CN114124501A - Data processing method, electronic device and computer storage medium - Google Patents

Data processing method, electronic device and computer storage medium Download PDF

Info

Publication number
CN114124501A
CN114124501A CN202111349786.4A CN202111349786A CN114124501A CN 114124501 A CN114124501 A CN 114124501A CN 202111349786 A CN202111349786 A CN 202111349786A CN 114124501 A CN114124501 A CN 114124501A
Authority
CN
China
Prior art keywords
information
terminal
user
message
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111349786.4A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Time North South Network Technology Consulting Center
Original Assignee
Wuhan Time North South Network Technology Consulting Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Time North South Network Technology Consulting Center filed Critical Wuhan Time North South Network Technology Consulting Center
Priority to CN202111349786.4A priority Critical patent/CN114124501A/en
Publication of CN114124501A publication Critical patent/CN114124501A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/10Alarms for ensuring the safety of persons responsive to calamitous events, e.g. tornados or earthquakes
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Emergency Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Environmental & Geological Engineering (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Geology (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application discloses a data processing method, terminal equipment and a computer storage medium. One embodiment of the method comprises: receiving a first message sent by a first terminal, wherein the first message comprises a first information set, the first information set comprises first user information of at least one user, and the first user information comprises identity information and at least one piece of position information; for each position in the first information set, determining at least one second terminal, wherein the second terminal is within a certain range of the position; acquiring a second information set, wherein the second information set at least comprises identity information of at least one user corresponding to the position in the first information set and position information of the position; and generating a second message, and sending the second message to the second terminal, wherein the second message comprises the second information set. According to the embodiment, the user information is stored in the nearby user terminal, so that after an earthquake occurs, even if the user is trapped, the rescue commander can obtain the user information from the terminals of other users, and the rescue efficiency is improved.

Description

Data processing method, electronic device and computer storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a data processing method, an electronic device, and a computer storage medium.
Background
The statements herein merely provide background information related to the present disclosure and may not necessarily constitute prior art.
The data of the trapped people has important significance for earthquake rescue, and the rescue efficiency can be greatly improved.
Patent application CN113420054A proposes collecting and distributing data before, during and after an earthquake to assist rescue command work, where collecting data during an earthquake requires reliance on an earthquake early warning system. However, the earthquake early warning system has a blind area, and the blind area is the area which is damaged most by the earthquake. In addition, communication congestion may occur when an earthquake occurs while communicating with a large number of terminal apparatuses. A
Data is collected before earthquake, and the data storage has a big problem. If only a small number of servers are deployed, rescue workers in the earthquake area may not obtain the data in time after the earthquake; if the deployment is large, a lot of resources are consumed, and there may be a problem in data security.
Disclosure of Invention
This disclosure is provided to introduce concepts in a simplified form that are further described below in the detailed description. This disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The embodiment of the application provides a data processing method, terminal equipment and a computer storage medium.
In a first aspect, an embodiment of the present application provides a data processing method, where the method is applied to a server, and the method includes: receiving a first message sent by a first terminal, wherein the first message comprises a first information set, the first information set comprises first user information of at least one user, and the first user information comprises identity information and at least one piece of position information; for each position in the first information set, determining at least one second terminal, wherein the second terminal is within a certain range of the position; acquiring a second information set, wherein the second information set at least comprises identity information of at least one user corresponding to the position in the first information set and position information of the position; and generating a second message, and sending the second message to the second terminal, wherein the second message comprises the second information set.
In a second aspect, an embodiment of the present application provides a data processing method, where the method includes: a first terminal sends a first message to a server, wherein the first message comprises a first information set, the first information set comprises first user information of at least one user, and the first user information comprises identity information and at least one piece of position information; a second terminal receives a second message sent by a server, wherein the second message comprises a second information set, the second terminal is located in a certain position range in the first information set, and the second information set at least comprises identity information of at least one user corresponding to the position in the first information set and position information of the position; the second terminal saves the second information set; and the second terminal outputs all or part of a third information set after an earthquake occurs, wherein the third information set is all or part of the second information set stored by the second terminal.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory storing processor-executable instructions that, when executed by the processor, implement the method of any of the first or second aspects.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method according to any one of the first aspect or the second aspect.
The embodiment of the disclosure stores the user information into the nearby user terminal, so that after an earthquake occurs, even if the user is trapped, rescue directing personnel can obtain the user information from the terminals of other users, thereby improving the rescue efficiency.
Drawings
FIG. 1 is an exemplary system architecture diagram in which one or more embodiments of the present disclosure may be applied.
Fig. 2 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
Fig. 3 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
Fig. 4 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
Fig. 5 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 6 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
Fig. 7 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 8 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 9 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 10 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 11 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 12 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 13 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 14 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 15 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 16 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 17 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 18 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 19 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
FIG. 20 is an exemplary flow diagram of a data processing method according to one or more embodiments of the present application.
Fig. 21 is an exemplary block diagram of a terminal device according to one or more embodiments of the present application.
FIG. 22 is an exemplary block diagram of a server in accordance with one or more embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. While certain embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present application. It should be understood that the drawings and examples are for illustrative purposes only and are not intended to limit the scope of the present application.
The various steps recited in method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. The sequence numbers of the operations, e.g., 101, 102, etc., are used merely to distinguish between the various operations, and do not represent any order of execution per se. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules, or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules, or units.
The modifications referred to in this disclosure as "a", "an", and "the" are illustrative and not restrictive, and it will be understood by those skilled in the art that "one or more" may be used unless the context clearly dictates otherwise.
Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, system, article, or apparatus.
Fig. 1 illustrates an example system architecture 100 to which one or more embodiments of a method for data processing or an apparatus for data processing of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include a terminal device 1000, a server 2000, and a network 3000. The network 3000 serves as a medium for providing a communication link between the terminal device 1000 and the server 2000. Network 3000 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few. Network 3000 may be a wide area network to communicatively connect terminal device 1000 with remote server 2000; or a local area network, so that a plurality of terminal apparatuses 1000 in one area can communicate with each other.
The user can use the terminal device 1000 to interact with the server 2000 through the network 3000 to receive or transmit data (e.g., user's identity information, frequently detained locations, etc.), and the like. The terminal device 1000 may be installed with various communication client applications, such as learning software, video playing software, news information applications, image processing applications, web browser applications, shopping applications, search applications, instant messaging tools, mailbox clients, social platform software, and the like.
The terminal device 1000 may be hardware or software. When the terminal device 1000 is hardware, it may be various terminal devices, including but not limited to a smart phone, a tablet computer, a notebook computer, a Digital broadcast receiver, a Personal Digital Assistant (PDA), a wearable device, a vehicle-mounted terminal device (e.g., a car navigation terminal device), an MP3 Player (Moving Picture Experts Group Audio Layer iii, motion Picture Experts compression standard Audio Layer 3), an MP4(Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4) Player, a Digital Television (TV), a Portable Multimedia Player (PMP), a laptop Portable computer, a desktop computer, or the like. When the terminal device 1000 is software, it can be installed in the above-listed terminal devices. It may be implemented as a plurality of software or software modules (e.g. software or software modules for providing distributed services) or as a single software or software module (e.g. software with data processing capabilities). And is not particularly limited herein.
The server 2000 may be a server providing various services, such as a background server for transmitting information set by the user to other users nearby. As an example, the server 105 may be a cloud server.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster composed of a plurality of servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., software or software modules for providing distributed services) or as a single piece of software or software module. And is not particularly limited herein.
It should be further noted that, the data processing method provided by the embodiment of the present disclosure is executed by the server and the terminal device in cooperation with each other, and some parts (for example, each unit, sub-unit, module, and sub-module) may be provided in the server or in the terminal device.
In some embodiments of the present disclosure, the terminal device 1000 includes at least one first terminal 1100 and at least one second terminal 1200. The first terminal 1100 is configured to acquire setting information of a first user and send the setting information to a server. The second terminal 1200 is used to receive the setting information of the first user from the server.
In some embodiments of the present disclosure, terminal apparatus 1000 further includes at least one third terminal 1300. The server encrypts the setting information of the first user after receiving the setting information, and the terminal device 1300 is configured to receive a decryption key from the server, so that the second terminal 1200 and the third terminal 1300 can cooperate with each other to decrypt the encrypted information according to the decryption key after an earthquake occurs.
In some embodiments of the present disclosure, terminal apparatus 1000 further includes at least one fourth terminal 1400. The server encrypts the setting information, encrypts the decryption key by using the second encryption key, and sends the second decryption key corresponding to the second encryption key to the fourth terminal 1400, so that the second terminal 1200, the third terminal 1300, and the fourth terminal 1400 can cooperate with each other after an earthquake occurs, and the encrypted information is decrypted according to the decryption key.
The first terminal 1100, the second terminal 1200, the third terminal 1300, and the fourth terminal 1400 are only logical partitions according to functions implemented in the data processing method provided by the present disclosure, and one actual terminal device may be any one of them, or may be multiple ones of them at the same time. For example, a mobile phone of one user may receive a setting instruction of the user and become the first terminal 1100; it is also possible to receive setting information of other users from the server at the same time, to become the second terminal 1200, and so on.
In some optional embodiments, the system architecture 100 further includes a seismic early warning system (not shown in the figure) for sending a seismic early warning message to the server, and the server sends the seismic early warning message to user terminals of a seismic area (in some optional embodiments, the seismic area refers to an area where the seismic intensity is greater than a preset intensity threshold), so that the user terminals output user information received by the user terminals after the earthquake, such as to a terminal device of a rescue commander through a communication component, or display the user information.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for an implementation. When the terminal device on which the data processing method operates does not need to perform data transmission with other terminal devices, the system architecture may include only the terminal device (e.g., terminal device) on which the data processing method operates.
Fig. 2 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 2, the method includes the following steps.
Step 201, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one piece of location information.
The first terminal may display an information setting interface in response to a setting instruction of the user (for example, a setting button is provided on the interface, and the user triggers the setting instruction by clicking the button), and obtain the first user information set. The user can only set own first user information and can also help other people to set the first user information of the user, such as direct relatives, students, patients, employees and the like. The first user information includes identity information and at least one location information.
The identity information may include at least one of user identification, name, age, gender, identification number, telephone number, occupation, and the like. The user identification can indicate a unique user identity. For example, the target user identifier is a mobile phone number of the user, an identity card number, a user account allocated by the server after the user is registered, and the like, which is not limited herein.
The location may be a location where the user is frequently detained, or a real-time location acquired by the first terminal, or the like. And the positions where the user often stays, such as the user residence address, the work address, the learning address and the like. The location information may be one or more of latitude and longitude coordinates, address names, and the like.
In some optional embodiments, each location in the location information may further include information of a time duration that the user is at the location, such as a respective time period that the user is at the location within a time period (e.g., the last month), a cumulative time duration, a number of times of the respective time period, and the like. When the position information includes corresponding time information, the position where the user may be located at the time of the earthquake can be estimated according to the earthquake occurrence time after the earthquake occurs.
In some optional embodiments, the first terminal may automatically acquire the first user information, generate a first message, and send the first message to the server. For example, the first terminal may automatically acquire a real-time location according to a predetermined rule and send the real-time location to the server together with the user identifier, so that the server may count the behavior rule of the user, thereby predicting the location where the user may appear after an earthquake occurs.
In some optional embodiments, each position in the position information may further include position description information, where the position description information may be information described in a form of text, voice, image, video, drawing, and the like of the corresponding position, and describes information such as a specific building structure, an indoor layout, furniture furnishings, an access passage, and the like corresponding to the position information.
In some optional embodiments, the first user information further comprises health information, and the health information may comprise at least one of a medical history, a blood type, an allergy condition, and the like.
In some optional embodiments, the first user information further includes relationship information, the relationship information may include a relationship type with a plurality of other users and/or a relationship object identity, the relationship type may be an emergency contact, an immediate relatives, a guardian and a person under guardianship, a teacher and a student, a colleague, a doctor and a patient, and the relationship object identity may be at least one of a user identifier, a name, an identification number, and the like of a corresponding object.
In some optional embodiments, the first user information further includes an earthquake emergency plan, such as whether to escape outwards or hide nearby, hide a location, store a food water source, and the like, at different earthquake magnitudes. Thereby helping the rescuer to estimate the location of possible traps, etc. when an earthquake occurs.
For example, the user a may set its own identity information, as well as a work address, a residential address 1 (home residence); identity information is set for its immediate relative B, as well as a learning address, a living address 1 (home residence), a living address 2 (e.g. school dormitory). Further, it is also possible to set the residence time of the immediate relative B at two locations, such as the residence address 2 on weekdays and the residence address 1 on weekends, and to set the data of the building structure, the indoor layout, and the like at two locations.
And after the first terminal acquires the first information set, generating a first message and sending the first message to the server, wherein the server receives the first message sent by the first terminal.
Step 202, for each position in the first information set, at least one second terminal is determined, and the second terminal is located in a certain range of the position.
The server may establish a correspondence between the user and the location according to the user identity information and the location information in the first message sent by the plurality of first terminals. Of course, the correspondence between the user and the location may be determined by other methods, such as being obtained from government departments such as civil administration, public security, and the like.
For each location in the first information set, the server may determine, from the correspondence between the user and the location, a terminal of a user whose at least one location is within a certain range of the location in the correspondence between the user and the location as the second terminal. The certain range of the position may be a range covered by all positions at a certain distance (e.g. 1 km) from the position; or the area where the position is located, the area being divided in advance based on administrative administration data (for example, a range governed by each street office or village committee is regarded as one area), base station coverage data (for example, a range covered by terminals connected to the same base station is regarded as one area), map data (for example, a rectangular range with a length of one kilometer is regarded as one area), and the like.
In some alternative embodiments, multiple second terminals may be determined for each location. The number of second terminals may be preset by the technician, such as set to 5; the setting control can also be set by the user, for example, the user sets in advance through the setting function of the first terminal, or the setting control for the number of the second terminals is provided when the first terminal displays the information setting interface.
In some optional embodiments, the server stores a corresponding relationship between the user/terminal and the received information/the number of users/the storage space occupied by the information, so that when determining the second terminal, the terminal that has received the user information of many users (for example, a certain number of users, or the storage space occupied by the user reaches a certain value, etc.) is not used as the second terminal.
In some alternative embodiments, the second terminal is a terminal of a user having a user information management authority, such as a member of various government offices such as villages, towns, streets and the like, or a representative selected by a group, and the like.
Step 203, obtaining a second information set, where the second information set at least includes identity information of at least one user corresponding to the location in the first information set, and location information of the location.
In some optional embodiments, the first set of information is taken as the second set of information.
In some other optional embodiments, all or part of the information corresponding to the position is extracted from the first information set as the second information set. For example, the first information set includes identity information and location information of a user a and a user B, the user a corresponds to an address 1 and an address 2, the user B corresponds to an address 1 and an address 3, and the server processes the address, the address 2, and the address 3 in sequence. When processing the address 1, the identity information and the address 1 of the user a may be used as the second information set, and the identity information and the address 1 of the user B may be used as another second information set; or the identity information of user a, the identity information of user B and address 1 as said second set of information, and so on.
Step 204, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
And after obtaining the second information set, the server generates a second message comprising the second information set and sends the second message to the second terminal.
In some optional embodiments, for each location in the first set of information, a plurality of the second sets of information may be obtained, and the server may send them to different ones of the second terminals.
In some optional embodiments, the first information set includes a plurality of locations, for example, one user corresponds to a plurality of locations, or a plurality of users corresponds to a plurality of locations; and the server sequentially processes the positions, respectively determines the corresponding second terminal and the second information set, and sends a second message containing the second information set to the second terminal.
In some optional embodiments, after receiving the second message, the second terminal stores the second information set, but does not provide a viewing portal, so that the user cannot view the received information; after the earthquake occurs, a viewing entrance is provided, and/or an information abstract (such as the number of users, the position distribution, the user name list and the like contained in the collected information) is displayed.
In some optional embodiments, after receiving the second message, the second terminal encrypts and stores the second information set; and after the earthquake happens, decrypting.
In some alternative embodiments, the information contained in the second set of information is already subjected to decryption, decryption methods such as encryption, information splitting, and the like.
In the embodiment of the disclosure, the server obtains the user information from the first terminal and sends the user information to the second terminal nearby, so that the information of one user is stored in the terminal equipment of other users. After an earthquake occurs, even if the user is trapped, only other user information receiving the user needs to be trapped or rescued, the rescuers can know that the user is possibly trapped in the area through the corresponding second terminal, and can determine more specific situations such as the possibly trapped position according to the position, an earthquake emergency plan and the like, so that the rescue efficiency is improved.
Fig. 3 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 3, the method includes the following steps.
Step 211, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one piece of location information.
Step 212, for each location in the first set of information, at least one second terminal is determined, the second terminal being within a certain range of the location.
Step 213, obtaining a second information set, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set and the location information of the location, and information included in the second information set is encrypted by an encryption key.
In some optional embodiments, after obtaining the information corresponding to the location from the first information set, the server encrypts the information using an encryption key to obtain the second information set.
In some optional embodiments, the first terminal has encrypted the information in the first set of information with the encryption key before sending the first message. For example, the information in the first set of information is in the form of: { address 1: encryption information 1, address 2: encryption information 2, … }; and after receiving the first message, the server takes the encrypted information corresponding to each position as the second information set.
The encryption algorithm is mainly divided into symmetric encryption and asymmetric encryption. In a symmetric encryption algorithm, the encryption key and the decryption key are the same, and in an asymmetric encryption algorithm, the encryption key and the decryption key are different. The disclosed embodiments do not limit the kind of encryption algorithm, and other types of encryption algorithms besides symmetric encryption and asymmetric encryption algorithms may also be employed.
In some optional embodiments, the server pre-divides a service area (e.g., a country) into a plurality of areas, e.g., according to administrative data (e.g., a range governed by each street office or village committee is taken as an area), base station coverage data (e.g., a range covered by a terminal connected to the same base station is taken as an area), map data (e.g., a rectangular range with a length of one kilometer is taken as an area), and the like; generating one or more encryption/decryption keys (encryption key and decryption key) for each area; when encryption is required, a corresponding area is determined according to the position, and an encryption/decryption key corresponding to the area is selected (when the number of the areas is multiple, one encryption/decryption key can be selected from the multiple encryption/decryption keys in a random mode or the like) to encrypt information.
In some optional embodiments, each user has one or more encryption and decryption keys, and the server selects the encryption and decryption key of the user corresponding to the first terminal or the second terminal to encrypt the information. The encryption/decryption key may be generated by the server or the user terminal, and transmitted to the user terminal/server at an appropriate time (e.g., when the app is first run, after user registration, before and after information transmission, after an earthquake occurs, etc.). For example, the first terminal generates a public key and a private key pair, then sends the public key to the server, and sends the information to the server after encrypting the information by using the private key before sending the first message each time; or the first terminal generates a public key and a private key pair, before sending the first message each time, the first terminal sends the first message to the server after encrypting the first message by using the private key, after an earthquake occurs (such as after receiving earthquake early warning information), the public key is sent to the server, and then the server sends the public key to the corresponding second terminal. For another example, the server generates an encryption/decryption key for each user, and each time a second message is sent to the second terminal, the second message is encrypted by using the encryption key corresponding to the second terminal and sent to the second terminal, and then the server sends the decryption key to the second terminal after an earthquake occurs (or may send the second message at another time).
In some alternative embodiments, the encryption and decryption keys for each message are different. For example, the encryption and decryption keys of each first message are different, but the encryption and decryption keys of the corresponding plurality of second messages are the same; alternatively, the encryption and decryption keys of each second message are different. The server may generate the encryption and decryption keys each time a first message is received or a second message is sent.
In some alternative embodiments, information is encrypted using multiple encryption keys, such as encrypting the result of one encryption key using the next encryption key, and so on.
Step 214, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
Step 215, generating a third message, and sending the third message to at least one third terminal, where the third terminal is located within the certain range of the location, and the third message includes a decryption key corresponding to the encryption key or a mapping of the decryption key.
The embodiment of the disclosure further includes generating a third message, sending the third message to at least one third terminal, where the third terminal is located in a certain range of the location, the third message includes a decryption key corresponding to the encryption key or a mapping of the decryption key, so that the second terminal can cooperate with the third terminal after an earthquake occurs (for example, the second terminal sends a second set of information to the third terminal, and the third terminal decrypts the information by using the decryption key, or the third terminal sends the decryption key to the second terminal and decrypts the information by using the decryption key, or the second terminal and the third terminal send the received information to another terminal, such as a terminal of a rescue commander, and decrypts the information by using the terminal, etc.), and decrypting the encrypted second information set so as to enable the rescuers to obtain the personnel contained in one area, wherein each person can be trapped in the position and the like.
It is to be understood that the range for determining the third terminal may be the same as or different from the range for determining the second terminal, and is not limited herein.
In some optional embodiments, the decryption key is transformed to obtain a mapping of the decryption key corresponding to the decryption key one to one, and the third message includes the mapping of the decryption key. For example, the decryption key is encrypted by using a second encryption key of the third terminal, and the third terminal, after receiving the mapping of the decryption key, decrypts the data by using a second decryption key corresponding to the second encryption key (may decrypt the data after the earthquake). Of course, other mapping methods may be used.
In some optional embodiments, the third terminal and the second terminal belong to different users, and/or the user to which the third terminal belongs is not a friend of the address list of the user to which the second terminal belongs. Thereby reducing the likelihood that the second terminal cooperates with the user of the third terminal to decrypt the privacy of other users when no earthquake occurs.
In some alternative embodiments, the third terminal is a terminal of a user having the location key management authority, such as a staff of various levels of government such as village, town, street, or the like, or a representative selected by a group, and the like.
In some optional embodiments, said sending said third message to at least one third terminal is performed to a terminal of the seismic area after the occurrence of the earthquake. For example, the server transmits a message including the decryption key to a third terminal of the earthquake area after receiving the earthquake early warning message from the earthquake early warning system.
In some optional embodiments, the sending of the third message to the at least one third terminal is performed when no earthquake occurs. If the second message is sent, continuing to send a third message; or after the second message is sent, a third message is sent at an interval to prevent the information from being intercepted, so that the privacy of the user is leaked.
In some alternative embodiments, the information is encrypted using a plurality of encryption keys, and a decryption key corresponding to each encryption key may be transmitted to the at least one third terminal.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 2, and are not described again here.
In the embodiment of the disclosure, the server sends the encrypted user information to other nearby users, so that the second terminal receiving the user information cannot decrypt the information, and the privacy of the user is protected; after an earthquake occurs, the second terminal and the third terminal can be matched with each other or matched with rescue command personnel to decrypt data, so that the rescue command personnel can quickly and accurately know the local personnel conditions, and the rescue efficiency is improved.
Fig. 4 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 4, the method includes the following steps.
Step 221, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one piece of location information.
Step 222, for each position in the first information set, at least one second terminal is determined, and the second terminal is located in a certain range of the position.
Step 223, obtaining a second information set, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set and the location information of the location, and information included in the second information set is encrypted by an encryption key.
Step 224, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
Step 225, encrypting a decryption key corresponding to the encryption key by using at least one second encryption key to obtain a mapping of the decryption key, generating a third message, and sending the third message to at least one third terminal, where the third terminal is within the certain range of the location, and the third message includes the mapping of the decryption key.
Step 226, sending the second decryption key corresponding to each second encryption key to at least one fourth terminal, where the fourth terminal is located in the certain range of the location.
In some embodiments of the disclosure, at least one second encryption key is used to encrypt decryption keys corresponding to the encryption keys to obtain mappings of the decryption keys, and the second decryption key corresponding to each second encryption key is sent to at least one fourth terminal, so that the decryption key can be obtained only when at least one third terminal is matched with at least one fourth terminal, and decryption of one user information can be completed only when at least one second terminal, at least one third terminal and at least one fourth terminal are matched, thereby improving difficulty of illegal decryption of user privacy of a user, and increasing security of the user information.
In some implementations of embodiments of the present disclosure, the decryption key may be encrypted using a plurality of second encryption keys. For example, the decryption key may be successively encrypted using a plurality of second encryption keys, or encrypted using a method of sharing a symmetric key, or the like.
Some alternative ways may also be selected in the embodiments of the present disclosure, for example, the second encryption key and the second decryption key are generated by the user terminal and sent to the server; and when the server needs the second encryption key, the server selects the corresponding second encryption key again, so that the corresponding second decryption key does not need to be sent to the fourth terminal.
In some alternative embodiments, a single secret key is sent to multiple third or fourth terminals simultaneously, so that even if some users are trapped or some users are not in the area during an earthquake, decryption cannot be completed due to the lack of information.
After an earthquake occurs, users can cooperate with each other to complete decryption of information, for example, one party obtains user information or a decryption key and a second decryption key from terminals of other users to complete decryption of information; or, after completing the processing of the terminal, one terminal sends the processing result to the next terminal, for example, a decryption key, which is continuously encrypted by the respective second encryption keys of the user a, the user B, and the user C, when decrypting, the second terminal sends the received mapping of the decryption key to the terminal of the user C, and the terminal of the user C decrypts and then sends the decrypted mapping to the terminal of the user B, and so on.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 2 or fig. 3, and are not described again here.
The embodiment of the disclosure increases the security of the user information by re-encrypting the decryption key.
Fig. 5 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 5, the method includes the following steps.
Step 231, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one piece of location information.
Step 232, for each location in the first information set, determining at least one second terminal, where the second terminal is within a certain range of the location.
Step 233, obtaining a second information set, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set and the location information of the location, and the information included in the second information set is processed by decryption, where the decryption makes the corresponding original information in a confidential state when no earthquake occurs, and after an earthquake occurs, multiple terminals in a certain range of the location can cooperate with each other according to the obtained information to restore the original information.
Step 234, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
In some alternative implementations, the decryption process may be an encryption process in the embodiment shown in fig. 3 or fig. 4.
In some optional embodiments, the decryption process is a splitting process, where the splitting process splits each piece of information into a plurality of parts, and/or splits a plurality of pieces of associated information into a plurality of parts, and the server sends each part to a different second terminal. For example, the name, the telephone, the identification number and the like are divided into a plurality of parts, for example, each character of the name is divided into one part, the telephone number or the identification number is divided into a plurality of parts, and each part is respectively sent to a second terminal; alternatively, the associated information is divided into a plurality of parts, such as the name and the location are divided into two parts, each of which is sent to a second terminal. For another example, the information (which may be information that has been subjected to packetization, compression, encryption, etc.) is treated as a byte stream, and the byte stream is divided into multiple parts. In addition, after the splitting, the second information set also comprises information identifications corresponding to each part, so that different parts of one piece of information can be recombined according to the information identifications.
Of course, other decryption methods may be used, such as combining the splitting and encryption, or converting each message into its map, etc.
After an earthquake occurs, a plurality of terminals in a certain range of the position can cooperate with each other according to the acquired information to restore the original information. For example, in the embodiment shown in fig. 3 or fig. 4, the third terminal that obtains the decryption key or the second terminal that obtains the encrypted information sends the obtained information to the other party, and the other party completes decryption to obtain the original information; or the third terminal obtaining the decryption key and the second terminal obtaining the encrypted information send the obtained information to the terminal of the rescue commander, and the terminal of the rescue commander completes decryption. For another example, a plurality of second terminals that obtain different parts of one message send the message to a certain terminal, and the terminal restores the plurality of parts to obtain the original message.
The original information refers to personal information of at least one user corresponding to the position in the first information set and position information of the position. And after the decryption processing is carried out on the original information, a second information set is obtained.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 2, and are not described again here.
In the embodiment of the disclosure, the server desensitizes the user information and then sends the desensitized user information to nearby users, and after an earthquake occurs, a plurality of terminals receiving the information can cooperate with each other to restore the information, so that not only can rescue workers know the situation of trapped people, but also the privacy of the users can be protected when the earthquake does not occur.
Fig. 6 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 6, the method includes the following steps.
Step 241, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one piece of location information.
Step 242, for each location in the first information set, determining at least one second terminal, where the second terminal is within a certain range of the location.
Step 243, obtaining a second information set, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set and the location information of the location, and information included in the second information set is decrypted, and the decrypted information makes the corresponding original information in a confidential state when no earthquake occurs.
Step 244, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
Step 245, after an earthquake occurs, sending a third message to at least one third terminal within a certain range of the position, so that the second terminal and the third terminal can cooperate with each other according to the obtained information to restore the original information, wherein the third terminal is within the certain range of the position.
The decryption process may be performed in accordance with the embodiment shown in fig. 5.
In some optional embodiments, the decryption process is an encryption process, and after an earthquake occurs, the server sends a third message to at least one third terminal within a certain range of the position, and the third message includes all or part of decryption keys within the certain range of the position, so that the third terminal can obtain the second information set from other second terminals nearby and complete decryption of the encrypted information.
In some optional embodiments, the third terminal is the second terminal, and the server sends a third message to the second terminal after the earthquake occurs, where the third message includes a decryption key of the encrypted information received by the second terminal, so that the second terminal can complete decryption of the encrypted information.
In some optional embodiments, the third message includes seismic information, so that the third terminal enters a post-seismic processing flow, such as receiving information from a nearby terminal (e.g., a plurality of second terminals that receive different portions of information, or terminals that receive encrypted information and a decryption key, etc.), completing decryption of the information, and displaying the decrypted information.
Other manners may also be adopted to enable the second terminal and the third terminal to cooperate with each other according to the respective obtained information to restore the original information, which is not limited herein.
Some steps in the embodiments of the present disclosure are substantially the same as corresponding steps in the embodiments shown in fig. 2, fig. 3, fig. 4, or fig. 5, and are not described again here.
In the embodiment of the disclosure, the server desensitizes the user information and sends the desensitized user information to nearby users, and after an earthquake occurs, the server sends a message to the earthquake region terminal, so that a plurality of terminals receiving the information can cooperate with each other to restore the information, thereby enabling rescue workers to know the condition of trapped people and keeping the user information in a confidential state all the time when the earthquake does not occur.
Fig. 7 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 7, the method includes the following steps.
Step 251, a first message sent by a first terminal is received, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one piece of location information.
Step 252, for each location in the first set of information, at least one second terminal is determined, the second terminal being within a certain range of the location.
Step 253, obtaining a second information set, where the second information set at least includes personal information of at least one user corresponding to the location in the first information set, and location information of the location.
Step 254, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
And 255, receiving the decryption record sent by the terminal, and judging whether the decryption record belongs to illegal decryption.
The terminal can record the decryption record after decrypting each time, and sends the decryption record to the server after establishing communication connection with the server, and the server judges whether illegal decryption occurs according to the decryption record.
The terminal generally decrypts the data after the earthquake occurs (e.g., decrypts the decrypted information, or displays the information that is not displayed, or sends the received information to other terminals, etc.).
In some alternative embodiments, the server may transmit the seismic information to the terminal of the seismic area after the earthquake occurs, so that the terminal confirms that the earthquake has occurred.
In some alternative embodiments, the server has no time to send seismic information to terminals in the seismic area, such as terminals in seismic blind areas; the users in the earthquake area can make the terminal confirm the earthquake by the voting function of the terminal, for example, if more than a certain number of users in an area send an instruction for confirming the earthquake (in the case of the damaged communication facility, a local area network can be constructed by a wifi hot spot or the like, and the number of users sending the instruction for confirming the earthquake is counted), or if the number of users in the area exceeds a certain proportion of the total number of users in the area, the earthquake is confirmed.
In some optional embodiments, the terminal may confirm the earthquake occurrence after the user having the authority to confirm the occurrence of the earthquake confirms the occurrence of the earthquake. And users having the authority to confirm the occurrence of the earthquake, such as government staff like committee staff. After the terminal of the user with the authority of confirming the earthquake confirms that the earthquake occurs, the terminal can send a message to other terminals, so that the other terminals also confirm that the earthquake occurs and enter a processing flow after the earthquake occurs.
When the user confirms whether the earthquake occurs or not, violation behaviors may occur, for example, when the earthquake does not occur, the user makes the terminal confirm that the earthquake occurs, so that the received user information is decrypted in a violation manner.
In some embodiments, the server may determine, based on the seismic data and the decrypted record, whether each decryption was performed within a period of time after the earthquake occurred (e.g., within 1 day after the earthquake occurred and the earthquake intensity is above a threshold), and if not, may determine that the decryption was violated.
Step 256, notifying an operator when illegal decryption occurs; and/or notifying a user corresponding to the decrypted information; and/or sending a delete information instruction to the terminal to enable the terminal to delete information; and/or adding a user corresponding to the terminal into a blacklist, so that new second information is not sent to the user any more; and/or post the violation.
When illegal decryption occurs, predetermined operation can be performed on the illegal decryption user, such as notifying an operator, and processing by the operator, such as punishing and the like; and/or notifying a user corresponding to the decrypted information; and/or sending a delete information instruction to the terminal to enable the terminal to delete information; and/or adding a user corresponding to the terminal into a blacklist, so that new second information is not sent to the user any more; and/or post the violation, such as displaying a list of violations on the app's home page, etc.
Some steps in the embodiments of the present disclosure are substantially the same as corresponding steps in the embodiments shown in fig. 2, fig. 3, fig. 4, fig. 5, or fig. 6, and are not repeated here. Some steps in the embodiments shown in fig. 3, fig. 4, fig. 5, or fig. 6 may also be optionally included in the embodiments of the present disclosure, which are not described herein again.
In the embodiment of the disclosure, after the information is sent to the nearby terminal, the decryption record of the received information is monitored by the terminal, and if illegal decryption occurs, predetermined operation is performed, so that the user dares not to easily perform illegal decryption, and the privacy of the user is protected.
Fig. 8 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 8, the method includes the following steps.
Step 261, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one piece of location information.
Step 262, for each location in the first set of information, at least one second terminal is determined, the second terminal being within a certain range of the location.
Step 263, obtaining a second information set, where the second information set at least includes personal information of at least one user corresponding to the location in the first information set, and location information of the location.
Step 264, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
And 265, after the earthquake rescue is finished, indicating all or part of the terminal of the earthquake area receiving the user information of the nearby user to delete the received information of the earthquake area.
After the earthquake rescue is finished, the server instructs all or part of the terminals of the earthquake area, which receive the user information of the nearby users, to delete the received information of the earthquake area. The server can enable the terminal to delete the information by sending a deletion instruction to the corresponding terminal.
The terminal receiving the user information of the nearby user can be a second terminal, a third terminal and/or a fourth terminal in an earthquake area, and/or other terminals receiving the user information from the second terminal, such as a terminal of a rescue commander.
In some optional embodiments, the earthquake rescue is finished after a preset time of the earthquake, and the preset time may be a preset value according to the earthquake intensity, for example, for a high intensity, the earthquake rescue is regarded as finished 7 days after the earthquake occurs.
In some alternative embodiments, the end of earthquake rescue is determined by the server by the technician sending an instruction to the server to end the earthquake rescue. Such as a technician may determine from a rescue command whether the earthquake rescue is complete.
Of course, other methods may also be employed. For example, some terminals (such as terminals of ordinary users) may be instructed to delete information before the earthquake rescue is finished, and other terminals (such as terminals of rescue commanders) may be instructed to delete information after the earthquake rescue is finished.
In some alternative embodiments, the server may transmit the user information received from the first terminal in the corresponding area to other terminals nearby again by using the above method.
Some steps in the embodiments of the present disclosure are substantially the same as corresponding steps in the embodiments shown in fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, or fig. 7, and are not repeated here. Some steps in the embodiments shown in fig. 3, fig. 4, fig. 5, fig. 6, or fig. 7 may also be optionally included in the embodiments of the present disclosure, and are not described herein again.
In the embodiment of the disclosure, after the earthquake rescue is finished, the terminal in the earthquake area deletes the decrypted user information, so that the user information can be prevented from being leaked after the earthquake.
Fig. 9 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 9, the method includes the following steps.
Step 271, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one location information.
Step 272, for each location in the first set of information, determining at least one second terminal, the second terminal being within a certain range of the location.
Step 273, obtaining a second information set, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set, and the location information of the location.
Step 274, generating a second message, and sending the second message to the second terminal, where the second message includes the second set of information.
And 275, after the earthquake occurs, sending a third message to at least one second terminal in the earthquake area, so that the second terminal outputs the received second information set.
In some optional embodiments, the information in the second information set is encrypted information, and the third information includes a decryption key of the encrypted information received by the second terminal, so that the second terminal can complete decryption of the encrypted information.
In some optional embodiments, the third message includes seismic information, so that the third terminal enters a post-seismic processing flow, such as receiving information from a nearby terminal (e.g., a plurality of second terminals that receive different portions of information, or terminals that receive encrypted information and a decryption key, etc.), completing decryption of the information, and displaying the decrypted information.
In some optional embodiments, the second terminal encrypts and stores the information after receiving the second message; the third message contains seismic information, so that the third terminal enters a processing flow after the earthquake occurs, such as decryption of data and output of the data (such as displaying the decrypted information and/or sending the decrypted information to other terminals, and the like).
In some optional embodiments, the second message includes a terminal identifier of a terminal having a right to view information (e.g., identification information such as a MAC address having a one-to-one correspondence relationship with a terminal device); after an earthquake occurs, a terminal with information checking authority can send terminal identification information to other terminals through a network (such as a local area network), a second terminal receives the terminal identification information and then matches the terminal identification received from a server, and if the terminal identification information and the terminal identification are matched, the second terminal sends the received user information to the terminal with information checking authority.
Some steps in the embodiments of the present disclosure are substantially the same as corresponding steps in the embodiments shown in fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, or fig. 8, and are not repeated here. Some steps in the embodiments shown in fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, or fig. 8 may also be optionally included in the embodiments of the present disclosure, and are not described herein again.
In the embodiment of the disclosure, the user information of the first terminal is sent to the second terminal nearby, and after an earthquake occurs, a message is sent to the second terminal, so that the second terminal outputs the received information, and then rescue workers can know the local personnel condition, and the rescue efficiency is improved.
Fig. 10 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 10, the method includes the following steps.
Step 281, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one location information.
Step 282 determines, for each location in the first set of information, at least one second terminal, the second terminal being within a certain range of the location.
Step 283, a second information set is obtained, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set, and the location information of the location.
Step 284, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
Step 285, after an earthquake occurs, sending a third message to at least one third terminal in the earthquake area, so that the third terminal obtains a second information set received by the third terminal from at least one second terminal, obtains a fourth information set, and displays the fourth information set, wherein the third terminal is located in a certain range of the position.
In some alternative embodiments, the third terminal is a terminal of a rescue commander, such as a member of various government offices such as villages, towns, streets, etc., or a representative selected by a group, etc.
In some optional embodiments, the third message includes seismic information, so that the third terminal confirms that the earthquake occurs, and enters a post-earthquake processing flow: and obtaining the received second information set from at least one second terminal to obtain a fourth information set, and displaying the fourth information set.
In some optional embodiments, the information in the second information set is encrypted information, and the third information includes a decryption key of the encrypted information received by the second terminal, so that the third terminal can complete decryption of the encrypted information after collecting information from the second terminal.
Some steps in the embodiments of the present disclosure are substantially the same as corresponding steps in the embodiments shown in fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, or fig. 8, and are not repeated here. Some steps in the embodiments shown in fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, or fig. 8 may also be optionally included in the embodiments of the present disclosure, and are not described herein again.
In the embodiment of the disclosure, the user information is sent to the second terminal nearby, and after an earthquake occurs, a message is sent to the third terminal, so that the third terminal obtains the nearby user information from the second terminal and outputs the information, and then rescue workers can know the local personnel condition, and rescue efficiency is improved.
Fig. 11 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 11, the method includes the following steps.
Step 291, receiving a first message sent by a first terminal, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes personal information and at least one location information.
Step 292, for each location in the first set of information, determining at least one second terminal, the second terminal being within a certain range of the location.
Step 293, a second information set is obtained, where the second information set at least includes the personal information of at least one user corresponding to the location in the first information set, and the location information of the location.
Step 294, generating a second message, and sending the second message to the second terminal, where the second message includes the second information set.
Step 295, sending viewing permission information to at least one third terminal, wherein the third terminal is located in a certain range of the position, and sending viewing permission verification information to the second terminal, so that after an earthquake occurs, the second terminal verifies the viewing permission of the third terminal through the verification information, and sends the received second information set to the third terminal after the verification is passed.
In some alternative embodiments, the third terminal is a terminal of a rescue commander, such as a member of various government offices such as villages, towns, streets, etc., or a representative selected by a group, etc.
In some optional embodiments, the viewing right information and the viewing right verification information are an asymmetric encrypted key pair, the viewing right information is a private key, the viewing right verification information is a public key, the second terminal may generate a random number (or other data), and the random number is encrypted by the viewing right verification information and then sent to the third terminal; the third terminal decrypts the received verification information by using the viewing authority information and then sends the verification information back to the second terminal; and the second terminal matches the received decrypted verification information with the random number, and if the verification information is matched with the random number, the verification is passed, and the received second information set is sent to the third terminal.
In some optional embodiments, the checking authority information and the checking authority verification information are verification codes with a certain length, the third terminal sends the verification codes to the second terminal, the second terminal determines whether the two are matched (if the two are identical character strings), and if the two are matched, the verification is passed.
Other ways to verify whether the third terminal has the viewing right may also be used, which is not limited herein.
Some steps in the embodiments of the present disclosure are substantially the same as corresponding steps in the embodiments shown in fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, or fig. 8, and are not repeated here. Some steps in the embodiments shown in fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, or fig. 8 may also be optionally included in the embodiments of the present disclosure, and are not described herein again.
In the embodiment of the disclosure, user information is sent to a second terminal nearby, a third terminal sends viewing permission information, viewing permission verification information is sent to the second terminal, after an earthquake occurs, the second terminal sends the received user information to a third terminal passing verification, and therefore a user with information viewing permission obtains information of the user nearby, and further rescue workers can know local personnel conditions, rescue efficiency is improved.
Fig. 12 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 12, the method includes the following steps.
Step 301, a first terminal sends a first message to a server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one piece of location information.
Step 301 corresponds to step 201, and reference may be made to the description in step 201, which is not described herein again.
Step 302, a second terminal receives a second message sent by a server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, and the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location.
Step 302 corresponds to step 202, step 203, and step 204, and reference may be made to the descriptions in step 202, step 203, and step 204, which are not described herein again.
Step 303, the second terminal saves the second information set.
After receiving the second message, the second terminal may save the second information set in the memory, and may perform a saving operation through an interface provided by the database and/or the file system.
Step 304, the second terminal outputs all or part of a third information set after an earthquake occurs, wherein the third information set is all or part of the second information set stored by the second terminal.
After the earthquake occurs, the second terminal may output all or a portion of the third information set. Only a part of the third information set may be output, for example, only user information of users in the third information set related to the current position is output, or only user information of users in an earthquake region (for example, a region with an earthquake intensity greater than a preset intensity threshold value is used as an earthquake region) in the third information set is output, and so on.
In some optional embodiments, the second terminal outputs the information by way of a display interface.
In some alternative embodiments, the second terminal outputs the information by sending it to the other terminal. For example, to a terminal of a rescue commander. Of course, the information in the second information set may also be sent to other terminals, for example, the information in the second information set is encrypted and sent to the terminal containing the decryption key to decrypt the information.
In some optional embodiments, after receiving the second message, the second terminal encrypts and stores the second information set; after the earthquake occurs, the information is decrypted and then output.
In some alternative embodiments, the server may transmit the seismic information to the terminal of the seismic area after the earthquake occurs, so that the terminal confirms that the earthquake has occurred.
In some optional embodiments, the terminal provides a voting function, and the users in the earthquake area can make the terminal confirm the occurrence of the earthquake through the voting function of the terminal, for example, if more than a certain number of users in an area send an instruction for confirming the occurrence of the earthquake (in the case of a damaged communication facility, a local area network can be constructed in a wifi hotspot mode, and the number of users sending the instruction for confirming the occurrence of the earthquake is counted), or a certain proportion of the number of total users in the area is exceeded, the occurrence of the earthquake is confirmed.
In some optional embodiments, the terminal may confirm the earthquake occurrence after the user having the authority to confirm the occurrence of the earthquake confirms the occurrence of the earthquake. And users having the authority to confirm the occurrence of the earthquake, such as government staff like committee staff. Alternatively, the user terminal having the authority to confirm the occurrence of the earthquake may provide a button for confirming the occurrence of the earthquake in the interface, and the user clicks the button to confirm the occurrence of the earthquake, while the other terminals do not provide the button. After the terminal of the user with the authority of confirming the earthquake confirms that the earthquake occurs, the terminal can send messages to other terminals, so that other terminals can confirm that the earthquake occurs and enter a processing flow after the earthquake occurs.
Other ways of confirming the occurrence of the earthquake by the terminal may also be used, and are not limited herein.
In the embodiment of the disclosure, the first terminal sends the user information to the server, the second terminal nearby receives and stores the user information from the server, and outputs the received user information after the earthquake occurs, so that the rescue commander can quickly obtain the situation of nearby personnel after the earthquake occurs, and accordingly rescue measures can be formulated in a targeted manner, and rescue efficiency is improved.
Fig. 13 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 13, the method includes the following steps.
Step 311, a first terminal sends a first message to a server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one location information.
Step 312, a second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location, and information included in the second information set is encrypted information encrypted by an encryption key.
Step 313, the second terminal saves the second information set.
In step 314, the third terminal receives a message containing a decryption key corresponding to the encryption key from the server, and the third terminal is located in the certain range of the location.
And 315, after an earthquake occurs, the terminal receiving the encrypted information and the terminal receiving the decryption key cooperate to complete decryption of the encrypted information.
In some optional embodiments, the terminal receiving the encrypted information, such as the second terminal; the terminal receiving the decryption key, such as the third terminal. After an earthquake occurs, the second terminal and the third terminal can cooperate to finish decryption of encrypted information, and if the second terminal sends the received encrypted information to the third terminal, the third terminal decrypts the encrypted information by using a decryption key after receiving the encrypted information; or the third terminal sends the received decryption key to the second terminal, and the second terminal completes decryption of the encrypted information after receiving the decryption key; or the second terminal and the third terminal send the received information to other terminals, such as terminals of rescue commanders, and the other terminals complete decryption of the encrypted information after receiving the encrypted information and the decryption key, and so on.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 3, and reference may be made to corresponding descriptions, which are not described herein again.
In the embodiment of the disclosure, the user information received by the second terminal is encrypted information, and decryption is completed only after an earthquake occurs by matching with other terminals, so that the user information is in a confidential state when the earthquake does not occur, and the safety of user privacy is guaranteed.
Fig. 14 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 14, the method includes the following steps.
Step 321, the first terminal sends a first message to the server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one location information.
Step 322, a second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location, and information included in the second information set is encrypted information encrypted by an encryption key.
Step 323, the second terminal saves the second information set.
Step 324, the third terminal receives a third message from the server, where the third terminal is located in the certain range of the location, and the third message includes a mapping of a decryption key corresponding to the encryption key, where the mapping of the decryption key is obtained by encrypting the decryption key with at least one second encryption key.
Step 325, at least one fourth terminal receives and stores the second decryption key corresponding to the second encryption key, where the fourth terminal is located within the certain range of the location.
And 326, the terminal receiving the encrypted information, the terminal receiving the decryption key and the terminal receiving the second decryption key cooperate to complete decryption of the encrypted information.
In some optional embodiments, the terminal receiving the encrypted information, such as the second terminal; the terminal receiving the decryption key, such as the third terminal; the terminal receiving the second decryption key, for example, the fourth terminal.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 4, and reference may be made to corresponding descriptions, which are not repeated herein.
In the embodiment of the disclosure, the encryption key is encrypted by using at least one second encryption key, so that the encryption key is kept by multiple persons, and the decryption of the data can be completed only when the persons participate in the data decryption, thereby further improving the security of the user information.
Fig. 15 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 15, the method includes the following steps.
Step 331, the first terminal sends a first message to the server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one location information.
Step 332, a second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location, and information included in the second information set is processed by decryption.
Step 333, the second terminal saves the second information set.
And 334, after the earthquake occurs, the plurality of terminals can cooperate with each other according to the acquired information to restore the original information.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 5, and reference may be made to corresponding descriptions, which are not repeated herein.
In the embodiment of the disclosure, the user information received by the second terminal is decryption information, and decryption is completed by matching with other terminals after an earthquake occurs, so that the user information is in a confidential state when the earthquake does not occur, and the safety of user privacy is guaranteed.
Fig. 16 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 16, the method includes the following steps.
Step 341, the first terminal sends a first message to the server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one piece of location information.
Step 342, a second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location, and information included in the second information set is processed by decryption.
In step 343, the second terminal stores the second information set.
And 344, the third terminal receives a third message from the server, and the third terminal is located in the position within a certain range, so that after an earthquake occurs, the second terminal and the third terminal can cooperate with each other according to the respective obtained information to restore the original information which is not decrypted.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 6, and reference may be made to corresponding descriptions, which are not repeated herein.
In the embodiment of the disclosure, the user information received by the second terminal is decryption information, and decryption is completed by matching with other terminals after an earthquake occurs, so that the user information is in a confidential state when the earthquake does not occur, and the safety of user privacy is guaranteed.
Fig. 17 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 17, the method includes the following steps.
Step 351, the first terminal sends a first message to the server, wherein the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one piece of location information.
Step 352, a second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a location in the first information set, and the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location.
Step 353, the second terminal encrypts the second information set to obtain encrypted information, and stores the encrypted information.
Step 354, after the earthquake occurs, the second terminal decrypts all or part of the encrypted information to obtain a third information set, and outputs the third information set.
The second terminal may encrypt and store the second information set after receiving the second message, and decrypt and output the second information set after the earthquake occurs.
In some optional embodiments, the second terminal may store the decryption key in secure hardware to secure the data.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here.
In the embodiment of the disclosure, the second terminal encrypts and stores the received user information, and decrypts the user information after the earthquake occurs, so that the user information is kept secret when the earthquake does not occur, and the safety of the user privacy is guaranteed.
Fig. 18 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 18, the method includes the following steps.
Step 361, a first terminal sends a first message to a server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one location information.
Step 362, the second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, and the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location.
Step 363, the second terminal saves the second information set.
Step 364, after the earthquake occurs, the second terminal receives a third message sent by the server, and outputs all or part of a third information set in response to the third message, where the third information set is all or part of the second information set stored by the second terminal.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 9, and reference may be made to corresponding descriptions, which are not repeated herein.
In the embodiment of the disclosure, the second terminal receives the information of the user nearby, and receives the third message after the earthquake occurs, so that the received information is output, and then rescue workers can know the local personnel condition, and the rescue efficiency is improved.
Fig. 19 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 19, the method includes the following steps.
Step 371, the first terminal sends a first message to the server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one location information.
Step 372, a second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located in a certain range of a certain location in the first information set, and the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location.
Step 373, the second terminal saves the second information set.
Step 374, after an earthquake occurs, at least one third terminal receives a third message sent by the server, and in response to the third message, obtains a second information set received by the third terminal from at least one second terminal, obtains a fourth information set, and displays the fourth information set, wherein the third terminal is located in a certain range of the position.
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 10, and reference may be made to corresponding descriptions, which are not repeated herein.
In the embodiment of the disclosure, the second terminal receives information of a user nearby, and after an earthquake occurs, the third terminal receives the third message, so that the second information set received by the third terminal is obtained from at least one second terminal, the fourth information set is obtained, and the fourth information set is displayed, so that rescuers can know local personnel conditions, and rescue efficiency is improved.
Fig. 20 illustrates an exemplary flow diagram of an embodiment of one or more data processing methods of the present disclosure. As shown in fig. 20, the method includes the following steps.
Step 381, the first terminal sends a first message to the server, where the first message includes a first information set, the first information set includes first user information of at least one user, and the first user information includes identity information and at least one location information.
Step 382, the second terminal receives a second message sent by the server, where the second message includes a second information set, the second terminal is located within a certain range of a certain location in the first information set, and the second information set at least includes identity information of at least one user corresponding to the location in the first information set and location information of the location.
Step 383, the second terminal saves the second information set.
Step 384, at least one third terminal receives the viewing right information sent by the server, and the second terminal receives the viewing right verification information.
Step 385, after the earthquake occurs, the second terminal verifies the viewing right of the third terminal through the verification information, and sends the received second information set to the third terminal after the verification is passed
Some steps in the embodiment of the present disclosure are substantially the same as corresponding steps in the embodiment shown in fig. 12 and 13, and are not described again here. Some steps in the embodiment of the present disclosure correspond to the steps in the embodiment shown in fig. 11, and reference may be made to corresponding descriptions, which are not repeated herein.
In the embodiment of the disclosure, the second terminal receives user information and checking authority verification information, the third terminal receives checking authority information, after an earthquake occurs, the second terminal sends the received user information to the third terminal passing verification, so that a user with information checking authority obtains information of a user nearby, and further, rescue workers can know local personnel conditions, the rescue efficiency is improved, and only the users can obtain the user information, so that the user information is diffused only in a limited range, and the privacy of the users is guaranteed.
In any of the embodiments shown in fig. 12-20, further optionally comprising: and the second terminal displays an information abstract, wherein the information abstract comprises at least one of the number of people in the third information set, the name of each user, the position information of each position and the number statistics of people in each area.
By displaying the information abstract, the user can know the basic situation of the user information received by the terminal; after an earthquake occurs, the user can be prompted to send information to the rescue commander.
The second terminal may display the information summary only after the earthquake occurs, or may display the information summary when the earthquake does not occur, which is not limited herein.
In any of the embodiments shown in fig. 12-20, further optionally comprising: and after receiving the position deleting instruction, deleting the received information corresponding to the position to be deleted. For example, information of users of the seismic area is deleted.
Fig. 21 shows a block diagram of an electronic device 1000 according to an exemplary embodiment of the present invention. The electronic device 1000 may be various electronic devices including, but not limited to, a smart phone, a tablet computer, a notebook computer, a Digital broadcast receiver, a Personal Digital Assistant (PDA), a wearable device, a vehicle-mounted electronic device (e.g., a car navigation electronic device), an MP3 Player (Moving Picture Experts Group Audio Layer iii, motion Picture Experts compression standard Audio Layer 3), an MP4 Player (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), a Digital Television (TV), a Portable Multimedia Player (PMP), a laptop or desktop computer, and the like.
In general, the electronic device 1000 includes: a processor 1001 and a memory 1002.
Processor 1001 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The Processor 1001 may be at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a ProgRAMmable Logic Device (PLD), a Field ProgRAMmable Gate Array (FPGA), a Central Processing Unit (CPU), a controller, a microcontroller, and a microprocessor. The processor 1001 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also referred to as a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 10001 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed by the display screen. In some embodiments, the processor 10001 may further include an AI (Artificial Intelligence) processor for processing a calculation operation related to machine learning.
Memory 1002 may include one or more computer-readable storage media, which may be non-transitory. Memory 1002 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 1002 is used to store at least one instruction for execution by the processor 1001 to implement the data processing methods provided by the method embodiments herein.
In some alternative embodiments, the electronic device 1000 may also include a bus 1003. The processor 1001 and the memory 1002 may be connected to each other through a bus 1003; the bus 1003 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 1003 may be divided into an address bus, a data bus, a control bus, and the like.
In some embodiments, the electronic device 1000 may further include: I/O interface 1004 and at least one I/O device. The processor 1001, memory 1002, and I/O interface 1004 may be connected by a bus 1003 or signal lines. Various I/O devices may be connected to the I/O interface 1004 via buses, signal lines, or circuit boards. Specifically, the I/O device includes: at least one of a communication component 1005, a touch screen 1006, a camera component 1007, an audio component 1008, a positioning component 1009, a power supply 1010, and other input components 1011.
The I/O interface 1004 may be used to connect at least one I/O device associated with I/O (Input/Output) to the processor 1001 and the memory 1002. In some embodiments, the processor 1001, the memory 1002, and the I/O interface 1004 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1001, the memory, and the I/O interface 1004 may be implemented on separate chips or circuit boards, which are not limited by this embodiment.
The communication component 1005 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The communication component 105 communicates with a communication network and other communication devices via electromagnetic signals. The communication component 1005 converts electrical signals to electromagnetic signals for transmission or converts received electromagnetic signals to electrical signals. Optionally, the communication component 1005 comprises: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The communication component 1005 may include at least one short-range communication module, such as any module for performing short-range wireless communication based on short-range wireless communication protocols, such as the Hilink protocol, WiFi (IEEE 802.11 protocol), Mesh, Bluetooth, ZigBee, Thread, Z-Wave, NFC, UWB, LiFi, and the like, and the communication component 1005 may also include a long-range communication module, such as any module for performing WLAN, GPRS, 2G/3G/4G/5G long-range communication.
The touch screen 1006 is used to display a UI (User Interface), the ability to collect touch signals on or over the surface of the display screen 1005. The UI may include graphics, text, icons, video, and any combination thereof. The touch signal may be input to the processor 1001 as a control signal for processing. At this point, the touch screen 1006 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the touch screen 1006 may be one, and is configured to be a front panel of the electronic device 1000; in other embodiments, the number of the touch screens 1006 may be at least two, and the at least two touch screens 1006 are respectively disposed on different surfaces of the electronic device 1000 or are in a folding design; in still other embodiments, the touch screen 1006 may be a flexible display screen disposed on a curved surface or a folded surface of the electronic device 1000. Even more, the touch screen 1006 can be arranged in a non-rectangular irregular pattern, i.e. a shaped screen. The touch screen 1006 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or other materials.
The camera assembly 1007 is used to capture images or video. Optionally, the camera assembly 1007 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each of the rear cameras is any one of a main camera, a depth-of-field camera, a wide-angle camera, a telephoto camera and an infrared camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, the main camera and the wide-angle camera are fused to realize a panoramic shooting function and a VR (Virtual Reality) shooting function or other fusion shooting functions. In some embodiments, camera assembly 1007 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color temperature flash lamp is a combination of a warm light flash lamp and a cold light flash lamp and can be used for light compensation under different color temperatures.
The audio components 1008 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, inputting the electric signals to the processor 1001 for processing, or inputting the electric signals to the communication component 1005 for realizing voice communication. For the purpose of stereo sound collection or noise reduction, a plurality of microphones may be provided at different portions of the electronic device 1000. The microphones may also be array microphones or omni-directional pick-up microphones. The speaker is used to convert electrical signals from the processor 1001 or the communications component 1005 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, the audio component 1008 may also include a headphone jack.
The positioning component 1009 is used for positioning the current geographic Location of the electronic device 1000 to implement navigation or LBS (Location Based Service). The Positioning component 1009 may be a Positioning component based on a Global Positioning System (GPS) in the united states, a beidou System in china, a graves System in russia, or a galileo System in the european union.
The power supply 1010 is used to power the various components in the electronic device 1000. The power supply 1010 may be alternating current, direct current, disposable batteries, or rechargeable batteries. When power supply 1010 includes a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge techniques.
Other input components 1011 may include a physical keyboard, mouse, buttons, sensors, and the like. These buttons may include, but are not limited to: volume button, start button. Sensors include, but are not limited to: acceleration sensors, gyroscope sensors, pressure sensors, fingerprint sensors, optical sensors, and proximity sensors.
Those skilled in the art will appreciate that the configuration shown in fig. 21 does not constitute a limitation of the electronic device 1000, and may include more or fewer components than those shown, or combine certain components, or employ a different arrangement of components.
The steps executed by the processor 1001 in this embodiment may refer to the data processing method on the terminal device side in the foregoing multiple method embodiments, and have the beneficial effects of the corresponding method embodiments, which are not described herein again. In addition, the electronic device of this embodiment is used to correspondingly implement the foregoing data processing method, and therefore the description is relatively simple, and relevant portions may refer to the description of corresponding portions in the foregoing method embodiments, which is not repeated herein.
It should be noted that, according to the implementation requirement, each component/step described in the embodiment of the present invention may be divided into more components/steps, or two or more components/steps or partial operations of the components/steps may be combined into a new component/step to achieve the purpose of the embodiment of the present invention.
Fig. 22 is a schematic structural diagram of a server according to an embodiment of the present application, where the server 2000 may generate a relatively large difference due to a difference in configuration or performance, and may include one or more processors (CPUs) 2001 and one or more memories 2002, where the memory 2002 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 2001 to implement a step of a corresponding server in the data processing method.
In some optional embodiments, server 2000 further comprises a communications component 2004. The communication module 2004 is used to receive and transmit RF (Radio Frequency) signals, also known as electromagnetic signals. The communication component 2004 communicates with communication networks and other communication devices via electromagnetic signals.
In some alternative embodiments, server 2000 may also include a bus 2003. Wherein the communication component 2004, the processor 2001 and the memory 2002 may be interconnected by a bus 2003; the bus 2003 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 2003 may be divided into an address bus, a data bus, a control bus, and the like.
The server 2000 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a web service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), a big data and artificial intelligence platform, and the like.
For each step executed by the processor 2001 in this embodiment, reference may be made to a corresponding server-side data processing method in the foregoing multiple method embodiments, and the beneficial effects of the corresponding method embodiments are also provided, which are not described herein again. In addition, the server of the present embodiment is used for correspondingly implementing the foregoing data processing method, and therefore the description is relatively simple, and relevant portions can refer to the description of corresponding portions in the foregoing method embodiments, and are not redundantly described here.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such embodiments, the computer program may be downloaded and installed from a network through communications component 1005 or communications component 2004, or installed from memory 1002 or memory 2002. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processor 1001 or the processor 2001.
It should be noted that the computer readable medium in the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Python, Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The above description mainly introduces the solutions provided by the embodiments of the present invention from the perspective of electronic devices. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. The elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein may be embodied in hardware or in a combination of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution.
In the embodiment of the present invention, the terminal device may be divided into the functional units according to the above method examples, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
The above embodiments are merely illustrative of the present invention, and not restrictive, and those skilled in the relevant art can make various changes and modifications without departing from the spirit and scope of the embodiments of the present invention, and therefore all equivalent technical solutions also fall within the scope of the embodiments of the present invention.

Claims (22)

1. A data processing method is applied to a server, and the method comprises the following steps:
receiving a first message sent by a first terminal, wherein the first message comprises a first information set, the first information set comprises first user information of at least one user, and the first user information comprises identity information and at least one piece of position information;
for each position in the first information set, determining at least one second terminal, wherein the second terminal is within a certain range of the position;
acquiring a second information set, wherein the second information set at least comprises identity information of at least one user corresponding to the position in the first information set and position information of the position;
and generating a second message, and sending the second message to the second terminal, wherein the second message comprises the second information set.
2. The method of claim 1, wherein the second set of information comprises information encrypted with an encryption key;
the method further comprises the following steps: and generating a third message, and sending the third message to at least one third terminal, wherein the third terminal is located in the certain position range, and the third message contains a decryption key corresponding to the encryption key or a mapping of the decryption key.
3. The method of claim 2, wherein the third terminal and the second terminal belong to different users; and/or the presence of a gas in the gas,
and the user to which the third terminal belongs is not a friend of the address list of the user to which the second terminal belongs.
4. The method of claim 2, wherein the third terminal is a terminal of a user having the location key management authority.
5. The method according to claim 2, characterized in that the mapping of the decryption key is obtained by encrypting the decryption key using at least one second encryption key;
the method further comprises the step of sending a second decryption key corresponding to each second encryption key to at least one fourth terminal, wherein the fourth terminal is located in the certain position range.
6. The method of claim 2, further comprising:
dividing according to geographical areas, wherein one area comprises one or more encryption and decryption keys, the encryption and decryption keys in different areas are different, the area is determined according to the position, and the encryption and decryption key corresponding to the area is selected as the encryption key and the decryption key; alternatively, the first and second electrodes may be,
each user or terminal has a corresponding encryption and decryption key, and the encryption and decryption keys of the first terminal or the second terminal are selected as the encryption key and the decryption key; alternatively, the first and second electrodes may be,
generating the encryption and decryption key each time the first message is received; alternatively, the first and second electrodes may be,
generating the encryption and decryption keys before each generation of the second message.
7. The method according to any of claims 2-6, wherein said sending of said third message to at least one third terminal is performed after an earthquake has occurred to a terminal in the earthquake area; alternatively, the first and second electrodes may be,
said sending said third message to at least one third terminal is performed when no earthquake has occurred.
8. The method of claim 1, further comprising:
the information contained in the second information set is subjected to decryption processing, the decryption processing enables corresponding original information to be in a secret state when no earthquake occurs, and after the earthquake occurs, a plurality of terminals in a certain range of the position can cooperate with each other according to the information obtained by the terminals to restore the original information; alternatively, the first and second electrodes may be,
and the information contained in the second information set is subjected to decryption processing, the decryption processing enables corresponding original information to be in a secret state when no earthquake occurs, after the earthquake occurs, a fourth message is sent to at least one third terminal within a certain range of the position, the second terminal and the third terminal can cooperate with each other according to the information obtained by the second terminal and the third terminal to restore the original information, and the third terminal is within the certain range of the position.
9. The method of claim 8,
the decryption processing is splitting processing, the splitting processing splits each information into a plurality of parts, and/or splits a plurality of associated information into a plurality of parts, and the server sends each part to different second terminals respectively; alternatively, the first and second electrodes may be,
the decryption process is an encryption process according to any one of claims 2 to 7.
10. The method of any of claims 1-6, 8, or 9, further comprising:
receiving a decryption record sent by a terminal, and judging whether the decryption record belongs to illegal decryption;
when illegal decryption occurs, notifying operators; and/or notifying a user corresponding to the decrypted information; and/or sending a delete information instruction to the terminal to enable the terminal to delete information; and/or adding a user corresponding to the terminal into a blacklist, so that new second information is not sent to the user any more; and/or post the violation.
11. The method of any of claims 1-6, 8, or 9, further comprising:
and after the earthquake rescue is finished, the terminal which indicates that all or part of the earthquake area receives the user information of the nearby users deletes the information of the earthquake area received by the terminal.
12. A method of data processing, the method comprising:
a first terminal sends a first message to a server, wherein the first message comprises a first information set, the first information set comprises first user information of at least one user, and the first user information comprises identity information and at least one piece of position information;
a second terminal receives a second message sent by a server, wherein the second message comprises a second information set, the second terminal is located in a certain position range in the first information set, and the second information set at least comprises identity information of at least one user corresponding to the position in the first information set and position information of the position;
the second terminal saves the second information set;
and the second terminal outputs all or part of a third information set after an earthquake occurs, wherein the third information set is all or part of the second information set stored by the second terminal.
13. The method according to claim 12, wherein the second set of information comprises encrypted information encrypted by an encryption key;
the method further comprises the following steps: a third terminal receives a third message from a server, wherein the third terminal is located in the certain position range, and the third message comprises a decryption key corresponding to the encryption key or the mapping of the decryption key;
and after an earthquake occurs, the terminal receiving the encrypted information and the terminal receiving the decryption key are matched to finish decryption of the encrypted information.
14. The method of claim 13, wherein the third terminal and the second terminal belong to different users; and/or the presence of a gas in the gas,
and the user to which the third terminal belongs is not a friend of the address list of the user to which the second terminal belongs.
15. The method of claim 13, wherein the third terminal is a terminal of a user having the location key management authority.
16. The method according to claim 13, characterized in that the mapping of the decryption keys is obtained by encrypting the decryption keys using at least one second encryption key;
the method further comprises the following steps: at least one fourth terminal receives and stores a second decryption key corresponding to the second encryption key, wherein the fourth terminal is located in the position within a certain range;
the terminal receiving the encrypted information and the terminal receiving the decryption key cooperate to complete decryption of the encrypted information, wherein the terminal receiving the encrypted information, the terminal receiving the decryption key and the terminal receiving the second decryption key cooperate to complete decryption of the encrypted information.
17. The method of claim 12, further comprising:
the information contained in the second information set is subjected to decryption processing, the decryption processing enables corresponding original information to be in a secret state when no earthquake occurs, and after the earthquake occurs, a plurality of terminals in one area can cooperate with each other according to the information obtained by the terminals to restore the original information; alternatively, the first and second electrodes may be,
the information contained in the second information set is subjected to decryption processing, the decryption processing enables corresponding original information to be in a secret state when no earthquake occurs, and after the earthquake occurs, at least one third terminal in a certain range of the position receives information from a server, so that the second terminal and the third terminal can cooperate with each other according to the obtained information to restore the original information; alternatively, the first and second electrodes may be,
and after the second information set is obtained, the second information set is encrypted and then stored by the second terminal, and after an earthquake occurs, the encrypted information is decrypted.
18. The method according to any one of claims 12-17, further comprising:
and the second terminal displays an information abstract, wherein the information abstract comprises at least one of the number of people in the third information set, the name of each user, the position information of each position and the number statistics of people in each area.
19. The method of any one of claims 12-17, further comprising the second terminal determining that an earthquake has occurred by at least one of: the number of the terminals which receive the earthquake information of the server, the earthquake occurrence instruction of the user and the earthquake occurrence instruction of the user in a certain area reaches preset conditions.
20. The method according to any one of claims 12-17, further comprising:
and after receiving the position deleting instruction, deleting the received information corresponding to the position to be deleted.
21. An electronic device, comprising: a processor, a memory storing processor-executable instructions that, when executed by the processor, implement the method of any of claims 1-11 or 12-20.
22. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-11 or 12-20.
CN202111349786.4A 2021-11-16 2021-11-16 Data processing method, electronic device and computer storage medium Pending CN114124501A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111349786.4A CN114124501A (en) 2021-11-16 2021-11-16 Data processing method, electronic device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111349786.4A CN114124501A (en) 2021-11-16 2021-11-16 Data processing method, electronic device and computer storage medium

Publications (1)

Publication Number Publication Date
CN114124501A true CN114124501A (en) 2022-03-01

Family

ID=80396303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111349786.4A Pending CN114124501A (en) 2021-11-16 2021-11-16 Data processing method, electronic device and computer storage medium

Country Status (1)

Country Link
CN (1) CN114124501A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1153668A (en) * 1997-07-31 1999-02-26 F F C:Kk Disaster information system
CN104215984A (en) * 2014-08-25 2014-12-17 北京乐富科技有限责任公司 Satellite positioning method and satellite positioning device
CN104506483A (en) * 2014-10-21 2015-04-08 中兴通讯股份有限公司 Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN105407456A (en) * 2015-10-22 2016-03-16 上海救要救信息科技有限公司 Method and system used for processing help-seeking information
CN107888560A (en) * 2017-10-12 2018-04-06 深圳市中易通安全芯科技有限公司 A kind of mobile intelligent terminal mail security Transmission system and method
CN109474622A (en) * 2018-12-25 2019-03-15 孝感天创信息科技有限公司 Improve the ciphertext encryption method of privacy of user safety
CN110152309A (en) * 2019-01-24 2019-08-23 腾讯科技(深圳)有限公司 Voice communication method, device, electronic equipment and storage medium
CN111899466A (en) * 2020-07-16 2020-11-06 深圳鞠慈云科技有限公司 System and method for seeking help and rescuing nearby around help seeker
CN112533189A (en) * 2020-11-23 2021-03-19 深圳传音控股股份有限公司 Transmission method, mobile terminal and storage medium
CN113420054A (en) * 2021-05-10 2021-09-21 武汉光阴南北网络技术咨询中心 Information statistical method, server, client and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1153668A (en) * 1997-07-31 1999-02-26 F F C:Kk Disaster information system
CN104215984A (en) * 2014-08-25 2014-12-17 北京乐富科技有限责任公司 Satellite positioning method and satellite positioning device
CN104506483A (en) * 2014-10-21 2015-04-08 中兴通讯股份有限公司 Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN105407456A (en) * 2015-10-22 2016-03-16 上海救要救信息科技有限公司 Method and system used for processing help-seeking information
CN107888560A (en) * 2017-10-12 2018-04-06 深圳市中易通安全芯科技有限公司 A kind of mobile intelligent terminal mail security Transmission system and method
CN109474622A (en) * 2018-12-25 2019-03-15 孝感天创信息科技有限公司 Improve the ciphertext encryption method of privacy of user safety
CN110152309A (en) * 2019-01-24 2019-08-23 腾讯科技(深圳)有限公司 Voice communication method, device, electronic equipment and storage medium
CN111899466A (en) * 2020-07-16 2020-11-06 深圳鞠慈云科技有限公司 System and method for seeking help and rescuing nearby around help seeker
CN112533189A (en) * 2020-11-23 2021-03-19 深圳传音控股股份有限公司 Transmission method, mobile terminal and storage medium
CN113420054A (en) * 2021-05-10 2021-09-21 武汉光阴南北网络技术咨询中心 Information statistical method, server, client and storage medium

Similar Documents

Publication Publication Date Title
US10834482B2 (en) Systems and methods for integrating first responder technologies
US9681301B2 (en) Enabling emergency access to secure wireless communications networks
CN110689460B (en) Traffic accident data processing method, device, equipment and medium based on block chain
EP2972949B1 (en) Wireless data privacy maintained through a social network
US10505923B2 (en) Apparatus for sharing private video streams with first responders and method of operation
CN105468608B (en) Crowdsourcing-based data acquisition and processing method and system
Al-Akkad et al. Help beacons: Design and evaluation of an ad-hoc lightweight sos system for smartphones
US9723486B2 (en) Method and apparatus for accessing network
Christin et al. Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications
US10848808B2 (en) Apparatus for sharing private video streams with public service agencies
KR20150124785A (en) Apparatas and method for providing a video telephony emergency call service in an electronic device
CN110598386A (en) Data processing method, device and equipment based on block chain and storage medium
KR20210000957A (en) System for authenticating image based on blockchain and hash encryption technique and method thereof
US20200396423A1 (en) Methods for sharing private video streams with first responders under facility administrator control
US11381605B2 (en) System, methods, and apparatus for sharing private video stream assets with first responders
JP7206986B2 (en) Time-Based Verification to Determine the Presence of Devices and/or Individuals at a Particular Location
CN114124501A (en) Data processing method, electronic device and computer storage medium
US20220053041A1 (en) Methods for sharing private video streams with first responders under facility administrator control
KR200481693Y1 (en) Cloud voice recording system
JP6412303B2 (en) Information communication system and terminal used therefor
CN110717605A (en) Access information processing method and device based on block chain
CN112583703B (en) Event group chat method, device, server, client and terminal for security concern object
CN114333098B (en) Night patrol method, night patrol device, electronic equipment and computer readable medium
KR102343338B1 (en) Blockchain-based body temperature measurement monitoring system using a portable thermometer and method thereof
CN112422479B (en) Equipment binding method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220301

WD01 Invention patent application deemed withdrawn after publication