CN110807885A - Alarm method and alarm device based on WeChat - Google Patents
Alarm method and alarm device based on WeChat Download PDFInfo
- Publication number
- CN110807885A CN110807885A CN201911104885.9A CN201911104885A CN110807885A CN 110807885 A CN110807885 A CN 110807885A CN 201911104885 A CN201911104885 A CN 201911104885A CN 110807885 A CN110807885 A CN 110807885A
- Authority
- CN
- China
- Prior art keywords
- information
- alarm
- identification information
- user
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B1/00—Systems for signalling characterised solely by the form of transmission of the signal
- G08B1/08—Systems for signalling characterised solely by the form of transmission of the signal using electric transmission ; transformation of alarm signals to electrical signals from a different medium, e.g. transmission of an electric alarm signal upon detection of an audible alarm signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
The application is applicable to the technical field of computers, and provides an alarm method and alarm equipment based on WeChat, wherein the method comprises the following steps: when alarm information sent by security equipment is received, target alarm information corresponding to the alarm information is generated according to a preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number. According to the mode, the alarm device generates target alarm information based on the alarm information sent by the security device and the preset message template, the target alarm information is pushed to a target user through the preset wechat public number, and the alarm of the security device is achieved based on the preset wechat public number, so that the alarm is timely, and the alarm cost is reduced.
Description
Technical Field
The application belongs to the technical field of computers, and particularly relates to an alarm method and alarm equipment based on WeChat.
Background
Currently, in the aspect of monitoring security equipment, a user is usually notified by mail reminding, short message notification or security software (APP). However, in a non-working state, a user generally cannot check the mail, short message notification requires high economic cost, and the security APP cannot push alarm information when not authorized, so that the security alarm cost is high and the alarm is not timely due to the defects of the existing alarm modes.
Disclosure of Invention
In view of this, the embodiment of the present application provides an alarm method and an alarm device based on WeChat, so as to solve the problems of high alarm cost and untimely alarm of the existing security device in the aspect of monitoring.
A first aspect of an embodiment of the present application provides an alarm method based on WeChat, including:
when alarm information sent by security equipment is received, target alarm information corresponding to the alarm information is generated according to a preset message template;
determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account;
and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
Further, the alarm information includes equipment identification information, alarm time and an alarm picture of the security equipment.
Further, in order to generate accurate and rich target alarm information, and better remind a user of a fault or an alarm event occurring in security equipment, when the alarm information sent by the security equipment is received, the target alarm information corresponding to the alarm information is generated according to a preset message template, and the target alarm information may include:
acquiring an alarm type to which the alarm information belongs;
searching an alarm file corresponding to the alarm type from the preset message template; the message template comprises a plurality of alarm files corresponding to preset alarm types;
and generating the target alarm information based on the alarm information and the alarm pattern.
Further, in order to accurately and quickly push alarm information to a user, the user can conveniently and timely take measures for alarm events sent by the security equipment, and the method can further comprise the following steps:
acquiring first identity information and the equipment identification information associated with each first identity information; the first identity information is generated for each user based on the WeChat open platform;
acquiring second identity information and the user identification information associated with each second identity information; the second identity information is identity information generated for each user based on the preset WeChat public number; the first identity information and the second identity information of the same user are the same;
and establishing an association relation between each piece of equipment identification information and each piece of user identification information based on the first identity information, the equipment identification information, the second identity information and the user identification information.
Further, in order to quickly and accurately obtain the second identity information and the user identification information associated with each second identity information, the method may further include:
when any user is detected to pay attention to the preset WeChat public number, generating second identity information and user identification information for the user based on the preset WeChat public number;
associating the second identity information corresponding to the same user with the user identification information, and generating attendee list information based on each group of associated second identity information and user identification information; the attendee list information is used to search the second identity information and the user identification information of each user.
Further, in order to ensure the validity of the attendee list information, the method may further include:
and when monitoring that any user pays attention to or cancels the preset micro-information public number, updating the list information of the attention people based on the second identity information and the user identification information corresponding to the user.
Further, in order to quickly and accurately acquire the second identity information and the user identification information associated with each second identity information, the method may generate the attendee list information, and the acquiring the second identity information and the user identification information associated with each second identity information includes:
searching the second identity information which is the same as the first identity information from the attendee list information;
when the second identity information identical to the first identity information is found, searching the user identification information associated with the second identity information from the attendee list information;
when the second identity information identical to the first identity information is not found, generating prompt information; the prompt message is used for reminding a user of paying attention to the preset WeChat public number.
Further, in order to accurately push alarm information to users, each user is concerned about the state of a preset WeChat public number in time, and different pushing measures are taken according to different states
And when the target user is monitored to cancel the attention of the preset WeChat public number, no alarm information is pushed to the target user.
A second aspect of an embodiment of the present invention provides an alarm device based on WeChat, including:
the generating unit is used for generating target alarm information corresponding to the alarm information according to a preset message template when the alarm information sent by the security equipment is received;
the determining unit is used for determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relation between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account;
and the pushing unit is used for pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
Further, the alarm information includes equipment identification information, alarm time and an alarm picture of the security equipment; the generating unit is specifically configured to:
acquiring an alarm type to which the alarm information belongs;
searching an alarm file corresponding to the alarm type from the preset message template; the message template comprises a plurality of alarm files corresponding to preset alarm types;
and generating the target alarm information based on the alarm information and the alarm pattern.
Further, the alarm device further includes:
a first acquisition unit configured to acquire first identity information and the device identification information associated with each of the first identity information; the first identity information is generated for each user based on the WeChat open platform;
a second obtaining unit, configured to obtain second identity information and the user identification information associated with each piece of the second identity information; the second identity information is identity information generated for each user based on the preset WeChat public number; the first identity information and the second identity information of the same user are the same;
and the establishing unit is used for establishing an association relation between each piece of equipment identification information and each piece of user identification information based on the first identity information, the equipment identification information, the second identity information and the user identification information.
Further, the alarm device further includes:
the detection unit is used for generating the second identity information and the user identification information for the user based on the preset WeChat public number when detecting that any user pays attention to the preset WeChat public number;
the association unit is used for associating the second identity information corresponding to the same user with the user identification information and generating the list information of the concerned persons based on each group of the associated second identity information and the associated user identification information; the attendee list information is used for searching the second identity information and the user identification information of each user;
further, the alarm device further includes:
and the updating unit is used for updating the list information of the concerned persons based on the second identity information and the user identification information corresponding to the user when monitoring that any user pays attention to or cancels the preset micro-information public account.
Further, the second obtaining unit is specifically configured to:
searching the second identity information which is the same as the first identity information from the attendee list information;
when the second identity information identical to the first identity information is found, searching the user identification information associated with the second identity information from the attendee list information;
when the second identity information identical to the first identity information is not found, generating prompt information; the prompt message is used for reminding a user of paying attention to the preset WeChat public number.
Further, the alarm device further includes:
and the monitoring unit is used for not pushing any alarm information to the target user any more when the target user is monitored to cancel the attention to the preset WeChat public number.
A third aspect of an embodiment of the present invention provides another alarm device, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program that supports a terminal to execute the above method, where the computer program includes program instructions, and the processor is configured to call the program instructions and execute the following steps:
when alarm information sent by security equipment is received, target alarm information corresponding to the alarm information is generated according to a preset message template;
determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account;
and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
A fourth aspect of embodiments of the present invention provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of:
when alarm information sent by security equipment is received, target alarm information corresponding to the alarm information is generated according to a preset message template;
determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account;
and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
The alarm method and the alarm device based on the WeChat have the following beneficial effects that:
according to the embodiment of the application, when the alarm information sent by the security equipment is received, the target alarm information corresponding to the alarm information is generated according to a preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number. In the mode, the alarm equipment generates target alarm information based on the alarm information sent by the security equipment and a preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and the target alarm information is pushed to the target user through a preset wechat public number. Because the alarm of the security equipment is realized based on the preset WeChat public number, the alarm is timely, and the alarm cost is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating an implementation of a WeChat-based alarm method according to an embodiment of the present application;
FIG. 2 is a flow chart of an implementation of a WeChat-based alarm method according to another embodiment of the present application;
FIG. 3 is a flowchart illustrating an implementation of a WeChat-based alarm method according to another embodiment of the present application;
FIG. 4 is a schematic diagram of a WeChat-based alarm device according to an embodiment of the present application;
fig. 5 is a schematic diagram of an alarm device based on WeChat according to another embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, fig. 1 is a schematic flow chart of an alarm method based on WeChat according to an embodiment of the present invention. In this embodiment, the execution subject of the alarm method based on the WeChat is an alarm device, and the alarm device includes, but is not limited to, a server. The WeChat-based alert method as shown in FIG. 1 may include:
s101: when alarm information sent by security equipment is received, target alarm information corresponding to the alarm information is generated according to a preset message template.
The security protection equipment is equipment capable of playing a preventive or protective role, products of the security protection equipment are multiple, different products can generate different alarm information when different conditions are met, and therefore different protective effects are played. The security device may be an anti-theft alarm control device, an intrusion detection device, an automobile anti-theft device, a video monitoring device, an anti-theft safe, etc., which are only exemplary illustrations, and are not limited thereto. Because the products of the security equipment are different, the condition that each security equipment touches the alarm information produced by the security equipment is different, and a user can set different trigger conditions for different security equipment according to actual conditions.
When the alarm device receives alarm information sent by the security device, target alarm information corresponding to the alarm information is generated according to a preset message template. Specifically, the preset message template includes a plurality of alarm scenarios, different alarm information belongs to different alarm types, and the different alarm types correspond to different alarm scenarios. The alarm device obtains the alarm type to which the alarm information belongs, searches an alarm file corresponding to the alarm type in a preset message template according to the alarm type, obtains device identification information of the security device which sends the alarm information, and generates target alarm information based on the alarm file and the device identification information of the security device. The target alarm information is used for being pushed to a user, so that the user can be informed of faults or alarm events of the security equipment in time.
Further, in order to generate accurate and rich target alarm information and better remind a user of a fault or an alarm event occurring in security equipment, S101 may include S1011 to S1013, specifically as follows:
s1011: and acquiring the alarm type of the alarm information.
The alarm information comprises equipment identification information, alarm time and an alarm picture of the security equipment. The alarm device receives alarm information sent by the security device, and the alarm information may include device identification information of the security device, alarm time when the security device gives an alarm, an alarm picture corresponding to an alarm event, data related to the alarm event, an alarm record, an alarm video, an alarm type to which the alarm information belongs, and the like, which is not limited to this. The alarm equipment acquires the alarm type of the alarm information. Specifically, the alarm information may include an alarm type to which the alarm information belongs, and the alarm device extracts the alarm type from the alarm information; the method may also be that a plurality of different alarm information and the alarm type corresponding to each alarm information are stored in advance in the database, and when the alarm device receives the alarm information sent by the security device, the alarm device searches the database for the alarm type corresponding to the alarm information that is the same as the alarm information, so as to obtain the alarm type to which the alarm information belongs. The alarm device generates different target alarm information aiming at different security equipment when the alarm information corresponding to the different security equipment is different; the method is not limited to the actual situation.
S1012: searching an alarm file corresponding to the alarm type from the preset message template; the message template comprises a plurality of alarm files corresponding to preset alarm types.
The preset message template can be preset and used for generating target alarm information. The preset message template comprises a plurality of alarm files corresponding to the preset alarm types. Specifically, the preset message template includes a plurality of alarm scenarios, different alarm information belongs to different alarm types, and the different alarm types correspond to different alarm scenarios. Specifically, the alarm device searches an alarm file corresponding to the alarm type in a preset message template. The alarm record can be edited and stored in the message template in advance, different alarm types correspond to different alarm records, the alarm record can directly embody the core content of the alarm information corresponding to the alarm type, and the specific content of the alarm record can be set according to different alarm types without limitation.
S1013: and generating the target alarm information based on the alarm information and the alarm pattern.
And the alarm equipment generates target alarm information according to the alarm information sent by the security equipment and the alarm pattern. When the alarm information corresponding to different security equipment is different, the alarm pattern corresponding to the alarm information is also different, and at the moment, the target alarm information generated by the alarm equipment aiming at the different security equipment is also different. For example, the alarm information may include device identification information of the security device, and the alarm device extracts the device identification information of the security device from the alarm information; or when the alarm device receives the alarm information, the device identification information of the device sending the alarm information is acquired, and the device identification information of the security device is obtained. The alarm equipment combines the equipment identification information of the security equipment, the alarm time of the security equipment giving an alarm and the alarm pattern to generate target alarm information. Further, in order to facilitate a user to timely master alarm information of more security equipment, an alarm picture corresponding to an alarm event contained in the alarm information can be added to target alarm information. Furthermore, in order to facilitate a user to master alarm information of more security and protection devices in time, data, alarm records, alarm videos and the like related to alarm events contained in the alarm information can be added into target alarm information. Furthermore, the alarm information generated by different security equipment has different contents, and the target alarm information corresponding to each security equipment can be adjusted according to actual conditions without limitation.
S102: determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account.
A plurality of pieces of equipment identification information and user identification information corresponding to each piece of equipment identification information are stored in a database in advance; the user identification information is user identification information generated by the alarm device for the user based on the preset WeChat public number when the user pays attention to the preset WeChat public number, and is used for uniquely identifying the user. The preset WeChat public number can be preset and generally corresponds to security equipment; for example, when monitoring a security device a, a corresponding wechat public number is opened based on the security device a, and a user using the security device can pay attention to the wechat public number by searching a public number name corresponding to the security device, scanning a two-dimensional code and the like; the specific conditions are subject to, and are not limited to.
The method comprises the steps that an alarm device acquires device identification information of a security device sending alarm information, specifically, the alarm information can include the device identification information of the security device, and the alarm device extracts the device identification information of the security device from the alarm information; or when the alarm device receives the alarm information, the device identification information of the device sending the alarm information is acquired, and the device identification information of the security device is obtained. And the alarm equipment searches the target user identification information corresponding to the equipment identification information software of the security equipment in a database.
S103: and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
And the alarm equipment pushes the target alarm information to the target user corresponding to the target user identification information through a preset WeChat public number. Specifically, after the alarm device finds the identification information of the target user, the target alarm information can be pushed to the target user through a preset wechat public number concerned by the target user. When a target user receives target alarm information pushed by a preset WeChat public number, the target user can check the target alarm information in time; because the target alarm information contains the equipment identification information, the alarm time, the alarm file, the alarm picture, the alarm audio, the alarm video and other information of the security equipment, the target user can clearly know which security equipment has the alarm event and when the alarm event occurs, and what the specific alarm event is, so that corresponding measures can be taken in time, and unnecessary loss is avoided.
In the embodiment, when the alarm information sent by the security equipment is received, the target alarm information corresponding to the alarm information is generated according to the preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number. In the mode, the alarm equipment generates target alarm information based on the alarm information sent by the security equipment and a preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and the target alarm information is pushed to the target user through a preset wechat public number. Because the alarm of the security equipment is realized based on the preset WeChat public number, the alarm is timely, and the alarm cost is reduced.
Referring to fig. 2, fig. 2 is a schematic flow chart of an alarm method based on WeChat according to another embodiment of the present invention. In this embodiment, the execution subject of the alarm method based on the WeChat is an alarm device, and the alarm device includes, but is not limited to, a server.
The differences between the embodiment of the present embodiment and the embodiment corresponding to fig. 1 are S201 to S203, and S207, and S204 to S206 in the present embodiment are completely the same as S101 to S103 in the embodiment corresponding to fig. 1, and specific reference is made to the description related to S101 to S103 in the embodiment corresponding to fig. 1, which is not repeated herein.
In order to accurately and quickly push alarm information to a user and facilitate the user to take measures for an alarm event sent by a security device in time, the embodiment may further include S201-S203, which is specifically as follows:
s201: acquiring first identity information and the equipment identification information associated with each first identity information; the first identity information is generated for each user based on the WeChat open platform.
The first identity information is identity information generated by the alarm device for each user through the wechat open platform, and in this application, the first identity information may be represented by unionID 1. The database stores a plurality of first identity information and device identification information corresponding to each first identity information in advance. The alarm device obtains first identity information from a database, and device identification information associated with each first identity information. Further, when the security APP requests wechat authorized login, that is, when the security APP sends an authorized login request to the wechat, the wechat open platform generates first identity information unionID1 for identifying the user for the user, and simultaneously generates identification information openID1 for the security APP used by the user, and sends the first identity information unionID1 and the identification information openID1 to a terminal for installing the security APP, the terminal obtains device identification information of the security device and account information of the user based on the security APP, and sends the first identity information unionID1, the identification information openID1, the device identification information of the security device and the account information of the user to the alarm device in an associated manner, and the alarm device receives the information and extracts the first identity information and the device identification information associated with the first identity information; further, after the alarm device confirms that the user pays attention to the WeChat public number, first identity information and device identification information related to the first identity information are stored in a database; when the alarm device detects that the user does not pay attention to the WeChat public number, prompt information is generated and sent to the security device, and the prompt information is used for indicating the security device to prompt the user to pay attention to the WeChat public number. Or when the alarm device detects that the user does not pay attention to the WeChat public number, the error code is fed back to the security APP to prompt the user to pay attention to the public number.
Further, for the user, the user selects to turn on a micro-message alarm function in the security APP; at the moment, the security APP requests WeChat authorization login; the user allows the wechat authorization; when the user allows wechat authorization, the wechat open platform generates first identity information unionID1 for identifying the user for the user, meanwhile, the wechat open platform generates identification information openID1 for the security APP used by the user, and a terminal for installing the security APP acquires the first identity information unionID1 and the identification information openID 1; the terminal acquires equipment identification information of security equipment and account information of a user based on the security APP, associates and sends first identity information unioniD1, identification information openID1, equipment identification information of the security equipment and account information of the user to alarm equipment, and after the alarm equipment receives the information, extracts the first identity information and the equipment identification information associated with the first identity information; further, after the alarm device confirms that the user pays attention to the WeChat public number, first identity information and device identification information related to the first identity information are stored in a database; when the alarm device detects that the user does not pay attention to the WeChat public number, prompt information is generated and sent to the security device, and the prompt information is used for indicating the security device to prompt the user to pay attention to the WeChat public number. Or when the alarm device detects that the user does not pay attention to the WeChat public number, the error code is fed back to the security APP to prompt the user to pay attention to the public number.
S202: acquiring second identity information and the user identification information associated with each second identity information; the second identity information is identity information generated for each user based on the preset WeChat public number; the first identity information of the same user is the same as the second identity information.
The second identity information is the identity information generated by the alarm device for each user through a preset wechat public number, and in the present application, the second identity information may be represented by a unionID2, and it should be noted that, for the same user, the first identity information unionID1 is the same as the second identity information unionID 2. The database is prestored with a plurality of second identity information and user identification information corresponding to each second identity information, and the alarm equipment acquires the second identity information and the user identification information associated with each second identity information from the database. Further, when the user concerns the preset wechat public number, the alarm device generates the second identity information unionID2 for the user through the preset wechat public number, and simultaneously the alarm device generates the user identification information for the user through the preset wechat public number. The alerting device associates the second identity information unionID2 with the user identification information and stores it in a database.
S203: and establishing an association relation between each piece of equipment identification information and each piece of user identification information based on the first identity information, the equipment identification information, the second identity information and the user identification information.
Based on first identity information, equipment identification information associated with the first identity information, second identity information and user identification information associated with the second identity information, establishing an association relationship between the equipment identification information and the user identification information. Specifically, for the same user, the first identity information unionID1 is the same as the second identity information unionID2, the first identity information unionID1 is associated with device identification information, and the second identity information unionID2 is associated with user identification information, and the device identification information of the user can be associated with the user identification information based on the first identity information unionID1 and the second identity information unionID2 of the same user. For example, when the first identity information unionID1 and the device identification information associated with the first identity information unionID1 are acquired, the second identity information unionID2 identical to the first identity information unionID1 is searched, when the second identity information unionID2 is searched, the user identification information associated with the second identity information unionID2 is acquired, and the device identification information of the user is associated with the user identification information.
Further, in order to accurately push the alarm information to the user, timely pay attention to the state of each user paying attention to the preset wechat public number, and take different pushing measures according to different states, after S206, S207 may be further included, specifically as follows:
s207: and when the target user is monitored to cancel the attention of the preset WeChat public number, no alarm information is pushed to the target user.
The alarm equipment monitors the state that the target user pays attention to a preset micro-message public number in real time, and marks the target user when detecting that the target user cancels paying attention to the preset micro-message public number; for example, the target user is marked as an invalid user, the user marked as an invalid user, and the alert device no longer pushes any alert information to the user. Further, the second identity information unionID2 of the user and the user identification information stored in the database may also be deleted to reduce the storage pressure of the database.
In the embodiment, when the alarm information sent by the security equipment is received, the target alarm information corresponding to the alarm information is generated according to the preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number. In the mode, the alarm equipment generates target alarm information based on the alarm information sent by the security equipment and a preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and the target alarm information is pushed to the target user through a preset wechat public number. Because the alarm of the security equipment is realized based on the preset WeChat public number, the alarm is timely, and the alarm cost is reduced.
Referring to fig. 3, fig. 3 is a schematic flow chart of an alarm method based on WeChat according to another embodiment of the present invention. In this embodiment, the execution subject of the alarm method based on the WeChat is an alarm device, and the alarm device includes, but is not limited to, a server.
The differences between the embodiment of the present embodiment and the embodiment corresponding to fig. 2 are S302 to S303, and S309, where S301, S304 to S308 in the present embodiment are completely the same as S201, S202 to S206 in the embodiment corresponding to fig. 2, and refer to the description of S201, S202 to S206 in the embodiment corresponding to fig. 2, which is not repeated herein.
Further, in order to quickly and accurately obtain the second identity information and the user identification information associated with each second identity information, the method may generate the attendee list information, and in this embodiment, the method may further include the following steps of S302-S303:
s302: and when any user concerning the preset WeChat public number is detected, generating the second identity information and the user identification information for the user based on the preset WeChat public number.
The method comprises the steps that the state that any user pays attention to a preset micro-information public number is monitored in real time by the alarm device, when the situation that any user pays attention to the preset micro-information public number is detected, the alarm device generates second identity information unionID2 for the user through the preset micro-information public number, and meanwhile, the alarm device generates user identification information for the user through the preset micro-information public number.
S303: associating the second identity information corresponding to the same user with the user identification information, and generating attendee list information based on each group of associated second identity information and user identification information; the attendee list information is used to search the second identity information and the user identification information of each user.
The alarm device associates the second identity information unionID2 of the same user with the user identification information, and generates the attendee list information based on the associated second identity information unionID2 corresponding to each user and the user identification information. The attendee list information is used to search the second identity information and the user identification information of each user. Specifically, the first identity information unionID1 of the same user is the same as the second identity information unionID2, when the alarm device acquires the first identity information unionID1, the alarm device searches the second identity information unionID2 which is the same as the first identity information unionID1 in the attendee list information based on the first identity information unionID1, and when the second identity information unionID2 which is the same as the first identity information unionID1 is found, the alarm device searches the user identification information associated with the second identity information unionID2 in the attendee list information.
S304: second identity information and the user identification information associated with each second identity information are obtained.
In this embodiment, S304 is the same as S202 in the previous embodiment, and specific reference is made to the related description of S202 in the embodiment corresponding to fig. 2, which is not repeated herein.
Further, in order to accurately obtain the second identity information and the user identification information associated with each second identity information, S304 may include S3041-S3043, specifically as follows:
s3041: searching the second identity information which is the same as the first identity information from the attendee list information.
The alarm device searches the attendee list information for second identity information identical to the first identity information. Specifically, the first identity information unionID1 of the same user is the same as the second identity information unionID2, and when the alarm device acquires the first identity information unionID1, the alarm device searches the second identity information unionID2 which is the same as the first identity information unionID1 in the attendee list information.
S3042: when the second identity information identical to the first identity information is found, the user identification information associated with the second identity information is found from the attendee list information.
The alarm equipment searches second identity information which is the same as the first identity information from the attendee list information, and when the second identity information which is the same as the first identity information is found, user identification information which is associated with the second identity information is searched from the attendee list information. Specifically, when the alarm device finds the second identity information unionID2 that is the same as the first identity information unionID1 from the attendee list information, the user identification information associated with the second identity information unionID2 is found from the attendee list information.
S3043: when the second identity information identical to the first identity information is not found, generating prompt information; the prompt message is used for reminding a user of paying attention to the preset WeChat public number.
The alarm equipment searches second identity information which is the same as the first identity information from the attendee list information, and generates prompt information when the second identity information which is the same as the first identity information is not searched. Specifically, the prompt message is used for the user to pay attention to the preset WeChat public number. That is, when the second identity information unionID2 identical to the first identity information unionID1 is not found in the attendee list information based on the first identity information unionID1, it is proved that the user does not attend the preset wechat public number at this time, and the alarm device generates prompt information to prompt the user to attend to the preset wechat public number.
It should be noted that, S3042 and S3043 are arranged in parallel, instead of executing S3043 after S3042, S3042 or S3043 is selected and executed according to the different execution results of S3041, which is not limited to actual situations.
Further, in order to ensure the validity of the attendee list information, the embodiment may further include S309, it is to be noted that S309 may be executed in any step after S303, that is, after S303, as long as it is monitored that any user pays attention to or cancels the preset wechat public number, the attendee list information is updated based on the second identity information corresponding to the user and the user identification information. The specific conditions are subject to, and are not limited to. S309 specifically is as follows:
s309: and when monitoring that any user pays attention to or cancels the preset micro-information public number, updating the list information of the attention people based on the second identity information and the user identification information corresponding to the user.
The alarm device monitors the state of any user concerning the preset micro-information public number in real time, for example, the state that a new user concerning the preset micro-information public number is detected, whether the user concerning the preset micro-information public number cancels the attention is detected, and the like. When it is monitored that a new user pays attention to the preset WeChat public number, second identity information unionID2 and user identification information are generated for the user based on the preset WeChat public number, and the second identity information unionID2 is associated with the user identification information and added to the attention list information. When a certain user is monitored to cancel the attention of the preset WeChat public number, the second identity information unionID2 and the user identification information of the user are searched in the attention list information, and the searched second identity information unionID2 and the user identification information are deleted.
In the embodiment, when the alarm information sent by the security equipment is received, the target alarm information corresponding to the alarm information is generated according to the preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number. In the mode, the alarm equipment generates target alarm information based on the alarm information sent by the security equipment and a preset message template; determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; and the target alarm information is pushed to the target user through a preset wechat public number. Because the alarm of the security equipment is realized based on the preset WeChat public number, the alarm is timely, and the alarm cost is reduced.
Referring to fig. 4, fig. 4 is a schematic diagram of an alarm device based on WeChat according to an embodiment of the present invention. The device comprises units for performing the steps in the embodiments corresponding to fig. 1, 2, 3. Please refer to the related descriptions in the corresponding embodiments of fig. 1, fig. 2, and fig. 3. For convenience of explanation, only the portions related to the present embodiment are shown. Referring to fig. 4, the apparatus 4 includes:
the generating unit 410 is configured to generate target alarm information corresponding to the alarm information according to a preset message template when the alarm information sent by the security device is received;
a determining unit 420, configured to determine, based on a preset correspondence between device identification information and user identification information, target user identification information corresponding to the device identification information of the security device; the user identification information is identification information of a user concerning a preset WeChat public account;
and the pushing unit 430 is configured to push the target alarm information to a target user corresponding to the target user identification information through the preset wechat public number.
Further, the alarm information includes equipment identification information, alarm time and an alarm picture of the security equipment; the generating unit 410 is specifically configured to:
acquiring an alarm type to which the alarm information belongs;
searching an alarm file corresponding to the alarm type from the preset message template; the message template comprises a plurality of alarm files corresponding to preset alarm types;
and generating the target alarm information based on the alarm information and the alarm pattern.
Further, the alarm device further includes:
a first acquisition unit configured to acquire first identity information and the device identification information associated with each of the first identity information; the first identity information is generated for each user based on the WeChat open platform;
a second obtaining unit, configured to obtain second identity information and the user identification information associated with each piece of the second identity information; the second identity information is identity information generated for each user based on the preset WeChat public number; the first identity information and the second identity information of the same user are the same;
and the establishing unit is used for establishing an association relation between each piece of equipment identification information and each piece of user identification information based on the first identity information, the equipment identification information, the second identity information and the user identification information.
Further, the alarm device further includes:
the detection unit is used for generating the second identity information and the user identification information for the user based on the preset WeChat public number when detecting that any user pays attention to the preset WeChat public number;
the association unit is used for associating the second identity information corresponding to the same user with the user identification information and generating the list information of the concerned persons based on each group of the associated second identity information and the associated user identification information; the attendee list information is used for searching the second identity information and the user identification information of each user;
further, the alarm device further includes:
and the updating unit is used for updating the list information of the concerned persons based on the second identity information and the user identification information corresponding to the user when monitoring that any user pays attention to or cancels the preset micro-information public account.
Further, the second obtaining unit is specifically configured to:
searching the second identity information which is the same as the first identity information from the attendee list information;
when the second identity information identical to the first identity information is found, searching the user identification information associated with the second identity information from the attendee list information;
when the second identity information identical to the first identity information is not found, generating prompt information; the prompt message is used for reminding a user of paying attention to the preset WeChat public number.
Further, the alarm device further includes:
and the monitoring unit is used for not pushing any alarm information to the target user any more when the target user is monitored to cancel the attention to the preset WeChat public number.
Referring to fig. 5, fig. 5 is a schematic diagram of an alarm method and an alarm device based on WeChat according to another embodiment of the present invention. As shown in fig. 5, the apparatus 5 of this embodiment includes: a processor 50, a memory 51 and a computer program 52 stored in said memory 51 and executable on said processor 50. The processor 50, when executing the computer program 52, implements the steps in the above-described WeChat-based alert method embodiment, such as S101-S103 shown in FIG. 1. Alternatively, the processor 50, when executing the computer program 52, implements the functions of the units in the device embodiments, such as the functions of the units 410 to 430 shown in fig. 4.
Illustratively, the computer program 52 may be divided into one or more units, which are stored in the memory 51 and executed by the processor 50 to accomplish the present invention. The one or more units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 52 in the device 5. For example, the computer program 52 may be divided into a unit generation unit, a determination unit, and a push unit, each unit functioning specifically as described above.
The apparatus includes, but is not limited to, a processor 50, a memory 51. Those skilled in the art will appreciate that fig. 5 is merely an example of a device 5 and does not constitute a limitation of device 5 and may include more or fewer components than shown, or some components in combination, or different components, e.g., the device may also include input output devices, network access devices, buses, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may be an internal storage unit of the device 5, such as a hard disk or a memory of the device 5. The memory 51 may also be an external storage device of the device 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the device 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the device 5. The memory 51 is used for storing the computer program and other programs and data required by the device. The memory 51 may also be used to temporarily store data that has been output or is to be output.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
Claims (10)
1. An alarm method based on WeChat, which is characterized by comprising the following steps:
when alarm information sent by security equipment is received, target alarm information corresponding to the alarm information is generated according to a preset message template;
determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relationship between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account;
and pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
2. The alarm method of claim 1, wherein the alarm information includes device identification information, alarm time, and an alarm picture of the security device; when alarm information sent by security equipment is received, generating target alarm information corresponding to the alarm information according to a preset message template comprises the following steps:
acquiring an alarm type to which the alarm information belongs;
searching an alarm file corresponding to the alarm type from the preset message template; the message template comprises a plurality of alarm files corresponding to preset alarm types;
and generating the target alarm information based on the alarm information and the alarm pattern.
3. The alarm method according to claim 1, wherein before generating target alarm information corresponding to the alarm information according to a preset message template when the alarm information sent by the security device is received, the method further comprises:
acquiring first identity information and the equipment identification information associated with each first identity information; the first identity information is generated for each user based on the WeChat open platform;
acquiring second identity information and the user identification information associated with each second identity information; the second identity information is identity information generated for each user based on the preset WeChat public number; the first identity information and the second identity information of the same user are the same;
and establishing an association relation between each piece of equipment identification information and each piece of user identification information based on the first identity information, the equipment identification information, the second identity information and the user identification information.
4. The alert method as recited in claim 3, wherein said obtaining second identity information and said user identification information associated with each of said second identity information is preceded by:
when any user is detected to pay attention to the preset WeChat public number, generating second identity information and user identification information for the user based on the preset WeChat public number;
associating the second identity information corresponding to the same user with the user identification information, and generating attendee list information based on each group of associated second identity information and user identification information; the attendee list information is used to search the second identity information and the user identification information of each user.
5. The alarm method according to claim 4, wherein after associating the second identity information corresponding to the same user with the user identification information and generating the attendee list information based on each set of the associated second identity information and the user identification information, further comprising:
and when monitoring that any user pays attention to or cancels the preset micro-information public number, updating the list information of the attention people based on the second identity information and the user identification information corresponding to the user.
6. The alert method of claim 4, wherein said obtaining second identity information, and said user identification information associated with each said second identity information comprises:
searching the second identity information which is the same as the first identity information from the attendee list information;
when the second identity information identical to the first identity information is found, searching the user identification information associated with the second identity information from the attendee list information;
when the second identity information identical to the first identity information is not found, generating prompt information; the prompt message is used for reminding a user of paying attention to the preset WeChat public number.
7. The alarm method according to claim 1, wherein after the target alarm information is pushed to the target user corresponding to the target user identification information through the preset wechat public number, the method further comprises:
and when the target user is monitored to cancel the attention of the preset WeChat public number, no alarm information is pushed to the target user.
8. A WeChat-based alert device, comprising:
the generating unit is used for generating target alarm information corresponding to the alarm information according to a preset message template when the alarm information sent by the security equipment is received;
the determining unit is used for determining target user identification information corresponding to the equipment identification information of the security equipment based on a preset corresponding relation between the equipment identification information and the user identification information; the user identification information is identification information of a user concerning a preset WeChat public account;
and the pushing unit is used for pushing the target alarm information to a target user corresponding to the target user identification information through the preset WeChat public number.
9. An alarm device comprising a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, wherein the processor when executing the computer readable instructions implements the method of any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911104885.9A CN110807885A (en) | 2019-11-13 | 2019-11-13 | Alarm method and alarm device based on WeChat |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911104885.9A CN110807885A (en) | 2019-11-13 | 2019-11-13 | Alarm method and alarm device based on WeChat |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110807885A true CN110807885A (en) | 2020-02-18 |
Family
ID=69502288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911104885.9A Pending CN110807885A (en) | 2019-11-13 | 2019-11-13 | Alarm method and alarm device based on WeChat |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110807885A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979258A (en) * | 2022-05-24 | 2022-08-30 | 厦门熵基科技有限公司 | Method and system for pushing security system message to chat software |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090265763A1 (en) * | 2005-04-01 | 2009-10-22 | Rockliffe Systems | Content-Based Notification and User-Transparent Pull Operation for Simulated Push Transmission of Wireless Email |
CN107124356A (en) * | 2017-06-26 | 2017-09-01 | 山东大学 | A kind of sensitive equipment encryption early warning system realized based on wechat platform and its application |
CN207115719U (en) * | 2017-08-24 | 2018-03-16 | 山东众安安防服务有限公司 | A kind of security alarm information transmission system |
CN107995023A (en) * | 2017-10-31 | 2018-05-04 | 平安科技(深圳)有限公司 | Electronic device, wechat alarm method and computer-readable recording medium |
CN108777656A (en) * | 2018-05-30 | 2018-11-09 | 湖南鑫蜀山网络科技有限公司 | A kind of electronic equipment being managed collectively wechat public platform user |
CN110019260A (en) * | 2017-09-27 | 2019-07-16 | 北京国双科技有限公司 | A kind of update method and relevant device of user data |
-
2019
- 2019-11-13 CN CN201911104885.9A patent/CN110807885A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090265763A1 (en) * | 2005-04-01 | 2009-10-22 | Rockliffe Systems | Content-Based Notification and User-Transparent Pull Operation for Simulated Push Transmission of Wireless Email |
CN107124356A (en) * | 2017-06-26 | 2017-09-01 | 山东大学 | A kind of sensitive equipment encryption early warning system realized based on wechat platform and its application |
CN207115719U (en) * | 2017-08-24 | 2018-03-16 | 山东众安安防服务有限公司 | A kind of security alarm information transmission system |
CN110019260A (en) * | 2017-09-27 | 2019-07-16 | 北京国双科技有限公司 | A kind of update method and relevant device of user data |
CN107995023A (en) * | 2017-10-31 | 2018-05-04 | 平安科技(深圳)有限公司 | Electronic device, wechat alarm method and computer-readable recording medium |
CN108777656A (en) * | 2018-05-30 | 2018-11-09 | 湖南鑫蜀山网络科技有限公司 | A kind of electronic equipment being managed collectively wechat public platform user |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979258A (en) * | 2022-05-24 | 2022-08-30 | 厦门熵基科技有限公司 | Method and system for pushing security system message to chat software |
CN114979258B (en) * | 2022-05-24 | 2023-08-29 | 厦门熵基科技有限公司 | Method and system for pushing security system message to chat software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815697B (en) | Method and device for processing false alarm behavior | |
CN110324416B (en) | Download path tracking method, device, server, terminal and medium | |
CN109684863B (en) | Data leakage prevention method, device, equipment and storage medium | |
US10108474B2 (en) | Trace capture of successfully completed transactions for trace debugging of failed transactions | |
CN109284331B (en) | Certificate making information acquisition method based on service data resources, terminal equipment and medium | |
CN110309669A (en) | A kind of data mask method, device and equipment | |
CN114925337A (en) | Data labeling method and device and electronic equipment | |
CN114663089A (en) | Data processing method and device, electronic equipment and storage medium | |
CN118072427A (en) | Access card verification method, system and device | |
CN112464176B (en) | Authority management method and device, electronic equipment and storage medium | |
CN110807885A (en) | Alarm method and alarm device based on WeChat | |
JP6989592B2 (en) | Computer system for generating authentication data | |
CN112054934B (en) | Protocol detection method and device and electronic equipment | |
JP7100607B2 (en) | Anomaly detection system and anomaly detection method | |
CN109509103B (en) | Detection method and related equipment for illegal medical institutions based on data analysis | |
CN111901299A (en) | Application authentication method and device, electronic equipment and storage medium | |
US8095980B2 (en) | Detecting malicious behavior in data transmission of a de-duplication system | |
CN114024867B (en) | Network anomaly detection method and device | |
CN114186278A (en) | Database abnormal operation identification method and device and electronic equipment | |
CN114428955A (en) | Method and system for judging abnormal risk based on operation information and electronic equipment | |
US11295031B2 (en) | Event log tamper resistance | |
CN110362464B (en) | Software analysis method and equipment | |
CN109559090B (en) | Medical project wind control method, device, server and medium based on data analysis | |
CN112035888A (en) | File path determining method, device and medium based on webpage tamper-proof system | |
JP2017045106A (en) | Information processing device and information processing program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200218 |
|
RJ01 | Rejection of invention patent application after publication |