CN110147989A - A kind of triggering system, the method and device of security process - Google Patents

A kind of triggering system, the method and device of security process Download PDF

Info

Publication number
CN110147989A
CN110147989A CN201910528665.2A CN201910528665A CN110147989A CN 110147989 A CN110147989 A CN 110147989A CN 201910528665 A CN201910528665 A CN 201910528665A CN 110147989 A CN110147989 A CN 110147989A
Authority
CN
China
Prior art keywords
order
security
user
terminal
flow condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910528665.2A
Other languages
Chinese (zh)
Inventor
苟艺
范莉莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Publication of CN110147989A publication Critical patent/CN110147989A/en
Priority to PCT/CN2019/121189 priority Critical patent/WO2020177408A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Alarm Systems (AREA)

Abstract

This application discloses a kind of triggering systems of security process, method and device, when order is completed to distribute, for at least one user relevant to the order, the terminal corresponding security trigger flow condition of the user being sent to where other users relevant to the order, whether the terminal where making other users is triggered according to the security trigger flow condition monitoring security process received, in this way, even if when the terminal of victim user or victim user itself are controlled by abuser, the terminal of abuser can still trigger immediately the starting of security process according to the corresponding security trigger flow condition of victim user, it can effectively ensure that the personal safety of user.

Description

A kind of triggering system, the method and device of security process
This application claims in submission on March 1st, 2019 State Intellectual Property Office, application No. is 201910154584.0, hair The priority of the application for a patent for invention of bright entitled " a kind of triggering method and device of security process ", entire contents are by drawing With being incorporated in the present application.
Technical field
This application involves Internet technical field more particularly to a kind of triggering system, the method and devices of security process.
Background technique
With the development of internet technology, net about Che Yingyong, take-away application etc. are dedicated to providing life clothes for user The application of business emerges one after another, these are applied while the life to user brings convenient, also gives the personal safety band of user Hidden danger is carried out.
It is illustrated by taking net about vehicle as an example.In the practical application scene of net about vehicle, driver and passenger both sides are in opposite envelope It spends lots of time together in the environment closed, all kinds of uncertain factor influences are overlapped mutually, and security risk is higher.Safety of a serious nature Scene such as traffic accident, illegal activities (hit abuse, it is obscene, plunder), lost contact, driver fight law enforcement etc., be required to driver or Terminal used in passenger (such as mobile phone) and the platform for providing net about vehicle application are triggering corresponding security process at the first time, To guarantee the personal safety of driver and passenger.
In the prior art, the method for triggering security process generally requires user and completes relatively cumbersome behaviour at the terminal Make, such as unlock terminal, the corresponding net about Che Yingyong of starting, click such as " key alarm ", " contact emergency contact person " triggering Button.
But user, when facing a danger situation, the difficulty of operating terminal will increase, it is difficult to complete above-mentioned a series of behaviour Make.It is more likely that victim user, when receiving abuser's infringement, the terminal even victim user of victim user itself has very much It may be controlled by abuser, be unable to complete the operation of triggering security process at all, it is therefore, in this case, existing The method of triggering security process not can guarantee the instant triggering of security process, just not can guarantee the personal safety of user yet.
Summary of the invention
This specification embodiment provides triggering system, the method and device of a kind of security process, existing with the solution of part The above problem existing for technology.
This specification embodiment adopts the following technical solutions:
A kind of triggering system for security process that this specification provides, which is characterized in that the system comprises: server with And the terminal of several users, in which:
The server determines user relevant to the order when the order received completes distribution, obtains and determines The pre-set security trigger flow condition of at least one user relevant to the order out, and be sent to determine it is each The terminal of other users in user in addition to the user;
The terminal receives the security trigger flow condition that the server is sent, meets the peace in response to receiving The information for protecting trigger flow condition, starts the security process, the security trigger flow condition is relevant to the order The corresponding security trigger flow condition of other users.
Optionally, it is pre-set to obtain at least one user relevant to the order determined for the server Keyword, as the security trigger flow condition got;
The terminal receives the pre-set key of other users relevant to the order that the server is sent Word, as the security trigger flow condition received.
Optionally, the server, if the order has terminated, or at least one terminal relevant to the order is worked as The destination of order described in the positional distance at preceding place is less than preset value, then at least one user's relevant to the order Send instruction information;
The terminal deletes the security process of non-self setting if receiving the instruction information that the server is sent Trigger condition.
Optionally, the terminal monitors and identifies voice data, if identifying the keyword, starts the security Process.
Optionally, the terminal deletes the security trigger flow condition of non-self setting if the order has terminated, If the destination of order described in the positional distance that is currently located of the terminal is less than preset value, deletes non-self setting Security trigger flow condition.
The triggering method for the first security process that this specification provides, comprising:
Server receives order;
If the order completes distribution, it is determined that user relevant to the order;
The pre-set security trigger flow condition of at least one user relevant to the order determined is obtained, and Be sent to the terminal of the other users in each user determined in addition to the user so that the terminal of the other users according to Whether the security trigger flow condition monitoring security process is triggered.
Optionally, the server is to provide the server of net about vehicle service;
The order is net about vehicle order;
It determines user relevant to the order, specifically includes:
Determine the passenger users for initiating the order and driver user corresponding with the order.
Optionally, the pre-set security trigger flow of at least one user relevant to the order determined is obtained Condition specifically includes:
Obtain the pre-set keyword of at least one user relevant to the order determined.
Optionally, the method also includes:
If the order has terminated, instruction information is sent to the terminal of at least one user relevant to the order, The instruction information is used to indicate the security trigger flow condition of the non-self setting of the terminal deletion;Or
If destination of the terminal of at least one user relevant to the order apart from the order is less than preset value, Instruction information is sent to the terminal of at least one user, the instruction information is used to indicate the non-self setting of the terminal deletion Security trigger flow condition.
The triggering method for second of security process that this specification provides, the second method are applied to and same order phase The terminal at least one user closed, for the terminal of at least one user, which includes:
The terminal of the user receives the security trigger flow condition that server is sent, the security trigger flow condition be with The corresponding security trigger flow condition of the relevant other users of the order;
The information for meeting the security trigger flow condition in response to receiving starts the security process.
Optionally, the security trigger flow condition that server is sent is received, is specifically included:
Receive the pre-set keyword of the other users that the server is sent.
Optionally, the information that the security trigger flow condition is met in response to receiving starts the security stream Journey specifically includes:
It monitors and identifies voice data;
If identifying the keyword, start the security process.
Optionally, the method also includes:
If the order has terminated, the security trigger flow condition of non-self setting is deleted;Or
If the destination of order described in the positional distance that the terminal is currently located is less than preset value, non-self set is deleted The security trigger flow condition set.
The trigger device for the first security process that this specification provides, comprising:
Receiving module, for receiving order;
Determining module, if completing distribution for the order, it is determined that user relevant to the order;
Sending module, for obtaining the pre-set security stream of at least one user relevant to the order determined Journey trigger condition, and be sent to the terminal of the other users in each user determined in addition to the user so that it is described other Whether the terminal of user is triggered according to the security trigger flow condition monitoring security process.
The trigger device for second of security process that this specification provides, comprising:
Receiving module, for receiving the security trigger flow condition of server transmission, the security trigger flow condition is The corresponding security trigger flow condition of relevant to order other users;
Monitoring module starts the security for meeting the information of the security trigger flow condition in response to receiving Process.
A kind of computer readable storage medium that this specification provides, the storage medium are stored with computer program, institute The triggering method for realizing the first above-mentioned security process when computer program is executed by processor is stated, or is realized above-mentioned second The triggering method of security process.
The a kind of electronic equipment that this specification provides, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize the triggering side of the first above-mentioned security process when executing described program Method, or realize the triggering method of above-mentioned second of security process.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
When order is completed to distribute, at least one user relevant to the order, by the corresponding security stream of the user Journey trigger condition is sent to the terminal where other users relevant to the order, makes the terminal where other users according to reception To security trigger flow condition monitoring security process whether be triggered, in this way, even if in the terminal of victim user or aggrieved When user itself is controlled by abuser, the terminal of abuser still can be according to the corresponding security trigger flow condition of victim user Immediately the starting of triggering security process, can effectively ensure that the personal safety of user.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of schematic diagram of the triggering system for security process that this specification embodiment provides;
Fig. 2 is the trigger process for the first security process that this specification embodiment provides;
Fig. 3 is a kind of network architecture schematic diagram that this specification embodiment provides;
Fig. 4 is the trigger process for second of security process that this specification embodiment provides;
Fig. 5 is the structural schematic diagram of the trigger device for the first security process that this specification embodiment provides;
Fig. 6 is the structural schematic diagram of the trigger device for second of security process that this specification embodiment provides;
Fig. 7 is the electronic equipment schematic diagram corresponding to Fig. 2 or Fig. 4 that this specification embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of this specification clearer, it is embodied below in conjunction with this specification Technical scheme is clearly and completely described in example and corresponding attached drawing.Obviously, described embodiment is only this Shen Please a part of the embodiment, instead of all the embodiments.Based on the embodiment in specification, those of ordinary skill in the art are not having Every other embodiment obtained under the premise of creative work is made, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Fig. 1 is a kind of triggering system for security process that this specification embodiment provides, which includes: server 600 And the terminal 601 of several users.Wherein, server 600 is to provide the equipment of service to terminal 601, therefore server 600 can It establishes and communicates to connect with terminal 601, the service request that is sent with receiving terminal 601 or to 601 issuing service data of terminal.
The server 600 can receive order.And when the order received completes distribution, determination is relevant to the order User obtains the pre-set security trigger flow condition of at least one user relevant to the order determined.Will obtain The security trigger flow condition taken, is sent to the terminal 601 of the other users in each user determined in addition to the user.Example Such as, it is assumed that it is an order that the terminal 601 of left side the top is corresponding with the terminal 601 of right side the top in Fig. 1, if then servicing Device 600, can will be after the security trigger flow condition after receiving the security trigger flow condition that terminal 601 on the left of this is sent It is sent to the terminal 601 on right side.
The terminal 601 receives the security trigger flow condition of the server 600 transmission, is somebody's turn to do in response to receiving to meet The information of security trigger flow condition starts the security process.Wherein, which is relevant to the order The corresponding security trigger flow condition of other users.
That is in the present specification, can by the terminal 601 of at least one user relevant to the same order and The server 600, each equipment as the triggering security process in the system.Below based on system shown in FIG. 1, respectively from clothes For the terminal 601 of business device 600 and user execute the trigger process of security process, it is illustrated.
Fig. 2 is the trigger process for the first security process that this specification embodiment provides, and specifically be can comprise the following steps that
S100: server receives order.
In the present specification, the illustrative network architecture is as shown in Figure 3.Fig. 3 is corresponding with system architecture diagram shown in FIG. 1, Service provider and service requester in Fig. 3, the terminal 601 corresponding to the user relevant to order in Fig. 1.Request obtains The user of service is known as service requester, is known as service provider for the user that service requester provides service, server is then made For the support platform of entire service function.Service request can be by the application corresponding with the server installed in its terminal The modes such as (Application, APP), webpage, short message, phone initiate order, and order is then sent on server.Server Then according to default rule, which is sent to terminal used in all or part of service provider, service provider It then can receive according to their own needs the order or not receive the order.
Once order completes distribution, the information for the service provider for completing the order of distribution can be then sent to by server The service requester of the order is initiated, the information for initiating the service requester of the order can be also sent to the clothes for receiving the order Be engaged in provider, so as to by the service provider for receiving the order by the mode on line or under line be initiation the order service ask The side's of asking offer service, wherein the service requester for initiating the order and the service provider for receiving the order are and the order Relevant user.
It being illustrated by taking net about vehicle service as an example, above-mentioned server is the server of offer net about vehicle service, or Say that the net about corresponding server of vehicle service platform, above-mentioned order are net about vehicle order, user relevant to order is to send out Rise order passenger users and driver user corresponding with the order.
It should be noted that terminal described in this specification includes but is not limited to mobile phone, tablet computer, personal computer (Personal Computer, PC) etc..
S102: if the order completes distribution, it is determined that user relevant to the order.
As described above, server receives the order of service requester initiation, and the order is sent to partly or entirely Service provider after, can monitor whether the order is completed to distribute, i.e., whether there is service provider to receive the order, determine should When order is received, it is determined that initiate the service requester of the order and receive the service provider of the order as with the order Relevant user.
S104: the pre-set security trigger flow item of at least one user relevant to the order determined is obtained Part, and it is sent to the terminal of the other users in each user determined in addition to the user, so that the end of the other users Whether end is triggered according to the security trigger flow condition monitoring security process.
In the present specification, server determines use relevant to the order of completion distribution in S102 through the above steps After family, then the corresponding security trigger flow condition of the user pre-saved can be inquired for each user determined, and Where the other users that the security trigger flow condition inquired is sent in each user determined in addition to the user Terminal, so that whether the terminal where other users is touched according to the security trigger flow condition monitoring security process received Hair.
The user of service provider is either still used as the user of service requester, it can preparatory customized security Trigger flow condition, and its customized security trigger flow condition is sent to server and is saved.Server can be inquired in advance The customized security trigger flow condition of each user saved, and the security trigger flow condition is sent to each use determined The terminal where at least one other user in family in addition to the user.And receive the security trigger flow condition other Whether the terminal of user can then be triggered according to the security trigger flow condition monitoring security process received, when monitoring security When process is triggered, security process can be started.
For example, in net about vehicle application scenarios, driver user and passenger users can itself security streams customized in advance Journey trigger condition, and be sent to server and accordingly save, when about vehicle order is received the net that passenger users are initiated by driver user, The customized security trigger flow condition of passenger users is sent to the terminal where driver user by server, in this way, working as driver When user exerts violence to passenger users and controls the terminal of passenger users, the terminal of driver user still can be according to the passenger received The security trigger flow condition of user triggers security process.Opposite, server also can be by the customized security stream of driver user Journey trigger condition is sent to passenger users, to achieve the purpose that protect driver user's personal safety.
In addition, in this specification to the quantity of above-mentioned user relevant to order and with no restrictions, upper example only with net About the relevant user of vehicle order is illustrated for having 2, and actually there may be 3 or 3 or more.For example, being taken in share-car In business, mutual unacquainted passenger users may have 2 or more, add driver user, then relevant to share-car order User can have 3 or more.At this point, server can be directed to each user relevant to order, by the corresponding security stream of the user Journey trigger condition is sent to all or part of other users in each user relevant to order in addition to the user, can reach same The effect of sample.
Optionally, in the present specification, since the security trigger flow condition that terminal receives is other users setting Whether security trigger flow condition triggers the purpose of security process according to the security trigger flow condition monitoring that other users are arranged It is the personal safety in order to protect other users, and is not the personal safety of terminal owner itself, therefore, terminal is connecing After the corresponding security trigger flow condition of other users for receiving server transmission, it is corresponding that the other users received can be hidden Security trigger flow condition, that is, the other users that (such as: display plays, casting) offer does not receive in any way are corresponding Security trigger flow condition, to prevent the owner of the terminal from being taken precautions against, can be further ensured that other users the person peace Entirely.
Certainly, for any user, where terminal in addition to according to the security process of other users received Trigger condition monitors whether other than triggering security process that the terminal itself also can be reserved for the customized security trigger flow of the user Condition, therefore, the terminal can also simultaneously according to the customized security trigger flow condition monitoring of the user locally saved whether Trigger security process.
Optionally, when server determines that the corresponding business of above-mentioned order is over (that is, service provider is complete Service is provided to service requester), then server can send instruction information to terminal, which is used to indicate orders with this The user of simple correlation deletes the corresponding security trigger flow condition of other users, stops according to the corresponding security process of other users Whether trigger condition monitoring security process is triggered.Alternatively, terminal can also have been tied determining the corresponding business of above-mentioned order Shu Shi, the corresponding security trigger flow condition of the deletion other users of active stop according to the corresponding security process of other users Whether trigger condition monitoring security process is triggered.
Optionally, it is contemplated that user can send order to server by operation and correspond at any time in the terminal of user The information that is over of business, therefore there are User Violations operations, have sent business to server when order is not yet completed Information through terminating causes the corresponding business of server erroneous judgement order to be over.Then, in the present specification, server The position (that is, position that the terminal is currently located) of user terminal relevant to the order can be monitored, and when the user's of monitoring When the position of terminal is less than preset value at a distance from the destination locations of the order, determine that the corresponding business of the order has been tied Beam sends instruction information to terminal, and it is corresponding which is used to indicate user's deletion other users relevant to the order Whether security trigger flow condition stops being touched according to the corresponding security trigger flow condition monitoring security process of other users Hair.Alternatively, terminal can also be when the position of itself be less than preset value at a distance from the destination locations of the order, the deletion of active The corresponding security trigger flow condition of other users stops according to the corresponding security trigger flow condition monitoring security of other users Whether process is triggered.Wherein, which can be set as needed, and this specification is without limitation.
Security process described in this specification and security trigger flow mode are described in detail below.
In the present specification, the security process include but is not limited to record audio/video and be uploaded to server, in real time Position, alarm, the preset emergency contact of connection for itself being currently located to server reporting terminal etc..Correspondingly, terminal exists When monitoring security process and being triggered, the method for starting security process includes but is not limited to: starting the recording of audio, by recording Audio data is uploaded to server;And/or start the recording of video, the video data of recording is uploaded to server;And/or It determines current location information, the location information is uploaded to server;And/or dial preset telephone number (alarm electricity At least one of words or emergency contact's phone).
It will be understood by those skilled in the art that the above-mentioned security process enumerated only is exemplary, security process Purpose is to ensure the personal safety of user, any for ensureing that the security process of the personal safety of user can be applied to this explanation In the method that book provides, this does not constitute the limitation to this specification.
Triggered in this specification above-mentioned security process security trigger flow mode can there are many, due to work as victim's quilt When abuser controls, it may be difficult to use hand operating terminal, therefore, in the present specification, security trigger flow mode may include Speech trigger.
Specifically, user can customize several keywords, server is sent to as security trigger flow condition and is saved, Then security trigger flow mode at this time are as follows: voice data is monitored and identify, if identifying this from the voice data monitored The keyword of user preset, it is determined that triggering security process.
Correspondingly, the method whether terminal monitoring triggers security process specifically: monitor and identify voice data, judgement is It is no that the keyword received is identified from the voice data monitored, if so, determining that security process is triggered, otherwise, really Dingan County protects process and is not triggered.
In this way, being difficult to use hand operating handset, victim can also be by speaking, calling out even if victim is controlled by abuser Etc. modes make abuser mobile phone trigger security process.
The security trigger flow mode that above-mentioned security process is triggered in this specification may also is that ought monitor long-pressing specifies When the time at any interface is more than setting duration in, triggering security process is determined.Then terminal can monitor the finger of itself installation Whether the time that any interface applied surely is long pressed is more than setting duration, if so, determine that security process is triggered, otherwise, Determine that security process is not triggered.
It is still illustrated by taking net about vehicle service as an example, above-mentioned specified application can be net about vehicle APP, and terminal can monitor certainly Whether the time that any position in any interface of the net about vehicle APP of body installation is long pressed is more than 2 seconds, if so, determining peace It protects process to be triggered, otherwise, it determines security process is not triggered.In this way, needing to click a certain button in compared with the existing technology Or for the precise manipulations such as icon, security process is easier to be triggered, and also can more effectively ensure the personal safety of user.
Certainly, except in the specified application of above-mentioned speech trigger and long-pressing any interface in addition to triggering, it can also be passed through He triggers security process at more convenient and fast mode, and e.g., user can customize volume threshold and duration and touch as security process Clockwork spring part, then security trigger flow mode can be with are as follows: when monitoring volume more than the duration of above-mentioned volume threshold is more than above-mentioned hold When continuous duration, determine that security process is triggered.Alternatively, user can customize terminal Oscillation Amplitude threshold value and duration as peace Trigger flow condition is protected, then security trigger flow mode can be with are as follows: when terminal monitoring to itself Oscillation Amplitude is more than above-mentioned vibration When the duration of dynamic amplitude threshold is more than above-mentioned duration, determine that security process is triggered.This specification will not enumerate.
It is further to note that terminal (or in which APP of installation) can provide a user customized security trigger flow The entrance of condition, so that the security trigger flow condition needed for it can be arranged, to meet different use according to the needs of itself in user The diversified demand at family.
Fig. 4 is the trigger process for second of security process that this specification embodiment provides, for related to same order Each user terminal, specifically can comprise the following steps that for the terminal of each user
S300: the terminal of the user receives the security trigger flow condition that server is sent, the security trigger flow item Part is the corresponding security trigger flow condition of relevant to order other users.
It is sent according to method as shown in Figure 2 to the terminal specifically, the security trigger flow condition can be server 's.
S302: meeting the information of the security trigger flow condition in response to receiving, and starts the security process.
That is, the security trigger flow condition that terminal is received according to, whether monitoring security process is triggered, if It monitors the security process to be triggered, then starts the security process.
Based on same thinking, this specification embodiment additionally provides corresponding security trigger flow device, such as Fig. 5~6 It is shown.
Fig. 5 is the structural schematic diagram of the trigger device for the first security process that this specification embodiment provides, comprising:
Receiving module 400, for receiving order;
Determining module 402, if completing distribution for the order, it is determined that user relevant to the order;
Sending module 404, for obtaining the pre-set peace of at least one user relevant to the order determined Trigger flow condition is protected, and is sent to the terminal of the other users in each user determined in addition to the user, so that described Whether the terminal of other users is triggered according to the security trigger flow condition monitoring security process.
Optionally, described device is to provide the server of net about vehicle service;
The order is net about vehicle order;
The determining module 402 is specifically used for, and determines passenger users for initiating the order and corresponding with the order Driver user.
Optionally, the sending module 404 is specifically used for, and obtains at least one use relevant to the order determined The pre-set keyword in family.
Optionally, the sending module 404 is also used to, if the order has terminated, to it is relevant to the order extremely The terminal of a few user sends instruction information, and the instruction information is used to indicate the security stream of the non-self setting of the terminal deletion Journey trigger condition, if at least one user relevant to the order destination of the terminal apart from the order be less than it is pre- If value, then instruction information is sent to the terminal of at least one user, it is non-that the instruction information is used to indicate the terminal deletion The security trigger flow condition of itself setting.
Fig. 6 is the structural schematic diagram of the trigger device for second of security process that this specification embodiment provides, comprising:
Receiving module 500, for receiving the security trigger flow condition of server transmission, the security trigger flow condition It is the corresponding security trigger flow condition of relevant to order other users;
Monitoring module 502 starts the peace for meeting the information of the security trigger flow condition in response to receiving Protect process.
Optionally, the receiving module 500 is specifically used for, and it is pre-set to receive the other users that server is sent Keyword.
Optionally, the monitoring module 502 is specifically used for, and monitors and identifies voice data;If identifying the keyword, Then start the security process.
Optionally, the monitoring module 502 is also used to, if the order has terminated, deletes the security of non-self setting Trigger flow condition, if the destination of order described in the positional distance that is currently located of the terminal be less than preset value, delete Except the security trigger flow condition of non-self setting.
Optionally, the monitoring module 502 is specifically used for, and starts the recording of audio, and the audio data of recording is uploaded to Server;And/or start the recording of video, the video data of recording is uploaded to server;And/or determination is currently located position The location information is uploaded to server by the location information set;And/or dial preset telephone number.
This specification embodiment additionally provides a kind of computer readable storage medium, which is stored with computer journey Sequence, computer program can be used for executing the triggering method for the security process that above-mentioned Fig. 2 or Fig. 4 is provided.
This specification embodiment also proposed the schematic configuration diagram of electronic equipment shown in Fig. 7.Such as Fig. 7, in hardware view, The electronic equipment includes processor, internal bus, network interface, memory and nonvolatile memory, is also possible that certainly Hardware required for other business.Then processor is from reading corresponding computer program into memory in nonvolatile memory Operation, to realize the triggering method of security process described in above-mentioned Fig. 2 or Fig. 4.Certainly, other than software realization mode, Other implementations, such as logical device or the mode of software and hardware combining etc. is not precluded in this specification, that is to say, that with The executing subject of lower process flow is not limited to each logic unit, is also possible to hardware or logical device.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (17)

1. a kind of triggering system of security process, which is characterized in that the system comprises: the end of server and several users End, in which:
The server determines user relevant to the order when the order that receives completes distribution, obtains and determines The pre-set security trigger flow condition of at least one user relevant to the order, and it is sent to each user determined In other users in addition to the user terminal;
The terminal receives the security trigger flow condition that the server is sent, meets the security stream in response to receiving The information of journey trigger condition, starts the security process, the security trigger flow condition be it is relevant to the order other The corresponding security trigger flow condition of user.
2. the system as claimed in claim 1, which is characterized in that the server, obtain determine it is related to the order The pre-set keyword of at least one user, as the security trigger flow condition got;
The terminal receives the pre-set keyword of other users relevant to the order that the server is sent, and makees For the security trigger flow condition received.
3. such as the described in any item systems of claims 1 or 2, which is characterized in that the server, if the order has terminated, Or the destination of order described in the positional distance that is currently located of at least one terminal relevant to the order is less than preset value, Then instruction information is sent to the terminal of at least one user relevant to the order;
The terminal deletes the security trigger flow of non-self setting if receiving the instruction information that the server is sent Condition.
4. system as claimed in claim 2, which is characterized in that the terminal monitors and identify voice data, if identifying institute Keyword is stated, then starts the security process.
5. such as claim 1,2 or 4 described in any item systems, which is characterized in that the terminal, if the order has terminated, The security trigger flow condition of non-self setting is then deleted, if order described in the positional distance that is currently located of the terminal Destination is less than preset value, then deletes the security trigger flow condition of non-self setting.
6. a kind of triggering method of security process, which is characterized in that the described method includes:
Server receives order;
If the order completes distribution, it is determined that user relevant to the order;
The pre-set security trigger flow condition of at least one user relevant to the order determined is obtained, and is sent To the terminal of the other users in each user determined in addition to the user, so that the terminal of the other users is according to Whether security trigger flow condition monitoring security process is triggered.
7. method as claimed in claim 6, which is characterized in that the server is to provide the server of net about vehicle service;
The order is net about vehicle order;
It determines user relevant to the order, specifically includes:
Determine the passenger users for initiating the order and driver user corresponding with the order.
8. method as claimed in claim 6, which is characterized in that obtain at least one use relevant to the order determined The pre-set security trigger flow condition in family, specifically includes:
Obtain the pre-set keyword of at least one user relevant to the order determined.
9. such as the described in any item methods of claim 6-8, which is characterized in that the method also includes:
If the order has terminated, instruction information is sent to the terminal of at least one user relevant to the order, it is described Indicate that information is used to indicate the security trigger flow condition of the non-self setting of the terminal deletion;Or
If destination of the terminal of at least one user relevant to the order apart from the order is less than preset value, to institute The terminal for stating at least one user sends instruction information, and the instruction information is used to indicate the peace of the non-self setting of the terminal deletion Protect trigger flow condition.
10. a kind of triggering method of security process, which is characterized in that the method is applied to relevant to same order at least one The terminal of a user;
For the terminal of at least one user, which comprises
The terminal of the user receives the security trigger flow condition that server is sent, the security trigger flow condition be with it is described The corresponding security trigger flow condition of the relevant other users of order;
The information for meeting the security trigger flow condition in response to receiving starts the security process.
11. method as claimed in claim 10, which is characterized in that receive the security trigger flow condition that server is sent, tool Body includes:
Receive the pre-set keyword of the other users that the server is sent.
12. method as claimed in claim 11, which is characterized in that meet the security trigger flow condition in response to receiving Information, start the security process, specifically include:
It monitors and identifies voice data;
If identifying the keyword, start the security process.
13. such as the described in any item methods of claim 10-12, which is characterized in that the method also includes:
If the order has terminated, the security trigger flow condition of non-self setting is deleted;Or
If the destination of order described in the positional distance that the terminal is currently located is less than preset value, the peace of non-self setting is deleted Protect trigger flow condition.
14. a kind of trigger device of security process characterized by comprising
Receiving module, for receiving order;
Determining module, if completing distribution for the order, it is determined that user relevant to the order;
Sending module, for obtaining the pre-set security process touching of at least one user relevant to the order determined Clockwork spring part, and it is sent to the terminal of the other users in each user determined in addition to the user, so that the other users Terminal whether be triggered according to the security trigger flow condition monitoring security process.
15. a kind of trigger device of security process characterized by comprising
Receiving module, for receiving the security trigger flow condition of server transmission, the security trigger flow condition is and orders The corresponding security trigger flow condition of the other users of simple correlation;
Monitoring module starts the security process for meeting the information of the security trigger flow condition in response to receiving.
16. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the meter The claims 6-9 or 10-13 any method are realized when calculation machine program is executed by processor.
17. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes that the claims 6-9 or 10-13 are any described when executing described program Method.
CN201910528665.2A 2019-03-01 2019-06-18 A kind of triggering system, the method and device of security process Pending CN110147989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/121189 WO2020177408A1 (en) 2019-03-01 2019-11-27 Security flow triggering system, method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910154584.0A CN109934559A (en) 2019-03-01 2019-03-01 A kind of triggering method and device of security process
CN2019101545840 2019-03-01

Publications (1)

Publication Number Publication Date
CN110147989A true CN110147989A (en) 2019-08-20

Family

ID=66986227

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910154584.0A Pending CN109934559A (en) 2019-03-01 2019-03-01 A kind of triggering method and device of security process
CN201910528665.2A Pending CN110147989A (en) 2019-03-01 2019-06-18 A kind of triggering system, the method and device of security process

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201910154584.0A Pending CN109934559A (en) 2019-03-01 2019-03-01 A kind of triggering method and device of security process

Country Status (2)

Country Link
CN (2) CN109934559A (en)
WO (1) WO2020177408A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020177408A1 (en) * 2019-03-01 2020-09-10 北京三快在线科技有限公司 Security flow triggering system, method and apparatus

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971334A (en) * 2017-03-28 2017-07-21 北京小米移动软件有限公司 Handle method and device, the electronic equipment of stroke order
CN108810804A (en) * 2018-06-13 2018-11-13 陈磊 A kind of intelligent protecting method and its system based on net about vehicle platform
CN109242647A (en) * 2018-10-23 2019-01-18 马伟超 A kind of shared automotive safety method for early warning and system based on Internet of Things

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107251565B (en) * 2014-07-11 2021-04-27 惠普发展公司,有限责任合伙企业 Cloud server, control device, output device, method for pairing devices, and cloud system including the same
CN106297268B (en) * 2015-05-29 2020-11-03 富顶精密组件(深圳)有限公司 Mutual-aid riding system and mutual-aid riding method
CN107170230A (en) * 2017-07-11 2017-09-15 杨益民 System and method are taken in highway private car mutual assistance with compensation
CN109934559A (en) * 2019-03-01 2019-06-25 北京三快在线科技有限公司 A kind of triggering method and device of security process

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971334A (en) * 2017-03-28 2017-07-21 北京小米移动软件有限公司 Handle method and device, the electronic equipment of stroke order
CN108810804A (en) * 2018-06-13 2018-11-13 陈磊 A kind of intelligent protecting method and its system based on net about vehicle platform
CN109242647A (en) * 2018-10-23 2019-01-18 马伟超 A kind of shared automotive safety method for early warning and system based on Internet of Things

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020177408A1 (en) * 2019-03-01 2020-09-10 北京三快在线科技有限公司 Security flow triggering system, method and apparatus

Also Published As

Publication number Publication date
CN109934559A (en) 2019-06-25
WO2020177408A1 (en) 2020-09-10

Similar Documents

Publication Publication Date Title
TWI706653B (en) Authorized guided data processing method, device, processing equipment and system
KR102147088B1 (en) Method and apparatus for offering received information to user in a electronic device
KR20200003134A (en) How notifications are handled and electronic devices
KR102125159B1 (en) Security verification method and device for smart card application
CN110320991B (en) Power management method and device for mobile terminal
KR20150054413A (en) Apparatas and method for determining a location of content according to user's eyes data in an electronic device
CN109922298A (en) Meeting room monitoring method and device
KR102071530B1 (en) Apparatas and method for proposing a response manual of occurring denial in an electronic device
CN108615158B (en) Risk detection method and device, mobile terminal and storage medium
CN113836540A (en) Method, apparatus, storage medium, and program product for managing application rights
CN110727941A (en) Private data protection method and device, terminal equipment and storage medium
CN110532803B (en) Private data protection method and device
CN110147989A (en) A kind of triggering system, the method and device of security process
CN110334529A (en) Data processing method, device, equipment, system and audio frequency apparatus
CN107071008B (en) Terminal equipment positioning method, device and equipment
CN113407150A (en) Terminal device, security guarantee method and storage medium
CN109144600A (en) A kind of operation method of application program, equipment and computer-readable medium
CN111597797A (en) Method, device, equipment and medium for editing social circle message
CN108132817B (en) Object management method and device
CN113781731B (en) Alarm method and device
CN115270181A (en) Information display method, device, equipment, computer readable storage medium and product
CN110929241B (en) Method and device for quickly starting small program, medium and electronic equipment
CN107256151A (en) Processing method, device and the terminal of page rendering
CN110018872A (en) A kind of PUSH message treating method and apparatus
CN113055534A (en) Terminal control method and device, terminal and non-transitory storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination