CN206672518U (en) * 2017-03-17 2017-11-24 无锡市第二人民医院 A kind of anti-patient of clinical care, which wanders away, uses paster
CN206863920U (en) * 2017-07-11 2018-01-09 象山兑鹏电子科技有限公司 Old man's bracelet

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
易走失人口管理系统设计;刘磊;《计算机时代》;20170415(第04期);第56-59页 *
老年性痴呆患者的家庭护理;李苏娜;《中外医学研究》;20111205;第34卷(第9期);第111-112页 *

Also Published As

Publication number Publication date
CN108491902A (en) 2018-09-04
CN112329899A (en) 2021-02-05
CN108491902B (en) 2020-11-24

Similar Documents

Publication Publication Date Title
CN112185582A (en) Infectious disease prevention and control method and system based on active reporting data
CN109584130A (en) Wisdom prohibition of drug socialized service system system
CN111090718B (en) Portrait identification method based on track tracking
CN114783553A (en) Rework epidemic prevention passing system and method by combining health code data with temperature measuring equipment
CN107507118A (en) A kind of three-dimensional safety of person vehicle prevention and control system
CN112002431A (en) Method and system for discovering close contacts of specific user by utilizing electromagnetic signals
CN112566036B (en) Epidemic disease close contact person tracking method based on low-power wide area network and block chain
CN111612664A (en) Big data-based smart campus platform
CN112669988A (en) Fine particle tight-joint detection method and system and interactive access management system
CN110929822A (en) Campus safety management system based on Internet of things
CN112329899B (en) Efficient and accurate anti-lost positioning method
Rudolph-Cleff et al. Crisis communication in a blackout scenario-An assessment considering socio-spatial parameters and the vulnerabilities of the population
CN114157837A (en) Safe attendance linked system based on video monitoring cloud platform
WO2020037929A1 (en) Method and device for community management and electronic apparatus
CN110070233A (en) A kind of emergency data processing method and its system
WO2018232887A1 (en) Mobile person information acquisition feedback method, server, and system
CN113161003B (en) System and method for tracking and registering activity track and contact of infectious disease patient
CN2796257Y (en) Campus network managing system
KR20200104047A (en) Vending machine for distributing mask for blocking fine dust
Renda COVID-19 and privacy: A European dilemma
US20230386679A1 (en) Integrated management method for preventing spread of contagious diseases
CN108537708A (en) A kind of Community Safety information management platform
CN111372197B (en) Early warning method and related device
CN113011746A (en) Early warning system for airborne disease high-risk place based on digital portrait
KR102502852B1 (en) Infectious disease prevention system that minimizes personal information exposure using AI analysis of big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant