CN107959748A - Automatic alarm method and device - Google Patents
Automatic alarm method and device Download PDFInfo
- Publication number
- CN107959748A CN107959748A CN201610903897.8A CN201610903897A CN107959748A CN 107959748 A CN107959748 A CN 107959748A CN 201610903897 A CN201610903897 A CN 201610903897A CN 107959748 A CN107959748 A CN 107959748A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- alarm
- terminal
- voice signal
- warning message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72433—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for voice messaging, e.g. dictaphones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/40—Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/74—Details of telephonic subscriber devices with voice recognition means
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Emergency Management (AREA)
- General Business, Economics & Management (AREA)
- Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of automatic alarm method and device, belong to the communications field.The described method includes:Gather the corresponding voice signal of monitored target;Identify whether the voice signal talks secretly comprising default triggering;If the voice signal includes the triggering and talks secretly, alarm terminal is specified to send warning message from trend with concealed pattern, the secret pattern is to send the process of the warning message sightless pattern on the mobile terminal.The present invention from trend with concealed pattern by specifying alarm terminal to send warning message, so that when an emergency happens, monitored target is alarmed by directly saying default triggering cipher, avoid the need for the situation for taking out mobile phone and the physical button on long-press mobile phone, and since mobile terminal is to send warning message with concealed pattern, entirely alarm procedure is not easy to be found by ruffian, has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
Description
Technical field
The present embodiments relate to the communications field, more particularly to a kind of automatic alarm method and device.
Background technology
Mobile phone is the most commonly used means of communication of user's routine use.When emergency occurs, user using mobile phone to
Emergency contact or the police alarm.
A kind of automatic alarm application exists in the prior art.User the automatic alarm application in set emergency contact and
The short message content of alarming short message.When emergency occurs, the default physical button of user's long-press produces alarm on mobile phone and touches
Signal, which sends alarming short message after the warning trigger signal is received, to emergency contact.
But when user is by criminal hijack, user be likely to have no chance to take out physics on mobile phone and long-press mobile phone by
Key is alarmed.Above-mentioned automatic alarm is difficult to be suitable for user by the scene of criminal hijack using provided alarm scheme
Under, even if user is alarmed, alarm procedure is also easily found by ruffian, is existed functionally so above-mentioned automatic alarm is applied
The defects of.
The content of the invention
In order to solve the problems, such as that the automatic alarm of mobile terminal applies the defects of existing functionally, the embodiment of the present invention provides
A kind of automatic alarm method and device.The technical solution is as follows:
First aspect, there is provided a kind of automatic alarm method, applied in mobile terminal, the described method includes:
Gather the corresponding voice signal of monitored target;
Identify whether the voice signal talks secretly comprising default triggering;
If the voice signal includes the triggering and talks secretly, alarm terminal is specified to send alarm from trend with concealed pattern
Information, the secret pattern are to send the process of the warning message sightless pattern on the mobile terminal.
Second aspect, there is provided a kind of autoalarm, described device include:
Acquisition module, for gathering the corresponding voice signal of monitored target;
Identification module, for identifying the voice signal whether comprising default triggering cipher;
Sending module, talks secretly if including the triggering for the voice signal, report is specified from trend with concealed pattern
Alert terminal sends warning message, and the secret pattern is to send the process of the warning message on the autoalarm not
Visible pattern.
Technical solution provided in an embodiment of the present invention at least has the advantages that:
By gathering the corresponding voice signal of monitored target;Whether recognition of speech signals talks secretly comprising default triggering;
If voice signal includes triggering and talks secretly, alarm terminal is specified to send warning message from trend with concealed pattern, concealed pattern is
Send the process sightless pattern on mobile terminals of warning message;So that when an emergency happens, monitored target leads to
Cross and directly say default triggering cipher and alarm, avoid the need for taking out mobile phone and physical button on long-press mobile phone
Situation, and since mobile terminal is to send warning message with concealed pattern, whole alarm procedure is not easy to be found by ruffian, reaches
To the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
Brief description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, without creative efforts, other can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 be the present embodiments relate to a kind of automatic alarm system structure diagram;
Fig. 2 is the flow chart of automatic alarm method provided by one embodiment of the present invention;
Fig. 3 is the flow chart for the automatic alarm method that another embodiment of the present invention provides;
Fig. 4 is the flow chart for the automatic alarm method that another embodiment of the present invention provides;
Fig. 5 is the flow chart for the automatic alarm method that another embodiment of the present invention provides;
Fig. 6 is the principle schematic for the automatic alarm method that another embodiment of the present invention provides;
Fig. 7 is the structure diagram of autoalarm provided by one embodiment of the present invention;
Fig. 8 is the structure diagram for the autoalarm that another embodiment of the present invention provides;
Fig. 9 is the structure diagram of the server provided in one embodiment of the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Please refer to Fig.1, it illustrates the present embodiments relate to a kind of automatic alarm system structure diagram.
The system includes mobile terminal 120, server cluster 140 and at least one specified alarm terminal 160.
Operation has the application program with auto-alarm function and/or operating system aspect in mobile terminal 120
Module.Mobile terminal 120 can be the portable electronic equipment for having message sending function, such as mobile phone.Mobile terminal 120 is also
Can be tablet computer, E-book reader, MP3 player (Moving Picture Experts Group Audio
Layer III, dynamic image expert's compression standard audio aspect 3), MP4 (Moving Picture Experts Group
Audio Layer IV, dynamic image expert's compression standard audio aspect 4) player, pocket computer on knee and desk-top meter
Calculation machine etc..Alternatively, which is the software client for sending warning message on automatic alarm platform.
It is connected between mobile terminal 120 and server cluster 140 by communication network.Optionally, communication network is wired
Network or wireless network.
Server cluster 140 is some servers, or a virtual platform, or a cloud computing service
Center.Optionally, server cluster 140 includes the server for being used for realization alignment system 142;Optionally, server cluster 140
The server of platform 144 is sent including being used for realization the communication information;Optionally, server cluster 140 includes being used for realization call
The server of platform 146, the call platform 146 are voice communication platform or video calling platform.
Optionally, alignment system 142 includes:Server for the geographical location for positioning mobile terminal 120.
Optionally, the communication information sends platform 144 and includes:Geographical position is carried for being sent to specified alarm terminal 160
The server for the warning message put.
Optionally, call platform 146 includes:For being sent to specified alarm terminal 160 in 120 local environment of mobile terminal
Real-Time Speech Signals and/or real time video signals server.
It is connected between server cluster 140 and specified alarm terminal 160 by communication network.Optionally, communication network is
Cable network or wireless network.
It can be the terminal for having information receive capabilities to specify alarm terminal 160, the mobile phone, the police such as emergency contact
SMS alarm accepting terminal or the telephone call accepting terminal of the police.Alarm terminal 160 is specified to can also be tablet computer, electronics
Book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert
Compression standard audio aspect 3), (Moving Picture Experts Group Audio Layer IV, dynamic image are special by MP4
Family's compression standard audio aspect 4) player, pocket computer on knee and desktop computer etc..
In general, mobile terminal 120 sends warning message to server cluster 140, then from server cluster 140 to urgent
Alarm terminal 160 is specified to send warning message used in coordinator or the police.
Optionally, above-mentioned wireless network or cable network use standard communication techniques and/or agreement.Network be usually because
Special net, it may also be any network, include but not limited to LAN (Local Area Network, LAN), Metropolitan Area Network (MAN)
(Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or nothing
Any combinations of gauze network, dedicated network or Virtual Private Network).In certain embodiments, using including hypertext markup
Language (Hyper Text Mark-up Language, HTML), extensible markup language (Extensible Markup
Language, XML) etc. technology and/or form represent the data by network exchange.In addition can also use such as safe
Socket layer (Secure Socket Layer, SSL), Transport Layer Security (Transport Layer Security, TLS), void
Intend dedicated network (Virtual Private Network, VPN), Internet Protocol Security (Internet Protocol
Security, IPsec) etc. conventional encryption techniques encrypt all or some links.In further embodiments, can also make
Substitute or supplement above-mentioned data communication technology with customization and/or the exclusive data communication technology.
Please refer to Fig.2, it illustrates the flow chart of automatic alarm method provided by one embodiment of the present invention.The present embodiment
With the automatic alarm method applied to illustrating in the mobile terminal 120 shown in Fig. 1.The automatic alarm method includes:
Step 202, the corresponding voice signal of monitored target is gathered.
Optionally, the corresponding voice signal of mobile terminal collection monitored target;Schematically, mobile terminal is monitored
The mobile phone of object.
Optionally, monitored target refers to the user of mobile terminal, and the corresponding voice signal of monitored target refers to this
The voice signal that monitored target is said.
Optionally, at least one microphone is provided with mobile terminal, which collects ring where monitored target
All sound in border, all sound include the corresponding voice signal of monitored target.
Under normal conditions, dangerous is unpredictable, therefore in order to ensure the real-time effectiveness of automatic alarm, is adopted
The microphone and relative program module of the corresponding voice signal of collection monitored target can be constantly in working status, that is, move
The microphone of terminal ceaselessly gathers the corresponding voice signal of monitored target always.
Optionally, in order to reduce the power consumption that microphone produces at work, mobile terminal is triggered by predetermined condition and opens wheat
The acquisition state of gram wind or the acquisition state that microphone is opened under artificial selection.
For example when mobile terminal monitors that current geographic position is different from resident geographical location, gather monitored target
Corresponding voice signal, the resident geographical location are counted to obtain by mobile terminal according to history usage record, such as, Yong Hu
Pekinese Chaoyang District often is lived in, then it is Chaoyang District to reside geographical location.
Again for example, when mobile terminal monitors abnormal motion sensor data, the corresponding language of collection monitored target
Sound signal, alternatively, the abnormal motion sensor data be as the sensing data caused by behavior that collides with extremely, it is such as bad
The exception caused when pullling victim by force is collided with behavior on foot.
For another example, before user will go out alone or go out at night, user can be manually opened on mobile terminals
The acquisition state of microphone.Corresponding, mobile terminal can be received for indicating the open command of unlatching acquisition state, and is opened
Acquisition state, that is, gather the corresponding voice signal of monitored target.
Step 204, whether recognition of speech signals talks secretly comprising default triggering.
Optionally, whether mobile terminal recognition of speech signals talks secretly comprising default triggering.
Wherein, default triggering cipher can be by the keyword or language of the pre-set textual form of monitored target
Sentence.
Step 206, if voice signal includes triggering and talks secretly, alarm terminal is specified to send alarm from trend with concealed pattern
Information, concealed pattern are to send the process sightless pattern on mobile terminals of warning message.
Optionally, if voice signal includes triggering and talks secretly, mobile terminal specifies alarm terminal with concealed pattern from trend
Send warning message.
Wherein, concealed pattern is to send the process sightless pattern on mobile terminals of warning message.
Specifically, when monitored target sends alarming short message or mail to specified alarm terminal, in the hair of mobile terminal
The transmission record of the alarming short message is hidden in part case;When monitored target to specified alarm terminal send instant messaging category information,
The transmission record of the instant messaging category information is hidden in the chat interface of instant messaging tools;When monitored target is with specifying report
Alert terminal establishes call connection, hides the call on mobile terminals and connects related user interface, related with the call connection
User interface include dialing interface, call interface and message registration.
Optionally, the content for the voice signal that the geographical location of warning message including mobile terminal, mobile terminal collect,
The time of voice signal, give tacit consent to emergency content and real-Time Speech Signals and/or real-time video letter in mobile terminal local environment
At least one of number.
Optionally, alarm terminal is specified to include the specified alarm terminal where the emergency contact specified or the police.Should
The emergency contact specified is pre-set by user.
In conclusion the present embodiment is by gathering the corresponding voice signal of monitored target;Whether recognition of speech signals wraps
Containing default triggering cipher;If voice signal includes triggering and talks secretly, alarm terminal is specified to send report from trend with concealed pattern
Alert information, concealed pattern are to send the process of warning message sightless pattern on mobile terminals;So that when the urgent feelings of generation
During condition, monitored target is alarmed by directly saying default triggering cipher, avoids the need for taking out mobile phone and long-press
The situation of physical button on mobile phone, and since mobile terminal is to send warning message, whole alarm procedure with concealed pattern
It is not easy to be found by ruffian, has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
In a kind of possible embodiment, step 206 is alternative to be implemented as step 206a and step 206b, such as Fig. 3
It is shown:
Step 206a, if voice signal includes triggering and talks secretly, the geographical location of mobile terminal is positioned using alignment system, to
Alarm terminal is specified to send the warning message for carrying geographical location.
Optionally, if voice signal includes triggering and talks secretly, mobile terminal positions the geography of mobile terminal using alignment system
Position, the warning message for carrying geographical location is sent to specified alarm terminal.
Optionally, mobile terminal directly opens global positioning system (English:Global Positioning System,
GPS) or other positions finder positions the geographical location of mobile terminal, the geographical location information after being positioned,
And the geographical location is determined as to a part for warning message, the alarm signal for carrying geographical location is sent to specified alarm terminal
Breath.
Optionally, mobile terminal by collect the content of the corresponding voice signal of monitored target, voice signal time
Or acquiescence emergency content is determined as the part of warning message, sent to specified alarm terminal carry voice signal content,
The time of voice signal or the warning message of acquiescence emergency content.
Step 206b, hides the transmission record of warning message.
Optionally, mobile terminal hides the transmission record of warning message;Schematically, when mobile terminal is whole to specified alarm
End sends the warning message for carrying geographical location, mobile whole if warning message is sent in the form of short message or mail
Hold the transmission record that the alarming short message or alarm mail are hidden in corresponding outbox;If warning message is with instant messaging
What the form of category information was sent, for example sent in the form of Real-Time Sharing position, then mobile terminal chatting in instant messaging tools
The transmission record of this information is hidden in its interface.
In alternatively possible embodiment, step 206 is alternative to be implemented as step 206c, step 206d and step
206e, as shown in Figure 4:
Step 206c, if voice signal includes triggering and talks secretly, mute state is arranged to by the loudspeaker on mobile terminal.
Talk secretly when voice signal includes triggering, when mobile terminal establishes call connection with specified alarm terminal, due to specifying
Alarm terminal not yet knows monitored target local environment, specifies alarm terminal probably directly to be sent out after call connection is established
Go out voice signal, it is corresponding, if mobile terminal receives the voice signal and sends the voice signal by loudspeaker, will lead
The alarm behavior of monitored target is caused to be found.Therefore, if voice signal includes triggering and talks secretly, mobile terminal is needed with specifying
Alarm terminal is established before call connection, and the loudspeaker on mobile terminal is arranged to mute state.
Optionally, if voice signal includes triggering and talks secretly, the loudspeaker on mobile terminal is arranged to mute by mobile terminal
State;Schematically, when loudspeaker is mute state, specified alarm terminal can receive the mobile end of mobile terminal transmission
The real-Time Speech Signals in local environment are held, and mobile terminal can not receive the specified alarm terminal institute that specified alarm terminal is sent
Locate the real-Time Speech Signals in environment.
Step 206d, establishes call connection, call is connected to send to specified alarm terminal and moves with specified alarm terminal
Real-Time Speech Signals and/or real time video signals in dynamic terminal local environment.
Optionally, mobile terminal actively establishes call connection with specified alarm terminal, and call is connected to specified alarm
Terminal sends real-Time Speech Signals and/or real time video signals in mobile terminal local environment;Schematically, mobile terminal can
To gather the real-Time Speech Signals in mobile terminal local environment by the microphone on mobile terminal, sent out to specified alarm terminal
Send the real-Time Speech Signals in mobile terminal local environment;Mobile terminal can also be gathered by the camera on mobile terminal and moved
Real time video signals in dynamic terminal local environment, the real-time video in mobile terminal local environment is sent to specified alarm terminal
Signal.
Step 206e, hiding talking connect related user interface.
Optionally, mobile terminal hiding talking connects related user interface;Schematically, call connects related user
The message registration that interface includes dialing interface, call interface is connected with the call.
Specifically, when monitored target dials communicating number used in specified alarm terminal using mobile terminal, i.e., to
When specifying alarm terminal transmission call request, mobile terminal does not show dialing interface;When receiving the call in specified alarm terminal
After request, mobile terminal establishes call connection with specified alarm terminal, i.e. mobile terminal and specified alarm terminal is in call
During state, mobile terminal does not show call interface;When mobile terminal or specified alarm terminal disconnect call connection, i.e. movement eventually
At the end of the talking state of end and specified alarm terminal, mobile terminal does not show the message registration of call connection.
Fig. 5 is refer to, it illustrates the flow chart of automatic alarm method provided by one embodiment of the present invention.The present embodiment
It is be based on the preferred embodiments of Fig. 2, the present embodiment is with the automatic alarm method applied to being illustrated in mobile terminal.Should
Automatic alarm method includes:
Step 501, the voice signal in monitored target local environment is gathered.
Optionally, the voice signal in mobile terminal collection monitored target local environment;Schematically, in local environment
Voice signal include the corresponding voice signal of monitored target, the corresponding voice signal of other objects, local environment background pair
At least one of voice signal answered.
Step 502, whether the vocal print feature for detecting voice signal is the corresponding vocal print feature of monitored target.
Optionally, whether the vocal print feature of mobile terminal detection voice signal is the corresponding vocal print feature of monitored target.
Optionally, whether mobile terminal is the corresponding vocal print feature of monitored target in the vocal print feature of detection voice signal
Before, mobile terminal prestores the corresponding vocal print feature of monitored target;Specifically, monitored target needs advance typing voice letter
Number, the voice signal of the mobile terminal collection advance typing of monitored target simultaneously extracts vocal print feature corresponding with monitored target;
Schematically, vocal print feature includes rolling up in flat tongue characteristic parameter, vocal cords characteristic parameter, oral cavity characteristic parameter, nasal sound characteristic parameter
At least one.
Step 503, if vocal print feature is the corresponding vocal print feature of monitored target, it is determined that voice signal is monitored pair
The voice signal of elephant.
Optionally, the vocal print feature of mobile terminal detection voice signal is not the corresponding vocal print feature of monitored target, then
Step 501 is performed again.
Optionally, mobile terminal carries out the voice signal in monitored target local environment vocal print feature analysis and carries
Take, obtain the vocal print feature of voice signal, the vocal print feature of obtained voice signal is corresponding with the monitored target to prestore
Vocal print feature information is matched.If the matching degree of obtained vocal print feature vocal print feature corresponding with the monitored target to prestore
More than or equal to default matching degree threshold value, it is determined that vocal print feature is the corresponding vocal print feature of monitored target;If obtained sound
The matching degree of line feature vocal print feature corresponding with the monitored target to prestore is less than default matching degree threshold value, it is determined that vocal print
Feature is not the corresponding vocal print feature of monitored target, re-executes step 501.
Step 504, voice signal is identified as text message by speech recognition engine.
Optionally, voice signal is identified as text message by mobile terminal by speech recognition engine;Schematically, voice
Identification engine is used to be identified by predetermined speech recognition modeling, such as common hidden Markov model (English:
Hidden Markov Model, HMM).
Step 505, detect whether comprising triggering cipher in text message, triggering cipher is pre-set textual form
Keyword or sentence.
Optionally, whether triggering cipher is included in mobile terminal detection text message.
Optionally, triggering cipher is the keyword or sentence of the pre-set textual form of monitored target;Schematically,
Due to the situation of human factor life-threatening safety being likely to occur, for example detected object is by criminal hijack, monitored target
Triggering cipher can be arranged to " not injure me, money all gives you ";Due to the external environment life-threatening peace being likely to occur
Full situation, for example fire occurs, triggering cipher can be arranged to " catching fire, I, which goes out, does not go " by monitored target;Due to
The situation that the body being likely to occur is injured unexpectedly, such as monitored target fall and hurt oneself, and monitored target can talk secretly triggering
It is arranged to " I falls, it is impossible to dynamic ";Since the situation of healthy hidden danger being likely to occur, such as monitored target have asthma,
Triggering cipher can be arranged to " I has difficulty in breathing now " by monitored target.
Step 506, if voice signal includes triggering and talks secretly, mobile terminal positions the geography of mobile terminal using alignment system
Position, the warning message for carrying geographical location is sent to specified alarm terminal.
Optionally, if not including triggering cipher in mobile terminal detection text message, step 501 is re-executed.
Step 507, mobile terminal hides the transmission record of warning message.
Step 508, if voice signal includes triggering and talks secretly, the loudspeaker on mobile terminal is arranged to mute by mobile terminal
State.
Step 509, mobile terminal establishes call connection with specified alarm terminal, and call is connected to specified alarm terminal
Send the real-Time Speech Signals and/or real time video signals in mobile terminal local environment.
Step 510, mobile terminal hiding talking connects related user interface.
Specifically, when monitored target dials communicating number used in specified alarm terminal using mobile terminal, i.e., to
When specifying alarm terminal transmission call request, mobile terminal does not show the dialing interface of call connection;When whole in specified alarm
After the end reception call request, mobile terminal establishes call connection, i.e. mobile terminal and specified alarm with specified alarm terminal
When terminal is in talking state, mobile terminal does not show the call interface of call connection;When mobile terminal or specify alarm eventually
End disconnects call connection, i.e., at the end of the talking state of mobile terminal and specified alarm terminal, mobile terminal does not show that this is logical
Talk about the message registration of connection.
Step 511, the communication information and/or voice communication request and/or video calling from specified alarm terminal are shielded
Request.
When mobile terminal sends the communication information such as short message or mail or instant messaging category information to specified alarm terminal, refer to
Determine authenticity of the alarm terminal due to not knowing the communication information, it is generally the case that specified alarm terminal can reply communication letter
Breath, i.e., send the communication information and/or voice communication request to mobile terminal used in monitored target and/or video calling please
Ask, if mobile terminal does not shield the communication information and/or voice communication request and/or video calling request, mobile terminal connect
The communication information and/or voice communication request and/or video calling request are received, and shows that the communication information and/or voice lead to
Words request and/or the transmission record of video calling request, so as to cause the alarm behavior of monitored target to be found, threaten by
The life security of monitoring object.Therefore, the communication information of the mobile terminal shielding from specified alarm terminal or voice communication are passed through
Request or video calling request, ensure that the transmission behavior of warning message is not found.
Optionally, when receiving the short message or mail from specified alarm terminal, then the inbox of mobile terminal intercepts
And do not show the short message or mail;When receiving the instant messaging category information from specified alarm terminal, then in mobile terminal
The chat interface of corresponding instant messaging tools does not receive and does not show the instant messaging category information;Reported when receiving from specified
During the voice communication request of alert terminal, then mobile terminal does not receive and does not show call channel hair corresponding with specified alarm terminal
The voice communication request sent;It is when receiving the request of the video calling from specified alarm terminal, then corresponding in mobile terminal
The chat interface of instant messaging tools does not receive and does not show that the video calling is asked.
Step 512, mobile terminal receives shutdown command.
When there is a situation where human factor life-threatening safety, for example user would generally be by user by criminal hijack, ruffian
Used mobile terminal shuts down, corresponding, and mobile terminal receives shutdown command.
Step 513, pseudo- shutdown mode is entered according to shutdown command, pseudo- shutdown mode is that the output equipment of mobile terminal is pass
Closed state but the pattern that background operation state is in for sending the program of warning message.
If mobile terminal enters normal shutdown mode after receiving shutdown command, warning message will be unable to be sent to finger
Determine alarm terminal, the call that the active before being forced to terminate with specified alarm terminal is established also is connected by mobile terminal.Therefore, use
Still need in the program for sending warning message on the premise of not being found and be in operating status.
In the present embodiment, (such as 1 in the scheduled duration after mobile terminal sends warning message to specified alarm terminal
In it), if mobile terminal have received shutdown command, mobile terminal enters pseudo- shutdown mode according to shutdown command, and puppet is closed
Machine pattern is that the output equipment of mobile terminal is in off state but the program for sending warning message is in background operation state
Pattern.
Wherein, output equipment includes:At least one of screen, loudspeaker, vibrational feedback component and flash lamp;Schematically
, when mobile terminal enters pseudo- shutdown mode, the screen in output equipment is arranged to black state, and loudspeaker is arranged to mute
State, vibrational feedback component are arranged to not vibrational state, and flash lamp is arranged to not flicker state.
Wherein, include for sending the program of warning message:Short message sending program, mail transmission program, instant messaging class
At least one of information transmission program, real-Time Speech Signals transmission program, real time video signals transmission program, finder.
Optionally, mobile terminal is after in detecting text message comprising triggering cipher, and mobile terminal is according to shutdown command
Into pseudo- shutdown mode, what what step 512 and step 513 were provided provided the step of entering pseudo- shutdown mode with step 511
The step of shielding, sequentially, can side by side perform in no particular order, alternatively, first carrying out step 512 and step 513, then perform step 511,
Wherein step 511 can be performed a plurality of times.
In conclusion the present embodiment is by gathering the corresponding voice signal of monitored target;Whether recognition of speech signals wraps
Containing default triggering cipher;If voice signal includes triggering and talks secretly, alarm terminal is specified to send report from trend with concealed pattern
Alert information, concealed pattern are to send the process of warning message sightless pattern on mobile terminals;So that when the urgent feelings of generation
During condition, monitored target is alarmed by directly saying default triggering cipher, avoids the need for taking out mobile phone and long-press
The situation of physical button on mobile phone, and since mobile terminal is to send warning message, whole alarm procedure with concealed pattern
It is not easy to be found by ruffian, has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
If the present embodiment also includes triggering by voice signal and talks secretly, mobile terminal sets the loudspeaker on mobile terminal
For mute state;Even if specifying alarm terminal directly to send voice signal after call connection is established due to not knowing situation, move
After dynamic terminal receives the voice signal, the voice signal will not be sent by loudspeaker, i.e., will not be listened by mobile terminal side
To the voice signal, so as to avoid the alarm behavior situation about being found of monitored target so that communication process be not easy by
Ruffian has found, has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
The present embodiment is also asked and/or regarded by the communication information of the shielding from specified alarm terminal and/or voice communication
Frequency call request;So that when specifying alarm terminal to be sent to determine the authenticity of warning message received to mobile terminal
During the communication information, mobile terminal intercepts the communication information;It is mobile when specified alarm terminal sends call request to mobile terminal
Terminal does not receive and does not show the call request so that whole alarm procedure is not easy to be found by ruffian, has reached and made up movement
The effect for the functional defect that automatic alarm is applied in terminal.
For the present embodiment also by entering pseudo- shutdown mode according to shutdown command, pseudo- shutdown mode is that the output of mobile terminal is set
The standby pattern being in off state but background operation state is in for sending the program of warning message;It is so that bad in mobile terminal
On foot after shutdown, the program for sending warning message still can be with normal operation, i.e. warning message still can be to specified alarm
Terminal is sent, and the output equipment of mobile terminal is in off state, that is, triggers any physical button of mobile terminal, mobile terminal is not
It can respond again, mobile terminal is normal off-mode on the surface so that in the case where not found by ruffian, whole report
Alert process is still continuing, and has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
With reference to reference to figure 6, illustrated with a specific example, user pre-sets triggering cipher and " not injure
I, money all gives you ", corresponding, the mobile phone storage triggering cipher " not injure me, money all gives you " of user, user's selection
The acquisition state of mobile microphone is opened, gathers all sound in user's local environment.When emergency occurs for user, say
Go out " not injure me, money all gives you ", " not hinder comprising triggering cipher in all sound that the mobile phone of user detects to collect
Me is done harm to, money all gives you ", the mobile phone of user uses the geographical location of the mobile phone of GPS positioning user at this time, then to emergency interconnection
The mobile phone of people or the telephone call terminal of the police send the alarming short message for carrying geographical location, and hide the hair of the alarming short message
Send record;The loudspeaker on mobile phone is arranged to mute state by the mobile phone of user at the same time, is established with the telephone call terminal of the police
Call connection, and hide call connection.When emergency contact sending short message by mobile phone from mobile phone to user or call or
When sending video request, the short message or phone or video request of mobile phone of the mobile phone shielding from emergency contact of user.When with
When the mobile phone at family receives shutdown command, pseudo- shutdown mode is entered according to shutdown command mobile phone.
Fig. 7 is refer to, it illustrates the structure diagram of autoalarm provided by one embodiment of the present invention.Should be certainly
Dynamic warning device includes:
Acquisition module 710, for gathering the corresponding voice signal of monitored target.
Whether identification module 720, default triggering cipher is included for recognition of speech signals.
Sending module 730, talks secretly if including triggering for voice signal, alarm terminal is specified from trend with concealed pattern
Send warning message, concealed pattern be send warning message process on autoalarm sightless pattern.
In conclusion the present embodiment is by gathering the corresponding voice signal of monitored target;Whether recognition of speech signals wraps
Containing default triggering cipher;If voice signal includes triggering and talks secretly, alarm terminal is specified to send report from trend with concealed pattern
Alert information, concealed pattern are to send the process of warning message sightless pattern on mobile terminals;So that when the urgent feelings of generation
During condition, monitored target is alarmed by directly saying default triggering cipher, avoids the need for taking out mobile phone and long-press
The situation of physical button on mobile phone, and since mobile terminal is to send warning message, whole alarm procedure with concealed pattern
It is not easy to be found by ruffian, has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
Fig. 8 is refer to, the structure diagram of the autoalarm provided it illustrates another embodiment of the present invention.This
Embodiment is to be based on the preferred embodiments of Fig. 7, which includes:
Sending module 730, including:
731 and first hidden unit 732 of transmitting element.
Transmitting element 731, for the geographical location using alignment system positioning auto-alarm, to specified alarm terminal
Send the warning message for carrying geographical location.
First hidden unit 732, the transmission for hiding warning message record.
Sending module 730, including:
Setting unit 733, establish 734 and second hidden unit 735 of unit.
Setting unit 733, for the loudspeaker on autoalarm to be arranged to mute state.
Unit 734 is established, for establishing call connection with specified alarm terminal, call is connected to specified alarm terminal
Send the real-Time Speech Signals and/or real time video signals of autoalarm side.
Second hidden unit 735, related user interface is connected for hiding talking.
Acquisition module 710, including:
First collecting unit 711 and/or the second collecting unit 712;
First collecting unit 711, for when monitoring that current geographic position is different from resident geographical location, gathering and being supervised
Survey the corresponding voice signal of object;
Second collecting unit 712, for when monitoring abnormal motion sensor data, collection monitored target to correspond to
Voice signal.
Identification module 720, including:
Recognition unit 721 and detection unit 722.
Recognition unit 721, for voice signal to be identified as text message by speech recognition engine.
Detection unit 722, whether for detecting comprising triggering cipher in text message, triggering cipher is pre-set text
The keyword or sentence of this form.
The device, further includes:
Shroud module 740, for shield the communication information from specified alarm terminal and/or voice communication request and/or
Video calling is asked.
The device, further includes:
Receiving module 750 and entrance module 760.
Receiving module 750, for receiving shutdown command.
Into module 760, for entering pseudo- shutdown mode according to shutdown command, pseudo- shutdown mode is autoalarm
Output equipment is in off state but the pattern of background operation state is in for sending the program of warning message.
Wherein, output equipment includes:At least one of screen, loudspeaker, vibrational feedback component and flash lamp.
In conclusion the present embodiment is by gathering the corresponding voice signal of monitored target;Whether recognition of speech signals wraps
Containing default triggering cipher;If voice signal includes triggering and talks secretly, alarm terminal is specified to send report from trend with concealed pattern
Alert information, concealed pattern are to send the process of warning message sightless pattern on mobile terminals;So that when the urgent feelings of generation
During condition, monitored target is alarmed by directly saying default triggering cipher, avoids the need for taking out mobile phone and long-press
The situation of physical button on mobile phone, and since mobile terminal is to send warning message, whole alarm procedure with concealed pattern
It is not easy to be found by ruffian, has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
The present embodiment is also asked and/or regarded by the communication information of the shielding from specified alarm terminal and/or voice communication
Frequency call request;So that when specifying alarm terminal to be sent to determine the authenticity of warning message received to mobile terminal
During the communication information, mobile terminal intercepts the communication information;It is mobile when specified alarm terminal sends call request to mobile terminal
Terminal does not receive and does not show the call request so that whole alarm procedure is not easy to be found by ruffian, has reached and made up movement
The effect for the functional defect that automatic alarm is applied in terminal.
The present embodiment is also asked and/or regarded by the communication information of the shielding from specified alarm terminal and/or voice communication
Frequency call request;So that lead to when specifying alarm terminal in order to which the authenticity for the warning message for determining to receive is sent to mobile terminal
When letter information and/or voice communication request and/or video calling are asked, believed by intercepting by the communication for specifying alarm terminal to send
Breath does not receive and does not show the mode of the voice communication request and/or video calling request by specifying alarm terminal transmission, makes
Obtain communication process to be not easy to be found by ruffian, reach the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
For the present embodiment also by entering pseudo- shutdown mode according to shutdown command, pseudo- shutdown mode is that the output of mobile terminal is set
The standby pattern being in off state but background operation state is in for sending the program of warning message;It is so that bad in mobile terminal
On foot after shutdown, the program for sending warning message still can be with normal operation, i.e. warning message still can be to specified alarm
Terminal is sent, and the output equipment of mobile terminal is in off state, that is, triggers any physical button of mobile terminal, mobile terminal is not
It can respond again, mobile terminal is normal off-mode on the surface so that in the case where not found by ruffian, whole report
Alert process is still continuing, and has reached the effect for making up the functional defect that automatic alarm is applied in mobile terminal.
Fig. 9 is the structure diagram of the server provided in one embodiment of the invention.The server can be shown in Fig. 1
Automatic alarm system in the server for realizing alignment system 142 or realize the communication information send platform 144 server
Or realize the server of call connecting platform 146.Specifically:The server 900 include central processing unit (CPU) 901,
System storage 904 including random access memory (RAM) 902 and read-only storage (ROM) 903, and connection system are deposited
Reservoir 904 and the system bus of central processing unit 901 905.The server 900 further includes each device helped in computer
The basic input/output (I/O systems) 906 of information is transmitted between part, and for storage program area 913, application program
914 and other program modules 915 mass-memory unit 907.
The basic input/output 906, which includes the display 908 for showing information and inputted for user, to be believed
The input equipment 909 of such as mouse, keyboard etc of breath.Wherein described display 908 and input equipment 909 are all by being connected to
The input and output controller 910 of system bus 905 is connected to central processing unit 901.The basic input/output 906
Can also include input and output controller 910 for receive and handle from keyboard, mouse or electronic touch pen etc. it is multiple its
The input of his equipment.Similarly, input and output controller 910 also provides output to display screen, printer or other kinds of defeated
Go out equipment.
The mass-memory unit 907 is by being connected to the bulk memory controller (not shown) of system bus 905
It is connected to central processing unit 901.The mass-memory unit 907 and its associated computer-readable medium are server
900 provide non-volatile memories.That is, the mass-memory unit 907 can include such as hard disk or CD-ROI
The computer-readable medium (not shown) of driver etc.
Without loss of generality, the computer-readable medium can include computer storage media and communication media.Computer
Storage medium is included for information such as storage computer-readable instruction, data structure, program module or other data
The volatile and non-volatile of any method or technique realization, removable and irremovable medium.Computer-readable storage medium includes
RAM, ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, tape
Box, tape, disk storage or other magnetic storage apparatus.Certainly, skilled person will appreciate that the computer-readable storage medium
It is not limited to above-mentioned several.Above-mentioned system storage 904 and mass-memory unit 907 may be collectively referred to as memory.
According to various embodiments of the present invention, the server 900 can also be arrived by network connections such as internets
Remote computer operation on network.Namely server 900 can be by the network interface that is connected on the system bus 905
Unit 911 is connected to network 912, in other words, can also be connected to using Network Interface Unit 911 other kinds of network or
Remote computer system (not shown).
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, which can be
Computer-readable recording medium included in memory in above-described embodiment;Can also be individualism, without supplying eventually
Computer-readable recording medium in end.The computer-readable recording medium storage has one or more than one program, this one
A either more than one program is used for performing above-mentioned automatic alarm method by one or more than one processor.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment
To complete, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on, should all be included in the protection scope of the present invention.
Claims (14)
- A kind of 1. automatic alarm method, it is characterised in that applied in mobile terminal, the described method includes:Gather the corresponding voice signal of monitored target;Identify whether the voice signal talks secretly comprising default triggering;If the voice signal includes the triggering and talks secretly, alarm terminal is specified to send alarm signal from trend with concealed pattern Breath, the secret pattern are to send the process of the warning message sightless pattern on the mobile terminal.
- 2. according to the method described in claim 1, it is characterized in that, described specify alarm terminal to send with concealed pattern from trend Warning message, including:The geographical location of the mobile terminal is positioned using alignment system, sends and is carried describedly to the specified alarm terminal Manage the warning message of position;Hide the transmission record of the warning message.
- 3. according to the method described in claim 1, it is characterized in that, described specify alarm terminal to send with concealed pattern from trend Warning message, including:Loudspeaker on the mobile terminal is arranged to mute state;Call connection is established with the specified alarm terminal, the call is connected to described in the specified alarm terminal transmission Real-Time Speech Signals and/or real time video signals in mobile terminal local environment;Hide the call and connect related user interface.
- 4. method according to any one of claims 1 to 3, it is characterised in that described to gather the corresponding voice of monitored target Signal, including:When monitoring that current geographic position is different from resident geographical location, the corresponding voice letter of the monitored target is gathered Number;And/orWhen monitoring abnormal motion sensor data, the corresponding voice signal of the monitored target is gathered.
- 5. method according to any one of claims 1 to 3, it is characterised in that whether the identification voice signal includes Default triggering cipher, including:The voice signal is identified as text message by speech recognition engine;Detect in the text message and whether talk secretly comprising the triggering, the triggering cipher is pre-set textual form Keyword or sentence.
- 6. method according to any one of claims 1 to 3, it is characterised in that described that alarm is specified from trend with concealed pattern After terminal sends warning message, further include:Shield the communication information from the specified alarm terminal and/or voice communication request and/or video calling request.
- 7. method according to any one of claims 1 to 3, it is characterised in that described that alarm is specified from trend with concealed pattern After terminal sends warning message, further include:Receive shutdown command;Pseudo- shutdown mode is entered according to the shutdown command, the puppet shutdown mode is that the output equipment of the mobile terminal is pass Closed state but the pattern that background operation state is in for sending the program of the warning message;Wherein, the output equipment includes:At least one of screen, loudspeaker, vibrational feedback component and flash lamp.
- 8. a kind of autoalarm, it is characterised in that described device includes:Acquisition module, for gathering the corresponding voice signal of monitored target;Identification module, for identifying the voice signal whether comprising default triggering cipher;Sending module, talks secretly if including the triggering for the voice signal, and alarm is specified eventually from trend with concealed pattern End send warning message, it is described secret pattern be send the warning message process it is invisible on the autoalarm Pattern.
- 9. device according to claim 8, it is characterised in that the sending module, including:Transmitting element and the first hidden unit;The transmitting element, for positioning the geographical location of the autoalarm using alignment system, to the specified report Alert terminal sends the warning message for carrying the geographical location;First hidden unit, the transmission for hiding the warning message record.
- 10. device according to claim 8, it is characterised in that the sending module, including:Setting unit, establish unit and the second hidden unit;The setting unit, for the loudspeaker on the autoalarm to be arranged to mute state;Described to establish unit, for establishing call connection with the specified alarm terminal, the call is connected to the finger Determine the real-Time Speech Signals and/or real time video signals in the alarm terminal transmission autoalarm local environment;Second hidden unit, related user interface is connected for hiding the call.
- 11. according to any method of claim 8 to 10, it is characterised in that the acquisition module, including:First collecting unit and/or the second collecting unit;First collecting unit, for when monitoring that current geographic position is different from resident geographical location, gathering the quilt The corresponding voice signal of monitoring object;Second collecting unit, for when monitoring abnormal motion sensor data, gathering the monitored target pair The voice signal answered.
- 12. according to any device of claim 8 to 10, it is characterised in that the identification module, including:Recognition unit and detection unit;The recognition unit, for the voice signal to be identified as text message by speech recognition engine;The detection unit, whether for detecting comprising the triggering cipher in the text message, the triggering cipher is pre- The keyword or sentence of the textual form first set.
- 13. according to any device of claim 8 to 10, it is characterised in that described device, further includes:Shroud module, for shielding the communication information and/or voice communication request and/or video from the specified alarm terminal Call request.
- 14. according to any device of claim 8 to 10, it is characterised in that described device, further includes:Receiving module and into module;The receiving module, for receiving shutdown command;Described to enter module, for entering pseudo- shutdown mode according to the shutdown command, the puppet shutdown mode is described automatic The output equipment of warning device is in off state but the mould of background operation state is in for sending the program of the warning message Formula;Wherein, the output equipment includes:At least one of screen, loudspeaker, vibrational feedback component and flash lamp.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610903897.8A CN107959748A (en) | 2016-10-17 | 2016-10-17 | Automatic alarm method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610903897.8A CN107959748A (en) | 2016-10-17 | 2016-10-17 | Automatic alarm method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107959748A true CN107959748A (en) | 2018-04-24 |
Family
ID=61953861
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610903897.8A Pending CN107959748A (en) | 2016-10-17 | 2016-10-17 | Automatic alarm method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107959748A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109191776A (en) * | 2018-09-06 | 2019-01-11 | 深圳市京华信息技术有限公司 | A kind of calling method, device, terminal, wearable device and storage medium |
CN109817202A (en) * | 2019-01-22 | 2019-05-28 | 珠海格力电器股份有限公司 | A kind of sound control method, device, storage medium and speech ciphering equipment |
CN110379099A (en) * | 2019-07-22 | 2019-10-25 | 闻泰科技(无锡)有限公司 | Terminal alarms method, apparatus, terminal and storage medium |
CN111340665A (en) * | 2018-12-19 | 2020-06-26 | 上海擎感智能科技有限公司 | Help seeking method, help seeking terminal and computer readable storage medium |
CN111862580A (en) * | 2020-06-14 | 2020-10-30 | 李建华 | Network car booking safety protection system based on intelligent identification and big data |
CN112243063A (en) * | 2019-07-18 | 2021-01-19 | 北京奇虎科技有限公司 | Automatic alarm method and device based on mobile terminal and mobile terminal |
CN112587107A (en) * | 2020-12-04 | 2021-04-02 | 歌尔科技有限公司 | Intelligent wearable device, safety protection management method, device and medium |
CN114821993A (en) * | 2022-04-14 | 2022-07-29 | 集美大学 | Vehicle-mounted secret language alarm and alarm method |
CN115410601A (en) * | 2022-11-01 | 2022-11-29 | 深圳市人马互动科技有限公司 | Voice interaction method based on scene recognition in man-machine conversation scene |
CN115842600A (en) * | 2022-11-14 | 2023-03-24 | 四川隐思保科技有限公司 | Signal leakage prevention system for confidential conference and installation method |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060022483A (en) * | 2004-09-07 | 2006-03-10 | 엘지전자 주식회사 | Mobile communication terminal having a fire alarming function and controlling method therefore |
CN101778353A (en) * | 2010-02-20 | 2010-07-14 | 华为终端有限公司 | Automatic alarm method and terminal |
CN102739863A (en) * | 2012-06-14 | 2012-10-17 | 中兴通讯股份有限公司 | Emergency call method and device |
CN103516876A (en) * | 2012-06-26 | 2014-01-15 | 希姆通信息技术(上海)有限公司 | Mobile terminal and concealed help seeking method |
CN104486521A (en) * | 2014-12-12 | 2015-04-01 | 北京元心科技有限公司 | Mobile phone alarm method and device |
CN104506717A (en) * | 2014-12-10 | 2015-04-08 | 广东欧珀移动通信有限公司 | Alarming method and device for mobile equipment |
CN104869251A (en) * | 2015-05-16 | 2015-08-26 | 广东维沃软件技术有限公司 | Method and mobile terminal for emergency calling for help |
CN105321514A (en) * | 2014-05-28 | 2016-02-10 | 西安中兴新软件有限责任公司 | Alarm method and terminal |
CN105744064A (en) * | 2016-01-29 | 2016-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Automatic communication help calling method, automatic communication help calling and terminal |
-
2016
- 2016-10-17 CN CN201610903897.8A patent/CN107959748A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060022483A (en) * | 2004-09-07 | 2006-03-10 | 엘지전자 주식회사 | Mobile communication terminal having a fire alarming function and controlling method therefore |
CN101778353A (en) * | 2010-02-20 | 2010-07-14 | 华为终端有限公司 | Automatic alarm method and terminal |
CN102739863A (en) * | 2012-06-14 | 2012-10-17 | 中兴通讯股份有限公司 | Emergency call method and device |
CN103516876A (en) * | 2012-06-26 | 2014-01-15 | 希姆通信息技术(上海)有限公司 | Mobile terminal and concealed help seeking method |
CN105321514A (en) * | 2014-05-28 | 2016-02-10 | 西安中兴新软件有限责任公司 | Alarm method and terminal |
CN104506717A (en) * | 2014-12-10 | 2015-04-08 | 广东欧珀移动通信有限公司 | Alarming method and device for mobile equipment |
CN104486521A (en) * | 2014-12-12 | 2015-04-01 | 北京元心科技有限公司 | Mobile phone alarm method and device |
CN104869251A (en) * | 2015-05-16 | 2015-08-26 | 广东维沃软件技术有限公司 | Method and mobile terminal for emergency calling for help |
CN105744064A (en) * | 2016-01-29 | 2016-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Automatic communication help calling method, automatic communication help calling and terminal |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109191776A (en) * | 2018-09-06 | 2019-01-11 | 深圳市京华信息技术有限公司 | A kind of calling method, device, terminal, wearable device and storage medium |
CN111340665A (en) * | 2018-12-19 | 2020-06-26 | 上海擎感智能科技有限公司 | Help seeking method, help seeking terminal and computer readable storage medium |
CN109817202A (en) * | 2019-01-22 | 2019-05-28 | 珠海格力电器股份有限公司 | A kind of sound control method, device, storage medium and speech ciphering equipment |
CN112243063A (en) * | 2019-07-18 | 2021-01-19 | 北京奇虎科技有限公司 | Automatic alarm method and device based on mobile terminal and mobile terminal |
CN110379099A (en) * | 2019-07-22 | 2019-10-25 | 闻泰科技(无锡)有限公司 | Terminal alarms method, apparatus, terminal and storage medium |
CN111862580A (en) * | 2020-06-14 | 2020-10-30 | 李建华 | Network car booking safety protection system based on intelligent identification and big data |
CN112587107A (en) * | 2020-12-04 | 2021-04-02 | 歌尔科技有限公司 | Intelligent wearable device, safety protection management method, device and medium |
CN114821993A (en) * | 2022-04-14 | 2022-07-29 | 集美大学 | Vehicle-mounted secret language alarm and alarm method |
CN115410601A (en) * | 2022-11-01 | 2022-11-29 | 深圳市人马互动科技有限公司 | Voice interaction method based on scene recognition in man-machine conversation scene |
CN115410601B (en) * | 2022-11-01 | 2022-12-30 | 深圳市人马互动科技有限公司 | Voice interaction method based on scene recognition in man-machine conversation scene |
CN115842600A (en) * | 2022-11-14 | 2023-03-24 | 四川隐思保科技有限公司 | Signal leakage prevention system for confidential conference and installation method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107959748A (en) | Automatic alarm method and device | |
US11475745B2 (en) | Self-contained security system including voice and video calls via the internet | |
CN107530011B (en) | Personal safety and assurance mobile applications responsive to heart rate changes | |
US20170188216A1 (en) | Personal emergency saver system and method | |
CN109410521A (en) | Voice monitoring alarm method and system | |
KR20140088836A (en) | Methods and systems for searching utilizing acoustical context | |
CN106657690A (en) | Method and device for preventing phone scam, and mobile terminal | |
CN108696641B (en) | Call prompting method, device, storage medium and mobile terminal | |
US9942741B2 (en) | Incident monitoring and response system | |
CN108769369A (en) | A kind of method for early warning and mobile terminal | |
CN108040182A (en) | A kind of alarm method and mobile terminal | |
US11775625B2 (en) | Alert task processing method, terminal, and computer-readable storage medium | |
RU2554549C2 (en) | Interactive door intercom | |
CN104954429A (en) | Method of automatic help seeking system in danger | |
KR101792047B1 (en) | A method of providing an emergency alert function using smartphone and earphone | |
CN110401806A (en) | A kind of video call method of mobile terminal, mobile terminal and storage medium | |
CN109918944A (en) | A kind of information protecting method, device, mobile terminal and storage medium | |
WO2016113697A1 (en) | Rescue sensor device and method | |
CN109309762A (en) | Message treatment method, device, mobile terminal and storage medium | |
CN108063869A (en) | A kind of safe early warning method, mobile terminal | |
CN110062107A (en) | A kind of content display method and terminal device | |
CN110223468A (en) | Intelligent sound alarm method, device, system, computer equipment and storage medium | |
CN108833686A (en) | Processing method for paging message, terminal device, network side equipment and storage medium | |
CN107911527A (en) | A kind of information protecting method, terminal device and computer-readable recording medium | |
US20210266731A1 (en) | User confidentiality protection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180424 |
|
RJ01 | Rejection of invention patent application after publication |