CN111125768A - Information processing method, information processing apparatus, electronic device, and medium - Google Patents
Information processing method, information processing apparatus, electronic device, and medium Download PDFInfo
- Publication number
- CN111125768A CN111125768A CN201911371877.0A CN201911371877A CN111125768A CN 111125768 A CN111125768 A CN 111125768A CN 201911371877 A CN201911371877 A CN 201911371877A CN 111125768 A CN111125768 A CN 111125768A
- Authority
- CN
- China
- Prior art keywords
- target user
- information
- state
- privacy information
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- Automation & Control Theory (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present disclosure provides an information processing method, including: acquiring the current state of a target user; determining whether the current state is a preset state; and in response to the fact that the current state is the preset state, opening a first permission for first privacy information of the target user, wherein the first permission is used as the permission for obtaining the first privacy information, and the first privacy information is used as a basis for providing a first specific service for the target user in the preset state. The present disclosure also provides an information processing apparatus, an electronic device, and a computer-readable storage medium.
Description
Technical Field
The present disclosure relates to an information processing method, an information processing apparatus, an electronic device, and a computer-readable storage medium.
Background
At present, a large amount of monitoring equipment is used for collecting user information in city construction, crimes can be prevented by collecting the user information, and emergencies and the like can be dealt with. For example, if a user is found to be dangerous by collecting information of the user, protective measures can be taken in time. However, when collecting the user information to ensure the personal and public security of the user, certain invasion can be caused to the privacy of the user.
Disclosure of Invention
One aspect of the present disclosure provides an information processing method, including: the method comprises the steps of obtaining a current state of a target user, determining whether the current state is a preset state or not, and opening a first permission for first privacy information of the target user in response to the fact that the current state is the preset state, wherein the first permission is used as the permission for obtaining the first privacy information, and the first privacy information is used as a basis for providing a first specific service for the target user in the preset state.
Optionally, the current state includes at least one of: the authorization state of the target user, the behavior state of the target user and the demand state of the target user.
Optionally, the determining whether the current state is the preset state includes at least one of the following: determining that the current state is a preset state based on the authorization state being an authorized state, wherein the authorized state comprises that the target user allows to obtain first privacy information of the target user, determining that the current state is the preset state in response to the behavior state representing that the target user has an emergency, and determining that the current state is the preset state in response to the demand state representing that the target user needs to execute a payment function.
Optionally, the method further includes: providing a first specific service for the target user based on the first private information. Wherein the providing of the first specific service for the target user based on the first privacy information comprises at least one of: monitoring whether the target user has an emergency situation or not based on first privacy information of the target user, wherein the first privacy information comprises biological characteristics of the target user, providing relevant support for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises contact information of other users associated with the target user, and providing a payment function for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises payment account information of the target user.
Optionally, the opening of the first right for the first privacy information of the target user includes at least one of: and allowing a collection device to collect the biological characteristics of the target user, and allowing a related device to acquire the stored contact information and the payment account information from a database.
Optionally, the method further includes: determining whether the authorization status of the target user is an authorized status, the determining whether the authorization status of the target user is an authorized status comprising: acquiring the posture information of the target user, acquiring the face information of the target user under the condition that the posture information represents that the similarity between the target user and a registered user meets the preset similarity, wherein the authorization state of the registered user is the authorized state, and determining whether the target user is the registered user or not based on the face information.
Optionally, the method further includes: when the target user is an unregistered user, determining that the target user needs a second specific service, and opening a second permission for second private information of the target user, wherein the second permission is used as a permission for acquiring the second private information, and the second private information is used as a basis for providing the second specific service for the target user, and the privacy level of the second private information is lower than that of the first private information.
Another aspect of the present disclosure provides an information processing apparatus including: the device comprises an acquisition module, a first determination module and a first opening module. The acquisition module acquires the current state of the target user. The first determining module is used for determining whether the current state is a preset state or not. And the first starting module is used for starting a first authority for first privacy information of the target user in response to the fact that the current state is determined to be the preset state, wherein the first authority is used as an authority for acquiring the first privacy information, and the first privacy information is used as a basis for providing a first specific service for the target user in the preset state.
Optionally, the current state includes at least one of: the authorization state of the target user, the behavior state of the target user and the demand state of the target user.
Optionally, the determining whether the current state is the preset state includes at least one of the following: determining that the current state is a preset state based on the authorization state being an authorized state, wherein the authorized state comprises that the target user allows to obtain first privacy information of the target user, determining that the current state is the preset state in response to the behavior state representing that the target user has an emergency, and determining that the current state is the preset state in response to the demand state representing that the target user needs to execute a payment function.
Optionally, the apparatus further comprises: and the providing module is used for providing a first specific service for the target user based on the first private information. Wherein the providing of the first specific service for the target user based on the first privacy information comprises at least one of: monitoring whether the target user has an emergency situation or not based on first privacy information of the target user, wherein the first privacy information comprises biological characteristics of the target user, providing relevant support for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises contact information of other users associated with the target user, and providing a payment function for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises payment account information of the target user.
Optionally, the opening of the first right for the first privacy information of the target user includes at least one of: and allowing a collection device to collect the biological characteristics of the target user, and allowing a related device to acquire the stored contact information and the payment account information from a database.
Optionally, the apparatus further comprises: a second determining module, configured to determine whether the authorization status of the target user is an authorized status, where the determining whether the authorization status of the target user is an authorized status includes: acquiring the posture information of the target user, acquiring the face information of the target user under the condition that the posture information represents that the similarity between the target user and a registered user meets the preset similarity, wherein the authorization state of the registered user is the authorized state, and determining whether the target user is the registered user or not based on the face information.
Optionally, the apparatus further comprises: a third determining module and a second opening module. And the third determining module is used for determining that the target user needs a second specific service when the target user is an unregistered user. And the second starting module is used for starting a second permission for second private information of the target user, wherein the second permission is used as the permission for acquiring the second private information, the second private information is used as a basis for providing the second specific service for the target user, and the privacy level of the second private information is lower than that of the first private information.
Another aspect of the present disclosure provides an electronic device including: one or more processors; and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the disclosure provides a non-transitory readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows an application scenario of an information processing method according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow chart of an information processing method according to an embodiment of the present disclosure;
FIG. 3 schematically shows a flow chart of an information processing method according to another embodiment of the present disclosure;
FIG. 4 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure;
fig. 5 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure;
fig. 6 schematically shows a block diagram of an information processing apparatus according to another embodiment of the present disclosure; and
FIG. 7 schematically shows a block diagram of a computer system for implementing information processing in accordance with an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable control apparatus to produce a machine, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable medium having instructions stored thereon for use by or in connection with an instruction execution system. In the context of this disclosure, a computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the instructions. For example, the computer readable medium can include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the computer readable medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and/or wired/wireless communication links.
An embodiment of the present disclosure provides an information processing method, including: the current state of the target user is obtained, then, whether the current state is the preset state or not can be determined, and in response to the fact that the current state is the preset state, a first permission is opened for first privacy information of the target user. The first authority is used as the authority for acquiring the first privacy information, and the first privacy information is used as a basis for providing the first specific service for the target user in the preset state.
Fig. 1 schematically shows an application scenario of an information processing method according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the application scenario 100 includes, for example, an electronic device 110, an acquisition device 120, and a target user 130.
According to an embodiment of the present disclosure, the electronic device 110 may be, for example, a server, and the electronic device 110 stores, for example, privacy information of the target user 130. By acquiring the current state of the target user 130 through the acquisition device 120, the acquisition device 120 may transmit the acquired current state to the electronic device 110. The electronic device 110 may open the right to access the private information of the target user 130 by determining whether the current state of the target user 130 satisfies the preset state, and if it is determined that the current state of the target user 130 satisfies the preset state.
To facilitate understanding of the technical solutions of the embodiments of the present disclosure, a case is exemplified. For example, the capturing device 120 captures an image of the target user 130 in real time and transmits the captured image to the electronic device 110. When the electronic device 110 determines that the target user 130 has an emergency event, such as a sudden fall or a traffic accident, from the image, the electronic device 110 may turn on the right to access the private information of the target user 130. The privacy information includes, for example, emergency contact information of the target user 130, so as to timely notify the emergency contact of the target user 130.
An information processing method according to an exemplary embodiment of the present disclosure is described below with reference to fig. 2 to 3 in conjunction with an application scenario of fig. 1. It should be noted that the above application scenarios are merely illustrated for the convenience of understanding the spirit and principles of the present disclosure, and the embodiments of the present disclosure are not limited in this respect. Rather, embodiments of the present disclosure may be applied to any scenario where applicable.
Fig. 2 schematically shows a flow chart of an information processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S230, for example.
In operation S210, a current state of a target user is acquired.
According to the embodiment of the present disclosure, the current state includes, for example, an authorization state of the target user, a behavior state of the target user, a demand state of the target user, and the like.
The authorized state includes, for example, an authorized state and an unauthorized state, and the authorized state includes, for example, first privacy information that the target user allows to obtain the target user. The behavior state is used for example to characterize whether an emergency situation occurs for the target user. The demand state may be used, for example, to characterize whether the target user needs to perform a payment function.
In operation S220, it is determined whether the current state is a preset state.
In one case, if the authorization status is an authorized status, and the current status is determined to be a preset status, the first privacy information of the target user is allowed to be acquired.
Specifically, it may be determined whether the authorization status of the target user is an authorized status, for example. Wherein whether the authorization status is an authorized status may be determined by determining whether the target user is a registered user. If the target user is a registered user, the authorization status of the target user can be represented as an authorized status.
For example, a monitoring system is installed in public to collect information of a user in real time. The monitoring system may comprise, for example, an electronic device (server) and a collection device. Each user can register in the monitoring system, for example, perform face registration, gait registration, and the like, and enter personal information. The personal information may include, for example, the user's name, age, emergency contact information, and so forth.
According to the embodiment of the present disclosure, if the target user is already registered in the monitoring system, it may indicate that the target user allows the monitoring system to collect privacy information such as a facial image thereof in real time so as to monitor the target user in real time. Among them, the face image of the target user, the name, age, emergency contact information, etc. of the target user stored in the monitoring system may be used as the first privacy information of the embodiment of the present disclosure.
Before allowing the monitoring system to acquire first privacy information such as a face image thereof in real time, it is first necessary to determine whether the target user is a registered user. The monitoring system is allowed to acquire first privacy information such as a face image thereof in real time only in the case where the target user is a registered user. Therefore, the information on which it is determined whether the target user is a registered user is, for example, related information of the target user, for example, posture information, which may be, for example, a gait (posture at walking) of the target user. Wherein the privacy level of the related information is for example lower than the privacy level of the first private information.
According to an embodiment of the present disclosure, determining whether the target user is a registered user may include, for example: by acquiring the posture information of the target user, under the condition that the posture information represents that the similarity between the target user and the registered user meets the preset similarity, the face information of the target user is acquired, and whether the target user is the registered user is determined based on the face information. Wherein, the authorization state of the registered user is an authorized state.
In other words, the monitoring system stores information of a plurality of registered users. In order to determine whether the target user is a registered user, the posture information of the target user is collected and compared with the posture information of a plurality of registered users stored in the monitoring system. If the pose of the target user is similar to the pose of the registered user, the target user may be determined to be a registered user. It can be understood that the first privacy information of the target user is not violated in the process of collecting the posture information of the target user to judge whether the target user is a registered user. And when the target user is judged to be the registered user, allowing the first privacy information of the target user to be collected so as to adopt a specific protection mode aiming at the target user for the target user based on the first privacy information. For example, it is allowed to acquire a facial image of a target user, determine whether the target is unexpected based on the facial image, acquire an emergency contact stored in the monitoring system by the target user if the target is unexpected, and notify the emergency contact.
In another case, the behavior state of the target user may be directly collected without determining in advance whether the target user is a registered user. And if the behavior state represents that the target user has an emergency, determining that the current state is a preset state. For example, if the behavior state of the target user represents that the target user is unexpected, an emergency contact of the target user may be acquired and timely notified.
In another case, if the demand state indicates that the target user needs to perform the payment function, the current state is determined to be the preset state. For example, it may be determined whether the target user needs to perform the payment function based on the current environment in which the target user is located. For example, if the target user performs a face brushing operation in a mall or supermarket, it is determined that the target user needs to perform a payment function. If the target user executes the face brushing operation in the residential district, the fact that the target user needs to open the entrance guard through face brushing is represented, and at the moment, it is determined that the target user does not need to execute a payment function.
In operation S230, in response to determining that the current state is the preset state, a first permission is opened for first privacy information of the target user. The first authority is used as the authority for acquiring the first privacy information, and the first privacy information is used as a basis for providing the first specific service for the target user in the preset state. Wherein, the specific process of providing the first specific service for the target user is as described in fig. 3.
For example, turning on the first privilege comprises allowing the capture device to capture a biometric of the target user. That is, when the current state of the target user is the authorized state, it indicates that the target user is a registered user. At this point, the monitoring system may be allowed to capture the biometric of the target user. The biometric features may be, for example, facial images, voice information, fingerprint information, and the like. The biometric feature may be, for example, first private information of the target user.
Alternatively, opening the first right may further include allowing the associated device to retrieve stored contact information from a database. For example, when the behavior state of the target user represents that the target user has an emergency, the emergency contact information of the target user can be acquired, so that the emergency contact of the target user can be notified in time.
Alternatively, opening the first privilege may further include allowing the associated device to retrieve the stored payment account information from a database. For example, when the demand state of the target user indicates that the target user needs to perform the payment function, the payment account information of the target user, such as a bank card number, may be obtained so as to perform the payment function based on the payment account information.
The embodiment of the disclosure determines whether to open the permission for acquiring the privacy information according to the current state of the user, thereby realizing the purpose of providing different services for different users. That is, if the user does not need a specific service, the user's privacy information may not be acquired, and the user's privacy information is protected from being leaked as much as possible. Namely, the embodiment of the disclosure determines whether to open the permission for acquiring the user privacy information according to the service required by the user, thereby providing convenience for the user and ensuring the privacy security of the user to a greater extent.
Fig. 3 schematically shows a flow chart of an information processing method according to another embodiment of the present disclosure.
As shown in fig. 3, the method includes operations S210 to S230 and operation S310, for example. Operations S210 to S230 are the same as or similar to the operations described above with reference to fig. 2, and are not described again here.
In operation S310, a first specific service is provided for a target user based on first privacy information.
In one case, if the target user is a registered user, providing the first specific service to the target user may include monitoring whether the target user has an emergency based on first privacy information of the target user, the first privacy information including a biometric characteristic of the target user. That is, if the target user is a registered user, a specific protection mode may be activated for the target user, and the behavior and activity of the target user may be monitored in real time, for example, a facial image, a voice message, and the like of the target user may be collected in real time, so as to determine whether the target user is in an emergency.
In another case, if the behavior state of the target user indicates that the target user is in an emergency, the target user may be provided with relevant support based on the first privacy information of the target user. The first privacy information comprises contact information of other users related to the target user, for example, emergency contact information of the target user is obtained, and timely notification of the emergency contact is facilitated.
In another case, if the demand state of the target user indicates that the target user needs to perform the payment function, the payment function may be provided for the target user based on the first privacy information of the target user. The first privacy information includes, for example, payment account information of the target user. The payment account information may be, for example, a bank card number, facilitating the execution of payment functions based on the payment account information.
According to the embodiment of the present disclosure, if the target user is an unregistered user, it is determined that the target user needs the second specific service. Wherein the second specific service is less targeted than the first specific service. That is, if the target user is an unregistered user, a less targeted service may be provided for the target user, and providing the less targeted service may not require relying on the first privacy information of the target user, for example. The less-targeted service may include, for example, general rescue, etc., without acquiring a facial image of the target user or acquiring first privacy information such as an emergency contact of the target user.
Specifically, for example, the second right may be opened for second private information of the target user. The second authority is used as the authority for obtaining the second private information, the second private information is used as a basis for providing a second specific service for the target user, and the privacy level of the second private information is lower than that of the first private information. The second privacy information may be, for example, a geographical location where the target user is located, an accident of the target user, or the like. That is, if the target user is an unregistered user, the specific protection mode is not turned on for the target user, but only the general protection mode is turned on, for example, only the geographical location of the user is acquired, whether or not to transmit the second private information such as an accident, and the like, so that the provision of the second specific service with lower pertinence based on the second private information is facilitated.
Fig. 4 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
As shown in fig. 4, an electronic device 400 of an embodiment of the disclosure includes, for example, a memory 410 and a processor 420.
According to an embodiment of the present disclosure, the memory 410 is, for example, configured to store one or more programs, where the one or more programs, when executed by the processor 420, cause the processor 420 to implement obtaining a current state of a target user, determining whether the current state is a preset state, and in response to determining that the current state is the preset state, opening a first right for first private information of the target user, where the first right is a right to obtain the first private information, and the first private information is a basis for providing a first specific service for the target user in the preset state.
According to an embodiment of the present disclosure, the current state includes at least one of: the authorization state of the target user, the behavior state of the target user and the demand state of the target user.
According to an embodiment of the present disclosure, determining whether the current state is the preset state includes at least one of: the method comprises the steps of determining that the current state is a preset state based on the fact that the authorization state is the authorized state, wherein the authorized state comprises first privacy information of a target user, the target user is allowed to obtain, responding to an emergency situation of a behavior state representation target user, determining that the current state is the preset state, responding to a demand state representation target user needing to execute a payment function, and determining that the current state is the preset state.
According to an embodiment of the present disclosure, the processor 420 is further configured to perform: providing a first specific service for a target user based on first privacy information; wherein providing the first specific service for the target user based on the first privacy information comprises at least one of: monitoring whether the target user has an emergency or not based on first privacy information of the target user, wherein the first privacy information comprises biological characteristics of the target user, providing relevant support for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises contact information of other users associated with the target user, and providing a payment function for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises payment account information of the target user.
According to the embodiment of the disclosure, the opening of the first permission for the first privacy information of the target user comprises at least one of the following: the collection device is allowed to collect the target user's biometric features, and the associated device is allowed to retrieve the stored contact information and payment account information from the database.
According to an embodiment of the present disclosure, the processor 420 is further configured to perform: determining whether the authorization status of the target user is an authorized status, the determining whether the authorization status of the target user is an authorized status comprising: the method comprises the steps of obtaining posture information of a target user, obtaining face information of the target user under the condition that the posture information represents that the similarity between the target user and a registered user meets a preset similarity, wherein the authorization state of the registered user is the authorized state, and determining whether the target user is the registered user or not based on the face information.
According to an embodiment of the present disclosure, the processor 420 is further configured to perform: and when the target user is an unregistered user, determining that the target user needs a second specific service, and opening a second permission for second private information of the target user, wherein the second permission is used as a permission for acquiring the second private information, and the second private information is used as a basis for providing the second specific service for the target user, and the privacy level of the second private information is lower than that of the first private information.
Fig. 5 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, the information processing apparatus 500 includes, for example, an acquisition module 510, a first determination module 520, and a first opening module 530.
The obtaining module 510 may be used to obtain the current status of the target user. According to the embodiment of the present disclosure, the obtaining module 510 may perform, for example, the operation S210 described above with reference to fig. 2, which is not described herein again.
The first determination module 520 may be used to determine whether the current state is a preset state. According to the embodiment of the present disclosure, the first determining module 520 may perform, for example, operation S220 described above with reference to fig. 2, which is not described herein again.
The first enabling module 530 may be configured to enable a first permission for first private information of the target user in response to determining that the current state is the preset state, where the first permission serves as a permission for obtaining the first private information, and the first private information serves as a basis for providing a first specific service for the target user in the preset state. According to the embodiment of the present disclosure, the first starting module 530 may, for example, perform the operation S230 described above with reference to fig. 2, which is not described herein again.
According to an embodiment of the present disclosure, the current state includes at least one of: the authorization state of the target user, the behavior state of the target user and the demand state of the target user.
According to an embodiment of the present disclosure, determining whether the current state is the preset state includes at least one of: the method comprises the steps of determining that the current state is a preset state based on the fact that the authorization state is the authorized state, wherein the authorized state comprises first privacy information of a target user, the target user is allowed to obtain, responding to an emergency situation of a behavior state representation target user, determining that the current state is the preset state, responding to a demand state representation target user needing to execute a payment function, and determining that the current state is the preset state.
Fig. 6 schematically shows a block diagram of an information processing apparatus according to another embodiment of the present disclosure.
As shown in fig. 6, the information processing apparatus 600 includes, for example, an acquisition module 510, a first determination module 520, a first opening module 530, and a providing module 610. The obtaining module 510, the first determining module 520, and the first opening module 530 are, for example, the same as or similar to the modules described in fig. 5, and are not repeated herein.
The providing module 610 may be configured to provide a first specific service to the target user based on the first private information. According to the embodiment of the present disclosure, the providing module 610 may perform, for example, the operation S310 described above with reference to fig. 3, which is not described herein again.
According to the embodiment of the disclosure, providing the first specific service for the target user based on the first privacy information comprises at least one of the following: monitoring whether the target user has an emergency or not based on first privacy information of the target user, wherein the first privacy information comprises biological characteristics of the target user, providing relevant support for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises contact information of other users associated with the target user, and providing a payment function for the target user in response to the first privacy information of the target user, wherein the first privacy information comprises payment account information of the target user.
According to the embodiment of the disclosure, the opening of the first permission for the first privacy information of the target user comprises at least one of the following: the collection device is allowed to collect the target user's biometric features, and the associated device is allowed to retrieve the stored contact information and payment account information from the database.
According to an embodiment of the present disclosure, the apparatus 500 or 600, for example, further comprises: the second determination module determines whether the authorization status of the target user is authorized, and the determining whether the authorization status of the target user is authorized includes: the method comprises the steps of obtaining posture information of a target user, obtaining face information of the target user under the condition that the posture information represents that the similarity between the target user and a registered user meets a preset similarity, wherein the authorization state of the registered user is the authorized state, and determining whether the target user is the registered user or not based on the face information.
According to an embodiment of the present disclosure, the apparatus 500 or 600, for example, further comprises: a third determining module and a second opening module. And the third determining module is used for determining that the target user needs the second specific service when the target user is an unregistered user. And the second starting module is used for starting a second permission for second private information of the target user, wherein the second permission is used as the permission for acquiring the second private information, the second private information is used as a basis for providing a second specific service for the target user, and the privacy level of the second private information is lower than that of the first private information.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the obtaining module 510, the first determining module 520, the first opening module 530, and the providing module 610 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the obtaining module 510, the first determining module 520, the first opening module 530, and the providing module 610 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by any other reasonable manner of integrating or packaging a circuit, such as hardware or firmware, or in any one of three implementations, or in any suitable combination of any of the three. Alternatively, at least one of the obtaining module 510, the first determining module 520, the first opening module 530, and the providing module 610 may be at least partially implemented as a computer program module that, when executed, may perform a corresponding function.
FIG. 7 schematically shows a block diagram of a computer system for implementing information processing in accordance with an embodiment of the present disclosure. The computer system illustrated in FIG. 7 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 7, a computer system 700 implementing information processing includes a processor 701, a computer-readable storage medium 702. The system 700 may perform a method according to an embodiment of the present disclosure.
In particular, the processor 701 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 701 may also include on-board memory for caching purposes. The processor 701 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage medium 702 may be, for example, any medium that can contain, store, communicate, propagate, or transport the instructions. For example, a readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the readable storage medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and/or wired/wireless communication links.
The computer-readable storage medium 702 may comprise a computer program 703, which computer program 703 may comprise code/computer-executable instructions that, when executed by the processor 701, cause the processor 701 to perform a method according to an embodiment of the disclosure, or any variant thereof.
The computer program 703 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 703 may include one or more program modules, including for example 703A, modules 703B, … …. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 701 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 701.
According to an embodiment of the present disclosure, at least one of the obtaining module 510, the first determining module 520, the first opening module 530, and the providing module 610 may be implemented as a computer program module described with reference to fig. 7, which, when executed by the processor 701, may implement the respective operations described above.
The present disclosure also provides a computer-readable medium, which may be embodied in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The above-mentioned computer-readable medium carries one or more programs which, when executed, implement the above-mentioned information processing method.
According to embodiments of the present disclosure, a computer readable medium may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, optical fiber cable, radio frequency signals, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.
Claims (10)
1. An information processing method comprising:
acquiring the current state of a target user;
determining whether the current state is a preset state; and
in response to determining that the current state is the preset state, opening a first permission for first private information of the target user,
the first authority is used as the authority for acquiring the first privacy information, and the first privacy information is used as a basis for providing a first specific service for the target user in the preset state.
2. The method of claim 1, wherein the current state comprises at least one of:
an authorization status of the target user;
a behavioral state of the target user; and
a demand status of the target user.
3. The method of claim 2, wherein the determining whether the current state is a preset state comprises at least one of:
determining that the current state is a preset state based on the authorization state being an authorized state, wherein the authorized state comprises that the target user allows to acquire first privacy information of the target user;
responding to the behavior state representation that the target user has an emergency, and determining that the current state is a preset state; and
and responding to the requirement state representing that the target user needs to execute a payment function, and determining that the current state is a preset state.
4. The method of any of claims 1-3, further comprising: providing a first specific service for the target user based on the first privacy information; wherein the providing of the first specific service for the target user based on the first privacy information comprises at least one of:
monitoring whether the target user has an emergency situation or not based on first privacy information of the target user, wherein the first privacy information comprises biological characteristics of the target user;
providing relevant support for the target user in response to first privacy information of the target user, wherein the first privacy information comprises contact information of other users associated with the target user; and
providing a payment function for the target user in response to first privacy information of the target user, wherein the first privacy information comprises payment account information of the target user.
5. The method of claim 4, wherein the opening of the first permission for the first private information of the target user comprises at least one of:
allowing a collection device to collect a biometric of the target user; and
and allowing the related equipment to acquire the stored contact information and the payment account information from a database.
6. The method of claim 1, further comprising: determining whether the authorization status of the target user is an authorized status,
the determining whether the authorization status of the target user is an authorized status comprises:
acquiring attitude information of the target user;
under the condition that the posture information represents that the 6 degrees of the target user and a registered user meet the preset similarity, acquiring the face information of the target user, wherein the authorization state of the registered user is an authorized state; and
determining whether the target user is a registered user based on the facial information.
7. The method of claim 6, further comprising:
when the target user is an unregistered user, determining that the target user needs a second specific service; and
opening a second authority for second private information of the target user, wherein the second authority is used as an authority for acquiring the second private information which is used as a basis for providing the second specific service for the target user,
wherein the privacy level of the second privacy information is lower than the privacy level of the first privacy information.
8. An information processing apparatus comprising:
the acquisition module acquires the current state of a target user;
the first determining module is used for determining whether the current state is a preset state or not; and
a first opening module, responsive to determining that the current state is the preset state, for opening a first permission for first privacy information of the target user,
the first authority is used as the authority for acquiring the first privacy information, and the first privacy information is used as a basis for providing a first specific service for the target user in the preset state.
9. An electronic device, comprising:
one or more processors; and
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7.
10. A computer-readable storage medium storing computer-executable instructions for implementing the method of any one of claims 1 to 7 when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911371877.0A CN111125768B (en) | 2019-12-26 | 2019-12-26 | Information processing method, device, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911371877.0A CN111125768B (en) | 2019-12-26 | 2019-12-26 | Information processing method, device, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111125768A true CN111125768A (en) | 2020-05-08 |
CN111125768B CN111125768B (en) | 2023-05-02 |
Family
ID=70503735
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911371877.0A Active CN111125768B (en) | 2019-12-26 | 2019-12-26 | Information processing method, device, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111125768B (en) |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080114213A1 (en) * | 2006-10-18 | 2008-05-15 | Bagan Kenneth J | Biometric Network Exchange System |
CN103577750A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Privacy authority management method and device |
US20150245189A1 (en) * | 2012-10-19 | 2015-08-27 | Srikanth Nalluri | Personal safety and emergency services |
CN204695502U (en) * | 2015-05-08 | 2015-10-07 | 重庆软汇科技股份有限公司 | A kind of fall alarm |
WO2016057347A1 (en) * | 2014-10-10 | 2016-04-14 | Pcms Holdings, Inc. | Systems and methods for protecting user privacy in networked data collection |
CN105930765A (en) * | 2016-02-29 | 2016-09-07 | 中国银联股份有限公司 | Payment method and device |
CN106096425A (en) * | 2016-06-06 | 2016-11-09 | 北京金山安全软件有限公司 | System permission starting method, device and equipment |
CN106650485A (en) * | 2016-09-18 | 2017-05-10 | 山东大学 | Personalized environmental perception privacy protection method based on Android |
CN106778556A (en) * | 2016-12-01 | 2017-05-31 | 大连因特视智能传感科技有限公司 | Intelligent identity identification system based on dynamic human face identification and Gait Recognition fusion |
CN108932435A (en) * | 2018-07-05 | 2018-12-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information security management method, terminal device and computer readable storage medium |
CN109348190A (en) * | 2018-12-05 | 2019-02-15 | 吉林大学 | Monitoring system and method is fallen down based on video monitoring |
CN109523747A (en) * | 2018-12-10 | 2019-03-26 | 广州知弘科技有限公司 | A kind of method for safety monitoring that network is ridden |
CN109544859A (en) * | 2018-12-12 | 2019-03-29 | 焦点科技股份有限公司 | A kind of active safety household camera intelligent realization method |
CN109598515A (en) * | 2018-11-29 | 2019-04-09 | 阿里巴巴集团控股有限公司 | A kind of method of payment, payment mechanism and terminal device |
CN109635710A (en) * | 2018-12-06 | 2019-04-16 | 中山乐心电子有限公司 | Precarious position determines method, apparatus, dangerous alarm equipment and storage medium |
CN109741573A (en) * | 2019-01-28 | 2019-05-10 | 武汉恩特拉信息技术有限公司 | A kind of personnel safety monitoring method, system and device based on recognition of face |
CN109840760A (en) * | 2018-12-11 | 2019-06-04 | 深圳招商建筑科技有限公司 | A kind of wisdom method of payment and system based on recognition of face |
CN109918930A (en) * | 2019-03-11 | 2019-06-21 | 维沃移动通信有限公司 | A kind of information protecting method and terminal device |
CN110049096A (en) * | 2019-03-01 | 2019-07-23 | 深圳市华慧云科技有限公司 | The net about monitoring of windward driving stroke and emergence message sending method |
CN110163146A (en) * | 2019-05-21 | 2019-08-23 | 银河水滴科技(北京)有限公司 | A kind of monitoring method and device based on characteristics of human body |
CN110263634A (en) * | 2019-05-13 | 2019-09-20 | 平安科技(深圳)有限公司 | Monitoring method, device, computer equipment and the storage medium of monitoring objective |
CN110378244A (en) * | 2019-05-31 | 2019-10-25 | 曹凯 | The detection method and device of abnormal posture |
CN110516568A (en) * | 2019-08-15 | 2019-11-29 | 合肥智圣新创信息技术有限公司 | A kind of more contextual data management methods of colleges and universities based on recognition of face and system |
CN110599149A (en) * | 2019-08-16 | 2019-12-20 | 深圳市赛亿科技开发有限公司 | Automatic checkout method and system based on unmanned vending terminal and storage medium |
-
2019
- 2019-12-26 CN CN201911371877.0A patent/CN111125768B/en active Active
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080114213A1 (en) * | 2006-10-18 | 2008-05-15 | Bagan Kenneth J | Biometric Network Exchange System |
US20150245189A1 (en) * | 2012-10-19 | 2015-08-27 | Srikanth Nalluri | Personal safety and emergency services |
CN103577750A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Privacy authority management method and device |
WO2016057347A1 (en) * | 2014-10-10 | 2016-04-14 | Pcms Holdings, Inc. | Systems and methods for protecting user privacy in networked data collection |
CN204695502U (en) * | 2015-05-08 | 2015-10-07 | 重庆软汇科技股份有限公司 | A kind of fall alarm |
CN105930765A (en) * | 2016-02-29 | 2016-09-07 | 中国银联股份有限公司 | Payment method and device |
CN106096425A (en) * | 2016-06-06 | 2016-11-09 | 北京金山安全软件有限公司 | System permission starting method, device and equipment |
CN106650485A (en) * | 2016-09-18 | 2017-05-10 | 山东大学 | Personalized environmental perception privacy protection method based on Android |
CN106778556A (en) * | 2016-12-01 | 2017-05-31 | 大连因特视智能传感科技有限公司 | Intelligent identity identification system based on dynamic human face identification and Gait Recognition fusion |
CN108932435A (en) * | 2018-07-05 | 2018-12-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information security management method, terminal device and computer readable storage medium |
CN109598515A (en) * | 2018-11-29 | 2019-04-09 | 阿里巴巴集团控股有限公司 | A kind of method of payment, payment mechanism and terminal device |
CN109348190A (en) * | 2018-12-05 | 2019-02-15 | 吉林大学 | Monitoring system and method is fallen down based on video monitoring |
CN109635710A (en) * | 2018-12-06 | 2019-04-16 | 中山乐心电子有限公司 | Precarious position determines method, apparatus, dangerous alarm equipment and storage medium |
CN109523747A (en) * | 2018-12-10 | 2019-03-26 | 广州知弘科技有限公司 | A kind of method for safety monitoring that network is ridden |
CN109840760A (en) * | 2018-12-11 | 2019-06-04 | 深圳招商建筑科技有限公司 | A kind of wisdom method of payment and system based on recognition of face |
CN109544859A (en) * | 2018-12-12 | 2019-03-29 | 焦点科技股份有限公司 | A kind of active safety household camera intelligent realization method |
CN109741573A (en) * | 2019-01-28 | 2019-05-10 | 武汉恩特拉信息技术有限公司 | A kind of personnel safety monitoring method, system and device based on recognition of face |
CN110049096A (en) * | 2019-03-01 | 2019-07-23 | 深圳市华慧云科技有限公司 | The net about monitoring of windward driving stroke and emergence message sending method |
CN109918930A (en) * | 2019-03-11 | 2019-06-21 | 维沃移动通信有限公司 | A kind of information protecting method and terminal device |
CN110263634A (en) * | 2019-05-13 | 2019-09-20 | 平安科技(深圳)有限公司 | Monitoring method, device, computer equipment and the storage medium of monitoring objective |
CN110163146A (en) * | 2019-05-21 | 2019-08-23 | 银河水滴科技(北京)有限公司 | A kind of monitoring method and device based on characteristics of human body |
CN110378244A (en) * | 2019-05-31 | 2019-10-25 | 曹凯 | The detection method and device of abnormal posture |
CN110516568A (en) * | 2019-08-15 | 2019-11-29 | 合肥智圣新创信息技术有限公司 | A kind of more contextual data management methods of colleges and universities based on recognition of face and system |
CN110599149A (en) * | 2019-08-16 | 2019-12-20 | 深圳市赛亿科技开发有限公司 | Automatic checkout method and system based on unmanned vending terminal and storage medium |
Non-Patent Citations (1)
Title |
---|
李圣普 等: "基于智能终端的跌倒检测系统需求分析", 《科技资讯》 * |
Also Published As
Publication number | Publication date |
---|---|
CN111125768B (en) | 2023-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7444777B2 (en) | Information processing device, terminal device, information processing method, and information processing program | |
US20220335162A1 (en) | Event-based community creation for data sharing platform | |
EP3350748B1 (en) | Systems for providing online monitoring of released criminals by law enforcement | |
CN109902575B (en) | Anti-walking method and device based on unmanned vehicle and related equipment | |
US10163330B1 (en) | System and method for securely accessing online systems | |
US12106262B2 (en) | Intelligence platform for automated retrieval or protection of a package or a person by an unmanned vehicle (UV) | |
US20180308344A1 (en) | Vehicle-to-infrastructure (v2i) accident management | |
CN110706371B (en) | Block chain-based driving safety management method, system and storage medium | |
US20140078304A1 (en) | Collection and use of captured vehicle data | |
MX2014003168A (en) | A computing platform for development and deployment of sensor-driven vehicle telemetry applications and services. | |
CN105453069A (en) | Situational crowd-sourced response system | |
Hussein et al. | Digital surveillance systems for tracing COVID-19: Privacy and security challenges with recommendations | |
CN111259682B (en) | Method and device for monitoring safety of construction site | |
CN111127824A (en) | Early warning method, device and system | |
KR102205536B1 (en) | Method and apparatus for improving security of data communiucation of unmanned warship using public network | |
US9576467B2 (en) | Emergency detection device, emergency detection system, recording medium, and method therefor | |
CN113946646A (en) | Vehicle residence detection method and device, electronic equipment and storage medium | |
CN111125768B (en) | Information processing method, device, electronic equipment and medium | |
CN104991467B (en) | Environmental detection device and its target identification tracking, emergent monitoring system | |
Rashid et al. | A survey on social-physical sensing: An emerging sensing paradigm that explores the collective intelligence of humans and machines | |
KR20160131678A (en) | Portable device for protecting having camera and method for taking picture | |
Arellano-Zubiate et al. | Design of an Anti-theft Alarm System for Vehicles using IoT | |
KR101468407B1 (en) | Digital forensic photographing device and digital forensic photographing system installed in car for preventing abuse of personal image information using the device | |
US20230230190A1 (en) | Personal protector platform | |
CN114333098B (en) | Night patrol method, night patrol device, electronic equipment and computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |