Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with this specification one or more embodiment.Phase
Instead, they are only some aspects phases with the one or more embodiments of as detailed in the attached claim, this specification
The example of consistent device and method.
It should be understood that the sequence that might not show and describe according to this specification in other embodiments executes
The step of correlation method.In some other embodiments, step included by method can than described in this specification more
It is more or less.In addition, single step described in this specification, may be broken down into other embodiments multiple steps into
Row description;And multiple steps described in this specification, it may also be merged into single step progress in other embodiments
Description.
Fig. 1 is a kind of flow chart for intelligent alarm method based on block chain that an exemplary embodiment provides.Such as Fig. 1 institute
To show, this method is applied to block chain node, it may comprise steps of:
Step 102, the safety verification message that user equipment is sent is received, the safety verification message is by the user equipment
It is generated in response to the User Status confirmation operation detected.
In one embodiment, user equipment can be any types such as mobile phone, tablet computer, smartwatch that user uses
Electronic equipment, this specification limited not to this.Pass through the registered account of login user on an electronic device, use
The phonecard of user's real name registration in advance binds the marks such as the MAC Address of electronic equipment with user, can establish
Unique mapping relations between the electronic equipment and user allow the electronic equipment to be identified as the corresponding user of the user
Equipment.
In one embodiment, be different from user implement in an emergency situation alarm etc. trigger actions, user can be not yet
Before facing emergency, it is in a safe condition in the case where, for user equipment implement User Status confirmation operation, to show
Under the user is still in a safe condition.User can set on a user device, to determine the need for opening intelligent report
Alert function, the intelligent alarm function for realizing this specification intelligent alarm scheme;In other words, when the intelligent alarm function quilt
When unlatching, intelligent alarm can be realized based on the technical solution of this specification.Wherein, user can be with manual switch intelligent alarm function
Can, certain judgment rule can also be set, so that user equipment can be automatically switched intelligent alarm based on the judgment rule
Function;For example, judgment rule may include time range, for example the time range can be 9. -12 points of every night, make
It is proper be in time range when user equipment can automatically turn on intelligent alarm function, intelligent alarm function is otherwise automatically closed;
For another example judgment rule may include geographical position range, for example the geographical position range can be the higher area of crime rate,
Allow and automatically turn on intelligent alarm function when user equipment is in the geographical position range, intelligent report is otherwise automatically closed
Alert function;In another example judgment rule may include time range and geographical position range, so that when being in time range and user
When equipment is in the geographical position range, user equipment can automatically turn on intelligent alarm function, and intelligent report is otherwise automatically closed
Alert function.
In one embodiment, User Status confirmation operation may include: the camera shooting for unlocking user equipment, opening user equipment
Head at least one shoot etc. by the camera of user equipment, and this specification is limited not to this.
In one embodiment, corresponding digital identity is obtained ahead of time in the user of user equipment, and carries out to user equipment
Authorization, allows user equipment to sign based on the digital identity to transmitted safety verification message, and block chain link
Point the sender to safety verification message can carry out authentication accordingly, to identify that illegal user falsely uses the behavior of identity.
Meanwhile when discovery falsely uses the behavior of identity there are illegal user, it is possible to determine that there are higher faces by the user of user equipment
Face the risk of the state of emergency, to carry out risk prompting to the user of the user equipment;Alternatively, the user of user equipment is very
Emergency may have extremely been faced, relevant information can have been reported without delay to the police to confirm that making by triggering alarm operation
The true situation of user, to release security risk.
In one embodiment, when user equipment carries out transmitted safety verification message based on the digital identity of user
When signature, even if so that user and be not logged in registered account, user equipment and be not used user's real name registration phone
Card, user equipment the marks such as MAC Address do not bound in advance with the user in the case where, the signature can also be passed through
To show the identity of user.
Step 104, intelligent contract is called, the intelligence contract is used for determining between the reception of the safety verification message
Every whether meet it is default receive the period, and trigger and alarm in the case where receptions interval is unsatisfactory for default the receptions period
Operation.
In one embodiment, when user has faced emergency, for example plunder, kidnap etc., one side user may
Threat and can not be successfully by offender takes out that user equipment operates or user equipment may be by crime point
Son is grabbed or damage, and another aspect user may lose ability (such as injured or syncope operated to user equipment
Deng), thus by implementing User Status confirmation operation when user is in a safe condition and by block chain node in this specification
Receive and the safety verification message that accordingly sends of counting user equipment, can safety verification message reception situation it is abnormal (such as
Receive interval and be unsatisfactory for the default reception period) when, thus it is speculated that emergency may have been faced by going out user, faced without user
Implement any operation when emergency, can not only reduce the operation difficulty of user, promote the accuracy of judgement degree to User Status, but also
It can be avoided user to cause the doubt of offender to the operation of user equipment in an emergency situation or enrage offender, help
In the personal safety for ensureing user.
It in one embodiment, can by calling intelligent contract to carry out recognition and verification to the reception situation of safety verification message
With ensure the recognition and verification operation can it is automatic, be reliably carried out, be not easily susceptible to influence, thus accurately triggering alarm operation,
To safeguard the personal safety of user.
In one embodiment, when the reception interval of safety verification message is excessive, for example beyond default period and difference are received
When greater than default value, user is likely to face emergency and can not implement User Status confirmation operation, it is possible to determine that
To be unsatisfactory for the default reception period, to trigger alarm operation;Alternatively, work as the reception interval too small of safety verification message, than
When as received a plurality of safety verification message in the same default reception period, user is likely to face emergency but be not easy to
Implement alarm etc. to easily cause the doubt of offender or enrage the operation of offender, thus can continuously implement User Status
Confirmation operation and cause the abnormal of safety verification message to send, can be determined that at this time for be unsatisfactory for this it is default receive the period, thus
Triggering alarm operation.
In one embodiment, when intelligent alarm function is turned on, user equipment can be based on above-mentioned default reception week
Phase issues the user with prompt, so that user in the case where in a safe condition, is timely completed User Status confirmation operation, keeps away
Exempt to cause the transmission situation of safety verification message exception occur due to forgetting operation etc., prevents wrong report resulting from
It is alert.
In one embodiment, the intelligent contract is also used to have been received by triggering alarm operation to alarm object offer
The safety verification message from the user equipment, for alarm object (such as police) referred to, such as alarm object can
Confirmed with quantity, sender, the reception interval etc. to safety verification message, to analyze whether associated user has faced
Emergency etc..
In one embodiment, the environment in the safety verification message comprising the user equipment local environment describes letter
Breath.For example, the environment description information may include at least one of: the photo or video, institute of the user equipment shooting
The trace information etc. that the audio of user equipment acquisition, the location information of user equipment acquisition, the user equipment generate is stated,
This specification is limited not to this.So, by the way that safety verification message is provided to alarm object, especially when safety is true
When recognizing message comprising above-mentioned environment description information, facilitates alarm object and confirm the present position of associated user, periphery accordingly
Building, or even tell doubtful offender from photo, audio or video or analyze which kind of emergency may be faced
Deng so that alarm object preferably assists associated user to be detached from emergency.
In one embodiment, block chain node can be by safety verification message and/or the number of the safety verification message
Summary info (such as cryptographic Hash) is distributed to block chain, can carry out depositing card to safety verification message, in order to subsequent access, management
Or it calls to account.
In one embodiment, block chain node can analyze the content that the safety verification message includes, and to the intelligence
Can contract transmitting analysis as a result, make the intelligent contract according to analysis result confirmation there are when anomalous content, triggering institute
State alarm operation.User may not yet recognize to have faced emergency or deposit when implementing User Status confirmation operation
The risk or offender for facing emergency after implementing crime may modelling customer behavior and to implement User Status true
Recognize operation, so that block chain node is to the reception interval of safety verification message and without exception, it at this time can be by safety verification
The content that message includes is analyzed, for example, include in photo or video people, place, behavior (such as fighting, gesture of crying for help)
Etc. information, what is occurred in video or audio sound, the improper location information or trace information etc., with analysis such as cries, cries for help
Safety problem that may be present out, thus the operation of triggering alarm in time.
Fig. 2 is a kind of overall architecture schematic diagram for intelligent alarm that an exemplary embodiment provides.As shown in Figure 2, it is assumed that
During user A uses mobile phone 21, User Status confirmation operation can be implemented for the mobile phone 21, and mobile phone 21 can be accordingly
Corresponding safety verification message is generated, and the safety verification message is sent to server 22.Further, server 22 can be with
By calling intelligent contract, add their confirmation to the reception condition of safety verification message, to be touched automatically when reaching preset condition
Hair alarm operation.
In order to make it easy to understand, the operation realized during intelligent alarm respectively below for mobile phone 21, server 22 and
Function is described in detail in conjunction with intelligent alarm scheme of the Fig. 3 to this specification.Fig. 3 is one that an exemplary embodiment provides
Plant the interaction schematic diagram for realizing intelligent alarm.As shown in figure 3, the interactive process may comprise steps of:
Step 301, the foundation to binding relationship is realized between mobile phone 21 and server 22.
In one embodiment, the binding relationship of required foundation be user A identity information and mobile phone 21 facility information it
Between binding relationship.Based on the binding relationship, so that server 22 is in the safety verification message for receiving the subsequent transmission of mobile phone 21
When, it can be confirmed that the safety verification message corresponds to the user A.
For example, user A can carry out account registration at server 22 in advance, obtain and user A is unique corresponding has infused
Volume account.Then, user A can be by logging in the registered account on mobile phone 21, and server 22 is based on the registered account
Log-on message number on mobile phone 21 determines the registered account (corresponding to user A) and establishes binding pass between mobile phone 21
System.Similarly, user A can equally make server 22 true on mobile phone 21 using the phone number of the registration of real name
Binding relationship is established between the fixed phone number (corresponding to user A) and mobile phone 21.
Step 302, mobile phone 21 enables intelligent alarm function.
In one embodiment, mobile phone 21 can default closing intelligent alarm function, and user A can be opened temporarily when needed
Open the intelligent alarm function;For example, when user A some day work overtime to it is later when, can by opening the intelligent alarm function,
To ensure the safety in way home.
In one embodiment, mobile phone 21 can be by the judgement to preset condition, to open and close automatically intelligent alarm
Function.For example, it includes: a. time conditions as at night 10 points to next day 4:00 AM, b. that user A, which can set the preset condition,
Managing locality condition is in certain camera uncovered area;So, sentenced by the synthesis to temporal information and geographical location information
It is disconnected, for example, when mobile phone 21 at night 11 points be in above-mentioned camera uncovered area when, it is possible to determine that it is above-mentioned pre- to meet
If condition, thus intelligent alarm function can be automatically turned on;And it is not covered when being not in the above-mentioned period or leaving related camera
When cover area, intelligent alarm function can be automatically closed in mobile phone 21.
Step 303, mobile phone 21 can be reminded reminding the moment to implement operation.
In one embodiment, based on the technical solution of this specification, when intelligent alarm function is opened, user A needs fixed
Phase implements predefined User Status confirmation operation, to show that itself is still in a safe condition.And in order to avoid user A is due to forgetting
Document applies the User Status confirmation operation and causes to judge by accident, and mobile phone 21 can determine the corresponding prompting moment according to predetermined period,
To remind the moment to remind for user A implementation operation, user A is allowed to implement User Status confirmation operation on time.
Prompting for User Status confirmation operation can be the predefined special alerting pattern of user A, and reminded contents
It avoids revealing information relevant to intelligent alarm function, for example when User Status confirmation operation is shooting operation, can export
" photo please be shoot " or similar reminded contents, and output is avoided " an at least photo please to be shoot, itself be in safety to confirm
State, otherwise will triggering alarm " or similar reminded contents, thus in the case where user A has faced emergency, prevent to
Offender issues prompt, avoids offender from simulating or coerce user A and implements relevant operation.It even, can be to avoid reminding
Include information relevant to action type in content, for example " predetermined registration operation please be execute " or similar reminded contents can be exported,
And avoid output " photo please be shoot " or similar reminded contents.
Step 304, mobile phone 21 detects shooting operation.
In one embodiment, when predefined User Status confirmation operation is shooting operation, if user A is still in peace
Total state, can actively or aforesaid operations remind suggesting effect under, open mobile phone 21 camera to implement shooting operation,
For example shoot an at least photo.
Certainly, User Status confirmation operation may include other types, for example be unlocked to mobile phone 21, on mobile phone 21
Specific character string etc. is inputted, this specification is limited not to this.
Step 305, mobile phone 21 collects environment description information.
In one embodiment, before user A implements predefined User Status confirmation operation, in or after the process, hand
Machine 21 can carry out information collection to local environment, obtain corresponding environment description information, for from more various dimensions, more detailed
Environment locating for mobile phone 21 or user A carefully is described.For example, the environment description information may include: mobile phone 21 in step 304
The positioning letter of audio, the acquisition of mobile phone 21 that video, the mobile phone 21 that photo, the mobile phone 21 of shooting acquire after camera unlatching acquire
The trace information etc. that breath, mobile phone 21 generate, this specification is limited not to this.
Step 306, mobile phone 21 sends safety verification message to server 22.
In one embodiment, safety verification message may include above-mentioned environment description information.In addition, user A can be pre-
First registration obtains unique corresponding digital identity, which is characterized by one group of public private key pair;Correspondingly, mobile phone 21 can
It is signed with the private key by the digital identity corresponding to user A to safety verification message.
Step 307, server 22 can carry out signature verification to the safety verification message received.
It in one embodiment, can be corresponding by user A after server 22 receives the safety verification message that mobile phone 21 uploads
Public key carry out sign test, to determine that the safety verification message is authorized by user A, and user not pretended to be by criminal
The identity of A is sent.
In one embodiment, when sign test does not pass through, since mobile phone 21 is tied to user A in advance, show that there may be not
Method molecule pretends to be the identity of user A, and user A has the risk in emergency, and server 22 can trigger alarm operation.
Step 308, server 22 calls intelligent contract, receives whether interval closes rule with verifying.
In one embodiment, the client for having block chain is run on server 22, so that the server 22 is configured as one
Block chain node, and server 22 can call intelligent contract accordingly, and will input intelligence to the time of reception of safety verification message
Whether energy contract meets default reception week with the reception interval by safety verification message of the intelligent contract verifying from mobile phone 21
Phase.
For example it is assumed that the default reception period is 3 minutes a length of when being 5 minutes, early warning, it is assumed that the last is 22:20
The safety verification message for receiving the transmission of mobile phone 21, sends out again then mobile phone 21 should be received in 22:25 or so under normal circumstances
The safety verification message sent;And in view of the operation of user A can not be very punctual, above-mentioned 3 minutes early warning durations can be used as
The fault-tolerant period, if that not receiving the safety verification message that mobile phone 21 is sent again yet in 22:28, intelligent contract can be sentenced
It is set to user A and does not implement User Status confirmation operation on time, there is user A greater probability to be encountered by emergency, thus intelligence
Energy contract can be alarmed with automatic trigger and be operated.
For another example assuming that the default reception period is 5 minutes, it is assumed that the last is that 22:20 receives the hair of mobile phone 21
The safety verification message sent disappears then the safety verification that mobile phone 21 is sent again should be received in 22:25 or so under normal circumstances
Breath;And intelligent contract is received again by the safety verification message that mobile phone 21 is sent again if in 22:22, or even continuously receives more
Safety verification message, then intelligent contract, which can be determined that, may be encountered by emergency for user A, and it is desirable that by upper
The abnormal operation stated gives a warning, thus intelligent contract can be alarmed with automatic trigger and be operated.
Step 309, server 22 is by calling intelligent contract, verification environment description information.
In one embodiment, when safety verification message includes environment description information, server 22 can extract the environment
Description information or its information content further included, and the environment description information or the information content are inputted into intelligent contract, with
It is tested by intelligent contract.
In one embodiment, intelligent contract may verify that the reception interval of safety verification message and pass through, but by upper
It states environment description information or the information content is analyzed, for example whether comprising a suspect (for example pass through people in the photo shot
Face, which identifies, determines that the people in photo has criminal record etc.), in the video of shooting whether include occurent criminal offence, bat
Whether comprising fight sound or sound of call for help etc. in the audio of the video or acquisition taken the photograph, paid-in safety verification may further determine that
Whether message is that user A is sent in the secure state, if there are offender's analog subscriber A or stress user A to implement user
The case where state confirmation operates etc..If it find that the case where there are offender's analog subscriber A or stress user A or risk, intelligence
Energy contract can trigger alarm operation.
In one embodiment, when intelligent contract has verified that it is abnormal for the reception interval of safety verification message when, can be with
By analyzing environment description information or the information content, with the surrounding enviroment that obtain user A, (such as street state, periphery are built
Build), surrounding people, geographical location information, the facial expression of run trace information and user A, the sound of sending and behavior
Movement etc., and relevant information is provided to alarm object when implementing alarm operation, in order to alarm, object implementation is more accurate
Analysis and more effective treatment measures.
It should be pointed out that persistent loop is implemented above-mentioned when the intelligent alarm function of mobile phone 21 is in the open state
Step 303~309, so that sustainable protection is realized to user A, until user A, which is reached, safety zone and closes the intelligent alarm
Function.
Fig. 4 is a kind of schematic configuration diagram for equipment that an exemplary embodiment provides.Referring to FIG. 4, in hardware view, it should
Equipment includes processor 402, internal bus 404, network interface 406, memory 408 and nonvolatile memory 410, is gone back certainly
It may include hardware required for other business.Processor 402 reads corresponding computer journey from nonvolatile memory 410
Then sequence is run into memory 408, the intelligent alarm device based on block chain is formed on logic level.Certainly, in addition to software
Except implementation, this specification one or more embodiment is not precluded other implementations, such as logical device or soft
Mode of combination of hardware etc., that is to say, that the executing subject of following process flow is not limited to each logic unit, can also
To be hardware or logical device.
Referring to FIG. 5, in Software Implementation block chain link should be applied to based on the intelligent alarm device of block chain
Point may include:
Receiving unit 51 receives the safety verification message that user equipment is sent, and the safety verification message is by the user
Equipment is generated in response to the User Status confirmation operation that detects;
Call unit 52, calls intelligent contract, and the intelligence contract is used for determining to connect the safety verification message
It receives whether interval meets the default reception period, and is triggered in the case where reception interval is unsatisfactory for the default reception period
Alarm operation.
Optionally, the safety verification message is signed by the user of the user equipment by corresponding digital identity
Name.
It optionally, include the environment description information of the user equipment local environment in the safety verification message.
Optionally, the environment description information includes at least one of: the photo or video of the user equipment shooting,
The trace information that the audio of the user equipment acquisition, the location information of user equipment acquisition, the user equipment generate.
Optionally, the intelligent contract is also used to provide paid-in come to alarm object in triggering alarm operation
The safety verification message of the user equipment.
Optionally, further includes:
Analytical unit 53 analyzes the content that the safety verification message includes;
Transfer unit 54, to the intelligent contract transmitting analysis as a result, tying the intelligent contract according to the analysis
There are when anomalous content, trigger the alarm operation for fruit confirmation.
Optionally, further includes:
Release unit 55 issues the digital digest information of the safety verification message and/or the safety verification message
To block chain.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can
To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment
The combination of any several equipment.
This description presents a kind of computer-readable mediums, are stored thereon with computer instruction, and the instruction is by processor
The technical solution of this specification, such as the intelligent alarm method based on block chain of any of the above-described embodiment are realized when execution, this
Place no longer repeats one by one.
In a typical configuration, computer includes one or more processors (CPU), input/output interface, network
Interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, disk storage, quantum memory, based on graphene
Storage medium or other magnetic storage devices or any other non-transmission medium, can be used for storing can be accessed by a computing device
Information.As defined in this article, computer-readable medium does not include temporary computer readable media (transitory media),
Such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
The term that this specification one or more embodiment uses be only merely for for the purpose of describing particular embodiments, and
It is not intended to be limiting this specification one or more embodiment.In this specification one or more embodiment and the appended claims
Used in the "an" of singular, " described " and "the" be also intended to including most forms, unless context understands earth's surface
Show other meanings.It is also understood that term "and/or" used herein refers to and includes one or more associated list
Any or all of project may combine.
It will be appreciated that though this specification one or more embodiment may using term first, second, third, etc. come
Various information are described, but these information should not necessarily be limited by these terms.These terms are only used to same type of information area each other
It separates.For example, the first information can also be referred to as in the case where not departing from this specification one or more scope of embodiments
Two information, similarly, the second information can also be referred to as the first information.Depending on context, word as used in this is " such as
Fruit " can be construed to " ... when " or " when ... " or " in response to determination ".
The foregoing is merely the preferred embodiments of this specification one or more embodiment, not to limit this theory
Bright book one or more embodiment, all within the spirit and principle of this specification one or more embodiment, that is done is any
Modification, equivalent replacement, improvement etc. should be included within the scope of the protection of this specification one or more embodiment.