CN111263310A - Alarm processing method and device, terminal equipment and computing equipment - Google Patents

Alarm processing method and device, terminal equipment and computing equipment Download PDF

Info

Publication number
CN111263310A
CN111263310A CN201811361285.6A CN201811361285A CN111263310A CN 111263310 A CN111263310 A CN 111263310A CN 201811361285 A CN201811361285 A CN 201811361285A CN 111263310 A CN111263310 A CN 111263310A
Authority
CN
China
Prior art keywords
alarm
information
user
eid
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811361285.6A
Other languages
Chinese (zh)
Inventor
刘正也
江盈义
陈哲
戚超杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201811361285.6A priority Critical patent/CN111263310A/en
Publication of CN111263310A publication Critical patent/CN111263310A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0297Robbery alarms, e.g. hold-up alarms, bag snatching alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an alarm processing method, an alarm processing device, terminal equipment and computing equipment, belongs to the technical field of information processing, and is used for improving the success rate and effectiveness of alarm. According to the method, when the alarming operation performed by a user is monitored, the current position information of the terminal equipment is obtained, alarming information including the current position information and eID codes of the user are sent to an alarm receiving system, the current position information of the terminal equipment can accurately represent the actual position of the user, the user can transmit the position of the user to the alarm receiving system through one alarming operation to realize quick and efficient alarming, the police resources can timely and quickly reach an alarm scene for rescue through accurate reporting of the position, the rescue effect is improved, meanwhile, the alarm receiving system can effectively screen invalid alarming through an authoritative identity verification mode of eID codes, and false alarming can be reduced or even avoided to a certain extent.

Description

Alarm processing method and device, terminal equipment and computing equipment
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to an alarm processing method and apparatus, a terminal device, and a computing device.
Background
People may encounter some emergency situations requiring emergency alarm in life, the current general alarm mode is to call an alarm phone (e.g. 110) to alarm, and because of the need of voice call, such an alarm mode is easily found by gangsters (e.g. robbers or violensers), resulting in failure of alarm, the alarm success rate is low, and even worse cases may occur because the alarm is found to possibly irritate the gangsters. Moreover, since the alarm user may be in a strange environment, even if the alarm call is not found, it may be difficult to accurately describe the current position to the police, so that the police force resource sent by the police is difficult to reach the police scene in time, and the rescue effect is greatly reduced due to the delay of the rescue, resulting in poor alarm effect. Therefore, how to realize safe and effective alarm is a problem to be solved.
In addition, in practice, false alarm and even malicious alarm exist, which results in the waste of police resources and affects social order, so the screening of invalid alarm is also a problem to be considered.
Disclosure of Invention
The embodiment of the application provides an alarm processing method and device, terminal equipment and computing equipment, which are used for improving the success rate and effectiveness of alarm.
In one aspect, an alarm processing method is provided, and the method includes:
monitoring an alarm operation, wherein the alarm operation is used for triggering an alarm function in the terminal equipment;
when the alarm operation is monitored, current position information of the terminal equipment is obtained;
triggering and sending alarm information including the current position information and an eID code of the user to an alarm receiving system so that the alarm receiving system carries out alarm processing according to the alarm information when confirming that the alarm is effective based on the eID code, wherein the eID code is a unique citizen network electronic identity signed and issued by a trusted system for the user.
In one aspect, an alarm processing method is provided, and the method includes:
receiving alarm information sent by terminal equipment and eID codes of a user, wherein the alarm information comprises current position information of the terminal equipment, and the eID codes are the only electronic identity of a citizen network issued by a trusted system for the user;
determining whether an alarm is valid according to the eID code;
and when the alarm is effective, carrying out alarm processing according to the alarm information.
In one aspect, an alarm processing method is provided, and the method includes:
the method comprises the steps that a terminal device monitors an alarm operation, and the alarm operation is used for triggering an alarm function in the terminal device; when the alarm operation is monitored, current position information of the terminal equipment is obtained; triggering and sending alarm information including the current position information and eID codes of the users to the alarm receiving system;
the alarm receiving system receives the alarm information and the eID codes; determining whether an alarm is valid according to the eID code; and when the alarm is effective, carrying out alarm processing according to the alarm information.
In one aspect, an alarm processing system is provided, which includes a terminal device and an alarm receiving system, wherein:
the terminal equipment is used for monitoring alarm operation, and the alarm operation is used for triggering an alarm function in the terminal equipment; when the alarm operation is monitored, current position information of the terminal equipment is obtained; triggering and sending alarm information including the current position information and eID codes of the users to the alarm receiving system;
the alarm receiving system is used for receiving the alarm information and the eID codes; determining whether an alarm is valid according to the eID code; and when the alarm is effective, alarm processing is carried out according to the alarm information.
In one aspect, an alarm processing apparatus is provided, including:
the monitoring module is used for monitoring alarm operation, and the alarm operation is used for triggering an alarm function in the terminal equipment;
the obtaining module is used for obtaining the current position information of the terminal equipment when the alarm operation is monitored;
and the alarm module is used for triggering the alarm receiving system to send alarm information including the current position information and eID codes of the user so as to enable the alarm receiving system to carry out alarm processing according to the alarm information when the eID codes confirm that the alarm is effective, wherein the eID codes are the only citizen network electronic identity signed and sent by the user by a trusted system.
In one aspect, an alarm processing apparatus is provided, including:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving alarm information sent by terminal equipment and eID codes of users, the alarm information comprises current position information of the terminal equipment, and the eID codes are unique citizen network electronic identity marks issued by a trusted system for the users;
the determining module is used for determining whether the alarm is effective according to the eID code;
and the alarm processing module is used for carrying out alarm processing according to the alarm information when the alarm is effective.
In one aspect, a terminal device is provided, where the terminal device includes:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the steps executed by the terminal equipment in the aspects according to the obtained program instructions.
In one aspect, a computing device is provided, the computing device comprising:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the steps executed by the alarm receiving system in the aspects according to the obtained program instructions.
In one aspect, a storage medium is provided, the storage medium storing computer-executable instructions for causing a computer to perform the steps included in the method of the above aspects.
In the embodiment of the invention, when a user needs to give an alarm, the user can directly carry out alarm operation on terminal equipment (such as a mobile phone), for example, an alarm button in an application with an alarm function in the terminal equipment is clicked, when the alarm operation of the user is monitored, the current position information of the terminal equipment can be obtained, alarm information is obtained according to the current position information, then the alarm information and an eID code of the user are automatically triggered to be sent to an alarm receiving system, the current position information of the terminal equipment can accurately represent the actual position of the user, so that the user can transmit the position of the user to the alarm receiving system through one alarm operation to realize quick and efficient alarm, meanwhile, the accurate reporting of the position can facilitate that police resources can more timely and quickly reach an alarm scene for rescue, and the rescue effect can be improved. Meanwhile, because the terminal equipment performs hidden alarm in a silent mode, compared with a voice call alarm mode in the prior art, the hidden alarm method can reduce the possibility of being discovered as much as possible, thereby improving the success rate of alarm.
Meanwhile, when the alarm receiving system is alarmed, eID codes of the users are reported together, so that the alarm receiving system can judge the effectiveness of the alarm through the unique citizen network electronic identity of the users, for example, whether the users really exist can be verified through the eID codes, if the users really exist, the users are considered to be effective alarms, namely, invalid alarms can be effectively screened through an authorized identity verification mode of the eID codes, and therefore false alarms can be reduced or even avoided to a certain extent, the effectiveness and the legality of the alarm are ensured, the identity tracing of the alarm users can be performed through the eID codes, the alarm recording and management of the users are facilitated, for example, the false alarm users can be warned and punished through the identity tracing, the legal use of the alarm is standardized, and the waste of police resources is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only the embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1A is a schematic diagram of an application scenario in an embodiment of the present invention;
fig. 1B is a schematic diagram of an application scenario in an embodiment of the present invention;
fig. 2A is a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 2B is a schematic structural diagram of a terminal device in the embodiment of the present invention;
fig. 2C is a schematic structural diagram of a terminal device in the embodiment of the present invention;
FIG. 3A is a schematic diagram of an architecture of an alarm processing system in an embodiment of the invention;
FIG. 3B is a schematic diagram of an architecture of an alarm processing system in an embodiment of the invention;
FIG. 4 is a flow chart of applying for a digital identity in an embodiment of the present invention;
FIG. 5 is a schematic diagram of a two-dimensional code showing a digital identity according to an embodiment of the present invention;
FIG. 6 is a diagram illustrating a one-touch alert function for a digital identity application in accordance with an embodiment of the present invention;
FIG. 7 is a flow chart of an alarm handling method in an embodiment of the present invention;
fig. 8 is a schematic diagram of inputting alert description information in an embodiment of the present invention;
FIG. 9 is a diagram illustrating the display of alarm processing results in an embodiment of the present invention;
FIG. 10A is a block diagram of an alarm processing apparatus according to an embodiment of the present invention;
FIG. 10B is a block diagram of an alarm processing apparatus according to an embodiment of the present invention;
FIG. 11 is a block diagram showing the structure of an alarm processing device according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a terminal device in an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a computing device in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions in the embodiments of the present invention will be described clearly and completely in the following with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. In the present application, the embodiments and features of the embodiments may be arbitrarily combined with each other without conflict. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
The terms "first" and "second" in the description and claims of the present application and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the term "comprises" and any variations thereof, which are intended to cover non-exclusive protection. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In the embodiments of the present application, "a plurality" may mean at least two, for example, two, three, or more, and the embodiments of the present application are not limited. In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" in this document generally indicates that the preceding and following related objects are in an "or" relationship without specific description.
Some of the words referred to herein are described below to facilitate understanding by those skilled in the art.
1. The digital identity is a concept relative to an entity identity, the entity identity is some entity objects capable of proving the identity of a user citizen, such as a Chinese resident identity card, a motor vehicle driving license, a Hongkong and Macau pass, a hometown returning license and the like, the plaintext identity information of the user can be directly obtained through the entity identity, and the digital identity can be understood as presenting the identity information of the user in a digital information mode, so that the digital identity is understood as a set of codes of the identity information of the citizen network certificate generated based on cryptography by using the entity identity as a basis.
2. Real-name identity information, which can be used to uniquely identify a user, such as some possible real-name information including an identification number, a name and identification number, a driver's license number, a name and identification number, and a face image of the user, etc.
3. eID coding, wherein eID is English abbreviation of Electronic Identity, and one possible Chinese translation is Electronic Identity, or network Electronic Identity, or citizen network Electronic Identity, or other possible translation modes can be included.
eID is based on the entity identity certification of citizens, and based on the cryptographic technology, a digital mark (network electronic identity) signed to citizens by a public network identity recognition system of the ministry of public security based on a cryptographic algorithm can be used, when the eID is signed to a user, for example, a unique code representing the user identity, namely a network identity code (eID code) of the user is calculated by using personal identity information and a random number of the user, the identity can be remotely recognized on line on the premise of not revealing the identity information, and the transmission of the identity information of the plaintext of the citizens on the network can be reduced while the uniqueness of the digital identity signed to each citizen is ensured.
The eID has incomparable advantages in authority, safety, universality and privacy, and can meet the safety guarantee requirements of citizens in various aspects such as individual privacy, network transaction, virtual property and the like.
In order to better understand the technical solutions provided by the embodiments of the present invention, the technical background of the embodiments of the present invention is described below.
As described above, for the existing alarm mode, the alarm success rate is low, timely and efficient rescue is difficult to realize, and the effectiveness is also low, and for example, false alarm and other invalid alarms waste energy resources. In view of this, the inventor considers that a silent and hidden alarm mode is needed to reduce the possibility of being discovered by ruffians during alarming, so that the success rate of alarming is improved, the purpose of timely and efficient rescue is achieved, meanwhile, effective judgment and tracing of the user identity can be realized through an authoritative and safe digital identity technology such as eID, the effectiveness of alarming can be judged, invalid alarming can be effectively screened, the effectiveness of alarming can be improved, the waste of police resources is reduced, and the alarming use is further standardized.
Based on the design concept, the embodiment of the invention provides an alarm processing method, by which an alarm operation can be directly performed on a terminal device when a user needs to give an alarm, after the alarm operation of the user is monitored, current position information of the terminal device can be obtained, alarm information is obtained according to the current position information, then the alarm information and an eID code of the user are automatically triggered and sent to an alarm receiving system, and because the current position information of the terminal device can accurately represent the actual position of the user, the user can silently transmit the position of the user to the alarm receiving system through one alarm operation to realize rapid and efficient alarm, and meanwhile, through accurate reporting of the position, the alarm resources can more timely and rapidly reach the alarm scene for rescue, and the rescue effect is improved. Meanwhile, because the terminal equipment performs hidden alarm in a silent mode, compared with the mode of voice call alarm in the prior art, the hidden alarm method can reduce the possibility of being discovered and improve the success rate of alarm. Meanwhile, invalid alarm is effectively screened in an eID coding verification mode, so that false alarm can be reduced or even avoided to a certain extent, the effectiveness and the legality of alarm are ensured, identity tracing can be carried out on alarm users through eID coding, and alarm recording and management of the users are facilitated.
After the design idea of the embodiment of the present invention is introduced, some simple descriptions are provided below for application scenarios to which the technical solution in the embodiment of the present invention can be applied, and it should be noted that the application scenarios described below are only used for illustrating the embodiment of the present invention and are not limited. In specific implementation, the technical scheme provided by the embodiment of the invention can be flexibly applied according to actual needs.
Referring to fig. 1A, fig. 1A is an application scenario to which the technical solution in the embodiment of the present invention is applied, where the application scenario includes a terminal device 101, a terminal device 102, an application server 103, and an alarm receiving platform 104. Both the terminal device 101 and the terminal device 102 are installed with an application having an alarm function, for example, the application having the alarm function may only have the alarm function, and at this time, the application may be directly referred to as an alarm application, or the application having the alarm function may integrate the alarm function in some applications, for example, an alarm function is integrated in a taxi taking application, or an alarm function is integrated in a digital identity application, and so on, whichever implementation manner, that is, the alarm processing method provided by the embodiment of the present invention may be implemented by the terminal device 101 and the terminal device 102. Taking the terminal device 102 as an example, the application server 103 is a background server of an application with an alarm function configured in the terminal device 102, that is, the application server 103 provides a background service for the application with the alarm function in the terminal device 102. The alarm receiving platform 104 refers to an authoritative platform capable of receiving the user alarm, such as a 110 alarm receiving center or a 119 alarm receiving center, and after receiving the user alarm, the alarm receiving platform 104 may perform alarm processing on the user alarm, for example, scheduling an alarm resource to perform timely rescue on the alarm user.
When an alarm is needed, a user 1 and a user 2 can respectively use a terminal device 101 and a terminal device 102 which are used by the user 1 and the user 2 to perform an alarm operation, taking the user 2 as an example, when an alarm is needed, the user 2 can directly click an alarm button in the terminal device 102, after the user 2 clicks the alarm button, the terminal device 102 can determine the current position and trigger to send alarm information including current position information and an eID code of the user 2 to an application server 103, wherein the trigger is that, for example, the terminal device 102 directly obtains the alarm information and the eID code from the local, and then sends the two information to the application server 103 to be reported to an alarm receiving platform 104 through the application server 103, otherwise, the terminal device 102 obtains the alarm information from the local, then sends the alarm information to the application server 103, and then the application server 103 obtains the eID code of the user from the local, and the received alarm information and the eID code obtained locally are reported to the alarm receiving platform 104, no matter which triggering and sending mode is adopted, the alarm is triggered in a silent transmission mode through the alarm information and the eID code, and for a user, the silent and quick alarm can be realized only by once operation such as clicking an alarm button, so that the success rate and the safety of the alarm can be improved to a certain extent.
Further, after receiving the alarm information and the eID code reported by the user side, the alarm receiving platform 104 may determine the effectiveness of the alarm based on the eID code, and perform alarm processing based on the alarm information when it is determined that the current alarm is effective, for example, a nearest police resource is dispatched to perform rescue according to the position of the user indicated by the alarm information, so as to ensure the timeliness of the rescue, and if it is determined that the alarm is false, the real-name identity information of the alarm user may be retrieved through the eID code, that is, identity tracing is performed on the alarm user, so that not only the alarm record of the alarm user may be counted, but also a certain warning penalty may be performed on the false alarm, and the legal use of an alarm system is maintained.
Referring to an application scenario to which the technical solution in the embodiment of the present invention shown in fig. 1B is applicable, compared with the application scenario shown in fig. 1A, a digital identity issuing center 105 is added to the application scenario shown in fig. 1B, and the digital identity issuing center 105 may be understood as the aforementioned trusted system, which is an official authority capable of issuing a unique digital identity for a user based on an eID encoding technology, for example, the third institute of public security (i.e., the third institute of public security). Because the eID code of the user is issued by the digital identity issuing center 105, when the alarm receiving platform 104 verifies whether the alarm is valid based on the eID code, the obtained eID code can be sent to the digital identity issuing center 105 so as to effectively verify the validity of the eID code through the digital identity issuing center 105, if the eID code is verified to be valid by the digital identity issuing center 105, the current alarm user is a real and legal user and not fake disguised identity information, so that the current alarm can be considered as a valid alarm, alarm resources can be scheduled for alarm rescue, otherwise the current alarm can be considered as a false alarm or malicious alarm, at the moment, the alarm resources are not dispatched so as to avoid the waste of police strength, or only 1 police officer can be dispatched to verify the situation on the spot, meanwhile, the alarm receiving platform 104 can also request the digital identity issuing center 105 for real name identity information of the alarm user based on the eID code, since the alarm receiving platform 104 is also an authoritative official police authority, the digital identity issuing center 105 can send the encrypted real-name identity information to the alarm receiving platform 104 at this time, and further, the alarm receiving platform 104 can decrypt the encrypted real-name identity information through a CA digital certificate, thereby determining the real identity of the alarm user, tracing the identity of the alarm user, and simultaneously recording the alarm record of the alarm user.
The terminal device 101 and the terminal device 102 may be a mobile phone, a tablet computer, a PDA (personal digital Assistant), a notebook computer, an intelligent wearable device (such as an intelligent watch and an intelligent bracelet), a personal computer, and the like, and no matter which device is used, an application with an alarm function may be run in the device, and a digital identity application may also be run, and the digital identity management may be performed on the eID code of the user through the digital identity application. And, the aforementioned application server 103, alarm receiving platform 104 and digital identity issuing center 105 can be understood as a personal computer, a large and medium sized computer, a computer cluster, and so on.
In addition, as mentioned above, the terminal device in the embodiment of the present invention runs an application having an alarm function, for example, as shown in fig. 2A, the terminal device in the embodiment of the present invention includes an operating system, a digital identity applet and an alarm applet, both of which are provided with interfaces interacting with the operating system, the terminal device can thus use the capabilities of the operating system to implement the monitoring and management of the alarm applet and the digital identity applet, i.e. in a few words, in fig. 2A, the alarm function and the digital identity function are implemented by two separate applets, and when the user triggers an alarm operation, the alarm applet can first obtain alarm information, and then calling a digital identity management function of the digital identity applet by means of a communication interface between the digital identity applets, and further obtaining eID codes of the user and sending the eID codes and the alarm information to a background.
Referring to fig. 2B again, at this time, the terminal device only includes an operating system and a digital identity application, the digital identity application may be operated in an independent application mode or in an applet mode, and in any implementation manner, the digital identity application has an alarm function at the same time, that is, an entry for one-key quick alarm is further provided in the digital identity application, and the user can implement the above-described quick alarm during silence through the entry.
Referring again to FIG. 2C, which is similar to FIG. 2B and includes only the alarm application and the operating system, it can be seen that FIG. 2C differs from FIG. 2B in that only the alarm application is included in FIG. 2C rather than a separate digital identity application, but rather that the digital identity functionality is integrated into the alarm application.
No matter which implementation manner in fig. 2A-2C is used, for a terminal device, an alarm function and a digital identity function can be simultaneously implemented, the two functions can be integrated in one application, or can be integrated in different applications, and when the two functions are integrated in different applications, the two functions may have mutual calling rights, so that the alarm processing method in the embodiment of the present invention is implemented in combination.
To further illustrate the alarm processing scheme provided by the embodiment of the present invention, the following detailed description is provided with reference to the accompanying drawings and the detailed description. Although embodiments of the present invention provide method steps as shown in the following embodiments or figures, more or fewer steps may be included in the method based on conventional or non-inventive efforts. In steps where no necessary causal relationship exists logically, the order of execution of the steps is not limited to that provided by embodiments of the present invention.
Referring to fig. 3A, an alarm processing system according to an embodiment of the present invention includes an alarm terminal, an application server, and an alarm receiving system, or as shown in fig. 3B, another alarm processing system according to an embodiment of the present invention includes an alarm terminal, an application server, an alarm receiving system, and a digital identity issuing center. The alarm terminal is, for example, the terminal device 101 or the terminal device 102 in fig. 1A-1B, the alarm terminal has an alarm function and a digital identity function, and can monitor an alarm operation performed by a user and obtain location information of the alarm terminal, the application server is, for example, the application server 103 in fig. 1A-1B, the alarm receiving system is, for example, the alarm receiving platform 104 in fig. 1A-1B, and the digital identity issuing center is, for example, the digital identity issuing center 105 in fig. 1B.
The alarm processing system in the embodiment of the present invention may be, for example, a system composed of all devices included in any application scenario in fig. 1A to fig. 1B, and is not described here.
Since the alarm processing scheme in the embodiment of the present invention relates to the eID code of the user, for convenience of understanding, before describing the alarm processing method in the embodiment of the present invention, a flow of issuing the eID code to the user is described below with reference to fig. 4. In fig. 4, the system includes 4 execution entities, which are a digital identity application client, a digital identity backend server, a trusted system, and a population query system, where the digital identity application client is a client installed and running in a terminal device for user interaction, that is, can be directly understood as an application installed in the terminal device, and the digital identity backend server is a server for providing a backend service for the digital identity application client.
S401: the digital identity application client sends real-name identity information and a digital identity issuing request to the digital identity background server, and the digital identity background server can receive the digital identity issuing request and the real-name identity information.
That is, when a user needs to issue a digital identity through the digital identity application, corresponding operations may be performed in the digital identity application, for example, clicking a "i want to issue" touch button may correspondingly trigger a digital identity issuance request, and after filling own real-name identity information in a specified interface, the real-name identity information and the digital identity issuance request may be sent to the digital identity background server.
S402: after the digital identity background server obtains the first two kinds of information reported by the digital identity application client, it is determined that the user wants to issue the digital identity, and the digital identity background server can send the obtained real-name identity information to a human mouth inquiry system (such as a population inquiry center of the ministry of public security) for validity check.
S403: and the population inquiry system performs validity verification on the real-name identity information.
After acquiring the real-name identity information sent by the digital identity background server, the population inquiry system can compare the real-name identity information with the citizen information base of the population inquiry system for searching, and if corresponding user information is searched in the citizen information base, the population inquiry system can determine that the real-name identity information sent by the digital identity background server is real, namely the identity real-name information of a real user is shown, so that a valid verification result can be obtained.
S404: the population inquiry system sends a notice that the verification is valid to the digital identity background server, so that the digital identity background server can receive the notice that the verification is valid and determine that the real-name identity information is valid through the notice that the verification is valid.
S405: when the real-name identity information reported by the user is determined to be valid, the digital identity background server sends the real-name identity information to a trusted system (such as the third place of public security) so as to request the trusted system to issue a corresponding digital identity for the real-name identity information.
S406: after receiving the real-name identity information sent by the digital identity background server, the trusted platform may verify the validity of the real-name identity information through the population query system as in S402.
S407: and the population inquiry system performs validity verification on the real-name identity information sent by the trusted system.
S408: and when the population inquiry system determines that the real-name identity information sent by the trusted system is valid, the population inquiry system sends a notification of valid verification to the trusted system.
S409: and when the trusted system determines that the real-name identity information is valid according to the valid verification notification, generating an eID code uniquely corresponding to the real-name identity information so as to complete the issuance of the digital identity of the user.
S410: the trusted system sends the issued eID code to the digital identity background server, and the digital identity background server can receive the eID code.
S411: and the digital identity background server sends the eID code to the digital identity application client.
After obtaining the eID code sent by the trusted system, the digital identity background server can store the eID code locally, and meanwhile, can return the eID code to the digital identity application client.
S412: after receiving the eID code sent by the digital identity background server, the digital identity application client may generate a two-dimensional code of the digital identity according to the eID code, for example, as shown in fig. 5, a schematic diagram of the two-dimensional code of the digital identity generated based on the eID code, in order to facilitate the use of the user.
The two-dimensional code of the digital identity in the embodiment of the invention can be refreshed at regular time, for example, refreshed once every 10 seconds, or can be manually refreshed according to the trigger of a user, and the possibility that the two-dimensional code of the digital identity is stolen to be refreshed can be reduced by a refreshing mode. In addition, the two-dimensional code of the digital identity in the embodiment of the invention can prohibit screenshot, that is, if the two-dimensional code of the digital identity is displayed on the current interface of the terminal device, the screenshot instruction can not be responded and prompt information for prohibiting screenshot is output if the screenshot instruction is detected, or the current two-dimensional code of the digital identity can be invalidated and a new two-dimensional code of the digital identity can be regenerated when the screenshot is detected, so that the copy and embezzlement of the two-dimensional code of the digital identity can be prevented through a series of modes, and the safety of user information can be ensured.
In addition, in the digital identity application in the embodiment of the present invention, as shown in fig. 6, functions such as one-key alarm and library may be integrated, and when a user needs to perform emergency alarm, the user may click "one-key alarm" as shown in fig. 6, so that the terminal device may be triggered to perform online alarm by using the alarm processing method in the embodiment of the present invention, which is very convenient and fast.
Through the introduction of the digital identity issuing process, the embodiment of the invention realizes the application mode of the pure online digital identity through the eID technology, and based on the characteristics of authority, safety, universality and privacy of the eID technology, the reliability, safety and effectiveness of the eID digital identity can be ensured, the risks of stealing, tampering and falsifying the digital identity are reduced, and the identity information safety of a user is ensured. That is to say, the eID code of the user can be understood as the network identity card of the user, and because the eID code is a unique electronic identity of the citizen network generated by encrypting the real-name identity information of the user by an authoritative encryption algorithm with a trusted system, the validity and the authoritativeness of the network identity card of the user can be ensured by the eID code, so that the true tracing and verification of the user can be realized through the eID code, and the identity of the user can be effectively and accurately identified.
After the foregoing description of the issuing process of the eID code, the alarm processing method in the embodiment of the present invention is described below with reference to fig. 7.
S701: the terminal device monitors an alarm operation, and specifically, the alarm operation may be performed by an application monitoring user having an alarm function in the terminal device.
The alarm operation refers to an operation for triggering an alarm function in the terminal device, for example, taking fig. 6 as an example, the alarm operation is a touch operation in which a user clicks "one-key alarm" in fig. 6, or may also be a gesture operation, or may also be a predetermined trajectory operation, or may also be an operation in which a specific physical key in the terminal device is pressed, and the like.
That is to say, when the user needs to give an alarm, the terminal equipment can be triggered to automatically give an alarm through an alarm operation, and the actions related to the user are fewer, so that the possibility of being discovered by gangsters can be reduced, safer and more effective alarm can be realized, and the probability of success of alarm is improved.
S702: and when the alarm operation is monitored, obtaining the current position information of the terminal equipment.
When the alarm operation is monitored, the fact that the user currently has the actual alarm requirement is indicated, the current position information of the terminal equipment can be obtained for the police to rescue as soon as possible, and the user gives an alarm through the terminal equipment, so that the real position of the user can be accurately reflected as much as possible through the current position information of the terminal equipment, the more accurate position of the user is reported to the alarm receiving system, and the police resources scheduled by the alarm receiving system can feel the police scene to rescue as soon as possible.
In the embodiment of obtaining the current position information of the terminal device, the two modes of automatic acquisition of the device and manual filling by the user can be included.
For the way that the user manually fills in, the terminal device may display an address input interface, and then after the user inputs the address information in the address input interface, the terminal device may regard the address information input by the user as the current location information of the terminal device. For example, the user inputs the address information of "marquis great wall 28 number" on the address input interface, which can directly use the address information as the current location information of the terminal device, and the address information can be made as accurate as possible by the manual input mode of the user, so that the accuracy of the current location information can be improved, and the location accuracy can be ensured.
For the mode that the equipment automatically acquires, the terminal equipment can determine the current longitude and latitude information through the GPS and then call the electronic map so as to take the address information of the place corresponding to the current longitude and latitude of the terminal equipment in the electronic map as the current position information of the terminal equipment, the current position can be quickly positioned through the mode that the equipment automatically acquires, the efficiency of acquiring the current position information is improved, and the timeliness of alarming is improved.
For the method of automatic acquisition of the device, problems such as positioning error, positioning deviation or positioning ambiguity may occur, and in order to improve the accuracy of the current position information, on the basis that the device automatically acquires the current position information, the user may also perform position correction, that is, before the terminal device determines the address information of a location corresponding to the current longitude and latitude of the terminal device in the electronic map as the current position information of the terminal device, the user may also obtain a position correction operation for the address information, and then performs a predetermined correction process on the address information according to the position correction operation to obtain the corrected address information, and then determines the corrected address information as the final current position information of the terminal device.
For example, the address information automatically acquired by the terminal device is "southern mountain area Guangming building", and after being corrected, the address information is corrected to be "southern mountain area peace district", wherein the peace district is a district adjacent to the position of the Guangming building, and the correction is equivalent to position correction for inaccurate position positioning; for another example, after the correction, the address information is corrected to be "futian area suge square", since the south mountain area and the futian area are two areas far apart, the correction is equivalent to the position correction performed on the position positioning error; for another example, after the correction, the correction of the address information to "building 03 of building 35 of lucent building in south mountain area" corresponds to a supplementary correction of the position locating blur in such a manner that the accuracy indicated by the address information after the supplementary correction is higher than the accuracy of the location indicated by the address information before the supplementary correction, and so on.
The method of correcting the address information automatically acquired by the equipment can improve the acquisition speed of the current position information to a certain extent, and meanwhile, the accuracy can be improved through position correction.
In addition, considering that in an actual case scene, the position of the user may be mobile, for example, an emergency situation requiring alarm occurs in the process of taking a vehicle, or a gangster may shift the position of the alarm user along with the development of the case, under these situations, in order to realize the tracking and monitoring of the position of the alarm user, the terminal device may obtain the current position information of the terminal device again according to a predetermined time interval, that is, the current position information of the terminal device is updated in real time, and the current position information updated in real time is sent to the alarm receiving system, so that the accurate tracking of the alarm user can be ensured, so that timely and accurate timely rescue can be realized according to the updated position.
In addition, based on the consideration of silent alarm, once the user triggers the alarm operation, the terminal device can be adjusted to a silent operation mode, where the silent operation mode refers to a device operation mode that does not output any sound, for example, directly adjusting a ring mode to a silent mode, and automatically turning off a shutter sound and a flash lamp during photographing, etc., so that the silent operation mode can be used to keep the attention of thieves as little as possible, thereby ensuring the safety as possible. In addition, after the user triggers the alarm operation, any content related to the alarm can not be displayed on the interface of the terminal equipment any more, so that the alarm is discovered in order to prevent a gangster from seizing the terminal equipment of the alarm user, and a worse alarm situation is caused.
S703: and the terminal equipment acquires alarm information according to the current position information.
In a possible embodiment, in order to alarm as soon as possible, after the terminal device obtains important information, i.e., current location information, the terminal device can directly report the current location information as alarm information to the alarm receiving system as soon as possible, i.e., the alarm information only includes the information, i.e., the current location information of the terminal device. In practice, once the user gives an alarm, it indicates that the current situation is more urgent, so it is desirable to send out the distress signal as soon as possible, so that the alarm signal can be transmitted to the alarm receiving system as soon as possible, so that the alarm receiving system can know the distress demand of the alarming user as soon as possible.
In another possible implementation, after obtaining the current location information, the terminal device may further display an alert supplemental interface shown in fig. 8, where, in the alert supplemental interface, the user may input alert description information, where the alert description information refers to related information used for describing a current case that is being alerted, where the case description information may be information such as text, picture, voice, or video, for example, as shown in fig. 8, the user may input a case category, where the case category may include, for example, a robbery category, a terror category, may further describe the case in detail in a text manner, may upload a picture or a video of a current environment, and so on, and through the supplement of the alert description information, the current case may be described in more detail, so that the alarm receiving system may reasonably schedule alarm resources based on the case description information. That is, in this embodiment, the current location information and the case description information may be sent to the alarm receiving system together as alarm information, and in this embodiment, when the case scene is not particularly critical, if the alarm user has time and chance, the case description information may be entered to assist the police to quickly rescue, and of course, even if the terminal device displays the alarm supplement interface, if the user does not input the relevant information conveniently, the user may select "unable to provide" and select not to enter the case description information, so that the alarm information including only the current location information may be reported to the alarm receiving system as quickly as possible in the critical time. In addition, after the alarm information is reported, the user can manually call the alarm condition supplement interface if the user has an opportunity subsequently, and then enters case description information when the user has an opportunity and ensures safety.
S704: and the terminal equipment triggers and sends alarm information and eID codes of the users to an alarm receiving system.
In the embodiment of the invention, when the relevant information needs to be reported to the alarm receiving system, the terminal device is a front-end device, so the relevant information can only be sent to the alarm receiving system through a background server corresponding to the terminal device, which is equivalent to that, information interaction between the terminal device and the alarm receiving system is forwarded through the background server, in other words, the terminal device triggers sending of alarm information and eID (electronic identity) codes of users to the alarm receiving system, and specifically, the information is sent to the background server first and then forwarded to the alarm receiving system through the background server.
In the embodiment of the invention, the eID code of the user can be stored in the terminal equipment, and at the moment, the terminal equipment can directly send the alarm information and the eID code to the background server together, and then the background server forwards the alarm information and the eID code to the alarm receiving system. In another mode, the eID code of the user may not be stored in the terminal device, and at this time, the terminal device may send the registration identity information and the alarm information of the user when the user registers in the application of the alarm function to the background server, and further, the background server may determine the identity of the user according to the registration identity information, then find out the corresponding eID code as the eID code of the user, and send the eID code and the alarm information to the alarm receiving system. Through the background interaction between the background server and the alarm receiving system, the information interaction between the terminal equipment and the alarm receiving system can be realized.
S705: and the alarm receiving system judges whether the current alarm is effective or not according to the eID code, namely whether the current alarm is effective or not.
As introduced above, the eID code of the user can uniquely represent a real user, and based on the authority and safety of the eID technology, the embodiment of the invention adopts the eID code to judge the authenticity and effectiveness of the alarm user, when the current alarm user is judged to be a real legal user according to the eID code, the alarm can be considered to be an effective alarm, at the moment, the alarm processing can be performed according to the alarm information, for example, the alarm resources can be arranged according to the current position information in the alarm information and the alarm user can be rescued according to the principle of being nearby, or the number of people who give out the alarm and the type and number of the police equipment can be determined according to the alarm description information, thereby achieving the efficient rescue. Otherwise, the alarm can be regarded as an invalid alarm, for example, a false alarm or a malicious alarm, and the invalid alarm can be effectively screened by the method, so that timely response and alarm processing of real alarm can be ensured, and meanwhile, the invalid alarm can be shielded, thereby saving police resources and avoiding the waste of the police resources.
As introduced above, the eID code is the only network identity card issued by the trusted system based on the real-name identity information of the user, and in view of authority of the trusted system and characteristics of the eID technology, effective verification of the eID code needs to be executed by the trusted system, so that the verification result can be ensured to be accurate and effective. The trusted system can further return the compared authentication result to an alarm receiving system, the alarm receiving system can judge whether the eID code is legal according to the authentication result, further, the alarm is considered to be effective alarm when the eID code is legal, and is considered to be invalid alarm when the eID code is illegal, so that the judgment on the effectiveness of the alarm is completed.
In addition, the alarm receiving system can also request real-name identity information corresponding to the eID code from the trusted platform based on the eID code, because the alarm receiving system is also an authoritative public security organization in general, the trusted system may transmit the real-name identity information corresponding to its eID code back to the alarm receiving system, and in order to ensure the identity information of the user is safe, the encrypted real-name identity information can be transmitted back to the alarm receiving system, the alarm receiving system can decrypt the encrypted real-name identity information based on an agreed decryption mode (for example, a mode of a CA certificate), therefore, clear real-name identity information is obtained, for example, the real-name identity information is Zhang III, the identity number is 123456789, the telephone number is 888888, and the like, and the alarm receiving system can count the alarm records of Zhang III based on the real-name identity information pair, so that unified management and maintenance of the alarm records of the users are realized. In addition, if the previous alarm validity identification fails, the invalid alarm is not identified as the valid alarm, so that the invalid dispatch of the police resource may be caused, and the police resource is wasted.
Further, after the alarm receiving system completes the alarm processing, the alarm processing result may be returned to the terminal device, and the terminal device may display the alarm processing result, for example, the schematic diagram of the alarm processing result shown in fig. 9, so that the user may know the alarm processing progress and result in time, thereby providing a psychological sense for the alarm user, and handling the current emergency more quietly.
Based on the same inventive concept, an embodiment of the present invention provides an alarm processing apparatus, which may be, for example, a terminal device or an alarm terminal in the foregoing method embodiment, and specifically, may be, for example, the terminal device 101 or the terminal device 102 in fig. 1A to fig. 1B. The alarm processing device can be a hardware structure, a software module or a hardware structure and a software module. The alarm processing device can be realized by a chip system, and the chip system can be formed by a chip and can also comprise the chip and other discrete devices. Referring to fig. 10A, an alarm processing apparatus according to an embodiment of the present invention may include a monitoring module 1001, an obtaining module 1002, and an alarm module 1003. Wherein:
a monitoring module 1001 for monitoring an alarm operation for triggering an alarm function in a terminal device;
an obtaining module 1002, configured to obtain current location information of a terminal device when an alarm operation is monitored;
the alarm processing module 1003 is configured to trigger sending of alarm information including current position information and an eID code of the user to the alarm receiving system, so that the alarm receiving system performs alarm processing according to the alarm information when the alarm is confirmed to be valid based on the eID code, where the eID code is a unique citizen network electronic identity signed and issued by the trusted system for the user.
In a possible implementation manner, the obtaining module 1002 is configured to determine address information input in an address input interface displayed by the terminal device as current location information; or calling a pre-stored electronic map, and determining address information of a place corresponding to the current longitude and latitude of the terminal equipment in the electronic map as the current position information.
In a possible implementation, the obtaining module 1002 is configured to obtain a location correction operation for the address information; performing preset correction processing on the address information according to the position correction operation to obtain corrected address information; and determining the corrected address information as the current position information.
In a possible implementation, the obtaining module 1002 is configured to obtain current location information of the terminal device again according to a predetermined time interval, and send the obtained current location information to the alarm receiving system.
In a possible implementation manner, please refer to fig. 10B, the alarm processing apparatus in the embodiment of the present invention further includes a display module 1004, configured to display the alarm supplement interface, and obtain the alarm description information input by the user in the alarm supplement interface.
In a possible implementation manner, the display module 1004 is further configured to receive alarm processing result information sent by the alarm receiving system; and displaying alarm processing result information on the terminal equipment.
In a possible implementation manner, the alarm module 1003 is configured to send registration identity information and alarm information of a user on an application including an alarm function to a corresponding application server, so as to trigger the application server to obtain an eID code according to the registration identity information and send the alarm information and the eID code to an alarm receiving system.
Based on the same inventive concept, the embodiment of the present invention provides an alarm processing apparatus, which may be, for example, an alarm receiving system or an alarm receiving platform in the foregoing method embodiments, and specifically, may be, for example, the alarm receiving platform 104 in fig. 1A-1B. The alarm processing device can be a hardware structure, a software module or a hardware structure and a software module. The alarm processing device can be realized by a chip system, and the chip system can be formed by a chip and can also comprise the chip and other discrete devices. Referring to fig. 11, an alarm processing apparatus according to an embodiment of the present invention may include a receiving module 1101, a determining module 1102, and an alarm processing module 1103. Wherein:
the receiving module 1101 is configured to receive alarm information sent by a terminal device and an electronic identity identifier (eID) code of a user, where the alarm information includes current position information of the terminal device, and the eID code is a unique citizen network electronic identity identifier issued by a trusted system for the user;
a determining module 1102, configured to determine whether the alarm is valid according to the eID code;
and the alarm processing module 1103 is used for performing alarm processing according to the alarm information when the alarm is effective.
In a possible implementation, the determining module 1102 is configured to send the eID code to the trusted system, so as to request the trusted system to authenticate whether the eID code is legal; receiving an authentication result notice sent by a trusted system; and determining whether the alarm is effective according to the authentication result notification.
In a possible implementation manner, the alarm processing apparatus in the embodiment of the present invention further includes a statistics module 1104, configured to receive real-name identity information of a ciphertext corresponding to the eID code, where the real-name identity information is sent by the trusted system; decrypting the real-name identity information of the ciphertext to obtain the real-name identity information of the user; and counting the alarm records of the user according to the real-name identity information.
All relevant contents of each step related to the embodiment of the alarm processing method may be referred to the functional description of the functional module corresponding to the alarm processing apparatus in the embodiment of the present invention, and are not described herein again.
The division of the modules in the embodiments of the present invention is schematic, and only one logical function division is provided, and in actual implementation, there may be another division manner, and in addition, each functional module in each embodiment of the present invention may be integrated in one processor, or may exist alone physically, or two or more modules are integrated in one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Based on the same inventive concept, an embodiment of the present invention further provides a terminal device, which may be the terminal device or the alarm terminal in the foregoing method embodiment, where the terminal device is, for example, a smart phone, a tablet computer, a PDA, a notebook computer, a vehicle-mounted device, an intelligent wearable device, and the like, and the terminal device may be, for example, the terminal device 101 or 102 in fig. 1A-1B. The terminal device may be a hardware structure, a software module, or a hardware structure plus a software module. The terminal device can be realized by a chip system, and the chip system can be formed by a chip and can also comprise the chip and other discrete devices. Referring to fig. 12, the terminal device in the embodiment of the present invention includes at least one processor 1201 and a memory 1202 connected to the at least one processor, and a specific connection medium between the processor 1201 and the memory 1202 is not limited in the embodiment of the present invention.
The Processor 1201 may be a general-purpose Processor, such as a Central Processing Unit (CPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component, which may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present invention. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
Memory 1202, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The Memory may include at least one type of storage medium, and may include, for example, a flash Memory, a hard disk, a multimedia card, a card-type Memory, a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Programmable Read Only Memory (PROM), a Read Only Memory (ROM), a charged Erasable Programmable Read Only Memory (EEPROM), a magnetic Memory, a magnetic disk, an optical disk, and so on. The memory is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 1202 in embodiments of the present invention may also be circuitry or any other device capable of performing a memory function for storing program instructions and/or data.
The processor 1201 is a control center of the terminal device, and may connect various parts of the terminal device by using various interfaces and lines, and perform various functions and process data of the terminal device by operating or executing instructions stored in the memory 1202 and calling data stored in the memory 1202, thereby performing overall monitoring on the terminal device. Optionally, the processor 1201 may include one or more processing units, and the processor 1201 may integrate an application processor and a modem processor, wherein the application processor mainly handles an operating system, a user interface, an application program, and the like, and the modem processor mainly handles wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 1201. In some embodiments, the processor 1201 and the memory 1202 may be implemented on the same chip, or in some embodiments, they may be implemented separately on separate chips.
The terminal device may further include an input unit 1201, a display unit 1202, a radio frequency unit 1203, an audio circuit 1204, a speaker 1205, a microphone 1206, a Wireless Fidelity (WiFi) module 1207, a bluetooth module 1208, a power supply 1209, an external interface 1210, a headphone jack 1211, and the like. Those skilled in the art will appreciate that fig. 12 is merely an example of a terminal device and is not intended to limit the terminal device, which may include more or fewer components than those shown, or some components may be combined, or different components.
The input unit 1201 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. For example, the input unit 1201 may include a touch screen 12011 and other input devices 12012. The touch screen 12011 may collect a touch operation performed by the user on or near the touch screen 12011 (e.g., a user's operation performed on or near the touch screen 12011 by using any suitable object, such as a finger, a joint, a stylus, etc.), that is, the touch screen 12011 may be configured to detect a touch pressure and a touch input position and a touch input area, and drive the corresponding connection device according to a preset program. The touch screen 12011 can detect a touch operation of the touch screen 12011 by a user, convert the touch operation into a touch signal and send the touch signal to the processor 1101, or can transmit touch information of the touch operation to the processor 1101, and can receive and execute a command sent by the processor 1101. The touch information may include at least one of pressure magnitude information and pressure duration information. The touch screen 12011 may provide an input interface and an output interface between the terminal device and the user. In addition, the touch screen 12011 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 1201 may include other input devices 12012 in addition to the touch screen 12011. For example, other input devices 12012 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 1202 may be used to display information input by the user or information provided to the user and various menus of the terminal device. Further, the touch screen 12011 may cover the display unit 1202, and when the touch screen 12011 detects a touch operation on or near the touch screen, the touch screen 12011 may transmit the pressure information of the touch operation to the processor 1201 for determination. In the embodiment of the present invention, the touch screen 12011 and the display unit 1202 may be integrated into one component to implement input, output, and display functions of the terminal device. For convenience of description, the embodiment of the present invention is schematically illustrated by taking the touch screen 12011 as a functional set representing the touch screen 12011 and the display unit 1202 as an example, but in some embodiments, the touch screen 12011 and the display unit 1202 may be taken as two separate components.
When the display unit 1202 and the touch panel are superimposed on each other in the form of layers to form the touch screen 12011, the display unit 1202 can function as an input device and an output device, and when functioning as an output device, can be used to display images, for example, to enable playing of various videos. The Display unit 1202 may include at least one of a Liquid Crystal Display (LCD), a Thin Film Transistor Liquid Crystal Display (TFT-LCD), an Organic Light Emitting Diode (OLED) Display, an Active Matrix Organic Light Emitting Diode (AMOLED) Display, an In-plane switching (IPS) Display, a flexible Display, a 3D Display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and the terminal device may include two or more display units (or other display means) according to a particular desired embodiment, for example, the terminal device may include an external display unit (not shown in fig. 12) and an internal display unit (not shown in fig. 12).
The rf unit 1203 may be used for receiving and transmitting information or signals during a call. Typically, the radio frequency circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the radio frequency unit 1203 can also communicate with network devices and other devices through wireless communication.
Audio circuitry 1204, speaker 1205, and microphone 1206 may provide an audio interface between a user and a terminal device. The audio circuit 1204 may transmit the electrical signal converted from the received audio data to the speaker 1205, and convert the electrical signal into a sound signal for output by the speaker 1205. On the other hand, the microphone 1206 converts the collected sound signal into an electrical signal, which is received by the audio circuit 1204 and then converted into audio data, and then the audio data is processed by the audio data output processor 1201 and then sent to another electronic device via the radio frequency unit 1203, for example, or the audio data is output to the memory 1102 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the terminal equipment can help a user to send and receive e-mails, browse webpages, access streaming media and the like through a WiFi module 1208, and provides wireless broadband internet access for the user. Although fig. 12 shows the WiFi module 1208, it is understood that it does not belong to the essential constitution of the terminal device, and may be omitted entirely as needed within the scope not changing the essence of the invention.
Bluetooth is a short-range wireless communication technology. By using the bluetooth technology, the communication between mobile communication terminal devices such as a palm computer, a notebook computer, a mobile phone and the like can be effectively simplified, the communication between the devices and the Internet (Internet) can also be successfully simplified, the terminal devices enable the data transmission between the terminal devices and the Internet to be more rapid and efficient through the bluetooth module 1208, and a road is widened for wireless communication. Bluetooth technology is an open solution that enables wireless transmission of voice and data. Although fig. 12 shows the bluetooth module 1208, it is understood that it does not belong to the essential constitution of the terminal device and may be omitted entirely as needed within the scope not changing the essence of the invention.
The terminal device may also include a power supply 1209 (such as a battery) for receiving external power or powering various components within the terminal device. Preferably, the power source 1209 may be logically connected to the processor 1101 through a power management system, so that functions of managing charging, discharging, and power consumption are implemented through the power management system.
The terminal device may further include an external interface 1210, where the external interface 1210 may include a standard Micro USB interface, and may also include a multi-pin connector, which may be used to connect the terminal device to communicate with other devices, and may also be used to connect a charger to charge the terminal device.
Although not shown, the terminal device in the embodiment of the present invention may further include a camera, a flash, and other possible functional modules, which are not described herein again.
Based on the same inventive concept, the embodiment of the present invention further provides a computing device, which may be, for example, an alarm receiving system or an alarm receiving platform in the foregoing method embodiment, and specifically, may be, for example, the alarm receiving platform 104 in fig. 1A to 1B. As shown in fig. 13, the computing device in the embodiments of the present invention includes at least one processor 1301, and a memory 1302 and a communication interface 1303 connected to the at least one processor 1301. In the embodiment of the present invention, a specific connection medium between the processor 1301 and the memory 1302 is not limited, fig. 13 illustrates an example in which the processor 1301 and the memory 1302 are connected through a bus 1300, the bus 1300 is shown by a thick line in fig. 13, and a connection manner between other components is only schematically illustrated and is not limited. The bus 1300 may be divided into an address bus, a data bus, a control bus, etc., and only one thick line is shown in fig. 13 for convenience of illustration, but does not indicate only one bus or one type of bus.
In an embodiment of the present invention, the memory 1302 stores instructions executable by the at least one processor 1301, and the at least one processor 1301 may execute the steps included in the method executed by the alarm receiving system or the alarm receiving platform by executing the instructions stored in the memory 1302.
The processor 1301 is a control center of the computing device, and may connect various parts of the entire computing device through various interfaces and lines, and perform various functions and process data of the computing device by running or executing instructions stored in the memory 1302 and calling data stored in the memory 1302, thereby performing overall monitoring of the computing device. Optionally, the processor 1301 may include one or more processing units, and the processor 1301 may integrate an application processor and a modem processor, where the processor 1301 mainly processes an operating system, a user interface, an application program, and the like, and the modem processor mainly processes wireless communication. It is to be appreciated that the modem processor described above may not be integrated into processor 1301. In some embodiments, processor 1301 and memory 1302 may be implemented on the same chip, or in some embodiments, they may be implemented separately on separate chips.
The processor 1301 may be a general-purpose processor, such as a Central Processing Unit (CPU), digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, that may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present invention. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
Memory 1302, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The Memory 1302 may include at least one type of storage medium, and may include, for example, a flash Memory, a hard disk, a multimedia card, a card-type Memory, a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Programmable Read Only Memory (PROM), a Read Only Memory (ROM), a charge Erasable Programmable Read Only Memory (EEPROM), a magnetic Memory, a magnetic disk, an optical disk, and so on. The memory 1302 is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 1302 in embodiments of the present invention may also be circuitry or any other device capable of performing a storage function to store program instructions and/or data.
The communication interface 1303 is a transmission interface that can be used for communication, and can receive data or transmit data through the communication interface 1303, for example.
The computing device also includes a basic input/output system (I/O system) 1301 that facilitates information transfer between various devices within the computing device, and a mass storage device 1305 that stores an operating system 1302, application programs 1303, and other program modules 1304.
The basic input/output system 1301 includes a display 1306 for displaying information and an input device 1307 such as a mouse, keyboard, etc. for a user to input information. Wherein the display 1306 and input device 1307 are both connected to the processor 1301 through a basic input/output system 1301 connected to the system bus 1300. The basic input/output system 1301 may also include an input/output controller for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, an input-output controller may also provide output to a display screen, a printer, or other type of output device.
The mass storage device 1305 is connected to the processor 1301 through a mass storage controller (not shown) connected to the system bus 1300. The mass storage device 1305 and its associated computer-readable media provide non-volatile storage for the server package. That is, the mass storage device 1305 may include a computer-readable medium (not shown) such as a hard disk or CD-ROM drive.
According to various embodiments of the invention, the computing device package may also be operated by a remote computer connected to the network through a network, such as the Internet. That is, the computing device may connect to the network 1308 via the communication interface 1303 connected to the system bus 1300, or may connect to other types of networks or remote computer systems (not shown) using the communication interface 1303.
Based on the same inventive concept, embodiments of the present invention further provide a storage medium storing computer instructions, which, when executed on a computer, cause the computer to perform the steps of the alarm processing method as described above.
Based on the same inventive concept, the embodiment of the present invention further provides an alarm processing apparatus, which includes at least one processor and a readable storage medium, and when instructions included in the readable storage medium are executed by the at least one processor, the steps of the alarm processing method may be performed.
Based on the same inventive concept, the embodiment of the present invention further provides a chip system, where the chip system includes a processor and may further include a memory, and is used to implement the steps of the alarm processing method. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
In some possible embodiments, the aspects of the alarm processing method provided by the present invention may also be implemented in the form of a program product comprising program code for causing a computer to perform the steps of the alarm processing method according to the various exemplary embodiments of the present invention described hereinbefore when the program product is run on the computer.
Based on the same inventive concept, an embodiment of the present invention further provides an alarm processing apparatus, including: a memory for storing program instructions; and a processor for calling the program instructions stored in the memory and executing the steps of the alarm processing method according to the various exemplary embodiments of the present invention described above according to the obtained program instructions.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (15)

1. An alarm processing method, characterized in that the method comprises:
monitoring an alarm operation, wherein the alarm operation is used for triggering an alarm function in the terminal equipment;
when the alarm operation is monitored, current position information of the terminal equipment is obtained;
triggering and sending alarm information including the current position information and an electronic identity identification eID code of the user to an alarm receiving system so that the alarm receiving system carries out alarm processing according to the alarm information when confirming that the alarm is effective based on the eID code, wherein the eID code is the only citizen network electronic identity signed and sent by the user by a trusted system.
2. The method of claim 1, wherein obtaining current location information of the terminal device comprises:
determining address information input in an address input interface displayed by the terminal equipment as the current position information; alternatively, the first and second electrodes may be,
and calling a pre-stored electronic map, and determining address information of a place corresponding to the current longitude and latitude of the terminal equipment in the electronic map as the current position information.
3. The method of claim 2, wherein determining address information of a location in the electronic map corresponding to the current longitude and latitude of the terminal device as the current location information comprises:
obtaining a position correction operation for the address information;
performing preset correction processing on the address information according to the position correction operation to obtain corrected address information;
and determining the corrected address information as the current position information.
4. The method of any of claims 1-3, wherein the method further comprises:
and according to a preset time interval, the current position information of the terminal equipment is obtained again, and the obtained current position information is sent to the alarm receiving system.
5. The method of any of claims 1-3, wherein the method further comprises:
displaying an alert supplement interface;
and acquiring the warning situation description information input by the user in the warning situation supplement interface.
6. The method of any of claims 1-3, wherein the method further comprises:
receiving alarm processing result information sent by the alarm receiving system;
and displaying the alarm processing result information on the terminal equipment.
7. The method of any of claims 1-3, wherein triggering the sending of the alarm information and the eID code to the alarm receiving system comprises:
and sending the registration identity information of the user on the application comprising the alarm function and the alarm information to a corresponding application server so as to trigger the application server to obtain the eID code according to the registration identity information and send the alarm information and the eID code to the alarm receiving system.
8. An alarm processing method, characterized in that the method comprises:
receiving alarm information sent by terminal equipment and an electronic identity (eID) code of a user, wherein the alarm information comprises current position information of the terminal equipment, and the eID code is the only electronic identity of a public network issued by a trusted system for the user;
determining whether an alarm is valid according to the eID code;
and when the alarm is effective, carrying out alarm processing according to the alarm information.
9. The method of claim 8, wherein determining whether an alarm is valid based on the eID encoding comprises:
sending the eID code to the trusted system to request the trusted system to authenticate whether the eID code is legal or not;
receiving an authentication result notice sent by the trusted system;
and determining whether the alarm is effective or not according to the authentication result notification.
10. The method of claim 9, wherein the method further comprises:
receiving real-name identity information of a ciphertext corresponding to the eID code and sent by the trusted system;
decrypting the real-name identity information of the ciphertext to obtain the real-name identity information of the user;
and counting the alarm records of the user according to the real-name identity information.
11. An alarm processing apparatus, characterized in that the apparatus comprises:
the monitoring module is used for monitoring alarm operation, and the alarm operation is used for triggering an alarm function in the terminal equipment;
the obtaining module is used for obtaining the current position information of the terminal equipment when the alarm operation is monitored;
and the alarm module is used for triggering the alarm receiving system to send alarm information including the current position information and an electronic identity identification eID code of the user, so that the alarm receiving system carries out alarm processing according to the alarm information when confirming that the alarm is effective based on the eID code, wherein the eID code is the only electronic identity of the citizen network issued by the user, which is the only electronic identity of the citizen network issued by the credible system.
12. An alarm processing apparatus, characterized in that the apparatus comprises:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving alarm information sent by terminal equipment and an electronic identity (eID) code of a user, the alarm information comprises current position information of the terminal equipment, and the eID code is a unique citizen network electronic identity issued by a trusted system for the user;
the determining module is used for determining whether the alarm is effective according to the eID code;
and the alarm processing module is used for carrying out alarm processing according to the alarm information when the alarm is effective.
13. A terminal device, characterized in that the terminal device comprises:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory and for executing the steps comprised in the method of any one of claims 1 to 7 in accordance with the obtained program instructions.
14. A computing device, wherein the computing device comprises:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory and for executing the steps comprised in the method of any one of claims 8 to 10 in accordance with the obtained program instructions.
15. A storage medium storing computer-executable instructions for causing a computer to perform the steps included in the method of any one of claims 1 to 7 or to perform the steps included in the method of any one of claims 8 to 10.
CN201811361285.6A 2018-11-15 2018-11-15 Alarm processing method and device, terminal equipment and computing equipment Pending CN111263310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811361285.6A CN111263310A (en) 2018-11-15 2018-11-15 Alarm processing method and device, terminal equipment and computing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811361285.6A CN111263310A (en) 2018-11-15 2018-11-15 Alarm processing method and device, terminal equipment and computing equipment

Publications (1)

Publication Number Publication Date
CN111263310A true CN111263310A (en) 2020-06-09

Family

ID=70953553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811361285.6A Pending CN111263310A (en) 2018-11-15 2018-11-15 Alarm processing method and device, terminal equipment and computing equipment

Country Status (1)

Country Link
CN (1) CN111263310A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836567A (en) * 2020-12-08 2021-05-25 北京澎思科技有限公司 Police force mobilization method and device, computer equipment and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408897A (en) * 2014-11-26 2015-03-11 杭州优体科技有限公司 Accurate moving alarming and positioning device based on physical buttons
CN104484985A (en) * 2014-12-29 2015-04-01 北京中安国通科技有限公司 Security alarm method, terminal, police system and security alarm platform
CN106529310A (en) * 2016-10-31 2017-03-22 珠海市魅族科技有限公司 Method and device for inhibiting screen capture
CN106850391A (en) * 2015-12-07 2017-06-13 天维尔信息科技股份有限公司 Alarm treatment method and system based on internet
CN107294909A (en) * 2016-04-04 2017-10-24 汪风珍 The product and method of a kind of electronic identity real-name authentication
CN107835176A (en) * 2017-11-10 2018-03-23 中汇通联科技有限公司 A kind of network authentication method and platform based on eID
CN107945080A (en) * 2016-10-13 2018-04-20 杭州悉尔科技有限公司 A kind of electronic identity card awarding method and system based on biological identification technology
CN108364442A (en) * 2018-02-14 2018-08-03 成都太航科技有限公司 A kind of combination person of reporting a case to the security authorities information and the alarm system of position positioning

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408897A (en) * 2014-11-26 2015-03-11 杭州优体科技有限公司 Accurate moving alarming and positioning device based on physical buttons
CN104484985A (en) * 2014-12-29 2015-04-01 北京中安国通科技有限公司 Security alarm method, terminal, police system and security alarm platform
CN106850391A (en) * 2015-12-07 2017-06-13 天维尔信息科技股份有限公司 Alarm treatment method and system based on internet
CN107294909A (en) * 2016-04-04 2017-10-24 汪风珍 The product and method of a kind of electronic identity real-name authentication
CN107945080A (en) * 2016-10-13 2018-04-20 杭州悉尔科技有限公司 A kind of electronic identity card awarding method and system based on biological identification technology
CN106529310A (en) * 2016-10-31 2017-03-22 珠海市魅族科技有限公司 Method and device for inhibiting screen capture
CN107835176A (en) * 2017-11-10 2018-03-23 中汇通联科技有限公司 A kind of network authentication method and platform based on eID
CN108364442A (en) * 2018-02-14 2018-08-03 成都太航科技有限公司 A kind of combination person of reporting a case to the security authorities information and the alarm system of position positioning

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836567A (en) * 2020-12-08 2021-05-25 北京澎思科技有限公司 Police force mobilization method and device, computer equipment and medium

Similar Documents

Publication Publication Date Title
CN110689460B (en) Traffic accident data processing method, device, equipment and medium based on block chain
US10528770B2 (en) System and method for remotely initiating lost mode on a computing device
CN109472166B (en) Electronic signature method, device, equipment and medium
CN108614878B (en) Protocol data management method, device, storage medium and system
CN111612168B (en) Management method and related device for machine learning task
CN111475841B (en) Access control method, related device, equipment, system and storage medium
US9515836B2 (en) System and method for location assurance using passive computational tags
US9094800B2 (en) System and method for preventing driver use of a mobile device
CN110826043B (en) Digital identity application system and method, identity authentication system and method
CN109844823A (en) The positioning of PEPS portable device
CN105848134A (en) Virtual SIM (Subscriber Identity Module) card management device, communication terminal, access control method and management method
CN110706371A (en) Block chain-based driving safety management method, system and storage medium
CN110933113B (en) Block chain-based interactive behavior detection method, device, equipment and storage medium
CN110598386B (en) Block chain-based data processing method, device, equipment and storage medium
WO2022052451A1 (en) Image information processing method and apparatus, electronic device and storage medium
CN110851510A (en) Data processing method and device of transaction system based on block chain
CN110581891A (en) Game data processing method, device, equipment and storage medium based on block chain
CN113408006A (en) Monitoring data access method and device, indoor monitoring system and storage medium
CN110597906B (en) Entrance integral generation method, device and equipment based on blockchain and storage medium
US11576229B2 (en) System for emergency response alerts and notification
CN111263310A (en) Alarm processing method and device, terminal equipment and computing equipment
US11238136B2 (en) Detecting unauthorized access to secure devices
CN111694892B (en) Resource transfer method, device, terminal, server and storage medium
CN110969072B (en) Model optimization method, device and image analysis system
CN203283185U (en) Anti-theft tracking device of car

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024346

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20200609

RJ01 Rejection of invention patent application after publication