CN110061793B - Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium - Google Patents

Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium Download PDF

Info

Publication number
CN110061793B
CN110061793B CN201910312918.2A CN201910312918A CN110061793B CN 110061793 B CN110061793 B CN 110061793B CN 201910312918 A CN201910312918 A CN 201910312918A CN 110061793 B CN110061793 B CN 110061793B
Authority
CN
China
Prior art keywords
bluetooth
data
evacuation
frame
broadcast
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910312918.2A
Other languages
Chinese (zh)
Other versions
CN110061793A (en
Inventor
龙志坚
谭燕强
石世淡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Kdthe Communications Co ltd
Original Assignee
Hunan Kdthe Communications Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Kdthe Communications Co ltd filed Critical Hunan Kdthe Communications Co ltd
Priority to CN201910312918.2A priority Critical patent/CN110061793B/en
Publication of CN110061793A publication Critical patent/CN110061793A/en
Application granted granted Critical
Publication of CN110061793B publication Critical patent/CN110061793B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H20/00Arrangements for broadcast or for distribution combined with broadcast
    • H04H20/53Arrangements specially adapted for specific applications, e.g. for traffic information or for mobile receivers
    • H04H20/59Arrangements specially adapted for specific applications, e.g. for traffic information or for mobile receivers for emergency or urgency
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H20/00Arrangements for broadcast or for distribution combined with broadcast
    • H04H20/65Arrangements characterised by transmission systems for broadcast
    • H04H20/71Wireless systems
    • H04H20/72Wireless systems of terrestrial networks

Abstract

The application discloses a broadcasting method and device of an air defense and disaster prevention alarm, electronic equipment and a storage medium, and relates to the air defense and disaster prevention alarm technology. Wherein, the method comprises the following steps: searching for a Bluetooth signal, and receiving Bluetooth data when the Bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the Bluetooth data comprises at least one of Bluetooth name data or Bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting; after one round of Bluetooth signal reception is finished, verifying whether the received Bluetooth data is complete; if the Bluetooth data is not complete, returning to the step of searching the Bluetooth signal, and receiving the missing part in the Bluetooth data; and if the Bluetooth data is complete, performing security verification on the Bluetooth data, and executing the instruction in the Bluetooth data passing the security verification. The method provides a broadcasting means of the digitalized air defense and disaster prevention alarm, and greatly improves the notification effect of the air defense and disaster prevention alarm.

Description

Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium
Technical Field
The present application relates to an air defense and disaster prevention alarm technology, and in particular, to a method and an apparatus for broadcasting an air defense and disaster prevention alarm, an electronic device, and a storage medium.
Background
The air defense and disaster prevention alarm equipment is an important component of urban air defense and disaster prevention engineering, is used for disaster prediction and emergency report under the conditions of disaster relief and emergency accidents at ordinary times and for civil air defense in wartime, and is a basic means for implementing civil air defense command and organizing personnel evacuation by all levels of civil governments.
The existing air defense and disaster prevention alarm equipment covers the city by sound through sound amplification equipment, and because the information which can be transmitted by the sound is simple and single, the notification effect of the air defense and disaster prevention alarm is poor when air attack or disaster occurs.
Disclosure of Invention
In view of the above, a main object of the present application is to provide a broadcasting method and apparatus for an air defense and disaster prevention alarm, an electronic device and a storage medium, where the method is applied to a mobile device, and can be used for disaster prediction and emergency notification under disaster relief and emergency situations, and in wartime, for people air defense and evacuation shelter, real-time information push notification and wartime command scheduling, and disaster prevention information data is transmitted by a digital means, so as to greatly improve the notification effect of the air defense and disaster prevention alarm.
In order to achieve the purpose, the technical scheme provided by the application is as follows:
in a first aspect, an embodiment of the present application provides a method for broadcasting an air defense and disaster prevention alarm, including:
searching a Bluetooth signal, and receiving Bluetooth data when the Bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the Bluetooth data comprises at least one of Bluetooth name data or Bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting;
after one round of Bluetooth signal reception is finished, verifying whether the received Bluetooth data is complete; if the Bluetooth data is not complete, returning to the step of searching for the Bluetooth signal, and receiving the missing part in the Bluetooth data;
and if the Bluetooth data is complete, performing security verification on the Bluetooth data, and executing the instruction in the Bluetooth data passing the security verification.
In a possible embodiment, in the case that the bluetooth data is bluetooth name data, the step of receiving the bluetooth data includes:
judging whether the acquired Bluetooth name data is the same as the existing Bluetooth name or not, and if the acquired Bluetooth name data is not the same as the existing Bluetooth name, receiving the acquired Bluetooth name data as Bluetooth data.
In a possible embodiment, in the case that the bluetooth data is bluetooth broadcast data, the step of receiving the bluetooth data includes:
timing communication idle time after receiving one byte of Bluetooth broadcast data;
and when the communication idle time exceeds a preset time threshold, stopping receiving the Bluetooth broadcast data, and entering the step of verifying whether the received Bluetooth broadcast data is complete.
In a possible embodiment, the step of verifying whether the received bluetooth data is complete includes:
dividing the received Bluetooth broadcast data into at least one data frame according to a frame ending identifier carried in each data frame; each data frame at most comprises a preset number of bytes;
for each data frame, checking whether the frame is complete according to the byte number information carried by the data frame;
when the frame is complete, extracting the frame number of the frame, and judging whether the frame is the first data frame of the first frame according to the frame number of the frame;
if the frame is the first data frame of the first frame, extracting the total frame number of the Bluetooth broadcast data; judging whether the Bluetooth broadcast data is single-frame data or multi-frame data according to the total frame number;
if the frame is not the first data frame of the first frame, judging whether the first data frame of the first frame exists in the Bluetooth broadcast data; and if the first data frame of the first frame exists, judging whether the Bluetooth broadcast data is complete or not according to the frame number of each data frame and the total frame number.
In a possible embodiment, the performing security verification on the bluetooth data includes:
checking the Bluetooth data according to a preset secret key;
and the Bluetooth data passing the key verification passes the security verification.
In one possible embodiment, the step of performing security verification on the bluetooth data includes:
extracting a first content check code from a first data frame of the Bluetooth broadcast data;
calculating according to each byte in the Bluetooth broadcast data to obtain a second content check code;
and if the first content check code is the same as the second content check code, the Bluetooth broadcast data passes the security verification.
In one possible embodiment, the step of performing security verification on the bluetooth data includes:
extracting a first content check code from the Bluetooth name data;
calculating according to each byte in the Bluetooth name data to obtain a second content check code;
and if the first content check code is the same as the second content check code, the Bluetooth name data passes the security verification.
In one possible embodiment, the step of performing security verification on the bluetooth data includes:
extracting a duplication-removing identification code from a first data frame of the Bluetooth broadcast data;
storing the deduplication identification code after the executing of the instruction in the security-verified Bluetooth data;
before executing the instruction in the Bluetooth data passing the security verification, when the step of performing the security verification on the Bluetooth data is executed, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth broadcast data passing the security verification.
In one possible embodiment, the step of performing security verification on the bluetooth data includes:
extracting a duplicate identification code from the Bluetooth name data;
storing the deduplication identification code after the executing of the instruction in the security-verified Bluetooth data;
before executing the instruction in the Bluetooth data passing the security verification, when the step of performing the security verification on the Bluetooth data is executed, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth name data passing the security verification.
In one possible embodiment, the step of executing the instruction in the bluetooth data passing the security verification includes:
if the instruction is an alarm broadcast instruction, a voice broadcast text is obtained from the Bluetooth data, and the voice broadcast text is used for voice broadcast.
In a possible implementation manner, the step of performing voice broadcast using the voice broadcast text is:
converting the voice broadcast text into voice information using a voice synthesis TTS;
and playing the voice information.
In one possible embodiment, the step of executing the instruction in the bluetooth data passing the security verification includes:
if the instruction is an evacuation instruction, acquiring an evacuation mode selected by a user; the evacuation instruction is as follows: providing guidance information for the user, and guiding the user to go to an evacuation site for evacuation; the evacuation mode comprises the following steps: go to and unify going to by oneself;
extracting an evacuation place corresponding to the evacuation mode from the Bluetooth data according to the evacuation mode;
and starting navigation by taking the evacuation place as a destination.
In one possible embodiment, the step of determining the evacuation location corresponding to the evacuation mode includes: when the evacuation mode is self-propelled forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation site;
and when the evacuation mode is unified forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation rendezvous site.
In a possible embodiment, after obtaining the evacuation location, before said initiating navigation, it comprises:
verifying whether a connection to the residential network is possible;
and if the user can be connected to the civil network, inquiring whether the user selects a third-party navigation tool, and opening the third-party navigation tool when the user selects the third-party navigation tool, and navigating by using the third-party navigation tool.
In a possible embodiment, after the extracting the evacuation location corresponding to the evacuation manner from the bluetooth data, before the starting of navigation, the method further includes:
judging whether first evacuation personnel information corresponding to the evacuation location exists in the Bluetooth data; wherein the first evacuation people information comprises the number of people existing at the evacuation location;
and if so, storing the first evacuating personnel information, and popping up reminding information containing the first evacuating personnel information.
In a possible implementation, after the starting of navigation, the method further includes:
judging whether the evacuation site can be connected to the server or not, and if the evacuation site can be connected to the server, reporting second evacuation personnel information corresponding to the evacuation site to the server; the second evacuation personnel information is information that a user is going to the evacuation site.
In one possible embodiment, the step of executing the instruction in the bluetooth data passing the security verification includes:
if the command is a masking command, extracting a masking place from the Bluetooth data; the masking instruction is: providing guiding information for the user, and guiding the user to go to a masking place for masking;
and starting navigation by taking the masking place as a destination.
In one possible embodiment, the step of executing the instruction in the bluetooth data passing the security verification includes:
if the command is an alarm sounding command, starting an evaluation questionnaire program, and acquiring an evaluation result formed by a user according to the evaluation questionnaire program;
and uploading the evaluation result to a server.
In one possible embodiment, the step of executing the instruction in the bluetooth data passing the security verification includes:
if the instruction is civil defense knowledge recommendation, extracting civil defense knowledge recommendation data from the Bluetooth data, and pushing the civil defense knowledge recommendation to a user; the civil air defense knowledge recommendation data comprises a civil air defense knowledge recommendation catalog.
In a second aspect, an embodiment of the present application further provides a broadcast device for an air defense and disaster prevention alarm, including:
the receiving module is used for searching the Bluetooth signal and receiving the Bluetooth data when the Bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the bluetooth data includes: at least one of bluetooth name data or bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting; the Bluetooth module is also used for receiving the missing part in the Bluetooth data when the Bluetooth data is incomplete;
the verification module is used for verifying whether the received Bluetooth data is complete or not after one round of Bluetooth signal reception is finished; if the Bluetooth data is complete, performing security verification on the Bluetooth data;
and the execution module is used for executing the instruction in the Bluetooth data passing the security verification. In a third aspect, an embodiment of the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps in any possible implementation manner of the first aspect and the first aspect when executing the program.
In a fourth aspect, this application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in any possible implementation manner of the first aspect and the first aspect.
In summary, the broadcasting method, device, electronic device and storage medium for the air defense and disaster prevention alarm provided by the present application provide a digital broadcasting means for the air defense and disaster prevention alarm, and can broadcast the air defense and disaster prevention alarm more conveniently by receiving the disaster prevention information data carried in the bluetooth signal, thereby greatly improving the notification effect of the air defense and disaster prevention alarm.
Drawings
Fig. 1 is a schematic view of an application scenario according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart illustrating a bluetooth data receiving and verifying process in the method according to the second embodiment of the present application;
fig. 4 is a schematic flowchart illustrating a bluetooth data receiving and verifying process in the method according to the third embodiment of the present application;
fig. 5 is a schematic diagram illustrating a bluetooth data receiving method in the method according to the third embodiment of the present application;
fig. 6 is a schematic flowchart illustrating a process of executing an alarm broadcast instruction in the method according to the fourth embodiment of the present application;
fig. 7 is a schematic flow chart of alarm broadcasting in the method according to the fourth embodiment of the present application;
fig. 8 is a schematic flowchart illustrating an evacuation command executed in the method according to the fifth embodiment of the present application;
fig. 9 is a schematic flowchart illustrating a process of executing a masking instruction in a method according to a sixth embodiment of the present application;
fig. 10 is a schematic flow chart illustrating transmission of evacuation people information using bluetooth signals in a method according to a seventh embodiment of the present application;
fig. 11 is a schematic flowchart of a process of transmitting masked person information by using a bluetooth signal in the method according to the eighth embodiment of the present application;
fig. 12 is a schematic flow chart of an alarm sounding trial operation in the method according to the ninth embodiment of the present application;
fig. 13 is a schematic flowchart of civil air defense knowledge recommendation operation in a method provided in a tenth embodiment of the present application;
FIG. 14 is a schematic structural diagram of an apparatus according to an eleventh embodiment of the present disclosure;
fig. 15 is a schematic structural diagram of an electronic device according to a twelfth embodiment of the present application.
Detailed Description
The air defense and disaster prevention alarm equipment is an important component of urban air defense and disaster prevention engineering, the existing air defense and disaster prevention alarm equipment covers the city by sound through sound amplification equipment, and the notification effect of the air defense and disaster prevention alarm is poor when air attack or disaster occurs because the information which can be transmitted by sound is simple and single.
In view of this, the core of the broadcast method for the air defense and disaster prevention alarm provided in the embodiment of the present application lies in the following aspects:
1. because the Android and iOS two major operating systems popular in the mobile terminal on the market at present control the system level authority strictly, and the common Bluetooth transmission needs to be paired and connected, the pairing process cannot meet the timeliness requirement of the air defense and disaster prevention alarm. Therefore, the Bluetooth name data and/or the Bluetooth broadcast data are used for sending the air defense and disaster prevention alarm.
2. If the data transmission universality is higher by adopting the Bluetooth technology, but the safety is lower, and the requirement on the communication safety is extremely high due to the particularity of the civil air defense application field, therefore, the encryption and the content verification are required, and the potential safety hazard is prevented in the bud.
3. In order to completely acquire the bluetooth data, the bluetooth data needs to be continuously polled, so that duplicate removal verification needs to be performed, and the purpose of accurately receiving the bluetooth data is achieved.
4. The received broadcast content comprises air defense and disaster prevention alarms, intelligent voice texts, regional/rendezvous point evacuation personnel information and peripheral engineering masking personnel information, and after the broadcast content is received, subsequent business operations such as evacuation guidance, masking navigation and the like need to be executed, so that the whole system forms a closed loop.
As shown in fig. 1, the embodiment of the present application is applied to a mobile device 102 with a bluetooth module, such as a mobile phone, a tablet computer, a palmtop computer, a television, a home alarm terminal, a car multimedia screen, and the like. The embodiment of the application receives the bluetooth signal sent by the bluetooth module 101, and the bluetooth signal is used as a broadcasting means, so that the air defense and disaster prevention alarm can be sent to any mobile device 102 with the bluetooth module, a digital broadcasting means of the air defense and disaster prevention alarm is provided, and the air defense and disaster prevention alarm can be broadcasted more conveniently by receiving the disaster prevention information data carried in the bluetooth signal, thereby greatly improving the notification effect of the air defense and disaster prevention alarm.
To make the objects, technical solutions and advantages of the present application more clear, the present application will be further described in detail with reference to the accompanying drawings and specific embodiments.
Example one
Fig. 2 is a schematic flow chart of a broadcasting method of an air defense and disaster prevention alarm provided in an embodiment of the present application, and as shown in fig. 2, the embodiment mainly includes:
s201: searching a Bluetooth signal, and receiving Bluetooth data when the Bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the bluetooth data includes: at least one of bluetooth name data or bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting.
In disaster and wartime, the civil network is unreliable, and broadcasting of air defense and disaster prevention alarms and evacuation or masking of personnel need to be performed in time in a civil air defense multimode communication private network mode, so that the Bluetooth signal in the embodiment of the application is a Bluetooth signal sent by unidirectional broadcasting. The method provided by the first embodiment of the present application needs to be premised on that the mobile terminal turns on the bluetooth module of the local device, and the bluetooth module can normally receive and transmit data. The mobile terminal continuously searches for the Bluetooth signal, and receives Bluetooth data carried in the Bluetooth signal when the Bluetooth signal is obtained.
Because the bluetooth data transmission needs to be paired and connected, the timeliness requirement of the air defense and disaster prevention alarm cannot be met in the pairing process, and after the connection is established by general bluetooth equipment, the two-way communication can be realized, so that the safety of the air defense and disaster prevention alarm system can be endangered. To solve this problem, the following three possible embodiments can be adopted:
a: in a possible implementation mode, the bluetooth module is set to a broadcast working mode, and the broadcast data is used to broadcast the air defense and disaster prevention alarm, so that the content of the bluetooth broadcast data is received as long as the bluetooth module enters the coverage range of the bluetooth signal. Because the broadcast working mode of the Bluetooth module is one-way communication, the safety of the air defense and disaster prevention alarm system can be guaranteed.
B: in another possible embodiment, the transmission of bluetooth data is performed by modifying the bluetooth name. As long as the Bluetooth signal enters the coverage range of the Bluetooth signal, the instruction for modifying the Bluetooth name can be received, the Bluetooth data carried by the Bluetooth name data can also be received, and the process of searching the Bluetooth name data is also unidirectional, so that the safety of the air defense and disaster prevention alarm system can be guaranteed.
C: in another possible embodiment, a bluetooth module with a broadcast mode of operation is used. The method not only sends disaster prevention information data through the Bluetooth name data in a mode of modifying the Bluetooth name, but also broadcasts the air defense and disaster prevention alarm by using the Bluetooth broadcast data.
S202: after one round of Bluetooth signal reception is finished, verifying whether the received Bluetooth data is complete; and if the Bluetooth data is not complete, returning to the step of searching the Bluetooth signal, and receiving the missing part in the Bluetooth data.
And under the condition that the Bluetooth data is the Bluetooth name data, checking whether the Bluetooth name data is complete or not according to the byte quantity information carried by the Bluetooth name data. Because the Bluetooth name data is short, the safety verification can be directly carried out on the Bluetooth name data, and whether the Bluetooth name data is complete or not is verified through the safety verification.
In the case that the bluetooth data is the bluetooth broadcast data, after the bluetooth broadcast data is received, it is first required to verify whether the received bluetooth broadcast data is complete, specifically, the following steps 1 to 5 may be adopted to perform integrity verification on the received bluetooth broadcast data:
step 1, dividing the received Bluetooth broadcast data into at least one data frame according to a frame ending identifier carried in each data frame; and each data frame at most comprises a preset number of bytes.
And 2, aiming at each data frame, checking whether the frame is complete or not according to the byte quantity information carried by the data frame.
And 3, when the frame is complete, extracting the frame number of the frame, and judging whether the frame is the first data frame or not according to the frame number of the frame.
Step 4, if the frame is the first data frame, extracting the total frame number of the Bluetooth broadcast data; and judging whether the Bluetooth broadcast data is single-frame data or multi-frame data according to the total frame number.
Here, if the frame is the first data frame and the bluetooth broadcast data is single frame data, the single frame data of the frame must be complete since the single frame integrity of the first data frame has been verified. The step of verifying the bluetooth broadcast data may be directly performed.
Step 5, if the frame is not the first data frame, judging whether the first data frame exists in the Bluetooth broadcast data; and if the first data frame exists, judging whether the Bluetooth broadcast data is complete or not according to the frame number of each data frame and the total frame number.
If the Bluetooth broadcast data of the multi-frame is not complete, recording the frame number and the total frame number of the data frame with complete data, obtaining the frame number of the data frame with incomplete data according to the frame number and the total frame number of the data frame with complete data, and then returning to the step of searching the Bluetooth signal. And when the Bluetooth signal is acquired, receiving the incomplete data frame according to the frame number of the data frame with incomplete data until all the data frames in the Bluetooth broadcast data of the plurality of frames are received. If the first data frame does not exist in the Bluetooth broadcast data, the Bluetooth broadcast data is not complete, the frame number of the data frame with complete data is recorded, and the step of searching the Bluetooth signal is returned. And when the Bluetooth signal is acquired, receiving the incomplete data frame according to the frame number of the data frame with complete data until all the data frames in the multi-frame Bluetooth broadcast data are received.
S203: and if the Bluetooth data is complete, performing security verification on the Bluetooth data, and executing the instruction in the Bluetooth data passing the security verification.
Here, the security verifying the bluetooth data may include: at least one of a key check, a content check, and a repeatability check.
Through the multiple verification, the obtained Bluetooth data is complete and legal Bluetooth data, and the Bluetooth data can be executed.
For the method provided by the first embodiment of the application, the most important function is to provide a broadcast function of the air defense and disaster prevention alarm. Because the communication packet size of the bluetooth signal is limited, and the air defense and disaster prevention alarm needs to be quickly notified in place in disaster or wartime, voice information with large data volume cannot be directly transmitted to the mobile terminal. Specifically, need follow acquire the voice broadcast text in the bluetooth data, use the voice broadcast text carries out voice broadcast. Further, the voice broadcast Text may be converted into voice information using a Text To Speech (TTS); and playing the converted voice information. Thereby achieving the purposes of quick transmission and timely broadcast.
In a possible implementation manner, the broadcast of the air defense and disaster prevention alarm needs to record a play log on the mobile terminal and report to the server when the civil network is available and can be connected to the server through the civil network, so that the broadcast is used as a decision basis for commanding and scheduling of the civil air defense command center.
As the civil network is unreliable in disaster or wartime, people need to be instructed to evacuate or shelter through bluetooth signals.
When people are instructed to evacuate through the Bluetooth signals, evacuation instructions need to be sent through the Bluetooth signals, and then evacuation modes selected by users are obtained; and extracting the evacuation site corresponding to the evacuation mode from the Bluetooth data according to the evacuation mode. Specifically, when the evacuation manner is self-propelled forward, the evacuation location corresponding to the evacuation manner is the address of the evacuation location; and when the evacuation mode is unified forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation rendezvous site.
Because the civil network is unreliable in disaster or wartime, when evacuation guidance is carried out, a local navigation function needs to be provided, a navigation path can be calculated locally, and navigation is started by taking an evacuation place as a destination. Here, the nearest evacuation site may be used as the destination, or an evacuation site selected by the user may be used as the destination. In addition, whether the civil network can be connected or not can be verified at the moment, and if the civil network can be connected, the user can select a third-party navigation tool to navigate.
In addition, in disaster or wartime, due to the disconnection of the civil network, the mobile terminal cannot acquire the evacuation personnel information in the evacuation site temporarily, and needs to push the information through a bluetooth signal as the basis for evacuation guidance. Specifically, it may be determined whether first evacuation personnel information corresponding to the evacuation location exists in the bluetooth data; wherein the first evacuation people information comprises the number of people existing at the evacuation location; and if so, storing the first evacuated personnel information and reminding a user to check. Therefore, the number of people in each evacuation place can be reminded, evacuation guidance is carried out according to the number of people in each evacuation place, and the situation that the users go to the evacuation places with the full number of people is avoided.
Further, when the evacuation guidance service function is executed, whether the evacuation guidance service function can pass through a civil network or not can be judged, and if the evacuation guidance service function can be connected to the server, second evacuation personnel information corresponding to the evacuation site is reported to the server; the second evacuation personnel information is information that a user is going to the evacuation site.
The manner of conducting the shelter guidance is similar to the manner of conducting the evacuation guidance. Specifically, if the instruction in the bluetooth data is a masking instruction, extracting a masking place from the bluetooth data; and starting navigation by taking the masking place as a destination. Likewise, the nearest masking place may be automatically selected by the masking place, or a masking place selected by the user may be used. And, in case of being able to connect to the residential network, the user may be allowed to select a navigation tool of a third party for navigation. And the information of the masking personnel at the masking place is pushed through the Bluetooth signal as the basis of the masking guide. Specifically, whether first masking personnel information corresponding to the masking place exists in the bluetooth data or not can be judged; wherein the first masking person information includes the number of existing persons of the masking place; and if so, storing the first masking personnel information and reminding a user to view. Therefore, the number of people in each shelter site can be reminded, and the shelter guidance is carried out according to the number of people in each shelter site, so that the user is prevented from going to the shelter site with the full number of people. Further, when the masking guidance service function is executed, whether the second masking personnel can pass through the civil network or not can be judged, and if the second masking personnel can be connected to the server, second masking personnel information corresponding to the masking place is reported to the server; the second masking personnel information is information that the user is going to the masking place.
At present, the air defense and disaster prevention alarm system only covers the city with sound through the public address equipment, so that the civil defense department cannot master the sounding test effect when the civil defense alarm sounds in a test every year. Therefore, the air defense and disaster prevention alarm broadcasting system provided by the embodiment of the application can provide an alarm sounding function, specifically, when the instruction is an alarm sounding instruction, an evaluation questionnaire program is started, and an evaluation result formed by a user according to the evaluation questionnaire program is obtained; and uploading the evaluation result to a server. Therefore, the basis can be provided for the overall planning and construction of the alarm, and the alarm sounds to the public to make a counter sound to form a closed loop.
In addition, when people's air defense knowledge propaganda is carried out at ordinary times, and necessary people's air defense knowledge propaganda and guidance are carried out in disaster or wartime, people's air defense knowledge recommendation instructions can be carried through Bluetooth data, and people's air defense knowledge catalogues which recommend users to read and know are carried in the Bluetooth data to guide the users to read and learn the people's air defense knowledge stored in the mobile equipment. Moreover, the browsing records of the user can be reported to the server through the civil network, so that the civil air defense office can master the effect of civil air defense propaganda and education in real time.
Example two
As shown in fig. 3, in a broadcast method of an air defense and disaster prevention alarm provided in the second embodiment of the present application, in a case that the bluetooth data is bluetooth name data, the steps of receiving the bluetooth data and verifying security include:
s301: a search for bluetooth signals is constantly made.
In order to solve the problems of timeliness communication and safety, the Bluetooth data is sent in a mode of modifying the Bluetooth name. As long as the Bluetooth signal coverage range is entered, the instruction for modifying the Bluetooth name can be received, and the disaster prevention information data carried by the Bluetooth name data can be received.
S302: when the Bluetooth signal is acquired, whether Bluetooth name data exists in the Bluetooth signal is judged.
S303: and receiving the Bluetooth name data until the communication idle time reaches a preset time threshold.
When using bluetooth name data as bluetooth data, carrying out disaster prevention information data's transmission through the mode of revising the bluetooth name, constantly search for the bluetooth name data that the bluetooth signal carried, specifically include:
judging whether the acquired Bluetooth name data is the same as the existing Bluetooth name or not, and if the acquired Bluetooth name data is not the same as the existing Bluetooth name, taking the acquired Bluetooth name data as Bluetooth data.
When the bluetooth name data is used as the bluetooth data and the disaster prevention information data is transmitted by modifying the bluetooth name, the bluetooth name data is received byte by byte, the length of the bluetooth name is usually 16 bytes, and the disaster prevention information data with less than 16 bytes can be transmitted through the bluetooth name data. Timing communication idle time after receiving one byte of Bluetooth name data; in general, after receiving one byte of bluetooth name data, the communication idle time is counted from 0. In addition, the unit of time measurement may be millisecond ms. And when the communication idle time exceeds a preset time threshold, for example, 100ms, stopping receiving the bluetooth name data, and entering the step of verifying whether the received bluetooth name data is complete.
S304: and verifying whether the Bluetooth name data is complete.
Whether the Bluetooth name data is complete or not can be checked according to the byte number information carried by the Bluetooth name data. Because the Bluetooth name data is short, the safety verification can be directly carried out on the Bluetooth name data, and whether the Bluetooth name data is complete or not is verified through the safety verification.
S305: and after the Bluetooth name data is received completely, carrying out key verification and judging the safety of the Bluetooth name data.
Preferably, the bluetooth name data may be encrypted by using an asymmetric encryption technology, and after the bluetooth name data is obtained, the key verification may be performed on the bluetooth name data according to a preset key.
S306: and if the Bluetooth name data passes the key verification and is determined to be legal Bluetooth name data, performing content verification according to the first content verification code and the second content verification code.
In addition to the key verification, another method for increasing the security of bluetooth signal transmission is to perform content verification on the bluetooth name data, specifically, perform content verification on the bluetooth name data through the following steps 1 to 3:
step 1, extracting a first content check code from the Bluetooth name data;
step 2, calculating according to each byte in the Bluetooth name data to obtain a second content check code;
and 3, if the first content check code is the same as the second content check code, the Bluetooth name data passes the security verification.
S307: and after the content is verified to be legal, performing duplicate removal verification according to the duplicate removal identification code.
In order to prevent repeated broadcast of the air defense and disaster prevention alarm which has been broadcast, the bluetooth name data can be repeatedly verified, and the following steps 1 to 3 can be adopted:
step 1, extracting a duplication-removing identification code from Bluetooth name data;
step 2, after the instruction in the Bluetooth name data which passes the repeatability verification is executed, storing the duplicate removal identification code;
and 3, before executing the instruction in the Bluetooth name data which passes the repeated verification, judging according to the duplicate removal identification code when executing the step of performing the repeated verification on the Bluetooth name data, and if the duplicate removal identification code is not stored, executing the instruction in the Bluetooth name data which passes the repeated verification.
S308: and when the duplication elimination verification is determined that the broadcast content is not executed, executing the instruction in the Bluetooth name data passing the security verification.
EXAMPLE III
As shown in fig. 4, in a broadcast method of an air defense and disaster prevention alarm provided in the third embodiment of the present application, in a case that the bluetooth data is bluetooth name data, the step of receiving and verifying the bluetooth broadcast data includes:
s401: a search for bluetooth signals is constantly made.
The Bluetooth module is set to be in a broadcast working mode, the broadcasting of the air defense and disaster prevention alarm is carried out by using the Bluetooth broadcast data, and the content of the Bluetooth broadcast data is received as long as the Bluetooth broadcast data enters the coverage range of the Bluetooth signal. Because the broadcast working mode of the Bluetooth module is one-way communication, the safety of the air defense and disaster prevention alarm system can be guaranteed.
S402: when the Bluetooth signal is acquired, whether Bluetooth broadcast data exists in the Bluetooth signal is judged.
S403: and receiving the Bluetooth broadcast data until the communication idle time reaches a preset time threshold.
When the Bluetooth broadcast data is used as the Bluetooth data and disaster prevention information data is transmitted through the Bluetooth broadcast data, the Bluetooth broadcast data is received byte by byte, and the communication idle time is timed after each byte of the Bluetooth broadcast data is received; generally, after receiving one byte of bluetooth broadcast data, the communication idle time is counted from 0. In addition, the unit of time measurement may be millisecond ms.
And when the communication idle time exceeds a preset time threshold, stopping receiving the Bluetooth broadcast data, and entering the step of verifying whether the received Bluetooth broadcast data is complete. For example, if the communication idle time reaches 100ms, the bluetooth broadcast data reception is stopped, and the step of verifying whether the received bluetooth broadcast data is complete is performed.
S404: dividing the received Bluetooth broadcast data into at least one data frame according to a frame ending identifier carried in each data frame; and each data frame at most comprises a preset number of bytes, and whether each frame is complete or not is verified.
When the bluetooth broadcast data is used as the bluetooth data and the disaster prevention information data is transmitted through the bluetooth broadcast data, the transmission is usually performed by using a data frame as a unit, and the length of one data frame is different for different bluetooth modules. If the Bluetooth broadcast data is long and the content is more, a plurality of data frames are needed to be used for transmitting the Bluetooth broadcast data.
In the process of receiving the bluetooth broadcast data, the bluetooth broadcast data is received byte by byte, and because the bluetooth signal is used for data communication, in the process of data communication, due to the problem of the strength of the bluetooth signal or the problem of the user in the process of moving, the situations of data loss, damage and the like may exist, and the bluetooth broadcast data is not completely received.
Therefore, in order to ensure that all installed mobile terminals within the coverage of the bluetooth signal can receive complete information, the padding and packaging operations need to be performed during the receiving process.
Firstly, dividing the received bluetooth broadcast data into at least one data frame according to a frame end identifier carried in each data frame. If the Bluetooth broadcast data is single-frame data, the data frame is only one, and the length of the single-frame data of the frame is not fixed and contains a preset number of bytes at most. Different bluetooth module, the number of bytes of predetermined quantity is different. If the Bluetooth broadcast data is multi-frame data, the number of the data frames is at least two, the length of the last frame of data is not fixed, and the last frame of data contains a preset number of bytes at most. The length of the rest frame data is fixed and is a preset number of bytes. Different bluetooth module, the number of bytes of predetermined quantity is different.
And for each data frame, checking whether the frame is complete according to the byte number information carried by the data frame.
S405: acquiring a first data frame of the Bluetooth broadcast data, extracting the total frame number of the Bluetooth broadcast data, and judging whether the Bluetooth broadcast data is single-frame data or multi-frame data; and if the Bluetooth broadcast data is single-frame data, directly entering a checking step to judge the safety of the Bluetooth broadcast data.
S406: if the Bluetooth broadcast data is multi-frame data, polling to receive the multi-frame data, judging whether the Bluetooth broadcast data content of the multi-frame data is completely received when the communication idle time reaches a preset time threshold, if not, performing packet supplementing operation, wherein the packet supplementing operation is a vacant frame which is not received in the polling to receive the multi-frame data, and repeating the operation when the communication idle time reaches the preset time threshold each time until the multi-frame content is completely received.
S407: and after the Bluetooth broadcast data is received completely, carrying out key verification and judging the safety of the Bluetooth broadcast data.
The bluetooth signal may be intercepted in the air and may also be decompiled, thereby causing communication protocol leakage, causing illegal personnel to disturb the normal sending process of air defense and disaster prevention alarms, causing alarm mistaken sounding, disturbing social order, even generating important group safety hidden dangers of transmitting illegal violation information and the like. In summary, the civil air defense application field has extremely high requirements on communication security, and therefore, key verification is required to be adopted to prevent potential safety hazards in the bud. Preferably, the bluetooth broadcast data may be encrypted by using an asymmetric encryption technology, and after the bluetooth broadcast data is acquired, the key may be verified according to a preset key.
S408: and if the Bluetooth broadcast data is determined to be legal after passing the key verification, performing content verification according to the first content verification code and the second content verification code.
Besides the key verification, another method for increasing the security of bluetooth signal transmission is to perform content verification on bluetooth broadcast data, and may be performed by using the following steps 1 to 3:
step 1, extracting a first content check code from a first data frame of the Bluetooth broadcast data; specifically, the first content check code may be calculated by using a checksum.
Step 2, calculating according to each byte in the Bluetooth broadcast data to obtain a second content check code; specifically, the second content check code can be calculated in a checksum mode, and because the calculation modes are the same, if the bluetooth broadcast data is correct, the first check code and the second check code are the same.
And 3, if the first content check code is the same as the second content check code, the Bluetooth broadcast data passes the security verification.
S409: and after the content is verified to be legal, performing duplicate removal verification according to the duplicate removal identification code.
In order to ensure that the mobile device at both a long distance and a short distance can receive the air defense and disaster prevention alarm in the response period of the air defense and disaster prevention alarm, the bluetooth signal is broadcast circularly in the whole corresponding period, and each circulation is divided into two times of bluetooth signal transmission, wherein the bluetooth signal is transmitted once at higher power and then transmitted once at lower power. Also, as shown in fig. 5, if the bluetooth signal covers A, B adjacent two cells, it is possible to span two cells, or even more cells, during the response period when the mobile terminal is in a high speed motion state. In order to prevent repeated broadcast of the air defense and disaster prevention alarm which has been broadcast, the repeatability verification can be performed on the bluetooth broadcast data, and specifically, the following steps 1 to 3 can be adopted:
step 1, extracting a duplicate identification code from Bluetooth broadcast data.
And 2, storing the duplicate removal identification code after executing the instruction in the Bluetooth broadcast data which passes the repeatability verification.
And 3, before executing the instruction in the Bluetooth broadcast data which passes the repeated verification, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth broadcast data which passes the repeated verification.
As shown in fig. 5, bluetooth covers A, B two adjacent cells, and when the mobile terminal is in a high-speed driving state, it may be possible to span two cells or even more cells in a response period; when the mobile terminal receives the Bluetooth broadcast data in the Bluetooth information in the cell A and broadcasts the air defense and disaster prevention alarm, the duplicate removal identification code of the broadcasted Bluetooth broadcast data can be recorded, and when the mobile terminal roams to the cell B, the disaster prevention information data carrying the same duplicate removal identification code can not be broadcasted repeatedly; when the mobile terminal receives the Bluetooth broadcast data in the Bluetooth information in the cell A but does not receive the Bluetooth broadcast data completely, and roams to the cell B, the mobile terminal can continue to receive the Bluetooth broadcast data to complement disaster prevention information data content carried in the Bluetooth broadcast data and then broadcast the disaster prevention information data content.
S410: and when the duplication elimination verification is determined that the broadcast content is not executed, executing the instruction in the Bluetooth broadcast data passing the security verification.
Example four
As shown in fig. 6, in a broadcast method of an air defense and disaster prevention alarm provided in the fourth embodiment of the present application, a step of executing an instruction in bluetooth data that passes security verification includes:
s601: and receiving an alarm broadcast instruction which is legally required to be executed.
S602: and directly playing the alarm, recording the playing log and reporting to the server.
Specifically, the alarm broadcasting step shown in fig. 7 may be adopted:
s701: receiving an intelligent voice file legally required to be executed;
s702: analyzing the voice into audio through TTS and playing the audio;
s703: and recording the play log and reporting to the server.
S603: after the alarm is played and the user knows, the system automatically judges whether a subsequent instruction needs to be executed in association.
S604: and if the related instruction is related, such as evacuation guidance/masking guidance and the like, directly starting the execution of the related instruction.
EXAMPLE five
As shown in fig. 8, in a broadcast method of an air defense and disaster prevention alarm provided in the fifth embodiment of the present application, a step of executing an evacuation instruction in verified bluetooth data includes:
s801: and when the Bluetooth data carrying the evacuation instruction is received or the Bluetooth data further carries the associated instruction of the evacuation guidance after the playing operation is executed, executing the evacuation guidance operation.
Here, the evacuation instruction is: providing guidance information for the user, and guiding the user to an evacuation site for evacuation
S802: and acquiring the evacuation mode selected by the user.
Specifically, the evacuation mode includes: self-travel and unified travel. Here, the evacuation mode carried in the bluetooth data may also be received.
S803: and when the evacuation mode is unified forward, automatically starting navigation to the address of the evacuation aggregation site, and reporting the information of the evacuated personnel if the civil network service can be connected.
S804: and when the evacuation mode is self-propelled forward, automatically starting navigation to an evacuation site address, and reporting the information of evacuation personnel if the civil network service can be connected.
S805: it is then determined whether the system is capable of connecting to a residential network, such as the internet.
S806: if the civil network cannot be connected, the local navigation service is automatically started, and the evacuation site is taken as a destination for navigation.
S807: if the civil network can be connected, the user selects whether to use the third-party navigation tool.
Here, the user may also select which third party navigation tool to use for navigation.
S808: and after the user selects, opening the third-party navigation tool, and using the third-party navigation tool selected by the user to navigate by taking the evacuation site as a destination.
The third-party navigation tool is richer in application content and more suitable for the usual use habit of the user.
EXAMPLE six
As shown in fig. 9, a sixth embodiment of the present application provides a method for broadcasting an air defense and disaster prevention alarm, where the step of executing a masking instruction in verified bluetooth data includes:
s901: and when the Bluetooth data carrying the masking instruction is received or the Bluetooth data further carries the correlation instruction of the masking guide after the playing operation is executed, executing the masking guide operation.
Specifically, the masking instruction is: providing guiding information for the user, and guiding the user to go to a masking place for masking;
s902: and automatically judging whether the civil network, such as the Internet, can be connected or not, and reporting the information of the masking personnel if the civil network can be connected.
S903: if the civil network can be connected, the user selects whether to use the third-party navigation tool or not, and also can select which third-party navigation tool to use for navigation.
S904: if the civil network cannot be connected or the user chooses not to use the third-party navigation tool, the local navigation service is automatically started to take the shelter place as the destination to navigate.
S905: if the civil network can be connected and the user selects to use the third-party navigation tool, after the user selects, the third-party navigation tool selected by the user is used for navigating by taking the shelter place as the destination.
EXAMPLE seven
As shown in fig. 10, in the broadcast method of the air defense and disaster prevention alarm provided in the seventh embodiment of the present application, when an evacuation instruction is executed, transmission of information of an evacuated person may also be performed using a bluetooth signal, including:
s1001: when receiving the evacuation personnel information of the evacuation places which are legally required to be executed, such as the evacuation ground and/or the evacuation rendezvous ground, the Bluetooth data is used for executing the storage and display operation of the evacuation personnel information. And locally storing the evacuated personnel information as the basis of evacuation guidance.
S1002: and simultaneously popping up reminding information containing the first evacuated personnel information, and reminding a user to look up evacuated personnel information details by adopting a message reminding mode.
S1003: and if the user needs to inquire the details of the evacuation personnel information, directly jumping to a browsing page, and providing the details of the evacuation personnel information of each evacuation site and/or the evacuation rendezvous site for the user.
Example eight
As shown in fig. 11, in the broadcast method of the air defense and disaster prevention alarm provided in the eighth embodiment of the present application, when a masking instruction is executed, a bluetooth signal may also be used to transmit information of a masked person, where the method includes:
s1101: when the masking personnel information of the masking place which is legally required to be executed is received through the Bluetooth data, the storage and display operation of the masking personnel information is executed. And locally storing the information of the masking personnel as the basis of masking guidance.
S1102: meanwhile, the reminding information containing the information of the masking personnel is popped up, and the user is reminded to look up the details of the information of the masking personnel by adopting a message reminding mode.
S1103: and if the user needs to inquire the information details of the masking personnel, directly jumping to a browsing page, and providing the information details of the masking personnel of each masking place for the user.
Example nine
As shown in fig. 12, in the broadcast method of an air defense and disaster prevention alarm provided in the ninth embodiment of the present application, an alarm sounding operation may also be performed through bluetooth data, and the alarm sounding function is mainly applied to enhance the air defense and disaster prevention awareness of citizens, increase the air defense and disaster prevention skills of citizens, and improve the consciousness of citizens participating in civil defense construction, including:
s1201: the method comprises the steps that when the civil air defense starts alarm sounding once every year, the current geographical position information of a user is obtained, an evaluation program is automatically started according to the geographical position information and the preset local sounding time corresponding to the geographical position information, Bluetooth data are received, an alarm sounding test instruction in the Bluetooth data is executed, and the local alarm sounding test is directly carried out.
Here, the geographical location information of the user may include: the current geographical position positioning information of the user or the geographical position information input by the user.
S1202: and starting an evaluation questionnaire program according to the alarm sounding instruction.
S1203: and obtaining an evaluation result formed by the user according to the evaluation questionnaire program, and uploading the evaluation result to a server through a civil network.
The subsequent server side can perform statistical analysis on the alarm sounding test effect according to the evaluation result, so that an actual basis is provided for the construction of the air defense alarm, and the air defense alarm sounding test forms a closed loop.
Example ten
In the broadcasting method of air defense and disaster prevention alarm provided in the tenth embodiment of the present application, propaganda operation of people's air defense knowledge can be performed through bluetooth data, and the people's air defense knowledge recommendation function is mainly applied to ordinary times, and is used for enhancing air defense and disaster prevention awareness of citizens, and increasing air defense and disaster prevention knowledge and skills of citizens, and the server side can continuously update people's air defense knowledge, and send people's air defense knowledge to the mobile device through software updating and other modes, and store the people's air defense knowledge locally in the mobile device, and a user can browse and learn the people's air defense knowledge at any time according to directory selection or through retrieval in the mobile device, as shown in fig. 13, the people's air defense knowledge recommendation operation includes:
s1301: extracting civil air defense knowledge recommendation data from the Bluetooth data, and pushing the civil air defense knowledge recommendation to a user; the civil air defense knowledge recommendation data comprises a civil air defense knowledge recommendation catalog.
S1302: and after the user selects or retrieves according to the catalogue, displaying the corresponding civil defense knowledge to the user. The browsing learning records can be automatically reported to the server, so that the civil air defense can count and analyze the civil air defense propaganda education release effect at any time.
Based on the same design concept, the embodiment of the application also provides a broadcast device, electronic equipment and a readable storage medium for the air defense and disaster prevention alarm.
EXAMPLE eleven
As shown in fig. 14, an air defense and disaster prevention alarm broadcasting device 1400 provided in an embodiment of the present application includes:
a receiving module 1401, configured to search for a bluetooth signal, and receive bluetooth data when the bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the bluetooth data includes: at least one of bluetooth name data or bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting; and the Bluetooth module is also used for receiving the missing part in the Bluetooth data when the Bluetooth data is incomplete.
In a possible implementation manner, in the case that the bluetooth data is bluetooth name data, the receiving module 1401 is specifically configured to:
judging whether the acquired Bluetooth name data is the same as the existing Bluetooth name or not, and if the acquired Bluetooth name data is not the same as the existing Bluetooth name, receiving the acquired Bluetooth name data as Bluetooth data.
In a possible implementation manner, in a case that the bluetooth data is bluetooth broadcast data, the receiving module 1401 is specifically configured to: timing communication idle time after receiving one byte of Bluetooth broadcast data; and when the communication idle time exceeds a preset time threshold, stopping receiving the Bluetooth broadcast data, and entering the step of verifying whether the received Bluetooth broadcast data is complete.
In a possible implementation, the receiving module 1401 further includes: the integrity verification module 1411 is specifically configured to:
dividing the received Bluetooth broadcast data into at least one data frame according to a frame ending identifier carried in each data frame; each data frame at most comprises a preset number of bytes; for each data frame, checking whether the frame is complete according to the byte number information carried by the data frame; when the frame is complete, extracting the frame number of the frame, and judging whether the frame is the first data frame or not according to the frame number of the frame; if the frame is the first data frame, extracting the total frame number of the Bluetooth broadcast data; judging whether the Bluetooth broadcast data is single-frame data or multi-frame data according to the total frame number; if the frame is not the first data frame, judging whether the first data frame exists in the Bluetooth broadcast data; and if the first data frame exists, judging whether the Bluetooth broadcast data is complete or not according to the frame number of each data frame and the total frame number.
The verification module 1402 is configured to verify whether the received bluetooth data is complete after a round of bluetooth signal reception is completed; and if the Bluetooth data is complete, performing security verification on the Bluetooth data.
In one possible implementation, the verification module 1402 includes at least one of: a key verification module 1421, a content verification module 1422, or a deduplication verification module 1423.
In a possible implementation, the key verification module 1421 is configured to: checking the Bluetooth data according to a preset secret key; and the Bluetooth data passing the key verification passes the security verification.
In one possible implementation, the content verification module 1422 is configured to: extracting a first content check code from a first data frame of the Bluetooth broadcast data; calculating according to each byte in the Bluetooth broadcast data to obtain a second content check code; and if the first content check code is the same as the second content check code, the Bluetooth broadcast data passes the security verification.
In one possible implementation, the content verification module 1422 is further configured to: extracting a first content check code from the Bluetooth name data; calculating according to each byte in the Bluetooth name data to obtain a second content check code; and if the first content check code is the same as the second content check code, the Bluetooth name data passes the security verification.
In one possible implementation, the duplication verification module 1423 is configured to: extracting a duplication-removing identification code from a first data frame of the Bluetooth broadcast data; storing the deduplication identification code after the executing of the instruction in the security-verified Bluetooth data; before executing the instruction in the Bluetooth data passing the security verification, when the step of performing the security verification on the Bluetooth data is executed, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth broadcast data passing the security verification.
In one possible implementation, the duplication verification module 1423 is further configured to: extracting a duplicate identification code from the Bluetooth name data; storing the deduplication identification code after the executing of the instruction in the security-verified Bluetooth data; before executing the instruction in the Bluetooth data passing the security verification, when the step of performing the security verification on the Bluetooth data is executed, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth name data passing the security verification.
And an executing module 1403, configured to execute the instruction in the bluetooth data that passes the security verification.
In one possible implementation, the execution module 1403 includes at least one of: an alarm broadcasting module 1431, an evacuation module 1432, a masking module 1433, an alarm sounding module 1434, or a civil defense knowledge module 1435.
In a possible implementation, the alarm reporting module 1431 is configured to:
if the instruction is an alarm broadcast instruction, a voice broadcast text is obtained from the Bluetooth data, and the voice broadcast text is used for voice broadcast.
In one possible implementation, the alarm reporting module 1431 is further configured to:
converting the voice broadcast text into voice information using a voice synthesis TTS;
and playing the voice information.
In one possible implementation, the evacuation module 1432 is configured to:
if the instruction is an evacuation instruction, acquiring an evacuation mode selected by a user; the evacuation instruction is as follows: providing guidance information for the user, and guiding the user to go to an evacuation site for evacuation; the evacuation mode comprises the following steps: go to and unify going to by oneself;
extracting an evacuation place corresponding to the evacuation mode from the Bluetooth data according to the evacuation mode;
and starting navigation by taking the evacuation place as a destination.
In a possible implementation, the evacuation module 1432 is specifically configured to:
when the evacuation mode is self-propelled forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation site;
and when the evacuation mode is unified forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation rendezvous site.
In one possible embodiment, the evacuation module 1432 is further configured to:
verifying whether a connection to the residential network is possible;
and if the user can be connected to the civil network, inquiring whether the user selects a third-party navigation tool, and opening the third-party navigation tool when the user selects the third-party navigation tool, and navigating by using the third-party navigation tool.
In one possible embodiment, the evacuation module 1432 is further configured to:
judging whether first evacuation personnel information corresponding to the evacuation location exists in the Bluetooth data; wherein the first evacuation people information comprises the number of people existing at the evacuation location;
and if so, storing the first evacuating personnel information, and popping up reminding information containing the first evacuating personnel information.
In one possible embodiment, the evacuation module 1432 is further configured to:
judging whether the evacuation site can be connected to the server or not, and if the evacuation site can be connected to the server, reporting second evacuation personnel information corresponding to the evacuation site to the server; the second evacuation personnel information is information that a user is going to the evacuation site.
A masking module 1433 to:
if the command is a masking command, extracting a masking place from the Bluetooth data; the masking instruction is: providing guiding information for the user, and guiding the user to go to a masking place for masking;
and starting navigation by taking the masking place as a destination.
An alarm strike module 1434 to:
if the command is an alarm sounding command, starting an evaluation questionnaire program, and acquiring an evaluation result formed by a user according to the evaluation questionnaire program;
and uploading the evaluation result to a server.
A civil defense knowledge module 1435 is included for:
if the instruction is civil defense knowledge recommendation, extracting civil defense knowledge recommendation data from the Bluetooth data, and pushing the civil defense knowledge recommendation to a user; the civil air defense knowledge recommendation data comprises a civil air defense knowledge recommendation catalog.
Example twelve
As shown in fig. 15, a twelfth embodiment of the present application further provides an electronic device 1500, for example, a mobile device, including: memory 1501, processor 1502 and computer programs stored on the memory 1501 and executable on the processor 1502, which when executed by the processor 1502, implement the steps of any one of the possible implementations of embodiment one through embodiment ten.
The computer program stored in the memory 1501 implements the modules provided in the ninth embodiment of the present application, and includes: a receiving module 1401, an authenticating module 1402 and an executing module 1403. The verification module 1402 may include at least one of: a key verification module 1421, a content verification module 1422, or a deduplication verification module 1423. Execution block 1403 may include at least one of: an alarm broadcasting module 1431, an evacuation module 1432, a masking module 1433, an alarm sounding module 1434, or a civil defense knowledge module 1435.
EXAMPLE thirteen
A thirteenth embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in any one of the tenth to the eleventh possible implementation manners of the first embodiment.
The method provided by any one of the first to the tenth possible embodiments of the present application can be implemented in the form of software, and has already formed the release of the intelligent people air defense APP product.
In summary, the above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (20)

1. A broadcasting method of an air defense and disaster prevention alarm is characterized by comprising the following steps:
searching a Bluetooth signal, and receiving Bluetooth data when the Bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the Bluetooth data comprises at least one of Bluetooth name data and Bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting;
after one round of Bluetooth signal reception is finished, verifying whether the received Bluetooth data is complete; if the Bluetooth data is not complete, returning to the step of searching the Bluetooth signal, and receiving the missing part in the Bluetooth data when the Bluetooth signal is obtained;
if the Bluetooth data is complete, performing security verification on the Bluetooth data, and executing an instruction in the Bluetooth data passing the security verification;
in a case that the bluetooth data is bluetooth name data, the step of receiving the bluetooth data includes:
judging whether the acquired Bluetooth name data is the same as the existing Bluetooth name or not, and if the acquired Bluetooth name data is not the same as the existing Bluetooth name, receiving the acquired Bluetooth name data as Bluetooth data;
in a case that the bluetooth data is bluetooth broadcast data, the step of receiving the bluetooth data includes:
timing communication idle time after receiving one byte of Bluetooth broadcast data;
and when the communication idle time exceeds a preset time threshold, stopping receiving the Bluetooth broadcast data, and entering the step of verifying whether the received Bluetooth data is complete.
2. The method of claim 1, wherein the step of verifying whether the received bluetooth data is complete comprises:
dividing the received Bluetooth broadcast data into at least one data frame according to a frame ending identifier carried in each data frame; each data frame at most comprises a preset number of bytes;
for each data frame, checking whether the frame is complete according to the byte number information carried by the data frame;
when the frame is complete, extracting the frame number of the frame, and judging whether the frame is the first data frame or not according to the frame number of the frame;
if the frame is the first data frame, extracting the total frame number of the Bluetooth broadcast data; judging whether the Bluetooth broadcast data is single-frame data or multi-frame data according to the total frame number;
if the frame is not the first data frame, judging whether the first data frame exists in the Bluetooth broadcast data; and if the first data frame exists, judging whether the Bluetooth broadcast data is complete or not according to the frame number of each data frame and the total frame number.
3. The method of claim 1, wherein the step of performing security verification on the bluetooth data comprises:
checking the Bluetooth data according to a preset secret key;
and the Bluetooth data passing the key verification passes the security verification.
4. The method of claim 3, wherein the step of performing security verification on the Bluetooth data further comprises:
extracting a first content check code from a first data frame of the Bluetooth broadcast data;
calculating according to each byte in the Bluetooth broadcast data to obtain a second content check code;
and if the first content check code is the same as the second content check code, the Bluetooth broadcast data passes the security verification.
5. The method of claim 1, wherein the step of security verifying the bluetooth data comprises:
extracting a first content check code from the Bluetooth name data;
calculating according to each byte in the Bluetooth name data to obtain a second content check code;
and if the first content check code is the same as the second content check code, the Bluetooth name data passes the security verification.
6. The method of claim 5, wherein the step of security verifying the Bluetooth data comprises:
extracting a duplication-removing identification code from a first data frame of the Bluetooth broadcast data;
storing the deduplication identification code after the executing of the instruction in the security-verified Bluetooth data;
before executing the instruction in the Bluetooth data passing the security verification, when the step of performing the security verification on the Bluetooth data is executed, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth broadcast data passing the security verification.
7. The method of claim 1, wherein the step of security verifying the bluetooth data comprises:
extracting a duplicate identification code from the Bluetooth name data;
storing the deduplication identification code after the executing of the instruction in the security-verified Bluetooth data;
before executing the instruction in the Bluetooth data passing the security verification, when the step of performing the security verification on the Bluetooth data is executed, judging according to the duplication-removing identification code, and if the duplication-removing identification code is not stored, executing the instruction in the Bluetooth name data passing the security verification.
8. The method of claim 1, wherein the step of executing the instructions in the security-verified bluetooth data comprises:
if the instruction is an alarm broadcast instruction, a voice broadcast text is obtained from the Bluetooth data, and the voice broadcast text is used for voice broadcast.
9. The method according to claim 8, wherein the step of performing the voice broadcasting using the voice broadcasting text comprises:
converting the voice broadcast text into voice information using a voice synthesis TTS;
and playing the voice information.
10. The method of claim 1, wherein the step of executing the instructions in the security-verified bluetooth data comprises:
if the instruction is an evacuation instruction, acquiring an evacuation mode selected by a user; the evacuation instruction is as follows: providing guidance information for the user, and guiding the user to go to an evacuation site for evacuation; the evacuation mode comprises the following steps: go to and unify going to by oneself;
extracting an evacuation place corresponding to the evacuation mode from the Bluetooth data according to the evacuation mode;
and starting navigation by taking the evacuation place as a destination.
11. The method according to claim 10, wherein the step of extracting the evacuation location corresponding to the evacuation mode comprises:
when the evacuation mode is self-propelled forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation site;
and when the evacuation mode is unified forward, the evacuation site corresponding to the evacuation mode is the address of the evacuation rendezvous site.
12. The method of claim 10, after extracting the evacuation site, and prior to the initiating navigation, comprising:
verifying whether a connection to the residential network is possible;
and if the user can be connected to the civil network, inquiring whether the user selects a third-party navigation tool, and opening the third-party navigation tool when the user selects the third-party navigation tool, and navigating by using the third-party navigation tool.
13. The method according to claim 10, wherein after the extracting the evacuation location corresponding to the evacuation mode from the bluetooth data, before the starting of navigation, the method further comprises:
judging whether first evacuation personnel information corresponding to the evacuation location exists in the Bluetooth data; wherein the first evacuation people information comprises the number of people existing at the evacuation location;
and if so, storing the first evacuating personnel information, and popping up reminding information containing the first evacuating personnel information.
14. The method of claim 10, further comprising, after said initiating navigation:
judging whether the evacuation site can be connected to the server or not, and if the evacuation site can be connected to the server, reporting second evacuation personnel information corresponding to the evacuation site to the server; the second evacuation personnel information is information that a user is going to the evacuation site.
15. The method of claim 1, wherein the step of executing the instructions in the security-verified bluetooth data comprises:
if the command is a masking command, extracting a masking place from the Bluetooth data; the masking instruction is: providing guide information for a user, and guiding the user to go to a masking place for masking;
and starting navigation by taking the masking place as a destination.
16. The method of claim 1, wherein the step of executing the instructions in the security-verified bluetooth data comprises:
if the command is an alarm sounding command, starting an evaluation questionnaire program, and acquiring an evaluation result formed by a user according to the evaluation questionnaire program;
and uploading the evaluation result to a server.
17. The method of claim 1, wherein the step of executing the instructions in the security-verified bluetooth data comprises:
if the instruction is civil defense knowledge recommendation, extracting civil defense knowledge recommendation data from the Bluetooth data, and pushing the civil defense knowledge recommendation data to a user; the civil air defense knowledge recommendation data comprises a civil air defense knowledge recommendation catalog.
18. The utility model provides a report device of air defense and disaster prevention alarm which characterized in that includes:
the receiving module is used for searching the Bluetooth signal and receiving the Bluetooth data when the Bluetooth signal is acquired; the Bluetooth data is disaster prevention information data carried by the Bluetooth signal; the bluetooth data includes: at least one of bluetooth name data and bluetooth broadcast data; the Bluetooth signal is a Bluetooth signal sent by unidirectional broadcasting; the receiving module is further used for receiving the missing part in the Bluetooth data when the Bluetooth data is incomplete;
the verification module is used for verifying whether the received Bluetooth data is complete or not after one round of Bluetooth signal reception is finished; if the Bluetooth data is complete, performing security verification on the Bluetooth data;
the execution module is used for executing the instructions in the Bluetooth data which pass the security verification;
wherein, under the condition that the bluetooth data is bluetooth name data, the receiving the bluetooth data includes: judging whether the acquired Bluetooth name data is the same as the existing Bluetooth name or not, and if the acquired Bluetooth name data is not the same as the existing Bluetooth name, receiving the acquired Bluetooth name data as Bluetooth data;
in a case that the bluetooth data is bluetooth broadcast data, the receiving the bluetooth data includes: timing communication idle time after receiving one byte of Bluetooth broadcast data; and when the communication idle time exceeds a preset time threshold, stopping receiving the Bluetooth broadcast data, and entering the step of verifying whether the received Bluetooth data is complete.
19. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the method steps of any of claims 1-17 are implemented when the program is executed by the processor.
20. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method steps of any one of claims 1 to 17.
CN201910312918.2A 2019-04-18 2019-04-18 Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium Active CN110061793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910312918.2A CN110061793B (en) 2019-04-18 2019-04-18 Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910312918.2A CN110061793B (en) 2019-04-18 2019-04-18 Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110061793A CN110061793A (en) 2019-07-26
CN110061793B true CN110061793B (en) 2021-07-02

Family

ID=67319393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910312918.2A Active CN110061793B (en) 2019-04-18 2019-04-18 Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110061793B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104901972A (en) * 2015-06-24 2015-09-09 上海文广科技(集团)有限公司 File receiving and making-up method
CN105068830A (en) * 2015-07-30 2015-11-18 株洲南车时代电气股份有限公司 Human-computer interaction unit and update system thereof
CN105075154A (en) * 2013-02-27 2015-11-18 索尼公司 A relay device, method and computer program
CN105491067A (en) * 2016-01-08 2016-04-13 腾讯科技(深圳)有限公司 Key-based business security verification method and device
CN206835106U (en) * 2017-06-30 2018-01-02 成都共同进步信息技术有限公司 Emergent broadcast terminal with bluetooth module
CN107995591A (en) * 2017-12-05 2018-05-04 四川爱联科技有限公司 Disaster guides system in ad hoc network room based on low-power consumption bluetooth
CN108270847A (en) * 2017-12-28 2018-07-10 上海文广科技(集团)有限公司 A kind of method that file sends and reissues packet

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017511989A (en) * 2014-01-02 2017-04-27 エルジー エレクトロニクス インコーポレイティド Broadcast receiving apparatus and method of operating broadcast receiving apparatus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105075154A (en) * 2013-02-27 2015-11-18 索尼公司 A relay device, method and computer program
CN104901972A (en) * 2015-06-24 2015-09-09 上海文广科技(集团)有限公司 File receiving and making-up method
CN105068830A (en) * 2015-07-30 2015-11-18 株洲南车时代电气股份有限公司 Human-computer interaction unit and update system thereof
CN105491067A (en) * 2016-01-08 2016-04-13 腾讯科技(深圳)有限公司 Key-based business security verification method and device
CN206835106U (en) * 2017-06-30 2018-01-02 成都共同进步信息技术有限公司 Emergent broadcast terminal with bluetooth module
CN107995591A (en) * 2017-12-05 2018-05-04 四川爱联科技有限公司 Disaster guides system in ad hoc network room based on low-power consumption bluetooth
CN108270847A (en) * 2017-12-28 2018-07-10 上海文广科技(集团)有限公司 A kind of method that file sends and reissues packet

Also Published As

Publication number Publication date
CN110061793A (en) 2019-07-26

Similar Documents

Publication Publication Date Title
CN106056369B (en) Information processing method and device
Okolloh Ushahidi, or ‘testimony’: Web 2.0 tools for crowdsourcing crisis information
CN104299286B (en) Public security inspection is registered method and system
CN103888837B (en) A kind of video information method for pushing and device
CN104978831B (en) A kind of safe early warning startup method and system
WO2017181613A1 (en) Search response method, device and system
CN109194427B (en) Campus broadcasting system based on IP network
CN106488270B (en) Live broadcast room switching method and device
CN106993168B (en) A kind of monitoring method, device, electronic equipment and system
CN108040295A (en) Many sanction methods, server, user terminal and many sanction systems
CN105873177A (en) Method and equipment for obtaining access information of shared wireless access point
CN103154762B (en) Based on intelligent data collection and the transmission of remote action sensing
CN107135043B (en) Public emergency broadcast system
CN107560617A (en) A kind of air navigation aid based on advertisement machine, storage medium and advertisement machine
CN109829697A (en) A kind of prompt information output method, relevant apparatus and storage medium
CN106210079A (en) The method and apparatus that multimedia messages is shared
CN106097225B (en) Meteorological information instant transmission method and system based on mobile terminal
Nasution et al. Using google location APIs to find an accurate criminal accident location
CN110061793B (en) Broadcasting method and device for air defense and disaster prevention alarm, electronic equipment and storage medium
CN108092947A (en) A kind of method and device that identity discriminating is carried out to third-party application
CN103489119B (en) A kind of monitoring of the advertisement method, apparatus and system
CN109360371A (en) A kind of generator car monitoring alarm wireless transmitting system
WO2023116484A1 (en) Video acquisition method and apparatus, information display method and apparatus, and device and medium
CN115022701B (en) Video playing method, terminal, device, electronic equipment, medium and program product
JP6066824B2 (en) Post information display system, server, terminal device, post information display method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant