CN110033602A - Intelligent alarm method and device, electronic equipment based on block chain - Google Patents

Intelligent alarm method and device, electronic equipment based on block chain Download PDF

Info

Publication number
CN110033602A
CN110033602A CN201811482684.8A CN201811482684A CN110033602A CN 110033602 A CN110033602 A CN 110033602A CN 201811482684 A CN201811482684 A CN 201811482684A CN 110033602 A CN110033602 A CN 110033602A
Authority
CN
China
Prior art keywords
safety verification
verification message
user
user equipment
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811482684.8A
Other languages
Chinese (zh)
Inventor
栗志果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811482684.8A priority Critical patent/CN110033602A/en
Publication of CN110033602A publication Critical patent/CN110033602A/en
Priority to TW108133588A priority patent/TWI711319B/en
Priority to PCT/CN2019/112157 priority patent/WO2020114112A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Emergency Management (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This specification one or more embodiment provides a kind of intelligent alarm method based on block chain and device, electronic equipment, applied to block chain node, the described method includes: receiving the safety verification message that user equipment is sent, the safety verification message is generated by the user device responsive in the User Status confirmation operation detected;Intelligent contract is called, the intelligence contract is used for determining whether the reception interval to the safety verification message meets default reception period, and the triggering alarm operation in the case where reception interval is unsatisfactory for the default reception period.

Description

Intelligent alarm method and device, electronic equipment based on block chain
Technical field
This specification one or more embodiment is related to block chain technical field more particularly to a kind of intelligence based on block chain It can alarm method and device, electronic equipment.
Background technique
In the related art, user is when facing emergency, can be dialed the police emergency number by mobile phone (or other are urgent Phone) mode alarm.But the premise that success is alarmed is: user can have found in time emergency, successfully take out hand Machine, and smoothly dial or press the combination button on mobile phone.
Summary of the invention
In view of this, this specification one or more embodiment provides a kind of intelligent alarm method and dress based on block chain It sets, electronic equipment.
To achieve the above object, it is as follows to provide technical solution for this specification one or more embodiment:
According to this specification one or more embodiment in a first aspect, proposing a kind of intelligent alarm based on block chain Method is applied to block chain node, which comprises
The safety verification message that user equipment is sent is received, the safety verification message is by the user device responsive in inspection The User Status confirmation operation that measures and generate;
Intelligent contract is called, the intelligence contract is used for determining whether full to the reception interval of the safety verification message Foot is default to receive period, and the triggering alarm operation in the case where reception interval is unsatisfactory for the default reception period.
According to the second aspect of this specification one or more embodiment, a kind of intelligent alarm based on block chain is proposed Device, is applied to block chain node, and described device includes:
Receiving unit, receives the safety verification message that user equipment is sent, and the safety verification message is set by the user It is generated in response to the User Status confirmation operation detected;
Call unit, calls intelligent contract, and the intelligence contract is used for determining the reception to the safety verification message Whether interval meets default reception period, and the triggering report in the case where reception interval is unsatisfactory for the default reception period Alert operation.
According to the third aspect of this specification one or more embodiment, a kind of electronic equipment is proposed, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is by running the executable instruction to realize such as above-mentioned method as described in the examples.
Detailed description of the invention
Fig. 1 is a kind of flow chart for intelligent alarm method based on block chain that an exemplary embodiment provides.
Fig. 2 is a kind of overall architecture schematic diagram for intelligent alarm that an exemplary embodiment provides.
Fig. 3 is a kind of interaction schematic diagram for realizing intelligent alarm that an exemplary embodiment provides.
Fig. 4 is a kind of structural schematic diagram for equipment that an exemplary embodiment provides.
Fig. 5 is a kind of block diagram for intelligent alarm device based on block chain that an exemplary embodiment provides.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with this specification one or more embodiment.Phase Instead, they are only some aspects phases with the one or more embodiments of as detailed in the attached claim, this specification The example of consistent device and method.
It should be understood that the sequence that might not show and describe according to this specification in other embodiments executes The step of correlation method.In some other embodiments, step included by method can than described in this specification more It is more or less.In addition, single step described in this specification, may be broken down into other embodiments multiple steps into Row description;And multiple steps described in this specification, it may also be merged into single step progress in other embodiments Description.
Fig. 1 is a kind of flow chart for intelligent alarm method based on block chain that an exemplary embodiment provides.Such as Fig. 1 institute To show, this method is applied to block chain node, it may comprise steps of:
Step 102, the safety verification message that user equipment is sent is received, the safety verification message is by the user equipment It is generated in response to the User Status confirmation operation detected.
In one embodiment, user equipment can be any types such as mobile phone, tablet computer, smartwatch that user uses Electronic equipment, this specification limited not to this.Pass through the registered account of login user on an electronic device, use The phonecard of user's real name registration in advance binds the marks such as the MAC Address of electronic equipment with user, can establish Unique mapping relations between the electronic equipment and user allow the electronic equipment to be identified as the corresponding user of the user Equipment.
In one embodiment, be different from user implement in an emergency situation alarm etc. trigger actions, user can be not yet Before facing emergency, it is in a safe condition in the case where, for user equipment implement User Status confirmation operation, to show Under the user is still in a safe condition.User can set on a user device, to determine the need for opening intelligent report Alert function, the intelligent alarm function for realizing this specification intelligent alarm scheme;In other words, when the intelligent alarm function quilt When unlatching, intelligent alarm can be realized based on the technical solution of this specification.Wherein, user can be with manual switch intelligent alarm function Can, certain judgment rule can also be set, so that user equipment can be automatically switched intelligent alarm based on the judgment rule Function;For example, judgment rule may include time range, for example the time range can be 9. -12 points of every night, make It is proper be in time range when user equipment can automatically turn on intelligent alarm function, intelligent alarm function is otherwise automatically closed; For another example judgment rule may include geographical position range, for example the geographical position range can be the higher area of crime rate, Allow and automatically turn on intelligent alarm function when user equipment is in the geographical position range, intelligent report is otherwise automatically closed Alert function;In another example judgment rule may include time range and geographical position range, so that when being in time range and user When equipment is in the geographical position range, user equipment can automatically turn on intelligent alarm function, and intelligent report is otherwise automatically closed Alert function.
In one embodiment, User Status confirmation operation may include: the camera shooting for unlocking user equipment, opening user equipment Head at least one shoot etc. by the camera of user equipment, and this specification is limited not to this.
In one embodiment, corresponding digital identity is obtained ahead of time in the user of user equipment, and carries out to user equipment Authorization, allows user equipment to sign based on the digital identity to transmitted safety verification message, and block chain link Point the sender to safety verification message can carry out authentication accordingly, to identify that illegal user falsely uses the behavior of identity. Meanwhile when discovery falsely uses the behavior of identity there are illegal user, it is possible to determine that there are higher faces by the user of user equipment Face the risk of the state of emergency, to carry out risk prompting to the user of the user equipment;Alternatively, the user of user equipment is very Emergency may have extremely been faced, relevant information can have been reported without delay to the police to confirm that making by triggering alarm operation The true situation of user, to release security risk.
In one embodiment, when user equipment carries out transmitted safety verification message based on the digital identity of user When signature, even if so that user and be not logged in registered account, user equipment and be not used user's real name registration phone Card, user equipment the marks such as MAC Address do not bound in advance with the user in the case where, the signature can also be passed through To show the identity of user.
Step 104, intelligent contract is called, the intelligence contract is used for determining between the reception of the safety verification message Every whether meet it is default receive the period, and trigger and alarm in the case where receptions interval is unsatisfactory for default the receptions period Operation.
In one embodiment, when user has faced emergency, for example plunder, kidnap etc., one side user may Threat and can not be successfully by offender takes out that user equipment operates or user equipment may be by crime point Son is grabbed or damage, and another aspect user may lose ability (such as injured or syncope operated to user equipment Deng), thus by implementing User Status confirmation operation when user is in a safe condition and by block chain node in this specification Receive and the safety verification message that accordingly sends of counting user equipment, can safety verification message reception situation it is abnormal (such as Receive interval and be unsatisfactory for the default reception period) when, thus it is speculated that emergency may have been faced by going out user, faced without user Implement any operation when emergency, can not only reduce the operation difficulty of user, promote the accuracy of judgement degree to User Status, but also It can be avoided user to cause the doubt of offender to the operation of user equipment in an emergency situation or enrage offender, help In the personal safety for ensureing user.
It in one embodiment, can by calling intelligent contract to carry out recognition and verification to the reception situation of safety verification message With ensure the recognition and verification operation can it is automatic, be reliably carried out, be not easily susceptible to influence, thus accurately triggering alarm operation, To safeguard the personal safety of user.
In one embodiment, when the reception interval of safety verification message is excessive, for example beyond default period and difference are received When greater than default value, user is likely to face emergency and can not implement User Status confirmation operation, it is possible to determine that To be unsatisfactory for the default reception period, to trigger alarm operation;Alternatively, work as the reception interval too small of safety verification message, than When as received a plurality of safety verification message in the same default reception period, user is likely to face emergency but be not easy to Implement alarm etc. to easily cause the doubt of offender or enrage the operation of offender, thus can continuously implement User Status Confirmation operation and cause the abnormal of safety verification message to send, can be determined that at this time for be unsatisfactory for this it is default receive the period, thus Triggering alarm operation.
In one embodiment, when intelligent alarm function is turned on, user equipment can be based on above-mentioned default reception week Phase issues the user with prompt, so that user in the case where in a safe condition, is timely completed User Status confirmation operation, keeps away Exempt to cause the transmission situation of safety verification message exception occur due to forgetting operation etc., prevents wrong report resulting from It is alert.
In one embodiment, the intelligent contract is also used to have been received by triggering alarm operation to alarm object offer The safety verification message from the user equipment, for alarm object (such as police) referred to, such as alarm object can Confirmed with quantity, sender, the reception interval etc. to safety verification message, to analyze whether associated user has faced Emergency etc..
In one embodiment, the environment in the safety verification message comprising the user equipment local environment describes letter Breath.For example, the environment description information may include at least one of: the photo or video, institute of the user equipment shooting The trace information etc. that the audio of user equipment acquisition, the location information of user equipment acquisition, the user equipment generate is stated, This specification is limited not to this.So, by the way that safety verification message is provided to alarm object, especially when safety is true When recognizing message comprising above-mentioned environment description information, facilitates alarm object and confirm the present position of associated user, periphery accordingly Building, or even tell doubtful offender from photo, audio or video or analyze which kind of emergency may be faced Deng so that alarm object preferably assists associated user to be detached from emergency.
In one embodiment, block chain node can be by safety verification message and/or the number of the safety verification message Summary info (such as cryptographic Hash) is distributed to block chain, can carry out depositing card to safety verification message, in order to subsequent access, management Or it calls to account.
In one embodiment, block chain node can analyze the content that the safety verification message includes, and to the intelligence Can contract transmitting analysis as a result, make the intelligent contract according to analysis result confirmation there are when anomalous content, triggering institute State alarm operation.User may not yet recognize to have faced emergency or deposit when implementing User Status confirmation operation The risk or offender for facing emergency after implementing crime may modelling customer behavior and to implement User Status true Recognize operation, so that block chain node is to the reception interval of safety verification message and without exception, it at this time can be by safety verification The content that message includes is analyzed, for example, include in photo or video people, place, behavior (such as fighting, gesture of crying for help) Etc. information, what is occurred in video or audio sound, the improper location information or trace information etc., with analysis such as cries, cries for help Safety problem that may be present out, thus the operation of triggering alarm in time.
Fig. 2 is a kind of overall architecture schematic diagram for intelligent alarm that an exemplary embodiment provides.As shown in Figure 2, it is assumed that During user A uses mobile phone 21, User Status confirmation operation can be implemented for the mobile phone 21, and mobile phone 21 can be accordingly Corresponding safety verification message is generated, and the safety verification message is sent to server 22.Further, server 22 can be with By calling intelligent contract, add their confirmation to the reception condition of safety verification message, to be touched automatically when reaching preset condition Hair alarm operation.
In order to make it easy to understand, the operation realized during intelligent alarm respectively below for mobile phone 21, server 22 and Function is described in detail in conjunction with intelligent alarm scheme of the Fig. 3 to this specification.Fig. 3 is one that an exemplary embodiment provides Plant the interaction schematic diagram for realizing intelligent alarm.As shown in figure 3, the interactive process may comprise steps of:
Step 301, the foundation to binding relationship is realized between mobile phone 21 and server 22.
In one embodiment, the binding relationship of required foundation be user A identity information and mobile phone 21 facility information it Between binding relationship.Based on the binding relationship, so that server 22 is in the safety verification message for receiving the subsequent transmission of mobile phone 21 When, it can be confirmed that the safety verification message corresponds to the user A.
For example, user A can carry out account registration at server 22 in advance, obtain and user A is unique corresponding has infused Volume account.Then, user A can be by logging in the registered account on mobile phone 21, and server 22 is based on the registered account Log-on message number on mobile phone 21 determines the registered account (corresponding to user A) and establishes binding pass between mobile phone 21 System.Similarly, user A can equally make server 22 true on mobile phone 21 using the phone number of the registration of real name Binding relationship is established between the fixed phone number (corresponding to user A) and mobile phone 21.
Step 302, mobile phone 21 enables intelligent alarm function.
In one embodiment, mobile phone 21 can default closing intelligent alarm function, and user A can be opened temporarily when needed Open the intelligent alarm function;For example, when user A some day work overtime to it is later when, can by opening the intelligent alarm function, To ensure the safety in way home.
In one embodiment, mobile phone 21 can be by the judgement to preset condition, to open and close automatically intelligent alarm Function.For example, it includes: a. time conditions as at night 10 points to next day 4:00 AM, b. that user A, which can set the preset condition, Managing locality condition is in certain camera uncovered area;So, sentenced by the synthesis to temporal information and geographical location information It is disconnected, for example, when mobile phone 21 at night 11 points be in above-mentioned camera uncovered area when, it is possible to determine that it is above-mentioned pre- to meet If condition, thus intelligent alarm function can be automatically turned on;And it is not covered when being not in the above-mentioned period or leaving related camera When cover area, intelligent alarm function can be automatically closed in mobile phone 21.
Step 303, mobile phone 21 can be reminded reminding the moment to implement operation.
In one embodiment, based on the technical solution of this specification, when intelligent alarm function is opened, user A needs fixed Phase implements predefined User Status confirmation operation, to show that itself is still in a safe condition.And in order to avoid user A is due to forgetting Document applies the User Status confirmation operation and causes to judge by accident, and mobile phone 21 can determine the corresponding prompting moment according to predetermined period, To remind the moment to remind for user A implementation operation, user A is allowed to implement User Status confirmation operation on time.
Prompting for User Status confirmation operation can be the predefined special alerting pattern of user A, and reminded contents It avoids revealing information relevant to intelligent alarm function, for example when User Status confirmation operation is shooting operation, can export " photo please be shoot " or similar reminded contents, and output is avoided " an at least photo please to be shoot, itself be in safety to confirm State, otherwise will triggering alarm " or similar reminded contents, thus in the case where user A has faced emergency, prevent to Offender issues prompt, avoids offender from simulating or coerce user A and implements relevant operation.It even, can be to avoid reminding Include information relevant to action type in content, for example " predetermined registration operation please be execute " or similar reminded contents can be exported, And avoid output " photo please be shoot " or similar reminded contents.
Step 304, mobile phone 21 detects shooting operation.
In one embodiment, when predefined User Status confirmation operation is shooting operation, if user A is still in peace Total state, can actively or aforesaid operations remind suggesting effect under, open mobile phone 21 camera to implement shooting operation, For example shoot an at least photo.
Certainly, User Status confirmation operation may include other types, for example be unlocked to mobile phone 21, on mobile phone 21 Specific character string etc. is inputted, this specification is limited not to this.
Step 305, mobile phone 21 collects environment description information.
In one embodiment, before user A implements predefined User Status confirmation operation, in or after the process, hand Machine 21 can carry out information collection to local environment, obtain corresponding environment description information, for from more various dimensions, more detailed Environment locating for mobile phone 21 or user A carefully is described.For example, the environment description information may include: mobile phone 21 in step 304 The positioning letter of audio, the acquisition of mobile phone 21 that video, the mobile phone 21 that photo, the mobile phone 21 of shooting acquire after camera unlatching acquire The trace information etc. that breath, mobile phone 21 generate, this specification is limited not to this.
Step 306, mobile phone 21 sends safety verification message to server 22.
In one embodiment, safety verification message may include above-mentioned environment description information.In addition, user A can be pre- First registration obtains unique corresponding digital identity, which is characterized by one group of public private key pair;Correspondingly, mobile phone 21 can It is signed with the private key by the digital identity corresponding to user A to safety verification message.
Step 307, server 22 can carry out signature verification to the safety verification message received.
It in one embodiment, can be corresponding by user A after server 22 receives the safety verification message that mobile phone 21 uploads Public key carry out sign test, to determine that the safety verification message is authorized by user A, and user not pretended to be by criminal The identity of A is sent.
In one embodiment, when sign test does not pass through, since mobile phone 21 is tied to user A in advance, show that there may be not Method molecule pretends to be the identity of user A, and user A has the risk in emergency, and server 22 can trigger alarm operation.
Step 308, server 22 calls intelligent contract, receives whether interval closes rule with verifying.
In one embodiment, the client for having block chain is run on server 22, so that the server 22 is configured as one Block chain node, and server 22 can call intelligent contract accordingly, and will input intelligence to the time of reception of safety verification message Whether energy contract meets default reception week with the reception interval by safety verification message of the intelligent contract verifying from mobile phone 21 Phase.
For example it is assumed that the default reception period is 3 minutes a length of when being 5 minutes, early warning, it is assumed that the last is 22:20 The safety verification message for receiving the transmission of mobile phone 21, sends out again then mobile phone 21 should be received in 22:25 or so under normal circumstances The safety verification message sent;And in view of the operation of user A can not be very punctual, above-mentioned 3 minutes early warning durations can be used as The fault-tolerant period, if that not receiving the safety verification message that mobile phone 21 is sent again yet in 22:28, intelligent contract can be sentenced It is set to user A and does not implement User Status confirmation operation on time, there is user A greater probability to be encountered by emergency, thus intelligence Energy contract can be alarmed with automatic trigger and be operated.
For another example assuming that the default reception period is 5 minutes, it is assumed that the last is that 22:20 receives the hair of mobile phone 21 The safety verification message sent disappears then the safety verification that mobile phone 21 is sent again should be received in 22:25 or so under normal circumstances Breath;And intelligent contract is received again by the safety verification message that mobile phone 21 is sent again if in 22:22, or even continuously receives more Safety verification message, then intelligent contract, which can be determined that, may be encountered by emergency for user A, and it is desirable that by upper The abnormal operation stated gives a warning, thus intelligent contract can be alarmed with automatic trigger and be operated.
Step 309, server 22 is by calling intelligent contract, verification environment description information.
In one embodiment, when safety verification message includes environment description information, server 22 can extract the environment Description information or its information content further included, and the environment description information or the information content are inputted into intelligent contract, with It is tested by intelligent contract.
In one embodiment, intelligent contract may verify that the reception interval of safety verification message and pass through, but by upper It states environment description information or the information content is analyzed, for example whether comprising a suspect (for example pass through people in the photo shot Face, which identifies, determines that the people in photo has criminal record etc.), in the video of shooting whether include occurent criminal offence, bat Whether comprising fight sound or sound of call for help etc. in the audio of the video or acquisition taken the photograph, paid-in safety verification may further determine that Whether message is that user A is sent in the secure state, if there are offender's analog subscriber A or stress user A to implement user The case where state confirmation operates etc..If it find that the case where there are offender's analog subscriber A or stress user A or risk, intelligence Energy contract can trigger alarm operation.
In one embodiment, when intelligent contract has verified that it is abnormal for the reception interval of safety verification message when, can be with By analyzing environment description information or the information content, with the surrounding enviroment that obtain user A, (such as street state, periphery are built Build), surrounding people, geographical location information, the facial expression of run trace information and user A, the sound of sending and behavior Movement etc., and relevant information is provided to alarm object when implementing alarm operation, in order to alarm, object implementation is more accurate Analysis and more effective treatment measures.
It should be pointed out that persistent loop is implemented above-mentioned when the intelligent alarm function of mobile phone 21 is in the open state Step 303~309, so that sustainable protection is realized to user A, until user A, which is reached, safety zone and closes the intelligent alarm Function.
Fig. 4 is a kind of schematic configuration diagram for equipment that an exemplary embodiment provides.Referring to FIG. 4, in hardware view, it should Equipment includes processor 402, internal bus 404, network interface 406, memory 408 and nonvolatile memory 410, is gone back certainly It may include hardware required for other business.Processor 402 reads corresponding computer journey from nonvolatile memory 410 Then sequence is run into memory 408, the intelligent alarm device based on block chain is formed on logic level.Certainly, in addition to software Except implementation, this specification one or more embodiment is not precluded other implementations, such as logical device or soft Mode of combination of hardware etc., that is to say, that the executing subject of following process flow is not limited to each logic unit, can also To be hardware or logical device.
Referring to FIG. 5, in Software Implementation block chain link should be applied to based on the intelligent alarm device of block chain Point may include:
Receiving unit 51 receives the safety verification message that user equipment is sent, and the safety verification message is by the user Equipment is generated in response to the User Status confirmation operation that detects;
Call unit 52, calls intelligent contract, and the intelligence contract is used for determining to connect the safety verification message It receives whether interval meets the default reception period, and is triggered in the case where reception interval is unsatisfactory for the default reception period Alarm operation.
Optionally, the safety verification message is signed by the user of the user equipment by corresponding digital identity Name.
It optionally, include the environment description information of the user equipment local environment in the safety verification message.
Optionally, the environment description information includes at least one of: the photo or video of the user equipment shooting, The trace information that the audio of the user equipment acquisition, the location information of user equipment acquisition, the user equipment generate.
Optionally, the intelligent contract is also used to provide paid-in come to alarm object in triggering alarm operation The safety verification message of the user equipment.
Optionally, further includes:
Analytical unit 53 analyzes the content that the safety verification message includes;
Transfer unit 54, to the intelligent contract transmitting analysis as a result, tying the intelligent contract according to the analysis There are when anomalous content, trigger the alarm operation for fruit confirmation.
Optionally, further includes:
Release unit 55 issues the digital digest information of the safety verification message and/or the safety verification message To block chain.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of any several equipment.
This description presents a kind of computer-readable mediums, are stored thereon with computer instruction, and the instruction is by processor The technical solution of this specification, such as the intelligent alarm method based on block chain of any of the above-described embodiment are realized when execution, this Place no longer repeats one by one.
In a typical configuration, computer includes one or more processors (CPU), input/output interface, network Interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, disk storage, quantum memory, based on graphene Storage medium or other magnetic storage devices or any other non-transmission medium, can be used for storing can be accessed by a computing device Information.As defined in this article, computer-readable medium does not include temporary computer readable media (transitory media), Such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
The term that this specification one or more embodiment uses be only merely for for the purpose of describing particular embodiments, and It is not intended to be limiting this specification one or more embodiment.In this specification one or more embodiment and the appended claims Used in the "an" of singular, " described " and "the" be also intended to including most forms, unless context understands earth's surface Show other meanings.It is also understood that term "and/or" used herein refers to and includes one or more associated list Any or all of project may combine.
It will be appreciated that though this specification one or more embodiment may using term first, second, third, etc. come Various information are described, but these information should not necessarily be limited by these terms.These terms are only used to same type of information area each other It separates.For example, the first information can also be referred to as in the case where not departing from this specification one or more scope of embodiments Two information, similarly, the second information can also be referred to as the first information.Depending on context, word as used in this is " such as Fruit " can be construed to " ... when " or " when ... " or " in response to determination ".
The foregoing is merely the preferred embodiments of this specification one or more embodiment, not to limit this theory Bright book one or more embodiment, all within the spirit and principle of this specification one or more embodiment, that is done is any Modification, equivalent replacement, improvement etc. should be included within the scope of the protection of this specification one or more embodiment.

Claims (15)

1. a kind of intelligent alarm method based on block chain is applied to block chain node, which comprises
The safety verification message that user equipment is sent is received, the safety verification message is by the user device responsive in detecting User Status confirmation operation and generate;
Intelligent contract is called, it is pre- that the intelligence contract is used for determining whether the reception interval to the safety verification message meets If receiving the period, and the triggering alarm operation in the case where reception interval is unsatisfactory for the default reception period.
2. according to the method described in claim 1, the safety verification message passes through correspondence by the user of the user equipment Digital identity sign.
3. according to the method described in claim 1, including the ring of the user equipment local environment in the safety verification message Border description information.
4. according to the method described in claim 3, the environment description information includes at least one of: the user equipment is clapped Photo or video, the audio of user equipment acquisition, the location information of user equipment acquisition, the user equipment taken the photograph The trace information of generation.
5. according to the method described in claim 1, the intelligence contract is also used to mention in triggering alarm operation to alarm object For the paid-in safety verification message from the user equipment.
6. according to the method described in claim 1, further include:
Analyze the content that the safety verification message includes;
To the intelligent contract transmitting analysis as a result, the intelligent contract is made to confirm that there are in exception according to the analysis result Rong Shi triggers the alarm operation.
7. according to the method described in claim 1, further include:
The digital digest information of the safety verification message and/or the safety verification message is distributed to block chain.
8. a kind of intelligent alarm device based on block chain, is applied to block chain node, described device includes:
Receiving unit, receives the safety verification message that user equipment is sent, and the safety verification message is rung by the user equipment User Status confirmation operation that Ying Yu is detected and generate;
Call unit, calls intelligent contract, and the intelligence contract is used for determining the reception interval to the safety verification message Whether satisfaction is default receives period, and the triggering alarm behaviour in the case where reception interval is unsatisfactory for the default reception period Make.
9. device according to claim 8, the safety verification message passes through correspondence by the user of the user equipment Digital identity sign.
It include the ring of the user equipment local environment 10. device according to claim 8, in the safety verification message Border description information.
11. device according to claim 10, the environment description information includes at least one of: the user equipment The photo or video of shooting, the audio of user equipment acquisition, the location information of user equipment acquisition, the user set The standby trace information generated.
12. device according to claim 8, the intelligence contract is also used in triggering alarm operation, to alarm object The paid-in safety verification message from the user equipment is provided.
13. device according to claim 8, further includes:
Analytical unit analyzes the content that the safety verification message includes;
Transfer unit, to the intelligent contract transmitting analysis as a result, confirming that the intelligent contract according to the analysis result There are when anomalous content, trigger the alarm operation.
14. device according to claim 8, further includes:
The digital digest information of the safety verification message and/or the safety verification message is distributed to block by release unit Chain.
15. a kind of electronic equipment, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is by running the executable instruction to realize such as side of any of claims 1-7 Method.
CN201811482684.8A 2018-12-05 2018-12-05 Intelligent alarm method and device, electronic equipment based on block chain Pending CN110033602A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811482684.8A CN110033602A (en) 2018-12-05 2018-12-05 Intelligent alarm method and device, electronic equipment based on block chain
TW108133588A TWI711319B (en) 2018-12-05 2019-09-18 Block chain-based smart alarm method and device, and electronic equipment
PCT/CN2019/112157 WO2020114112A1 (en) 2018-12-05 2019-10-21 Block chain-based smart alarm method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811482684.8A CN110033602A (en) 2018-12-05 2018-12-05 Intelligent alarm method and device, electronic equipment based on block chain

Publications (1)

Publication Number Publication Date
CN110033602A true CN110033602A (en) 2019-07-19

Family

ID=67235304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811482684.8A Pending CN110033602A (en) 2018-12-05 2018-12-05 Intelligent alarm method and device, electronic equipment based on block chain

Country Status (3)

Country Link
CN (1) CN110033602A (en)
TW (1) TWI711319B (en)
WO (1) WO2020114112A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111127824A (en) * 2019-09-17 2020-05-08 中国联合网络通信集团有限公司 Early warning method, device and system
WO2020114112A1 (en) * 2018-12-05 2020-06-11 阿里巴巴集团控股有限公司 Block chain-based smart alarm method and apparatus, and electronic device
CN112598183A (en) * 2020-12-26 2021-04-02 深圳市八方通达科技有限公司 Crime prediction method, system and storage medium based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105118228A (en) * 2015-07-11 2015-12-02 深圳市前海安测信息技术有限公司 Automatic alarm system and method used for monitoring children safety
CN106056516A (en) * 2016-05-31 2016-10-26 杭州致峰网络科技有限公司 Monitoring method and monitoring system
CN106205043A (en) * 2016-08-29 2016-12-07 马良花 A kind of campus card of automatic alarm
US20170032601A1 (en) * 2015-07-31 2017-02-02 Beijing Kuangshi Technology Co., Ltd. Access control system and data processing method thereof
CN107707633A (en) * 2017-09-19 2018-02-16 深圳市易成自动驾驶技术有限公司 Information of vehicles processing method, equipment and readable storage medium storing program for executing
CN108156133A (en) * 2017-11-28 2018-06-12 黄敬易 personal safety confirmation method, device, system and user terminal
CN108665253A (en) * 2018-05-18 2018-10-16 百度在线网络技术(北京)有限公司 A kind of data processing method, device, equipment and the storage medium of block chain network

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10257206B2 (en) * 2016-12-21 2019-04-09 International Business Machines Corporation Monitoring actions performed by a network of peer devices using a blockchain
CN107657401A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Express box monitoring method, device and system based on block chain technology
CN107317730B (en) * 2017-08-21 2020-09-04 上海点融信息科技有限责任公司 Method, equipment and system for monitoring state of block chain node
CN108632381B (en) * 2018-05-14 2020-09-29 浪潮集团有限公司 Block chain-based environment supervision method and system
CN108777703A (en) * 2018-05-15 2018-11-09 维沃移动通信有限公司 A kind of abnormal behaviour processing method and system based on block chain
CN108804165A (en) * 2018-05-25 2018-11-13 李昭强 A kind of information processing method, device and storage medium based on user's unlocking behavioural analysis
CN110033602A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 Intelligent alarm method and device, electronic equipment based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105118228A (en) * 2015-07-11 2015-12-02 深圳市前海安测信息技术有限公司 Automatic alarm system and method used for monitoring children safety
US20170032601A1 (en) * 2015-07-31 2017-02-02 Beijing Kuangshi Technology Co., Ltd. Access control system and data processing method thereof
CN106056516A (en) * 2016-05-31 2016-10-26 杭州致峰网络科技有限公司 Monitoring method and monitoring system
CN106205043A (en) * 2016-08-29 2016-12-07 马良花 A kind of campus card of automatic alarm
CN107707633A (en) * 2017-09-19 2018-02-16 深圳市易成自动驾驶技术有限公司 Information of vehicles processing method, equipment and readable storage medium storing program for executing
CN108156133A (en) * 2017-11-28 2018-06-12 黄敬易 personal safety confirmation method, device, system and user terminal
CN108665253A (en) * 2018-05-18 2018-10-16 百度在线网络技术(北京)有限公司 A kind of data processing method, device, equipment and the storage medium of block chain network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020114112A1 (en) * 2018-12-05 2020-06-11 阿里巴巴集团控股有限公司 Block chain-based smart alarm method and apparatus, and electronic device
CN111127824A (en) * 2019-09-17 2020-05-08 中国联合网络通信集团有限公司 Early warning method, device and system
CN112598183A (en) * 2020-12-26 2021-04-02 深圳市八方通达科技有限公司 Crime prediction method, system and storage medium based on block chain

Also Published As

Publication number Publication date
WO2020114112A1 (en) 2020-06-11
TW202037195A (en) 2020-10-01
TWI711319B (en) 2020-11-21

Similar Documents

Publication Publication Date Title
US10515203B2 (en) Method and system for improving security of a mobile terminal
CN110033602A (en) Intelligent alarm method and device, electronic equipment based on block chain
Landwehr et al. Privacy and cybersecurity: The next 100 years
US20140004817A1 (en) Cell phone detection and alert information system
CN105578126A (en) Monitoring camera automatic alarm system
US10776504B2 (en) Dynamic change in plurality of security layers based on project risk
US20180033266A1 (en) Automated motion disturbance detection and alerting
Pell You can't always get what you want: how will law enforcement get what it needs in a post-CALEA, Cybsecurity-Centric Encryption Era
CN109922206A (en) It is a kind of for the intelligent alarm method, apparatus of mobile phone and including its system
Singh et al. A systemic cybercrime stakeholders architectural model
US9965611B2 (en) Comparing real-time movements to pattern profile background
CN109598120A (en) Security postures intelligent analysis method, device and the storage medium of mobile terminal
Chang et al. Smartdog: Real-time detection of smartphone theft
Wang Erecting a Privacy Wall Against Technological Advancements: The Fourth Amendment in the Post-Carpenter Era
CN109379706A (en) Anti-theft method for mobile terminal, device, system and storage medium
CN105335629A (en) Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
US11611437B2 (en) Blockchain token holding social event history
CA2898364C (en) Method for protecting an electronic terminal, corresponding computer program and electronic terminal
CN114598844A (en) Doorbell reminding method and device, intelligent doorbell equipment and storage medium
CN109637079A (en) A kind of child custody method and system based on cloud computing
Uda Data protection method with blockchain against fabrication of video by surveillance cameras
Jenkins OMG-Not Something to LOL about: The Unintended Results of Disallowing Warrantless Searches of Cell Phones Incident to a Lawful Arrest
CN107018143A (en) The monitoring system of defense for the APT monitoring defence platforms analyzed based on big data
CN107045598A (en) Anti-theft method and device for mobile equipment
CN113538824A (en) Control method, device and system of electronic fence, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190719