CN112423218A - Social distance alarm method and device, computer equipment and storage medium - Google Patents

Social distance alarm method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112423218A
CN112423218A CN202011049338.8A CN202011049338A CN112423218A CN 112423218 A CN112423218 A CN 112423218A CN 202011049338 A CN202011049338 A CN 202011049338A CN 112423218 A CN112423218 A CN 112423218A
Authority
CN
China
Prior art keywords
distance
information
tag
label
alarm information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011049338.8A
Other languages
Chinese (zh)
Other versions
CN112423218B (en
Inventor
袁丽
冯杰
陈万里
孙川
刘建成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Red Point Positioning Beijing Technology Co ltd
Original Assignee
Red Point Positioning Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Red Point Positioning Beijing Technology Co ltd filed Critical Red Point Positioning Beijing Technology Co ltd
Priority to CN202011049338.8A priority Critical patent/CN112423218B/en
Publication of CN112423218A publication Critical patent/CN112423218A/en
Application granted granted Critical
Publication of CN112423218B publication Critical patent/CN112423218B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application relates to a social distance alarm method, a social distance alarm device, computer equipment and a storage medium. The method comprises the following steps: acquiring distance information between the first label and the second label; the distance information comprises a social distance between the first tag and the second tag and time corresponding to the social distance; detecting the time length of the social distance between the social distance and a first distance threshold value and the time length between the social distance and a second distance threshold value, and generating first alarm information when the time length is larger than a preset time threshold value; and if the social distance is smaller than or equal to the first distance threshold, generating second alarm information. Therefore, when the time that the social distance is larger than the first distance threshold and smaller than or equal to the second distance threshold reaches the preset time threshold, or the social distance is smaller than or equal to the first distance threshold, effective social contact is determined, and alarm information is generated to perform social early warning.

Description

Social distance alarm method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of ranging and positioning technologies, and in particular, to a social distance alarm method, apparatus, computer device, and storage medium.
Background
With the development of the distance measurement and positioning technology, a technology for measuring and positioning the distance between people or between people and obstacles appears, and the purposes of early warning and protection on the collision between people or between people and obstacles can be achieved through the technology. Traditional range finding location technique aims at solving children and special crowd's road safety, wears special waistband through making target crowd, detects other people or barrier to send out the police dispatch newspaper under the scene that probably bumps, avoid taking place danger.
However, in the conventional method, the early warning is only performed according to the distance between people, and based on the early warning information, whether the distance between people appears in a certain spatial range can only be determined, and whether effective social contact exists between the people cannot be determined, so that the social warning cannot be performed.
Disclosure of Invention
In view of the above, there is a need to provide a social distance warning method, apparatus, computer device and storage medium capable of determining whether there is effective social interaction between people.
A social distance alert method, the method comprising:
acquiring distance information between the first label and the second label; wherein the distance information comprises a social distance between the first tag and the second tag and a time corresponding to the social distance;
according to the social distance and the time corresponding to the social distance, detecting the time length of the social distance between a first distance threshold and a second distance threshold, and generating first alarm information when the time length is greater than a preset time threshold;
and if the social distance is smaller than or equal to the first distance threshold, generating second alarm information.
In one embodiment, the method further comprises:
tracking the users corresponding to the first label and the second label according to the first alarm information or the second alarm information, and determining the contact information of the users corresponding to the first label and the second label; wherein the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory.
In one embodiment, the method further comprises:
detecting a network state corresponding to the first label and/or the second label;
when no network connection exists, storing the first alarm information and the second alarm information to a storage unit corresponding to the first label and/or the second label;
and when the network connection is detected, reporting the first alarm information and the second alarm information in the storage unit to the target equipment according to a preset time interval.
In one embodiment, after the storing the first alarm information and the second alarm information to the storage unit corresponding to the first tag and/or the second tag when there is no network connection, the method further includes:
and storing the first alarm information and the second alarm information in the storage unit to the target equipment through a preset interface.
In one embodiment, after the reporting, according to a preset time interval, the first alarm information and the second alarm information in the storage unit to the target device when the existence of the network connection is detected, the method further includes:
and if the message of the target equipment for confirming the alarm information is not received within the preset time threshold, the first alarm information and the second alarm information in the storage unit are reported to the target equipment again.
In one embodiment, the obtaining distance information between the first tag and the second tag includes:
measuring distance information between the first tag and the second tag by an ultra-wideband ranging unit in the first tag or the second tag;
or, determining distance information between the first label and the second label through a preset anchor node.
In one embodiment, the determining, by a preset anchor node, distance information between the first tag and the second tag includes:
determining first position information corresponding to the first label and second position information corresponding to the second label through the anchor node;
and determining distance information between the first label and the second label according to the first position information and the second position information.
A social distance alert device, the device comprising:
the distance information acquisition module is used for acquiring distance information between the first label and the second label; wherein the distance information comprises a social distance between the first tag and the second tag and a time corresponding to the social distance;
the first alarm information generation module is used for detecting the time length of the social distance between the social distance and a first distance threshold value and the time length is smaller than or equal to a second distance threshold value according to the social distance and the time corresponding to the social distance, and generating first alarm information when the time length is larger than a preset time threshold value;
and the second alarm information generation module is used for generating second alarm information if the social distance is smaller than or equal to the first distance threshold.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the method of any preceding claim when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the above.
According to the social distance alarm method, the social distance alarm device, the computer equipment and the storage medium, the distance information between the first tag and the second tag is obtained, the distance information comprises the social distance between the first tag and the second tag and the time corresponding to the social distance, the time length of the social distance between the first distance threshold and the second distance threshold is detected according to the social distance and the time corresponding to the social distance, when the time length is larger than the preset time threshold, first alarm information is generated, and if the social distance is smaller than or equal to the first distance threshold, second alarm information is generated. Therefore, when the time that the social distance is larger than the first distance threshold and smaller than or equal to the second distance threshold reaches the preset time threshold, or the social distance is smaller than or equal to the first distance threshold, effective social contact is determined, and alarm information is generated to perform social early warning.
Drawings
FIG. 1 is a diagram of an application environment of a social distance alert method in one embodiment;
FIG. 2 is a flow diagram that illustrates a method for social distance alerting, according to one embodiment;
FIG. 3 is an interaction diagram of a tag alarm in one embodiment;
FIG. 4 is a flowchart illustrating an alarm information transmission method according to an embodiment;
FIG. 5 is a schematic flow chart diagram illustrating one possible implementation of step S100 in one embodiment;
FIG. 6 is a block diagram illustrating a social distance alert method in accordance with an exemplary embodiment;
FIG. 7 is a schematic interface diagram of an alarming tag in one embodiment;
FIG. 8 is a schematic diagram illustrating a process of processing an alarm message by the tag host MCU in one embodiment;
FIG. 9 is a flow diagram illustrating ultra-wideband network message processing in one embodiment;
FIG. 10 is a schematic diagram illustrating the cooperative transmission of alarm information in an S-PWS mode and a C-PWS mode in accordance with one embodiment;
FIG. 11 is a schematic diagram of alarm information transmission in a C-PWS mode in one embodiment;
FIG. 12 is a schematic diagram of alarm information transmission in an S-PWS mode in one embodiment;
FIG. 13 is a block diagram of a social distance alert device in one embodiment;
FIG. 14 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The social distance alarm method provided by the application can be applied to the application environment shown in fig. 1. The terminal 102 communicates with the terminal 104 via a network, and the terminal 102 may communicate with the server 106 via the terminal 104. The terminal 102 or the terminal 104 obtains distance information between the first tag and the second tag, where the distance information includes a social distance between the first tag and the second tag and time corresponding to the social distance, and detects a time length during which the social distance is kept between a first distance threshold and a second distance threshold, where the time length is greater than a preset time threshold, a first alarm message is generated, and if the social distance is less than or equal to the first distance threshold, a second alarm message is generated. The terminals 102 and 104 may be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 106 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a social distance warning method is provided, which is described by taking the method as an example applied to the terminal in fig. 1, and includes the following steps:
step S100, obtaining distance information between a first label and a second label; the distance information comprises a social distance between the first tag and the second tag and a time corresponding to the social distance.
Step S200, according to the social distance and the time corresponding to the social distance, detecting the time length of the social distance between the social distance and the first distance threshold value and the time length of the social distance between the social distance and the second distance threshold value, and generating first alarm information when the time length is larger than a preset time threshold value.
And step S300, if the social distance is smaller than or equal to the first distance threshold, generating second alarm information.
The first label and the second label are respectively arranged at different terminals and respectively represent different users. The distance between the first tag and the second tag represents a social distance between people. The first distance threshold is a preset distance which can be different from 50cm, 100cm or 300cm, if the social distance between the first tag and the second tag is smaller than or equal to the first preset threshold, it indicates that the distance between the first tag and the second tag is too close, and the social distance alarm is performed on the distance between the first tag and the second tag. The second distance threshold is a preset distance, and may be 100cm, 300cm or 500cm, and the social distance between the first tag and the second tag is greater than the first distance threshold and is less than or equal to the second distance threshold, which indicates that the distance between the first tag and the second tag is somewhat short, but the distance is not close to the situation that an emergency alarm is needed, but when the social distance between the first tag and the second tag is between the first distance threshold and the second preset distance for a long time (for example, 5 minutes or 10 minutes), it is considered that the social distance alarm needs to be performed on the distance between the first tag and the second tag. The preset time threshold is a preset time length and can be 3 minutes, 5 minutes or 10 minutes.
Specifically, distance information between a first tag and a second tag is obtained, and the distance information between the first tag and the second tag is used for representing the distance information between the first tag heat or equipment and the second tag equipped person or equipment, wherein the distance information comprises a corresponding social distance and a time corresponding to the social distance. For example, the social distance corresponds to a time of 10:10:00 am on 6/1/2020, and the social distance between the first tag and the second tag is 30cm, or the social distance corresponds to a time of 10:20:00 am on 6/1/2020, and the social distance between the first tag and the second tag is 40 cm.
For example, the description will be given by taking 50cm as a first preset distance, 100cm as a second preset distance, and 5 minutes as a preset time threshold. According to the social distance and the time corresponding to the social distance, detecting the time length of the social distance between (50cm, 100 cm), for example, between 10:10:00 in the morning of 6 month 1 in 2020 and 10:20:00 in the morning of 6 month 1 in 2020, the social distance between the first tag and the second tag is always between (50cm, 100 cm), at this time, the time length of the social distance between the first distance threshold and the second distance threshold is 10 minutes and is greater than the preset time threshold for 5 minutes, considering that effective social contact exists between the first tag and the second tag, and generating first alarm information, or considering that effective social contact exists between the first tag and the second tag, and generating second alarm information, when the social distance between the first tag and the second tag is always less than or equal to 50 cm.
According to the social distance alarm method, the distance information between the first tag and the second tag is obtained, the distance information comprises the social distance between the first tag and the second tag and the time corresponding to the social distance, the time length that the social distance is kept between the first distance threshold and the second distance threshold is smaller than or equal to the second distance threshold is detected according to the social distance and the time corresponding to the social distance, when the time length is larger than the preset time threshold, first alarm information is generated, and if the social distance is smaller than or equal to the first distance threshold, second alarm information is generated. Therefore, when the time that the social distance is larger than the first distance threshold and smaller than or equal to the second distance threshold reaches the preset time threshold, or the social distance is smaller than or equal to the first distance threshold, effective social contact is determined, and alarm information is generated to perform social early warning.
In an exemplary embodiment, the social distance alert method further includes:
tracking the users corresponding to the first label and the second label according to the first alarm information or the second alarm information, and determining the contact information of the users corresponding to the first label and the second label; wherein the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory.
Specifically, in the social distance alarm method in the previous embodiment, the first alarm information and the second alarm information used for alarm may be generated not only when the social distance between the first tag and the second tag is too close or is within a certain determined time length. Simultaneously, can also track the user that first label and second label correspond based on first alarm information or second alarm information, determine user's that first label and second label correspond contact distance, contact time, contact place or contact orbit etc..
For example, when an epidemic situation occurs and social situations between people need to be investigated or tracked, each user can be provided with a corresponding tag, an alarm is given through the distance between the tags, so that the user can keep a certain social distance with other people, and meanwhile, when the epidemic situation is outbreak or a specific user is detected to be a person in close contact, the person in close contact with the specific user is tracked according to the first alarm information and the second alarm information. Alternatively, in an ideal state, when all people or obstacles are equipped with tags, tracking can be performed according to alarm information corresponding to each tag. However, in a real situation, not every person or obstacle may be equipped with a tag, and in this case, the place where the user has passed and the time of stay can be tracked through the alarm information in the user equipped with the tag, and the corresponding contact information is gathered to the society according to the information.
Optionally, a ranging ultra wideband module (UWB), a bluetooth low energy module (BLE), a memory, an LED lamp, and a buzzer may be integrated in the tag. The tags "announce" the presence of the tags and the associated configuration information through the bluetooth beacon frame and use the ultra-wideband signal to measure the distance between the tags. When the alarm condition is met, the tag indicates an alarm or warning state via an LED light or buzzer. Fig. 3 is an interaction diagram of tag alarm.
In the above exemplary embodiment, according to the first alarm information or the second alarm information, the users corresponding to the first tag and the second tag are tracked, and the contact information of the users corresponding to the first tag and the second tag is determined, where the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory. Therefore, the contact history of the user can be tracked according to the first alarm information or the second alarm information, relevant contact personnel are found, and troubleshooting is facilitated.
In an exemplary embodiment, as shown in fig. 4, a flowchart of an alarm information transmission method is shown, which includes:
step S410, detecting a network state corresponding to the first tag and/or the second tag.
Step S420, when no network connection exists, the first alarm information and the second alarm information are stored in a storage unit corresponding to the first label and/or the second label.
Step S430, when the existence of the network connection is detected, reporting the first alarm information and the second alarm information in the storage unit to the target device according to a preset time interval.
The preset time interval is a preset time interval, and may be 10 seconds, 20 seconds, or 30 seconds.
Specifically, a network state corresponding to the first tag and/or the second tag is detected, when no network connection exists, the first alarm information and the second alarm information are stored in a storage unit corresponding to the first tag and/or the second tag, and when the existence of the network connection is detected, the first alarm information and the second alarm information in the storage unit are reported to a target device according to a preset time interval.
Illustratively, the RTLS module of the tag monitors the network status by periodically monitoring beacon frames of UWB in the tag, and once the ultra-wideband WIN network is discovered and establishes a connection with the server, the tag uploads alarm information from the local cache to the RTLS server. The RTLS module of the tag provides the connection status with WIN via the # NWK command. And the host MCU uploads alarm information to the RTLS server by using the MSG uplink message. Therefore, switching between the human-to-human social distance alarm (S-PWS) in the non-network environment and the human-to-human social distance alarm (C-PWS) in the network environment is realized.
Optionally, after step S420, the method further includes: and storing the first alarm information and the second alarm information in the storage unit to target equipment through a preset interface.
Specifically, in the state without a network, the alarm information is locally stored, and the alarm information can be exported through a preset interface besides being uploaded when the network is waited for. For example, connecting to a computer via USB, retrieving the alarm information in the cache from the connected tag, and saving it locally in the PC.
Optionally, after step S430, the method further includes: and if the message of the target equipment for confirming the alarm information is not received within the preset time threshold, the first alarm information and the second alarm information in the storage unit are reported to the target equipment again.
Specifically, in the presence of a network, reporting first alarm information and second alarm information in a storage unit to a target device according to a preset time interval, in order to ensure that the target device receives corresponding alarm information, the target device sends an acknowledgement message after receiving the alarm information, and if the acknowledgement message of the target device to the alarm information is not received within a preset time threshold, considering that the alarm information is failed to be uploaded, reporting the first alarm information and the second alarm information in the storage unit to the target device again.
In the above exemplary embodiment, a network state corresponding to the first tag and/or the second tag is detected, when no network connection exists, the first alarm information and the second alarm information are stored in the storage unit corresponding to the first tag and/or the second tag, and when the network connection is detected, the first alarm information and the second alarm information in the storage unit are reported to the target device according to a preset time interval. Therefore, data backup under the network-free and network-available states can be realized, and the safety of the data is ensured. Meanwhile, an interface is provided to transmit data, so that diversified implementation schemes are provided for the transmission of alarm information, and various requirements of data backup are met. And when network transmission exists, the reliability of data backup is ensured through the acknowledgement message.
In an exemplary embodiment, as shown in fig. 5, which is a schematic flow chart of an implementable method of step S100, the method includes:
step S110, measuring distance information between the first tag and the second tag by using the ultra-wideband ranging unit in the first tag or the second tag.
Step S120, determining distance information between the first tag and the second tag through a preset anchor node.
Specifically, the first tag and the second tag are provided with ultra-wideband ranging Units (UWB), and the distance between the first tag and the second tag can be measured through ultra-wideband signals of the UWB. Distance information between the first tag and the second tag may also be determined by an ultra-wideband wireless anchor node (WIN Anchors).
Optionally, determining, by the anchor node, first location information corresponding to the first tag and second location information corresponding to the second tag; and determining the distance information between the first label and the second label according to the first position information and the second position information.
Specifically, after first position information corresponding to a first tag is determined through the first tag and the anchor node, second position information corresponding to a second tag is determined through the second tag and the anchor node, and first position information corresponding to the first tag and second position information corresponding to the second tag are determined, distance information between the first tag and the second tag is determined according to the first position information and the second position information.
In the above exemplary embodiment, the distance information between the first tag and the second tag is determined by the ultra-wideband ranging unit in the first tag or the second tag; or, the distance information between the first label and the second label is determined through a preset anchor node. An optional mode is provided for determining the distance information between the first label and the second label, so that different field environments can be dealt with, accurate distance information is provided for generating alarm information, and the accuracy of the alarm information is improved.
In a specific exemplary embodiment, the first tag and the second tag are taken as elements such as an integrated ranging ultra wideband module (UWB), a bluetooth low energy module (BLE), a memory, an LED lamp, and a buzzer: the tag "announces" the presence of the tag and associated configuration information, through the bluetooth beacon frame, and measures the distance between the tags using the ultra-wideband signal. When the alarm condition is met, the tag indicates an alarm or warning state via an LED light or buzzer.
The social distance alarm using the tag comprises the following steps: the method comprises the following steps of (1) warning the social distance between people in a non-network environment (S-PWS) and warning the social distance between people in a network environment (C-PWS). Fig. 6 is a schematic structural diagram of a social distance warning method in a specific embodiment. The S-PWS system comprises: tag (T), Desktop configuration utility (Desktop utility). The C-PWS system comprises: the system comprises a label (T), ultra-wideband wireless infrastructure anchor nodes (WIN Anchors), an RTLS Server (RTLS Server) comprising a Message processor (Message processor), a REST API, a Server front-end component (SiteWise), a software module (analysis and Reporting) for generating alarm analysis and report, and desktop software (EZ-Tagging) for label distribution.
Specifically, the label can record alarm information in a local storage in a C-PWS mode, and upload the alarm information to an RTLS server when the alarm information is available after an ultra-wideband network is found. Desktop configuration utility: PWS _ SETUP is a stand-alone software that provides a user interface for tag configuration, firmware upgrade, and license renewal; the tag is communicated with the computer and is connected to the computer through a USB; in the no network mode, the software also provides a mechanism to retrieve cached alarm information from the attached tag and save it locally to the PC. The message handler is one of the server-side components that can receive incoming alarm events from the tags and store them in the history database. The server front-end component also provides a web application that manages PWS configuration and trackable associations that can search and display contact histories. EZ-Tagging is desktop software for trackable/tag assignment. The RTLS server provides a REST API for uploading alarm information for subsequent retrieval analysis, while also storing the configuration of tags, WIN and other RTLS data. The ultra-wideband WIN network provides wireless connection between the tag and the RTLS server for tag configuration and alarm uploading. And the software module for generating alarm analysis and report provides the function of generating report and UI to analyze the history of the PWS alarm information.
The method comprises the switching of the S-PWS and the C-PWS. The alarm tag uses a private manual card of V7, as shown in FIG. 7, which is an interface schematic diagram of the alarm tag. Specifically, the RTLS module of the tag and the host MCU communicate through the UART. The RTLS module sends alarm events, e.g., new alarms, updates of severity level, distance and alarm clearance, via # ALM messages. The RTLS module of the tag periodically monitors beacon frames of UWB, and once the ultra-wideband WIN network is found and connected with the server, the tag uploads alarm information to the RTLS server from a local cache. The RTLS module of the tag provides the connection status with WIN via the # NWK command. And the host MCU uploads alarm information to the RTLS server by using the MSG uplink message. Therefore, switching between the human-to-human social distance alarm (S-PWS) in the non-network environment and the human-to-human social distance alarm (C-PWS) in the network environment is realized. Fig. 8 is a schematic flow chart of processing an alarm message for a tag host MCU. Fig. 9 is a schematic flow chart of the message processing of the ultra-wideband network.
Regarding the derivation of the tag alert information, specifically, in the C-PWS mode, the tag reports the alert information to the RTLS server. The tag will store the event in a local cache when a connection to the server is not available. The local cache is capable of storing at least 500 events. If the tag cache is full, the new alarm information will cover the oldest and keep the 500 most recent events. In the S-PWS mode, the alarm of the tag can be derived through USB, and in the C-PWS mode, the alarm of the tag is transmitted to the server through a UWB network. As shown in FIG. 10, a schematic diagram is transmitted for the S-PWS mode and the C-PWS mode alarm information in a cooperation mode. Specifically, as shown in FIG. 11, the alarm information transmission diagram is in a C-PWS mode, and as shown in FIG. 12, the alarm information transmission diagram is in an S-PWS mode.
In the above exemplary embodiment, the alarm information can be generated according to the distance measurement in the presence or absence of a network, and the tag has a storage function, so that the alarm information in the absence of the network can be stored, and uploaded to the server when finding out the UWB network, thereby tracking, counting and analyzing all the historical alarm events in close contact between people in all directions. Information of persons in close contact.
It should be understood that although the various steps in the flow charts of fig. 2-12 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-12 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 13, there is provided a social distance warning apparatus including: distance information acquisition module 131, first alarm information generation module 132 and second alarm information generation module 133, wherein:
a distance information obtaining module 131, configured to obtain distance information between the first tag and the second tag; the distance information comprises a social distance between the first tag and the second tag and time corresponding to the social distance;
the first alarm information generation module 132 is configured to detect a time length during which the social distance is kept between being greater than a first distance threshold and being less than or equal to a second distance threshold according to the social distance and time corresponding to the social distance, and generate first alarm information when the time length is greater than a preset time threshold;
and the second alarm information generating module 133 is configured to generate second alarm information if the social distance is less than or equal to the first distance threshold.
In one embodiment, the apparatus further comprises a contact information tracking module for: tracking the users corresponding to the first label and the second label according to the first alarm information or the second alarm information, and determining the contact information of the users corresponding to the first label and the second label; wherein the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory.
In one embodiment, the apparatus further comprises an alert information transmission module configured to: detecting a network state corresponding to the first label and/or the second label; when no network connection exists, the first alarm information and the second alarm information are stored in a storage unit corresponding to the first label and/or the second label; when the network connection is detected, reporting the first alarm information and the second alarm information in the storage unit to the target equipment according to a preset time interval.
In one embodiment, the alert information transmission module is further configured to: and storing the first alarm information and the second alarm information in the storage unit to target equipment through a preset interface.
In one embodiment, the alert information transmission module is further configured to: and if the message of the target equipment for confirming the alarm information is not received within the preset time threshold, the first alarm information and the second alarm information in the storage unit are reported to the target equipment again.
In one embodiment, the distance information obtaining module 131 is further configured to: measuring distance information between the first label and the second label through an ultra-bandwidth ranging unit in the first label or the second label; or, the distance information between the first label and the second label is determined through a preset anchor node.
In one embodiment, the distance information obtaining module 131 is further configured to: determining first position information corresponding to the first label and second position information corresponding to the second label through the anchor node; and determining the distance information between the first label and the second label according to the first position information and the second position information.
For specific definition of the social distance warning device, reference may be made to the above definition of the social distance warning method, which is not described herein again. The modules in the social distance warning device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 14. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a social distance alert method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 14 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
acquiring distance information between the first label and the second label; the distance information comprises a social distance between the first tag and the second tag and time corresponding to the social distance;
detecting the time length of the social distance between the social distance and a first distance threshold value and the time length between the social distance and a second distance threshold value, and generating first alarm information when the time length is larger than a preset time threshold value;
and if the social distance is smaller than or equal to the first distance threshold, generating second alarm information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: tracking the users corresponding to the first label and the second label according to the first alarm information or the second alarm information, and determining the contact information of the users corresponding to the first label and the second label; wherein the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory.
In one embodiment, the processor, when executing the computer program, further performs the steps of: detecting a network state corresponding to the first label and/or the second label; when no network connection exists, the first alarm information and the second alarm information are stored in a storage unit corresponding to the first label and/or the second label; when the network connection is detected, reporting the first alarm information and the second alarm information in the storage unit to the target equipment according to a preset time interval.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and storing the first alarm information and the second alarm information in the storage unit to target equipment through a preset interface.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and if the message of the target equipment for confirming the alarm information is not received within the preset time threshold, the first alarm information and the second alarm information in the storage unit are reported to the target equipment again.
In one embodiment, the processor, when executing the computer program, further performs the steps of: measuring distance information between the first label and the second label through an ultra-bandwidth ranging unit in the first label or the second label; or, the distance information between the first label and the second label is determined through a preset anchor node.
In one embodiment, the processor, when executing the computer program, further performs the steps of: determining first position information corresponding to the first label and second position information corresponding to the second label through the anchor node; and determining the distance information between the first label and the second label according to the first position information and the second position information.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring distance information between the first label and the second label; the distance information comprises a social distance between the first tag and the second tag and time corresponding to the social distance;
detecting the time length of the social distance between the social distance and a first distance threshold value and the time length between the social distance and a second distance threshold value, and generating first alarm information when the time length is larger than a preset time threshold value;
and if the social distance is smaller than or equal to the first distance threshold, generating second alarm information.
In one embodiment, the computer program when executed by the processor further performs the steps of: tracking the users corresponding to the first label and the second label according to the first alarm information or the second alarm information, and determining the contact information of the users corresponding to the first label and the second label; wherein the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory.
In one embodiment, the computer program when executed by the processor further performs the steps of: detecting a network state corresponding to the first label and/or the second label; when no network connection exists, the first alarm information and the second alarm information are stored in a storage unit corresponding to the first label and/or the second label; when the network connection is detected, reporting the first alarm information and the second alarm information in the storage unit to the target equipment according to a preset time interval.
In one embodiment, the computer program when executed by the processor further performs the steps of: and storing the first alarm information and the second alarm information in the storage unit to target equipment through a preset interface.
In one embodiment, the computer program when executed by the processor further performs the steps of: and if the message of the target equipment for confirming the alarm information is not received within the preset time threshold, the first alarm information and the second alarm information in the storage unit are reported to the target equipment again.
In one embodiment, the computer program when executed by the processor further performs the steps of: measuring distance information between the first label and the second label through an ultra-bandwidth ranging unit in the first label or the second label; or, the distance information between the first label and the second label is determined through a preset anchor node.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining first position information corresponding to the first label and second position information corresponding to the second label through the anchor node; and determining the distance information between the first label and the second label according to the first position information and the second position information.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A social distance alert method, the method comprising:
acquiring distance information between the first label and the second label; wherein the distance information comprises a social distance between the first tag and the second tag and a time corresponding to the social distance;
according to the social distance and the time corresponding to the social distance, detecting the time length of the social distance between a first distance threshold and a second distance threshold, and generating first alarm information when the time length is greater than a preset time threshold;
and if the social distance is smaller than or equal to the first distance threshold, generating second alarm information.
2. The method of claim 1, further comprising:
tracking the users corresponding to the first label and the second label according to the first alarm information or the second alarm information, and determining the contact information of the users corresponding to the first label and the second label; wherein the contact information includes at least one of a contact distance, a contact time, a contact location, or a contact trajectory.
3. The method of claim 1, further comprising:
detecting a network state corresponding to the first label and/or the second label;
when no network connection exists, storing the first alarm information and the second alarm information to a storage unit corresponding to the first label and/or the second label;
and when the network connection is detected, reporting the first alarm information and the second alarm information in the storage unit to the target equipment according to a preset time interval.
4. The method of claim 3, wherein after storing the first alert information and the second alert information to a storage unit corresponding to the first tag and/or the second tag when there is no network connection, further comprising:
and storing the first alarm information and the second alarm information in the storage unit to the target equipment through a preset interface.
5. The method of claim 3, wherein after reporting the first alarm information and the second alarm information in the storage unit to a target device at preset time intervals when the presence of the network connection is detected, the method further comprises:
and if the message of the target equipment for confirming the alarm information is not received within the preset time threshold, the first alarm information and the second alarm information in the storage unit are reported to the target equipment again.
6. The method of claim 1, wherein obtaining distance information between the first tag and the second tag comprises:
measuring distance information between the first tag and the second tag by an ultra-wideband ranging unit in the first tag or the second tag;
or, determining distance information between the first label and the second label through a preset anchor node.
7. The method according to claim 6, wherein the determining the distance information between the first tag and the second tag through a preset anchor node comprises:
determining first position information corresponding to the first label and second position information corresponding to the second label through the anchor node;
and determining distance information between the first label and the second label according to the first position information and the second position information.
8. A social distance alert device, the device comprising:
the distance information acquisition module is used for acquiring distance information between the first label and the second label; wherein the distance information comprises a social distance between the first tag and the second tag and a time corresponding to the social distance;
the first alarm information generation module is used for detecting the time length of the social distance between the social distance and a first distance threshold value and the time length is smaller than or equal to a second distance threshold value according to the social distance and the time corresponding to the social distance, and generating first alarm information when the time length is larger than a preset time threshold value;
and the second alarm information generation module is used for generating second alarm information if the social distance is smaller than or equal to the first distance threshold.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202011049338.8A 2020-09-29 2020-09-29 Social distance alarm method, device, computer equipment and storage medium Active CN112423218B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011049338.8A CN112423218B (en) 2020-09-29 2020-09-29 Social distance alarm method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011049338.8A CN112423218B (en) 2020-09-29 2020-09-29 Social distance alarm method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112423218A true CN112423218A (en) 2021-02-26
CN112423218B CN112423218B (en) 2023-05-26

Family

ID=74854300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011049338.8A Active CN112423218B (en) 2020-09-29 2020-09-29 Social distance alarm method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112423218B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5574426A (en) * 1995-06-30 1996-11-12 Insys, Ltd. Obstacle detection system for vehicles moving in reverse
US20150113048A1 (en) * 2013-10-17 2015-04-23 International Business Machines Corporation Switching of electronic social presence between devices
CN108833682A (en) * 2018-05-28 2018-11-16 广东小天才科技有限公司 Position reminding method and device
CN111493444A (en) * 2020-04-23 2020-08-07 深圳市建筑装饰(集团)有限公司 Intelligent epidemic prevention safety helmet and intelligent epidemic prevention safety management system
CA3082221A1 (en) * 2020-04-15 2020-08-31 Promark Electronics Inc. Social distancing personal warning device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5574426A (en) * 1995-06-30 1996-11-12 Insys, Ltd. Obstacle detection system for vehicles moving in reverse
US20150113048A1 (en) * 2013-10-17 2015-04-23 International Business Machines Corporation Switching of electronic social presence between devices
CN108833682A (en) * 2018-05-28 2018-11-16 广东小天才科技有限公司 Position reminding method and device
CA3082221A1 (en) * 2020-04-15 2020-08-31 Promark Electronics Inc. Social distancing personal warning device
CN111493444A (en) * 2020-04-23 2020-08-07 深圳市建筑装饰(集团)有限公司 Intelligent epidemic prevention safety helmet and intelligent epidemic prevention safety management system

Also Published As

Publication number Publication date
CN112423218B (en) 2023-05-26

Similar Documents

Publication Publication Date Title
US11330397B2 (en) System for continuously determining location of electronic tags with methods to achieve low power consumption
US8872655B2 (en) System, method and network for monitoring of location of items
EP2827168A1 (en) Object acquiring system and acquiring method thereof
US20100013639A1 (en) Low power asset position tracking system
US20150049190A1 (en) System and Method for Video/Audio and Event Dispatch Using Positioning System
JP2015505406A (en) Emergency response and tracking using lighting networks
US9881480B2 (en) Mobile device loss prevention
US9706380B1 (en) Providing emergency notification and tracking data from a mobile device
Maryam et al. A survey on smartphones systems for emergency management (SPSEM)
CN110637480A (en) Wireless device detection, tracking and authentication platform and techniques
US11743685B2 (en) Systems and methods for monitoring system equipment diagnosis
JP2008103907A (en) Method and system of support for specifying and tracking criminal terminal, server, and base station
US9921290B2 (en) System and method for situational awareness
CN112423218A (en) Social distance alarm method and device, computer equipment and storage medium
US11195403B2 (en) Activity-based rules for compliance detection using body-worn offender monitoring electronic devices
Hasan et al. iQMS: IoT-based QMS framework for tracking of quarantined subjects
JP7127162B2 (en) Mobile terminal region monitoring control method, stay situation monitoring method and stay situation monitoring system
US11263881B2 (en) System and method of alternative tracking upon disabling of monitoring device
RU2695499C1 (en) Method and device for remote monitoring of compliance with safety regulations by employees
Sah et al. Weather prediction using multiple iot based wireless sensors
Silva et al. Traceme—indoor real-time location system
US20230177946A1 (en) System and method of tracking a monitoring device
US10972875B2 (en) System and method of alternative tracking upon disabling of monitoring device
Gohain et al. Coviband-wearable social distancing and contact tracing device using signal strength indicator metrics
US11895556B2 (en) Systems and methods for correlating encounters between entities via ubiquitous networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant