CN109218532B - User safety monitoring method and system for stranger social offline activities - Google Patents

User safety monitoring method and system for stranger social offline activities Download PDF

Info

Publication number
CN109218532B
CN109218532B CN201811166079.XA CN201811166079A CN109218532B CN 109218532 B CN109218532 B CN 109218532B CN 201811166079 A CN201811166079 A CN 201811166079A CN 109218532 B CN109218532 B CN 109218532B
Authority
CN
China
Prior art keywords
activity
user
information
current user
position information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811166079.XA
Other languages
Chinese (zh)
Other versions
CN109218532A (en
Inventor
陈俊华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Feichi Network Technology Co ltd
Original Assignee
Hangzhou Feichi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Feichi Network Technology Co ltd filed Critical Hangzhou Feichi Network Technology Co ltd
Priority to CN201811166079.XA priority Critical patent/CN109218532B/en
Publication of CN109218532A publication Critical patent/CN109218532A/en
Application granted granted Critical
Publication of CN109218532B publication Critical patent/CN109218532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Emergency Management (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a user safety monitoring method and system for strangers to socialize offline activities, wherein the method comprises the following steps: acquiring personal information of a current user and activity information of an activity in which the current user participates; acquiring the position information of the current user in real time, and storing the position information; and when the alarm information is received, sending the current position information and the personal information of the current user, and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue organization. When a user participates in social activities of strangers, an alarm can be given in time when an accident occurs, meanwhile, the current position information when the accident occurs can be sent to rescue mechanisms such as police and the like, and the positions and the personal information of other users synchronized with the position of the current user giving the alarm in a period of time before the alarm is provided, so that references are provided for condition judgment, communication connection and position tracking in rescue, and the safety of the user is guaranteed.

Description

User safety monitoring method and system for stranger social offline activities
Technical Field
The application relates to the technical field of internet, in particular to a user safety monitoring method and system for strangers to socialize offline activities.
Background
Social interaction refers to the interpersonal communication between people in the society, and is the consciousness that people transmit information and communicate ideas in a certain mode (tool) so as to achieve various social activities with a certain purpose. In the modern times, changes in economic and social environments make interpersonal communication more important. Because people can only continuously interact with various personnel and communicate information, people can be enriched, developed and expanded continuously.
With the development of scientific technology and the application of internet resources in life, the communication between people is realized by means of the internet, and strangers can also realize social contact through the internet, so that the purposes of further developing and expanding the strangers are realized. Some internet platforms and services have appeared in the prior art that are directed to strangers' social services, such as searching for nearby people to have online conversations, transmitting network drift bottles, etc.
A stranger social platform recently appeared in the prior art is that an activity organizer publishes a social activity (such as dinner gathering, outing, playing games, etc.) held at a predetermined time and place on the platform, and sets conditions (such as sex, age, etc.) to be met for participating in the social activity; other users can search the social activities which are interesting and meet the conditions on the platform and register the social activities online, and then the social activities are attended to the scheduled places on time as activity participants.
In the prior art, in the process of realizing social contact among strangers, users usually use an intelligent terminal to initiate or register to participate in social activities in an APP of the intelligent terminal so as to realize the social contact among the strangers. And when the stranger social activity starts, the platform can generate a check-in two-dimensional code and send the check-in two-dimensional code to the activity initiator, and the users participating in the activity can use the intelligent terminal to scan the check-in two-dimensional code, so that the users sign in to the platform.
In the process of stranger social contact, user safety is the primary problem, and the platform needs to avoid the occurrence of some conditions threatening property safety and personal safety of the user, including accidents and human infringement, so that necessary safety guarantee is provided for the user; and once the above situation occurs, the platform can know as much related information as possible in the first time, thereby providing external help for the user and assistance for rescue institutions such as police.
Currently, the user security mechanisms that are common in practical applications include one-touch alerts and risk reminders. The one-key alarm mainly considers that in many cases, users with security threats cannot complete alarm in a conventional 110-call and short message sending mode, so that the platform can ask police and other mechanisms for help instead of the users after receiving one-key alarm requests triggered by the users. The risk prompt is mainly used for screening the holding time, place, content and the like of social activities by the platform, for example, necessary prompts are given when users register the names of the social activities of remote places or high-risk places, late night or early morning, content with certain risk or special links related to drinking and the like, and the users are required to register the names after evaluation with caution.
However, the above-mentioned security mechanisms in the prior art still have certain drawbacks. In fact, many user security cases do not occur at the time and place of the social activity itself, but at other places after the social activity is over, and thus the risk alert function has limitations. In addition, communication behaviors of users are often restricted in the case occurrence process, even if the mobile phone is in a power-off state, the platform cannot contact with the users and cannot position the users, and therefore even if the platform receives one-key alarm, the platform cannot provide more useful information for police or rescue institutions.
Disclosure of Invention
In view of the above, an object of the present application is to provide a user security monitoring method and system for strangers 'offline activities, so as to solve the technical problem in the prior art that a user cannot give an alarm in time when an accident occurs during or after participating in the strangers' social activities, and cannot send necessary information such as the position of the user and the same person when the accident occurs to an police, so that the security of the user cannot be guaranteed.
In view of the above, in a first aspect of the present application, a method for monitoring user security of strangers social networking activities is provided, including:
acquiring personal information of a current user and activity information of an activity in which the current user participates;
acquiring the position information of the current user in real time, and storing the position information;
and when the alarm information is received, sending the current position information and the personal information of the current user, and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue organization.
In some embodiments, the obtaining and storing the location information of the current user in real time includes:
judging whether the current time point is within a preset monitoring time period or not;
if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information;
and if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
In some embodiments, the activity information includes activity flow information, each of the activity flows corresponds to an activity location and an activity time, and the method further includes:
and when the activity time corresponding to the current activity process and the activity place corresponding to the current activity process are different from each other, automatically sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue organization.
In some embodiments, the obtaining the location information of the current user in real time includes:
and receiving reporting information sent by the intelligent terminal in real time, and extracting the position information of the current user from the reporting information.
In some embodiments, the location information of the current user is determined by GPS positioning when the current user is located outdoors.
In some embodiments, whether the position information of the current user and the position information of other users participating in the social activity are synchronous or not can be judged by calculating the distance between the position information of the current user and the position information of the other users participating in the social activity
In some embodiments, when the current user is located indoors, the location information of the current user is represented by WIFI fingerprints.
In some embodiments, the WIFI fingerprint comprises:
account information of a plurality of WIFI transmitters and signal strength of each WIFI transmitter received by the intelligent terminal.
In some embodiments, by comparing the consistency of the current user's WIFI fingerprint with the WIFI fingerprints of other users participating in the social activity; and when account names contained in the WIFI fingerprints of the two are consistent and the signal intensity difference value of each account is not greater than a preset signal intensity difference threshold value, judging that the position information of the two is synchronous.
In some embodiments, the WIFI fingerprint is compared with a positioning reference WIFI fingerprint in an indoor WIFI fingerprint database, and when the WIFI fingerprint database includes a matching positioning reference WIFI fingerprint, an indoor location can be accurately identified.
In some embodiments, further comprising:
and generating a corresponding activity track according to the real-time position information of the current user, and sending the activity track to the police party when alarm information is received.
In another aspect of the present application, there is provided a user security monitoring system for strangers social networking activities, including:
the first information acquisition module is used for acquiring personal information of a current user and activity information of an activity in which the current user participates;
the second information acquisition module is used for acquiring the position information of the current user in real time and storing the position information;
and the alarm module is used for sending the current position information and the personal information of the current user, and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue organization when receiving the alarm information.
In some embodiments, further comprising:
the time judging module is used for judging whether the current time point is within a preset monitoring time period or not; if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information; and if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
The embodiment of the application provides a user safety monitoring method and system for stranger social offline activities, when a user participates in stranger social activities, an alarm can be given in time when an accident or man-made invasion occurs, meanwhile, current position information when the accident occurs can be sent to rescue mechanisms such as police and the like, and positions and personal information of other users synchronized with the position of the current user giving the alarm in a period before the alarm is provided, so that references are provided for condition judgment, communication connection and position tracking in rescue, and the safety of the user is guaranteed. The invention can realize synchronous judgment of the user position indoors or indoor position positioning by using a plurality of positioning modes such as WIFI fingerprint and the like. The present invention may also automatically trigger manual verification and intervention by platform customers when the user is significantly deviated from the activity site of the social activity.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a flowchart of a user security monitoring method for stranger social networking activities according to a first embodiment of the present application;
FIG. 2 is a flowchart of a user security monitoring method for stranger social networking activities according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of a user security monitoring system for stranger social networking activities according to a third embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
As an embodiment of the present application, as shown in fig. 1, a flowchart of a user security monitoring method for social offline activities of strangers is shown in the first embodiment of the present application. As can be seen from fig. 1, the user security monitoring method for strangers social offline activity of the present embodiment may include the following steps:
s101: personal information of a current user and activity information of an activity in which the current user is participating are acquired.
The user safety monitoring method for the stranger social offline activities is mainly applied to a background server, the background server can be in communication connection with a plurality of intelligent terminals, and personal information of a current user and activity information of activities in which the current user participates are obtained through the intelligent terminals.
The intelligent terminal in this embodiment may be, for example, a common smart phone or the like, an APP (application software) may be installed in the intelligent terminal, and a user may realize stranger social contact by registering an APP account. Specifically, the user APP may initiate an activity and publish activity information, so that other users can obtain the activity information and further participate in the activity to realize social contact among strangers, and the user may also participate in activities initiated by other users to realize social contact among strangers. And when the stranger social activity starts, the platform can generate a check-in two-dimensional code and send the check-in two-dimensional code to an activity initiator or an activity participating user. And the users participating in the activity can utilize the intelligent terminal to scan the check-in two-dimensional code, so that the intelligent terminal of the user obtains the activity number of the activity in which the current user participates, then checks in the platform, and once the check-in indicates that the user participates in the social activity, the platform starts the background safety protection of the user and extracts the activity information of the social activity. The activity information of the social activity comprises the holding time, the holding place, the personal information of other users who organize and participate in the social activity, and the like.
In addition, the personal information of the users participating in the social activities is visible to the platform, and the platform can acquire the personal information of the users by checking the personal dynamic information associated with the users or checking the personal setting information of the users at the backstage. The personal dynamic information of the current user in this embodiment and the following embodiments is information of the user participating in social activities, and the personal setting information mainly refers to account information and identity information of the current user, for example, a registered account number of the current user in the APP, and personal identity information filled in during identity authentication in a registration process, for example, a name, a gender, an age, a place of residence, a type of work performed, and the like.
In this embodiment, after the current user signs in to participate in the stranger social offline activity, the personal information of the current user and the activity information of the social activity in which the current user is participating are acquired by the background server. The activity information in this embodiment may include an activity time and an activity location of an activity in which the current user is participating, and when the activity is divided into a plurality of activity processes, the activity information may further include an activity time and an activity location corresponding to an activity of each process.
S102: and acquiring the position information of the current user in real time, and storing the position information.
In this embodiment, after the background security protection is started, within an activity time range in the activity information, the intelligent terminal of the current user acquires the position information of the current user in real time, and sends the position information of the current user acquired in real time to the background server, for example, once every 5 seconds. And after the background server receives the position information of the current user sent by the intelligent terminal of the current user, storing the position information acquired all the time. In this embodiment, the intelligent terminal of the current user may send the location information of the current user to a background server in real time, or may send the location information of the current user to the background server every preset time period, for example, send the location information of the current user to the background server every 3 minutes. Because each user participating in the social activity can acquire and upload own position information in real time, the background server can acquire and store the position information of all users according to the user information organizing and participating in a certain social activity in the activity information.
S103: and when the alarm information is received, sending the current position information and the personal information of the current user, and the current position information and the personal information of other users synchronized with the position information of the current user to rescue mechanisms such as police and the like.
In this embodiment, a key alarm function can be set in the APP of the current user's intelligent terminal, and the user can realize alarming by clicking a key in one APP or a key in the mobile phone. When the current user sends alarm information through a one-key alarm function in the intelligent terminal, the intelligent terminal of the current user can communicate with the background server, the background server can receive the alarm information sent by the intelligent terminal, and after the background server receives the alarm information sent by the intelligent terminal, the current position information and the personal information of the current user are acquired; and the background server retrieves the position information of the current user when the current user gives an alarm after signing in the social activity, and obtains the position information stored for other users participating in the social activity, compares the position information of the current user with the position information of other users, and sends the current position information of other users and the personal information of other users with synchronized position information to rescue mechanisms such as police and the like if the position information of the current user is synchronized with the position information of any one or more other users within a period of time before the alarm (for example, 20 minutes before the alarm), that is, the position distance between the current position information and the position information is kept less than a threshold value, so that the police and other rescue mechanisms can determine the identity and the position of the current user through the current position information and the personal information of the current user, and simultaneously, through the related information of other users synchronized with the position information of the current user, users around the current user are determined to provide assistance for rescue, for example, if the current user loses communication and location monitoring after an alarm, the police or rescue authorities may establish communication inquiries with other users synchronized with the current user location information, or keep track of the locations of other users.
According to the user safety monitoring method for the stranger offline activities, when a user participates in the stranger social activities, when an accident or human invasion occurs, an alarm can be given in time, meanwhile, the current position information when the accident occurs can be sent to rescue mechanisms such as police and the like, and the positions and personal information of other users synchronized with the position of the current user giving the alarm in a period before the alarm is provided, so that excessive reference is provided for condition judgment, communication connection and position tracking in rescue, and the safety of the user is guaranteed.
Fig. 2 is a flowchart of a user security monitoring method for strangers social networking activity according to a second embodiment of the present application. The user security monitoring method for the stranger social offline activity in the embodiment may include the following steps:
s201: personal information of a current user and activity information of an activity in which the current user is participating are acquired.
In this embodiment, after the current user signs in to participate in the stranger social offline activity, the background server obtains the personal information of the current user and the activity information of the activity in which the current user is participating. The personal information in this embodiment includes personal dynamic information and personal setting information of the user, the activity information may include activity time and activity place of an activity in which the current user is participating, and when the activity is divided into a plurality of activity processes, the activity information may further include activity time and activity place corresponding to the activity of each process.
S202: and judging whether the current time point is within a preset monitoring time period.
In this embodiment, a time period for monitoring the safety of the user may be preset. Because the probability of the user meeting a stranger social activity is different in different time periods, for example, the probability of the user meeting a stranger social activity is lower during the day compared to the night or late night. Therefore, the time period for monitoring the safety of the user may be preset, for example, the time period for monitoring the safety of the user in the time range from 20 hours to 6 days may be preset to be within 8 hours from the activity check-in time, and the monitoring time period for social activities outside the time range may be preset to be within 4 hours from the activity check-in time. In addition, the user can set the monitoring time interval according to personal needs. And, background security monitoring of the user may begin prior to the social activity check-in, e.g., 1 hour prior to the social activity hold time. Under the condition that a time period for monitoring the safety of a user is set, when the position information of the current user is acquired, whether the current time point is within a preset monitoring time period or not is judged. If the time is within the preset monitoring time period, the process goes to step S203, and if the time is not within the preset monitoring time period, the process goes to step S204. Still taking the time period for monitoring the safety of the user within the time range from 20 hours to 6 days as an example, when the check-in time of the social activity is 22 and the time point when the location information of the current user is acquired is 8, the current user is not within the preset monitoring time period, and the process proceeds to step S204.
S203: and acquiring the position information of the current user and storing the position information.
And if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information. Specifically, the intelligent terminal may send the acquired location information of the current user to a background server, and the background server receives and stores the location information.
S204: and not acquiring the position information of the current user.
And if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
S205: and when the alarm information is received, sending the current position information and the personal information of the current user, and the current position information and the personal information of other users synchronized with the position information of the current user to rescue mechanisms such as police and the like.
In this embodiment, a key alarm function can be set in the APP of the current user's intelligent terminal, and the user can realize alarming by clicking a key in one APP or a key in the mobile phone. When the current user sends alarm information through a one-key alarm function in the intelligent terminal, because the intelligent terminal of the current user can communicate with a background server, the background server can receive the alarm information sent by the intelligent terminal, after the background server receives the alarm information sent by the intelligent terminal, the current position information and the personal information of the current user, and the current position information and the personal information of the user which are synchronous with the position information of the current user in the past period of time are sent to a police or a rescue mechanism, so that the police or the rescue mechanism can determine the identity and the position of the current user through the current position information and the personal information of the current user, and simultaneously determine the user condition around the current user before the alarm through the current position information and the personal information of other users which are synchronous with the position of the current user, if the current user is shut down after alarming and loses communication and position monitoring, the police or the rescue organization can establish communication inquiry conditions with other users synchronized with the position information of the current user or keep tracking the positions of other users.
According to the user safety monitoring method for the offline activities of the strangers in the embodiment of the application, when a user participates in the social activities of the strangers, an alarm can be given in time when an accident occurs, meanwhile, the position information when the accident occurs can be sent to rescue mechanisms such as police and the like, and the positions and personal information of other users which are synchronous with the position of the current user who gives the alarm in a period of time before the alarm is provided, so that the safety of the user is guaranteed.
In addition, as an optional embodiment of the present application, when the activity time corresponding to the current activity process is different from the activity place corresponding to the current activity process, the current location information and the personal information of the current user, and the current location information and the personal information of other users synchronized with the location information of the current user, are automatically sent to a background customer service for verification or manual monitoring.
Specifically, the APP of the intelligent terminal may automatically compare the current position information of the current user with the activity place corresponding to the current activity flow, and in the comparison process, the position information of the current user is the coordinates of the current user, the activity place corresponding to the current activity flow is the coordinates of the activity place corresponding to the current activity flow, and through the coordinate comparison, it can be determined whether the position information of the current user is the same as the activity place corresponding to the current activity flow. And when the position information of the current user is different from the activity place corresponding to the current activity flow, sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to a background customer service for verification or manual monitoring. Therefore, even if the user does not trigger the one-key alarm, the manual verification and intervention of the platform client can be automatically triggered when the user is obviously deviated from the activity place of the social activity, so that the safety of the user is further guaranteed, and the method is particularly suitable for activity occasions such as field travel.
In the above embodiment, the intelligent terminal may obtain the location information of the current user in real time, and the background server may extract the location information of the current user from the reporting information by receiving the reporting information sent by the intelligent terminal in real time. When the intelligent terminal acquires the position information of the current user, when the current user is located outdoors, the position information of the current user is determined through a GPS positioning function of the intelligent terminal. Therefore, the background server can judge whether the position information of the current user is synchronous with the position information of other users participating in social activities by calculating the distance between the position information of the current user and the position information of the other users participating in social activities. And when the current user is located indoors, representing the position information of the current user through the WIFI fingerprint of the intelligent terminal. Specifically, the WIFI fingerprint includes: account information of a plurality of WIFI transmitters and signal strength of each WIFI transmitter received by the intelligent terminal. When the current user is located indoors, the intelligent terminal can receive signals sent by the WIFI transmitters, the intelligent terminal receives different strength of the signals sent by the WIFI transmitters due to different distances between the intelligent terminal and the WIFI transmitters, and the account names of the WIFI transmitters and the strength of the signals sent by the WIFI transmitters received by the intelligent terminal can accurately represent the indoor position of the intelligent terminal. For example, a WIFI fingerprint may be a vector of (Account 1, Signal Strength 1; Account 2, Signal Strength 2; … … Account n, Signal Strength n). The background server can compare the consistency of the WIFI fingerprint of the current user with the WIFI fingerprints of other users participating in social activities; when account names contained in the WIFI fingerprints of the two are consistent and the signal intensity difference value of each account is not greater than the preset signal intensity difference threshold value, the indoor positions of the two are close to each other, and therefore it is judged that the position information of the two is synchronous. Furthermore, the WIFI fingerprint can be compared with a positioning reference WIFI fingerprint in an indoor WIFI fingerprint database, and when the WIFI fingerprint database contains the matched positioning reference WIFI fingerprint, the indoor position of the user can be accurately identified.
In addition, as an optional embodiment of the present application, in the above embodiment, a corresponding activity track may also be generated according to the real-time location information of the current user, and when receiving the alarm information, the activity track is simultaneously sent to the police.
In another aspect of the present application, there is provided a user security monitoring system for strangers social networking activities, including:
the first information acquisition module is used for acquiring personal information of a current user and activity information of an activity in which the current user participates;
the second information acquisition module is used for acquiring the position information of the current user in real time and storing the position information;
and the alarm module is used for sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to rescue mechanisms such as police and the like when alarm information is received.
In some embodiments, further comprising:
the time judging module is used for judging whether the current time point is within a preset monitoring time period or not; if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information; and if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
Fig. 3 is a schematic structural diagram of a user security monitoring system for strangers social networking activity according to a third embodiment of the present application. The user security monitoring system for the stranger social offline activity of the embodiment may include:
the first information obtaining module 301 is configured to obtain personal information of a current user and activity information of an activity in which the current user is participating. Specifically, the first information obtaining module 301 may extract, from the report information, the personal information of the current user and the activity information of the activity in which the current user is participating, by receiving the report information sent by the intelligent terminal.
The second information obtaining module 302 is configured to obtain the location information of the current user in real time, and store the location information. Similarly, the second information obtaining module 302 may also extract the location information of the current user from the reporting information by receiving the reporting information sent by the intelligent terminal, and store the location information.
And the alarm module 303 is configured to send the current location information and the personal information of the current user, and the current location information and the personal information of other users synchronized with the location information of the current user to rescue mechanisms such as police and the like when receiving the alarm information.
The user safety monitoring system for the stranger social offline activities in the embodiment of the application can obtain the technical effects similar to those of the method embodiment, and the details are not repeated here.
In addition, as a specific embodiment of the user security monitoring system for the stranger offline activity of the application, the user security monitoring system for the stranger offline activity may further include a time judgment module, configured to judge whether a current time point is within a preset monitoring period; if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information; and if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
Specifically, a time period for monitoring the safety of the user may be preset. Since the probability of the user meeting a stranger social activity is different in different time periods, for example, the probability of the user meeting a stranger social activity is smaller in the daytime than in the evening or late night. Therefore, the time period for monitoring the safety of the user may be preset, for example, the time period for monitoring the safety of the user in the time range from 20 hours to 6 days may be preset to be within 8 hours from the activity check-in time, and the monitoring time period for social activities outside the time range may be preset to be within 4 hours from the activity check-in time. In addition, the user can set the monitoring time interval according to personal needs. And, background security monitoring of the user may begin prior to the social activity check-in, e.g., 1 hour prior to the social activity hold time. Under the condition that a time period for monitoring the safety of a user is set, when the position information of the current user is acquired, whether the current time point is within a preset monitoring time period or not is judged. And if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information. And if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (3)

1. A user security monitoring method for strangers social offline activities is characterized by comprising the following steps:
acquiring personal information of a current user and activity information of an activity in which the current user participates;
the method comprises the steps that a user APP initiates an activity and issues activity information, so that other users can obtain the activity information and further participate in the activity to realize social contact among strangers, and the user also participates in the activity initiated by other users to realize social contact among the strangers; when the stranger social activity starts, the platform generates a check-in two-dimensional code and sends the check-in two-dimensional code to an activity initiator or an activity participating user; the user participating in the activity scans the check-in two-dimensional code by using the intelligent terminal, so that the intelligent terminal of the user acquires the activity number of the activity in which the user is currently participating, then checks in the platform, and once the check-in indicates that the user is participating in the social activity, the platform starts the background safety protection of the user and extracts the activity information of the social activity; the activity information of the social activity comprises the holding time, the holding place, the organization and the personal information of other users participating in the social activity;
moreover, the personal information of the users participating in the social activities is visible to the platform, and the platform obtains the personal information of the users by checking the personal dynamic information related to the users or checking the personal setting information of the users at the backstage; the personal dynamic information of the current user is information of the user participating in social activities, and the personal setting information mainly refers to account information and identity information of the current user;
after the current user signs in to participate in the offline activity of strangers, the personal information of the current user and the activity information of the social activity in which the current user participates are acquired by a background server; the activity information comprises activity time and activity place of the activity in which the current user participates, and when the activity is divided into a plurality of activity processes, the activity information further comprises activity time and activity place corresponding to the activity of each process;
acquiring the position information of the current user in real time, and storing the position information;
after the background safety protection is started, within the activity time range in the activity information, the intelligent terminal of the current user acquires the position information of the current user in real time and sends the acquired position information of the current user to a background server; after the background server receives the position information of the current user sent by the intelligent terminal of the current user, the position information obtained in the past is stored; the intelligent terminal of the current user sends the position information of the current user to a background server in real time or sends the position information of the current user to the background server at intervals of a preset time period; because each user participating in the social activity can acquire and upload own position information in real time, the background server acquires and stores the position information of all users according to the user information organizing and participating in a certain social activity in the activity information;
when alarm information is received, sending the current position information and the personal information of the current user, and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue mechanism;
the APP of the intelligent terminal of the current user is provided with a one-key alarm function, and the user can realize alarm by clicking a key in the APP or a key in the mobile phone; when the current user sends alarm information through a one-key alarm function in the intelligent terminal, the background server receives the alarm information sent by the intelligent terminal due to the fact that the intelligent terminal of the current user is communicated with the background server, after the background server receives the alarm information sent by the intelligent terminal, the current position information and the personal information of the current user and the current position information and the personal information of the user which are synchronous with the position information of the current user in a past period of time are sent to a police or a rescue mechanism, so that the police or the rescue mechanism can determine the identity and the position of the current user through the current position information and the personal information of the current user, and meanwhile, the user condition around the current user before the alarm is determined through the current position information and the personal information of other users which are synchronous with the position of the current user, if the current user is shut down and loses communication contact and position monitoring after alarming, the police or the rescue organization and other users synchronous with the position information of the current user establish communication contact inquiry conditions or keep tracking the positions of other users;
the background server retrieves the position information of the current user when the current user gives an alarm by one key after the social activity is checked in, and obtains the position information stored for other users participating in the social activity, compares the position information of the current user with the position information of other users, if the position information of the current user is synchronous with the position information of any one or more other users within a period of time before the alarm, sends the current position information of other users with synchronous position information and the personal information thereof to a rescue mechanism so that the rescue mechanism can determine the identity and the position of the current user according to the current position information and the personal information of the current user, and simultaneously determines the users around the current user according to the related information of other users synchronous with the position information of the current user, thereby providing assistance for rescue;
the obtaining the position information of the current user in real time and storing the position information comprises:
presetting a time period for monitoring the safety of a user; the probability of accidents occurring when the user participates in strangers social activities is different in different time periods; in the daytime, the probability that the user is accidentally involved in strangers' social activities is small relative to the probability in the evening or late night; therefore, a time period for monitoring the safety of the user is preset; when the time period for monitoring the safety of the user within the time range from 20 hours to 6 days is preset to be within 8 hours from the activity check-in time, the monitoring time period of the social activity outside the time range is within 4 hours from the activity check-in time; in addition, the user sets the monitoring time interval according to personal needs; and starting to perform background security monitoring on the user before the social activity is signed in; under the condition that a time period for monitoring the safety of a user is set, when the position information of the current user is acquired, whether the current time point is within a preset monitoring time period is judged;
if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information;
if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired;
the activity information includes activity flow information, each of the activity flows corresponds to an activity location and an activity time, and the method further includes:
when the activity time corresponding to the current activity process is different from the activity place corresponding to the current activity process, automatically sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue mechanism;
specifically, the APP of the intelligent terminal automatically compares the current position information of the current user with an activity place corresponding to the current activity process, in the comparison process, the position information of the current user is the coordinates of the current user, the activity place corresponding to the current activity process is the coordinates of the activity place corresponding to the current activity process, and whether the position information of the current user is the same as the activity place corresponding to the current activity process is judged through coordinate comparison; when the position information of the current user is different from the activity place corresponding to the current activity process, sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to a background customer service for verification or manual monitoring; therefore, even if the user does not trigger one-key alarm, the manual verification and intervention of the platform client can be automatically triggered when the user obviously deviates from the activity site of social activities, so that the safety of the user is further guaranteed, and the method is particularly suitable for the field travel activity occasions;
the obtaining the position information of the current user in real time includes:
receiving reporting information sent by an intelligent terminal in real time, and extracting the position information of the current user from the reporting information;
when the current user is located outdoors, determining the position information of the current user through GPS positioning;
when the current user is located indoors, representing the position information of the current user through WIFI fingerprints;
the WIFI fingerprint comprises:
account information of the WIFI transmitters and signal strength of each WIFI transmitter received by the intelligent terminal;
when the current user is located indoors, the intelligent terminal can receive signals sent by the WIFI transmitters, the intensity of the signals sent by the WIFI transmitters received by the intelligent terminal is different due to different distances between the intelligent terminal and the WIFI transmitters, and the indoor position of the intelligent terminal is accurately represented through the account name of each WIFI transmitter and the intensity of the signals sent by the WIFI transmitters received by the intelligent terminal; the background server compares the consistency of the WIFI fingerprint of the current user with the WIFI fingerprints of other users participating in social activities; when account names contained in WIFI fingerprints of the two accounts are consistent and the signal intensity difference value of each account is not greater than a preset signal intensity difference threshold value, the indoor positions of the two accounts are close to each other, and therefore it is judged that the position information of the two accounts is synchronous; and comparing the WIFI fingerprint with a positioning reference WIFI fingerprint in an indoor WIFI fingerprint database, and accurately identifying the indoor position of the user when the WIFI fingerprint database contains the matched positioning reference WIFI fingerprint.
2. The method of claim 1, further comprising:
and generating a corresponding activity track according to the real-time position information of the current user, and sending the activity track to the police party when alarm information is received.
3. A user security monitoring system for strangers social offline activities, comprising:
the first information acquisition module is used for acquiring personal information of a current user and activity information of an activity in which the current user participates;
the method comprises the steps that a user APP initiates an activity and issues activity information, so that other users can obtain the activity information and further participate in the activity to realize social contact among strangers, and the user also participates in the activity initiated by other users to realize social contact among the strangers; when the stranger social activity starts, the platform generates a check-in two-dimensional code and sends the check-in two-dimensional code to an activity initiator or an activity participating user; the user participating in the activity scans the check-in two-dimensional code by using the intelligent terminal, so that the intelligent terminal of the user acquires the activity number of the activity in which the user is currently participating, then checks in the platform, and once the check-in indicates that the user is participating in the social activity, the platform starts the background safety protection of the user and extracts the activity information of the social activity; the activity information of the social activity comprises the holding time, the holding place, the organization and the personal information of other users participating in the social activity;
moreover, the personal information of the users participating in the social activities is visible to the platform, and the platform obtains the personal information of the users by checking the personal dynamic information related to the users or checking the personal setting information of the users at the backstage; the personal dynamic information of the current user is information of the user participating in social activities, and the personal setting information mainly refers to account information and identity information of the current user;
after the current user signs in to participate in the offline activity of strangers, the personal information of the current user and the activity information of the social activity in which the current user participates are obtained by the background server; the activity information comprises activity time and activity place of the activity in which the current user participates, and when the activity is divided into a plurality of activity processes, the activity information further comprises activity time and activity place corresponding to the activity of each process;
the second information acquisition module is used for acquiring the position information of the current user in real time and storing the position information;
after the background safety protection is started, within the activity time range in the activity information, the intelligent terminal of the current user acquires the position information of the current user in real time and sends the acquired position information of the current user to a background server; after the background server receives the position information of the current user sent by the intelligent terminal of the current user, the position information obtained in the past is stored; the intelligent terminal of the current user sends the position information of the current user to a background server in real time or sends the position information of the current user to the background server at intervals of a preset time period; because each user participating in the social activity can acquire and upload own position information in real time, the background server acquires and stores the position information of all users according to the user information organizing and participating in a certain social activity in the activity information;
the alarm module is used for sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to a rescue mechanism when alarm information is received;
the APP of the intelligent terminal of the current user is provided with a one-key alarm function, and the user can realize alarm by clicking a key in the APP or a key in the mobile phone; when the current user sends alarm information through a one-key alarm function in the intelligent terminal, the background server receives the alarm information sent by the intelligent terminal due to the fact that the intelligent terminal of the current user is communicated with the background server, after the background server receives the alarm information sent by the intelligent terminal, the current position information and the personal information of the current user and the current position information and the personal information of the user which are synchronous with the position information of the current user in a past period of time are sent to a police or a rescue mechanism, so that the police or the rescue mechanism can determine the identity and the position of the current user through the current position information and the personal information of the current user, and meanwhile, the user condition around the current user before the alarm is determined through the current position information and the personal information of other users which are synchronous with the position of the current user, if the current user is shut down and loses communication contact and position monitoring after alarming, the police or the rescue organization and other users synchronous with the position information of the current user establish communication contact inquiry conditions or keep tracking the positions of other users;
the APP of the intelligent terminal automatically compares the current position information of the current user with an activity place corresponding to the current activity process, in the comparison process, the position information of the current user is the coordinate of the current user, the activity place corresponding to the current activity process is the activity place coordinate corresponding to the current activity process, and whether the position information of the current user is the same as the activity place corresponding to the current activity process or not is judged through coordinate comparison; when the position information of the current user is different from the activity place corresponding to the current activity process, sending the current position information and the personal information of the current user and the current position information and the personal information of other users synchronized with the position information of the current user to a background customer service for verification or manual monitoring; therefore, even if the user does not trigger one-key alarm, when the user obviously deviates from the activity site of social activity, the manual verification and intervention of the platform client are automatically triggered, so that the safety of the user is further guaranteed, and the method is particularly suitable for activity occasions such as field travel;
when the current user is located indoors, the intelligent terminal can receive signals sent by the WIFI transmitters, the intensity of the signals sent by the WIFI transmitters received by the intelligent terminal is different due to different distances between the intelligent terminal and the WIFI transmitters, and the indoor position of the intelligent terminal can be accurately represented through the account name of each WIFI transmitter and the intensity of the signals sent by the WIFI transmitters received by the intelligent terminal; the background server compares the consistency of the WIFI fingerprint of the current user with the WIFI fingerprints of other users participating in social activities; when account names contained in WIFI fingerprints of the two accounts are consistent and the signal intensity difference value of each account is not greater than a preset signal intensity difference threshold value, the indoor positions of the two accounts are close to each other, and therefore it is judged that the position information of the two accounts is synchronous; the WIFI fingerprint is compared with positioning reference WIFI fingerprints in an indoor WIFI fingerprint database, and when the WIFI fingerprint database contains the matched positioning reference WIFI fingerprints, the indoor position of the user is accurately identified;
the background server retrieves the position information of the current user when the current user gives an alarm by one key after the social activity is checked in, and obtains the position information stored for other users participating in the social activity, compares the position information of the current user with the position information of other users, if the position information of the current user is synchronous with the position information of any one or more other users within a period of time before the alarm, sends the current position information of other users with synchronous position information and the personal information thereof to a rescue mechanism so that the rescue mechanism can determine the identity and the position of the current user according to the current position information and the personal information of the current user, and simultaneously determines the users around the current user according to the related information of other users synchronous with the position information of the current user, thereby providing assistance for rescue;
further comprising:
the time judgment module is used for presetting a time period for monitoring the safety of the user; the probability of accidents occurring when the user participates in strangers social activities is different in different time periods; in the daytime, the probability that the user is accidentally involved in strangers' social activities is small relative to the probability in the evening or late night; therefore, a time period for monitoring the safety of the user is preset; when the time period for monitoring the safety of the user within the time range from 20 hours to 6 days is preset to be within 8 hours from the activity check-in time, the monitoring time period of the social activity outside the time range is within 4 hours from the activity check-in time; in addition, the user sets the monitoring time interval according to personal needs; and starting to perform background security monitoring on the user before the social activity is signed in; under the condition that a time period for monitoring the safety of a user is set, when the position information of the current user is acquired, whether the current time point is within a preset monitoring time period is judged; if the current time point is within a preset monitoring time period, continuously acquiring the position information of the current user, and storing the position information; and if the current time point is not in the preset monitoring time period, the position information of the current user is not acquired.
CN201811166079.XA 2018-10-08 2018-10-08 User safety monitoring method and system for stranger social offline activities Active CN109218532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811166079.XA CN109218532B (en) 2018-10-08 2018-10-08 User safety monitoring method and system for stranger social offline activities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811166079.XA CN109218532B (en) 2018-10-08 2018-10-08 User safety monitoring method and system for stranger social offline activities

Publications (2)

Publication Number Publication Date
CN109218532A CN109218532A (en) 2019-01-15
CN109218532B true CN109218532B (en) 2021-07-27

Family

ID=64982986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811166079.XA Active CN109218532B (en) 2018-10-08 2018-10-08 User safety monitoring method and system for stranger social offline activities

Country Status (1)

Country Link
CN (1) CN109218532B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020154864A1 (en) * 2019-01-28 2020-08-06 深圳市世强元件网络有限公司 Internet platform single-keypress alarm method and computer terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106448045A (en) * 2016-10-19 2017-02-22 北京速能数码网络技术有限公司 Safety early warning method in driving process, safety early warning system in driving process and vehicle-mounted equipment
CN106548597A (en) * 2016-09-23 2017-03-29 南京邮电大学 A kind of night runs and escorts APP system and method
CN107871297A (en) * 2016-09-28 2018-04-03 北京嘀嘀无限科技发展有限公司 Safety monitoring method and device in stroke
CN108010287A (en) * 2017-12-28 2018-05-08 深圳市永达电子信息股份有限公司 A kind of cases scene testimony of a witness is searched and target association analysis method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
MX2012005570A (en) * 2009-11-11 2012-12-17 Lifestream Corp Wireless device emergency services connection and panic button, with crime and safety information system.

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548597A (en) * 2016-09-23 2017-03-29 南京邮电大学 A kind of night runs and escorts APP system and method
CN107871297A (en) * 2016-09-28 2018-04-03 北京嘀嘀无限科技发展有限公司 Safety monitoring method and device in stroke
CN106448045A (en) * 2016-10-19 2017-02-22 北京速能数码网络技术有限公司 Safety early warning method in driving process, safety early warning system in driving process and vehicle-mounted equipment
CN108010287A (en) * 2017-12-28 2018-05-08 深圳市永达电子信息股份有限公司 A kind of cases scene testimony of a witness is searched and target association analysis method and system

Also Published As

Publication number Publication date
CN109218532A (en) 2019-01-15

Similar Documents

Publication Publication Date Title
US11785458B2 (en) Security and public safety application for a mobile device
US10178537B2 (en) Emergency messaging system and method of responding to an emergency
US11032690B2 (en) Disaster event management
US20150358794A1 (en) Community Emergency Request Communication System
US9965819B1 (en) Real-time school bus and student tracking
US10255789B2 (en) Home incarceration confirmation system
US8928483B2 (en) Automated attendance tracking and event notification
US20160027292A1 (en) Security and Public Safety Application for a Mobile Device
US20180332162A1 (en) Mobile application for personal safety
US10109173B2 (en) Person of interest location confirmation system
JP6327335B2 (en) Short-range user identification system and information providing system and method using the same
US20180040091A1 (en) Method and system for electronic identity & licensure verification
US20120246089A1 (en) Method and Apparatus to Enable Safer Meetings and Dates
US8560557B1 (en) Method and system of progress monitoring
US11670152B2 (en) Alarm notification system
CN109218532B (en) User safety monitoring method and system for stranger social offline activities
US20220159443A1 (en) Personal safety and responder notification system and method
CN113850702A (en) Rescue method and system based on multi-source data fusion
KR101553161B1 (en) System Providing Advertisement To User At Close Range
US10791447B2 (en) System and method for verifying tactical equipment
CN113132909B (en) Missing person collaborative checking method and device based on network slice and edge data center
CN110796276A (en) System and method for providing personalized security services
CN109064367A (en) Interactive emergency information service system based on location information
US20210287514A1 (en) Method for sharing risk status of user using timer and apparatus therefor
KR20160119502A (en) Society mobile network service platform from wireless beacon signal transmission device key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant