CN112637404A - Supreme APP for preventing and treating dark-ground injury - Google Patents

Supreme APP for preventing and treating dark-ground injury Download PDF

Info

Publication number
CN112637404A
CN112637404A CN201911305501.XA CN201911305501A CN112637404A CN 112637404 A CN112637404 A CN 112637404A CN 201911305501 A CN201911305501 A CN 201911305501A CN 112637404 A CN112637404 A CN 112637404A
Authority
CN
China
Prior art keywords
short message
recording
alarm
early warning
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911305501.XA
Other languages
Chinese (zh)
Inventor
韦成自
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN112637404A publication Critical patent/CN112637404A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Abstract

The invention provides an application program, namely an adversary APP for preventing harm to a calling party and a stopping party in a dark place, which is used for upgrading a communication product to form an adversary machine and an adversary device which are matched with each other. The leading phone owner immediately sends an early warning short message containing position and seen information to a transfer station in a group mode for preventing the calling from being viciously called and opens a hand-free mode to wait for a call back; members of the transfer station receive the back dispute callback telephone, and who dials the call, who makes a big voice callback according to the received early warning short message, and the caller of the pre-criminal who moves to the owner can be reminded: it is not possible to reach the hands in the dark at this time. If the caller is not a criminal, the owner calls the phone to the parent, and the caller can call the phone without losing the two body sides; if the caller is just a crime maker, the caller can call to the right place to call off the exposure feared to prevent both parties from being fatigued, and a small number of callers who cannot call off can call the exposure immediately to prevent the criminal from killing the criminal; the intelligent communication tool cannot prevent and call out injuries darkly and tell victims to finish the historical declaration.

Description

Supreme APP for preventing and treating dark-ground injury
Technical Field
The invention relates to a communication terminal, a WeChat position, satellite positioning, mobile phone shooting screenshot recording, short message encryption, key dialing, voice dialing, short message group sending, short message early warning group sending, sending and storing, temporary storage, transfer, storage, extraction, short message (file) searching, short message opening display and intelligent communication. The upgraded version also has communication number detective, wireless talkback, wherein the possibility of adopting advanced patent technology of others is not excluded, and the related advanced technology is used by the user or combined with the user as much as possible.
Background
The method is established on the technology of the 'site recording system' which is intended to be invented; the short message alarm cannot be handled in any place, and the technology overcomes the defect of randomness of the short message alarm. In the meantime, the mobile phone video communication and positioning technology is applied, but the technology can also be applied but is not applied to the requirement of people on preventing and calling, stopping and carrying on murder crime and ensuring personal safety; the communication number detective technology is only used in the illegal field.
Disclosure of Invention
The invention provides an application program, namely a second-recording APP for preventing and calling out dark injuries. The personal version of the software upgrades the mobile phone and the computer to form a seconds recording mobile phone and a seconds recording computer (a seconds recording computer for short), and the two can finish relay type alarm generation; the watch version upgrades the telephone watch to form a second recording watch; the three parts are called as the second recording machine, and the operation is carried out according to the second recording machine operation data and the execution instruction set, so that the person or the family can get rid of interference and finish sending and storing the second recording short message or the early warning short message containing the seen picture, the position information and the like at effective second speed; the second-recording mobile phone and the second-recording computer can also finish transfer alarm short messages (for net friends);
the unit edition upgrading computer forms a quasi-malignant case solver and a case clue viewer, which are respectively called as the solver and the viewer for short, and are called as second recorders in combination, so that the device is the strongest hand for transferring the alarm short message and can be used for dispatching places and public inspection methods.
The system is matched with the second recorder and the second recorder to operate and comprises a headquarter mailbox and a server (a registration form). The four sets of equipment are called recording machines, and constitute hardware facilities for preventing and calling and stopping from harming the education network. The headquarters mailbox is a member of both the seconds total and the individual seconds minutes. The seconds scoreboard is sometimes referred to as seconds scoreboard and for ease of understanding also as seconds recording relay or transit.
The second recorder with second recording function and the resolvers and consultants which can be used by local police officers or even public inspection methods are the 'battlefield equipment' for preventing and calling and stopping from harming the education network. There are many and few of their properties. The seconds watch is only used for: a. helping the owner to complete second-to-second written notes and store the notes to a draft page, and b, packaging the notes into second-to-second stored short messages for mass sending or single sending when needed; the second-recording mobile phone and the second-recording computer have the function of mass sending or single sending of the second-recording watch, and are also used for temporarily storing and forwarding short messages of net friends in a standby mode (including processing-extracting short messages stored in the same period of time when the net friends are scattered), callback reminding and outgoing reminding; the solver and the viewer not only have all the performances of a second-recording mobile phone and a second-recording computer, but also have the functions of extracting and opening encrypted short messages of all users and sending a short message opening notification letter; in addition, if the alarm point has a broadcast horn (such as a bus with propaganda broadcast and a weather forecast broadcast in a rural area), the resolver can also instruct the broadcast horn to sound a reminder.
The second machine can complete one second short message in the shortest 3 seconds, and the next order can complete 1 piece; the shortest 1 second of the early warning short message finishes one, the next order finishes 1+ n (n is an information early warning duration value, set by the user before use, and the initial value is 12 seconds); a plurality of short messages completed by a certain parent machine within 30 seconds are called synchronous short messages within 30 seconds, and are called short messages within 30 for short. The parent machine can send the encrypted groups to each member in the 3-5 second-counting lines for temporary storage, and the headquarter mailbox is stored at the same time or after the headquarter mailbox is passed. The user can call one of the parents such as daddy and daddy to finish sending short messages containing at least position information and most of the portrait information of the user, temporarily store the short messages for the second-recording line-separating members, especially store the second-recording line-separating members in a main mailbox, and the second-recording line-separating members are difficult to delete by anyone and known at a glance by related departments when worrying about the hidden injury. If the second scoring line receives the early warning short message, all members can dial back the phone immediately, and the person who dials back the phone can hear that people and things who see the person who goes to the owner can see the phone according to the received early warning short message. The current position of a person is a certain place, a certain place is in front of the person, and a certain place is on the left and right sides of the person respectively, so that a criminal who listens and does not intend the person, but an acquaintance criminal who tries to know the secret can be reminded at once; if the caller is not a crime maker, the owner calls the caller to the end, namely, the caller calls the phone without losing the two physical aspects; if the caller is just a criminal, the caller can call to the right parent to call off the exposure feared to prevent both parties from being fatigued, and a small number of the callers who cannot call off can also immediately expose the criminal to prevent the criminal from being cut; the intelligent communication tool cannot prevent the injury from being caused darkly by calling and stopping and cannot inform the victimization of the history of the parent in time to declare the completion.
If the communication product upgraded by the second-recording APP is intelligent, an ancestor mobile phone, an ancestor computer and an ancestor watch are formed, and in the starting state of the safety assistant, the owner is found to invite to follow the steps of the owner, and immediately makes a ringtone and a safety prompt such as' Xiaolili, where are you? Or is the cell phone used by wife-wife? Therefore, a user can naturally drag a little time to an opponent, such as ' daddy ' father (or old and old, long and the like), i go somewhere with me ' but can avoid the counter sense of the opponent, the opponent can conveniently and immediately encrypt and mass-send the second-recording short message of ' who the owner is together ' by the opponent, and after that, the relevant department can know the message at a glance, thereby preventing the acquaintance from going out of a shielded room, a vehicle and other areas. Can prevent a criminal from happening in more malignant cases.
Thus the second note APP may be referred to as the leading APP. The corresponding second-hand mobile phone, second-hand computer and second-hand watch can be called as the leading mobile phone, leading computer and leading watch; the seconds recorder and the seconds recorder can be called as an adversary and an adversary.
The invention belongs to the field of short message encryption group sending, electronic document, WeChat or satellite positioning data insertion, mobile phone camera shooting screenshot, recording, invention of a patent 'field network recording system', recombination of intelligent communication, upgrading version, recombination of technologies such as wireless talkback, communication number detection and the like. The government may be responsible for the software work of the program if adopted to ensure security.
Drawings
(1) Figure 1 of the specification shows the direction of mass texting of the parent machine.
The solid arrows indicate the flow of mass texting, position texting, extraction letter, etc. to the parent. The leading mobile phone and the leading computer are in mutual help relationship in the process of mass sending of the short messages with the second memory and the short messages with the positions, and are in mutual help in two directions (the viewer and the resolver are also in mutual help relationship); however, the leading mobile phone and the leading computer (including the solver and the viewer) only assist the leading watch in a one-way mode, but do not assist each other, and after all, the leading watch belongs to the family of children and has limited storage space.
In addition, the relationship between the adversary mobile phone and the adversary mobile phone, and between the adversary computer and the adversary computer (between a viewer and a viewer, and between a resolver and a viewer) are also in a mutual help relationship, and the relationship is easy to understand and is not drawn.
(the dotted arrow only indicates the flow of the rare short message request letter)
(2) FIG. 2 is the operational relationship of the parent machine and the viewer.
Sending short messages to the parent group, and sending the short messages to four places: the first place is a headquarter mailbox (including the leading phone of the guardian/guardian if the guardian/guardian number is registered), the second place is a resolution device (if the guardian/guardian number is registered), the third place is a look-up device of a public inspection method, and the fourth place is a net friend leading phone; the sequence of the group sending and extracting functions of the solver and the viewer is approximately the same as the sequence. In the figure, seven lines of relational languages are shared in the middle. The arrows in the first row "to the parent cluster send a short message (third/fourth) and below, mean: (a) any parent machine user can not know whether the parent is called to the parent for preventing the parent from being harmed darkly, the parent machine hears the member in the group sending second recording short message to second recording branch immediately, and if the look-up device exists, the look-up device is taken as the third place to be sent; (b) if the parent machine responds to the request of the 'short message request letter' to send the 'location short message' in group, the channel is passed.
The second row of the method is that the early warning short message is sent to the caller to call and the prompt is sent when the caller is called up, and the following arrows mean: if the second-stored short message sent by the parent machine in group is the early warning short message containing probeThe finder can immediately participate in dialing the phone number of the caller and call the caller who calls the caller after receiving the phone numberReplies according to the content of the received early warning short message to remind the criminal who intends to go underground The hidden underground hand cannot be realized(ii) a The third row means that the warning message is called back and the prompt is sent when the user is put through, and the following arrow points mean: if the mass texting of the leading phone is the early warning texting but does not contain the mobile phone number of the coming person, the look-up device immediately puts in the callback reminding work after receiving the short message, and gets throughThen … …(same as for the upper plus transverse lines);
the fourth row of the dotted arrows "if the person is missing, the person sends a short message request message to the leading phone" and the following row of the dotted arrows mean: if there is a missing person: if the child who has carried the product and goes out with the negative air is not aware of where to go, or the user carries the product carelessly and falls into water and is not aware of where to float, the guardian/the protection person organizes to search/rescue and sends a short message demand message to the student computer of the missing person (the sound operation method is that the person says 'to the parent' or the student's to the parent's to call a certain sending position, 'hear' is 138 … … 8888, when the relation language is shown in the figures 4 and 5, the relation language is simply stated as 'demand letter for the missing person', and the meanings are the same;
the "group sending extraction function (fourth/fourth) of the fifth row and the following arrows mean: the fourth place of the look-up device group sending extraction letter is the leading mobile phone and leading computer which have possibly temporarily stored net friend short messages and have come; the sixth row of "arrival at the top of the viewer satisfies the extraction" and the following arrows mean: if the matched short message exists, the matched short message is sent; the seventh row of the arrow below the "send-sms-open notification letter" means: and sending an opening notice letter to the sender after the short message opened by the viewer is sent for half an hour.
(3) Figure 3 in the specification is the working relation between a user and a transfer station and is also an abstract figure.
On the left side of the figure, a certain leading user encounters a receiver carrying a communication tool mobile phone and a broadcast speaker is nearby. The right side is a transfer station consisting of a headquarter mailbox, 3-5/leading computers, namely leading mobile phones and leading computers; if the transfer station has the participation of the parent devices, namely the resolvers and the consultants, the number of the parent devices is correspondingly reduced. In the transfer station, except that the headquarter mailbox may be far away from people, other members are usually within a county area or even a town area, and the rarity of users at the beginning of product marketing can be within provincial areas or even several provincial areas.
The first, second and third row relation words and the meanings of the arrows below the first, second and third row relation words can be easily understood by referring to the description of the first, second and third row relation words in FIG. 2;
the fourth row 'the warning message parser can also arrange broadcast reminding' and the following arrows mean: the host of the solver can also arrange a local broadcast speaker to carry out broadcast reminding according to the authority;
the meaning of the relation in the fifth row and the dashed arrow thereunder can be easily understood by referring to the description of the relation in the fourth row of fig. 2; the last three rows (sixth, seventh, eight rows) are identical to the description of the last three rows (fifth, sixth, seven rows) of fig. 2.
(4) FIG. 4 is the drawing of the specification, which shows the working relationship between the solver and other machines such as headquarters mailbox.
In the figure, the first one, the second one, the third one, the fourth one, the fifth one, the third one, the fifth one, the sixth one, the seventh one, the sixth one, the fifth one, the sixth one, the fifth one.
In the figure, the first row "mass texting to the parent machine (second/four places) and the arrows below the first row mean that if the resolver exists, the resolver is given to the mass texting as the second place when the second texting exists to the parent mobile phone, the parent computer or the parent watch;
the fourth row 'requirement letter for the missing person' is a shorthand for 'the position requirement letter is sent to the parent machine of the missing person by the resolver'; other items can be easily understood from the relationship words and the arrows below the relationship words, and are omitted.
(5) Figure 5 of the specification shows the relationship between the second recorder and the solver and the headquarters mailbox and server.
The last row "send the members mailbox of the station transfer station to the parent", means: when a user travels or travels on a business trip to a new place, the parent machine is far away from the original in-place transfer station, the original in-place transfer station is not the most easily connected transfer station any more, and the server sends a transfer station member mailbox of the new place to the user; the first column "main service contact line" on the right and the connecting line beside the main service contact line are channels for exchanging information between the server and the headquarter mailbox. Other items are also easily understood from the text, and omitted.
The 5 pictures are combined to see that the mass texting, namely the mass texting second-time short message is mainly the second-time machine, and the transferring second-time short message is the member of the transfer station. If the transfer station lacks a government solution device and a consulting device, the transfer station is charged by a second-recording mobile phone and a second-recording computer. The network recording machines are mutually matched to help a user to independently see the second without interference and send early warning short messages in the second, if the support of a government digestion device and a consulting device is provided, the safety requirement of the user is further undermined, and a crime expected to undermine cannot undermine, so that the parent machine has the participation of the parent machine, namely the strong back shield for preventing personnel from being harmed and calling and stopping the hidden injury, and the scientific means for preventing and calling and stopping the hidden injury to protect the parent machine and saving the crime can be realized by depending on a national strong law network; the high efficiency of dispatching public security work is promoted, few cases of prevention and invalid calling and stopping can be conveniently detected and evidence can be obtained by public inspection methods, the attack is fast and efficient, and teenagers who are easy to miss the crime can be educated.
Detailed Description
First, origin of the product
The inventor hears a person suffering from a disaster or suffering from a disease since the age of childhood and always yells to' Maya! Maya |! "
The vulnerable personnel can be known by the relatives when the vulnerable personnel are in the place of the adult or go out, and the safety is high generally; after the case grows up, the case is inconvenient to tell family members one by one or the case is not found for a long time by the family members and even the police, and then the case is inconvenient to tell friends, so that the case is sometimes found when some people suffer from dark injuries and the family members and the police can not find the case for a long time. The system can tell the people or the relatives when the people are inconvenient to locate or go out one by one or the relatives are not in time to tell the people or the relatives, and the system can give the service of preventing the education network from being damaged by the hidden place of the education network with the help of the communication matched with the transfer station, namely the relatives mobile phone or the relatives watch has the effect of different functions and even has no time to know.
Second, technical scheme
For convenience of presentation, sometimes the third generation list is user A, the fourth LieQi is user B, the Wang is user C, and the Chengxi (if any) is user D. Their eleven-digit cell phone number and six-digit opening password are abbreviated as 136 … … 631 …, 158 … … 851 …, 189 … … 981 and 193 … … 391 … respectively; further, the term "receiver" or "opponent" shall mean a possible and preventable crime intended to endanger others.
Content of 1 second machine-recording second recording and early warning
1.1 basic second name, early warning name
The short message which is seen by the second-recording machine second-speed acquisition machine owner and is only stored in a headquarter mailbox is called a second-recording short message; sending a short message called a pre-warning short message, namely an early warning short message, which passes through a transfer station and needs to pass a temporary warning time period so as to determine whether to withdraw to avoid interference to police; the second-recording short message and the early-warning short message which are sent by the second-recording machine are distinguished by different short message names, and the second-recording short message and the early-warning short message are convenient to search.
The second note short message name (hereinafter, referred to as second note name) is 193 beginning to indicate that the society is about to be well; the name of the pre-alarm short message (hereinafter referred to as the pre-alarm name) is represented by beginning 111 and has preparation; and each name is also superposed with two digital codes, specifically
The mobile phone number of the second reporter with +11 bits + the second time of 12 bits (also the second memory time, i.e. the time displayed by the mobile phone at that time) is a group of 26 bits in total.For example, a second note user with a mobile phone number of 136 … … sends an individual second note to a headquarter mailbox at 22 minutes 22 seconds 22 hours at 11 months 11 days 11 months 11 in 2019 to prevent the occurrence of murder, and the basic second note name of the second note is as follows:
Figure BSA0000197870190000041
the user calls the second reporter when sending the second recording short message and calls the alarm when sending the early warning short message.
1.2 seconds to remember the proper attached number
Sending second recording and early warning information is helped to overcome if meeting difficulty, and in order to record who does good lift, the second recording and early warning information is attached after the basic second recordingHelper's cell phone number + difficulty category 1 or 2As an attachment number.
If the third Zhang in the above 1.1 basic second remembering/early warning name is recorded in 22 minutes and 22 seconds at 22 o' clock of 11/2019, if the midway obstacle "two difficulties in sending and saving" is encountered, the second remembering short message is arranged to be sent to the Liquan E-friend mailbox with the mobile phone number of 158 … … for short-term saving, and the second remembering name of the third Zhang in the second remembering is 38 digits:
Figure BSA0000197870190000042
(see below for difficulties in delivery).
If the third second recorder starts the interphone function to send the seen second recorder when the first storage difficulty is met, the second recorder of 189 … … Wang five is changed into the interphone function to help receiving and temporarily storing, and then the second recorder is named as:
Figure BSA0000197870190000043
content contained in 1.3 second note short message
The second storage short message sent by the parent machine and the parent device every time has the following contents displayed after the short message is opened, except that the name of the short message comprises the number of the mobile phone of the owner, the sending time of the short message, and the part encrypted by the website password or the owner password:
Figure BSA0000197870190000044
the first item is owner information. This easy acquisition is generally not lacking: owner name, gender, age, portrait. The owner inputs before using, and the portrait requires to be replaced by self-timer at any time when the clothes are changed (the replaced portrait is stored at one side for reuse).
Fifthly, the item is the information of the coming person. The item may have a detected mobile phone number of the caller, a captured image of the caller, a speech sound, a name, a title or a nickname of the caller of an acquaintance input or spoken by the owner in advance in a text mode, and a text or voice record of who calls or who goes where. This item may also be nothing, such as a seconds message sent by a child user.
After 3 draft pages are input at the mobile phone number input position of the second party, the draft pages are automatically packaged and sent by the parent phone at 193; thirdly, the parent machine sends out a query of' 5 pictures of the image of the receiver, if the image of the receiver needs to be sent? "5 pieces of full hair when the owner does not speak, carry out according to owner's meaning when the owner speaks: either all or the first four sheets … … are deleted.
The fourth step is used for preventing strangers, and the fifth step is used for preventing acquaintances; the fourth item can reduce the flow, and the fifth item can reduce the time; and fifthly, playing after clicking, and synchronously displaying when the rest items are opened. The collection of the third and fifth items is convenient for criminal investigation personnel to solve a case, and is more beneficial for receiving police and even intelligent software to carry out on-site telephone reminding, and directly advising the occurrence of injury.
Sixthly, position information. This is not missing in most cases: the place name with second time, the condition permission, the positioning number and the upgrade version are all possessed. Along with the displacement of the owner, the position information is continuously and automatically updated; when the parent machine receives a short message demand letter of 'sending position' sent by a guardian or a protector of the owner, only the position information is sent.
When the user clicks the 'owner portrait position' or the 'coming portrait position', the fonts of the 'open photo album' and the 'open camera' buttons become darker and available. After the selected portrait or the photographed portrait is inputted into the corresponding position, the two buttons are restored to light colors.
According to the draft page, a complete seconds/warning contains 6 items as indicated above, but in practice this is not required to be so complete. When the sending instruction is obtained, no matter whether the 6 items of information are perfect or not, the sending instruction is packaged into193First seconds or111And after the early warning information at the beginning is sent to the second recording line and the manuscript is stored, a new draft page with the main and position information is automatically generated.
Second recorder packing draft page sending193The first second records that the owner information is not included any more after the owner information is successfully transmitted and included once; packed draft page delivery111The first second is recorded as an early warning short message, and only one second of sender main information is arranged in the multi-second sending of each pre-warning; other information that has been successfully transmitted is not retransmitted, so as not to waste traffic.
2 second recorder operation data and execution instruction owner set window
The user clicks the leading APP icon on the second recorder screen, and the following first-level window I is opened:
Figure BSA0000197870190000051
all the actions of the second note APP are executed according to the rules of section 9.5, generating dedicated operation data and executing instruction set. Seven of the execution data instructions are set by the owner of the new user and are completed before use. The user clicks the first item in the primary window above, or clicks 'personal database' in a personal mailbox, and clicks 'operation data and execution instruction set' opens the following secondary window (one):
Figure BSA0000197870190000052
and when the user clicks any one of the seven items in the window, the corresponding three-level window can be opened. The arrangement of the three-level windows is set forth below.
2.1 encryption setting/modifying window for second-hand note by owner
The personal short message is encrypted, and the password is set by the owner of the machine, so that the machine has a name of the master password. The user needs to open the review code after the second is recorded, so the user also has the name of opening the code.
Any smart phone user downloads an 'application form of leading APP user' in a certain browser, and opens a following three-level window A (taking a window with a password set by the user three times as an example) by clicking 'encryption setting for seconds' at the lower left corner of the 'application form':
Figure BSA0000197870190000061
the method comprises the steps that a personal user who becomes an leading APP clicks ' A ' in a secondary window and the owner encrypts and modifies the second note '; and the public inspection method user clicks ' one ' in the secondary window, sets and opens the password for the user to send the short message for second storage ', and can also open the window.
2.2 setting window of individual voice control instruction
When the user clicks the item B in the second-level window (one) of the MEM, the following third-level window B is opened:
Figure 1
any one of the windows has a window on the right
Figure BSA0000197870190000063
All the instructions are instructions in the APP operation data and execution instruction set of the exclusive user, and are called in the window
Figure BSA0000197870190000064
Or
Figure BSA0000197870190000065
The instruction in (1) is changed correspondingly in the "exclusive user to the parent APP running data and execution instruction set".
Alternative names are put back in the alternative name. Such as "dad's" is replaced by "teacher," then "can replace the call" the teacher's "is asked for past, and" dad's "is asked for back.
All the settings of the leading watch are required to be carried out on a desktop or notebook computer or a guardian leading mobile phone.
2.3 duration setting window of leading to early warning
With a user specification named Werx. She clicks on item C in the second level window of the seconds recorder (one), and opens the following third level window C:
Figure BSA0000197870190000071
2.4 same-network guardian/guardian communication number input window
When the user clicks the D-th item in the parent secondary window (one), the following tertiary window D is opened:
Figure BSA0000197870190000072
after the user fills in the guardian/protector mobile phone number, the mobile phone number is displayed and the input field is displayed.
2.5 charging Window for Exclusive Individual Users
The account balance of the leading APP (personal computer) is transferred to be in a shutdown state once being equal to-20 yuan, and other buttons except the two buttons of 'transfer' and 'charging' are not changed at the moment, the other buttons are uniformly switched to be only opened for displaying as follows when being clicked:
"you are up to 20 yuan, until you are familiar with APP core and have no ability to work for you, only leave the ability to remind the debt, accept the charge and temporarily store and forward, if you want to continue using, give good care
Figure BSA0000197870190000073
Zhang III clicks the charging window of the exclusive individual user' E in the second-level window (I) of the second-level computer, or clicks in the using process
Figure BSA0000197870190000074
Then open and open the following three levels of windows E:
Figure BSA0000197870190000075
at this window, the user clicks three points
Figure BSA0000197870190000081
Or
Figure BSA0000197870190000082
Or
Figure BSA0000197870190000083
When the signal is normal, the second recorder immediately links a Zhang Sanyingnetowrk registration form positioned in a website. After the user finishes charging, the cost indexes of the user charging window on Zhang three mobile phones are completely consistent with the cost indexes of the registration form of Zhang three network entries on the website. The abnormal signal is shown in 7.1 No-signal virtual charging window.
The window belongs to a personal user, and a prompt is displayed 005; if the user belongs to the public inspection method, the following 006 prompt words are displayed:
Figure BSA0000197870190000084
2.6 whether to give priority to power supply and arrearage reminding and operation result prompting:
when a user clicks the F-th item in the secondary window (I) of the APP second recorder, the following tertiary window F is opened:
Figure BSA0000197870190000085
if the initial default of 'need to remind for a plurality of times when defaulting' is not changed, the APP sends out prompting voice according to the methods of 'arrearage prompting' (first), 'arrearage prompting' (second), 'arrearage prompting' (third) and 'arrearage prompting' (fourth).
Functional application of 3-second recorder
The user clicks the second item in the leading APP level window, and opens as followsSecond level window (two)
Figure BSA0000197870190000086
Install leading machine to leading APP, under the condition that APP is closed, after just starting up, or someone knocks, the owner just sends out big ring sound and sends out the question when just going out: whether or not toOpening a secure assistantIs there a And when the owner hears the result, opening the APP application program.
3.1 personal postbox-net friend second note short message transfer station
The user is atSecond level window (two)Click item (1) in (1) opens:
Figure BSA0000197870190000087
Figure BSA0000197870190000091
besides warm prompt, the personal mailbox and net friend second note short message transfer station has the following main purposes:
the platform is used for sending the seen information, saving a manuscript, recording numbers of relatives and friends of a person under guardianship, extracting a second note, opening a roaming intention, opening a change registry, opening a draft page, sending a packaged draft page and sending the packaged draft page by each individual user;
also between net friendsProviding the second storage short message for emergency temporary storage andtransfer ofThe transfer station-the net friend sends the storage second to the mail box of the headquarter, the alarm platform is sent to the temporary storage and then transferred after the network fault happens or the busy line can not be sent; the early warning short message helps the user not receive additional withdrawal warning letter after the waiting suspension warning time periodTransfer ofTo the local 12110 message alarm platform (if any). However, network failures usually occur for one or two days for several months, forwarding the pre-warning short message is also a half-day event, and the amount of the provided emergency temporary short message rarely reaches 20M.
All manuscripts of the second recording/early warning information of the users are stored in full names, and the address of the personal mailbox of each user is randomly generated when the user is on line and is pasted on the Xth item of the 'operating data and execution instruction set'.
Acquisition and transmission of 3.2 second recording/early warning information
The user can click in the personal mailbox windowSecond recording/early warning draft pageOr atSecond level window (two)In the middle click item (2) < second recording/early warning information collection and transmission >Draft/orThe leading and trailing of the parentOpening a second recording/early warning draft page for clearing the information of the future person in the content contained in the 1.3 second recording short message, and collecting and sending the page in the window; and the collection and transmission can also be carried out according to the instruction and the operation of 6 Zhi parent APP.
Figure RE-GSB0000192119550000052
The user opens any window of the second note APP, namely opensSafety assistant(APP applications)
3.3 early notification of roaming intent
Clicking in personal mailbox window for user
Figure BSA0000197870190000093
Or atSecond level window (two)When the user clicks the item (3) or the store-and-forward machine hears the pronunciation/speaking voice of the word "travel/roam/business trip" in the open state, the store-and-forward machine immediately pops up:
Figure BSA0000197870190000094
Figure BSA0000197870190000101
The owner selects or inputs the scenery spot in black and clicks
Figure BSA0000197870190000102
After that, the sender immediately sends the server a roaming intention: great wall, Guilin Lijiang, Shanghai outer beach, Hangzhou West lake, Yunnan Dali.
3.4 extracting the second note from the delivery
User click
Figure BSA0000197870190000103
The saved seconds may be extracted from the headquarters mailbox to see if they are still present. For example, 10 minutes at 10 months 10 days 10 months 10 years 2019, Zhang III with a mobile phone number of 136 … … … and an open password of 631 … wants to verify whether the sent and stored independently seen seconds at the moment of yesterday succeeds, and click the button "extract the sent seconds" so that the second recorder pops up the first extraction edit field:
please type in the time of year, month and day you probably sent to: 1, 1 piece
Figure BSA0000197870190000104
Zhang three keys put in yesterday for storageYear, month, day and timeThe method comprises the following steps:201910091010clicking when the front page and the back page are not changed
Figure BSA0000197870190000105
The second recording machine immediately and automatically sends the following extraction letter to a headquarter mailbox: "Extracted from 1910091010, part 1, 631…
wherein, the 'extracting from' is the beginning of the 'extracting second note extracting letter' which is sent to the user at a certain time; the extracted second-note short message is pasted in the personal mailbox, if the second-note short message which is the same as the second-note short message is still stored in the mailbox, the second-note short message is replaced, and the attribute which is originally stored is changed into extracted.
If Zhang san does not type in the year, month, day and hour of the self about to be stored
Figure BSA0000197870190000106
Then the second recording machine embeds the sending and extracting function according to the time, year, month, day and time of the three-page operation: "Extracted from 1910101010, item 1, 631 …”。
3.5 extracting seconds of person under guardianship
The personal mailbox of Zhang III has the mobile phone number of the person under guardianship/guardian, such as 13999999999, if clicking it, the second recorder immediately displays the extraction edit column II:
please type 13999999999 about the year, month, day and time of storage: the number of hours before and after: h
Figure BSA0000197870190000107
If Zhang Sanke is manually keyed in the person under guardianship 139 … to be about to storeYear, month, day and timeComprises the following steps:201803030303front and rear hours24HClick again
Figure BSA0000197870190000108
Figure BSA0000197870190000109
The second recording machine immediately sends the following extraction letter to the headquarter mailbox: "Extraction of 139 … 1803030303, 24H, 631 …
If Zhang Sanjian does not enter the year, month and day of the approximate storage of the person under guardianship
Figure BSA00001978701900001010
The second recorder embeds the time of year, month, day and time into the transmission extraction letter according to the time of three operationsSecondly, if: "Extract 139 … 1803030909, 2H, 631…”。
3.6 Change registration information
Zhang three user clicks item (6) in secondary window (two), or clicks in personal mailbox window
Figure BSA00001978701900001011
The mnemonic immediately pops up:
<(6) prevent to go on murder education to roll over application registration and change table secretly
Figure RE-GSB00001921195500000612
Figure RE-GSB00001921195500000613
The contents of the first and second lattices and the fonts are dark, which means that no obstacle-free second-hand machine is supplied temporarily;
click after Zhang three changes
Figure BSA00001978701900001013
Click on
Figure BSA00001978701900001014
Click again
Figure BSA00001978701900001015
The second recorder encrypts and sends to the website in the form of mail immediatelyServer. And moving out the prompt voice in the prompt voice setting window for playing after the successful sending:
Figure BSA00001978701900001016
the word "close" has a character frame belonging to the button unreadable. If the transmission is not successful, playing a prompt voice:
Figure BSA0000197870190000111
4 quasi-malignant case solver/case clue viewer
If the government adopts the invention, users of various local public inspection law units comprise a local police station, after a computer of the local police station is installed to the edition of the parent second-record APP unit, the second-record APP solver icon is arranged on a screen, and the following first-level windows of the solver are opened by clicking the second-record APP solver icon:
Figure BSA0000197870190000112
both the quasi-malignant case solver and the case clue viewer belong to a mailbox or a WeChat window and have a fixed mailbox address. And when the public inspection method user clicks the second item, opening a public inspection method user window as follows:
quasi-malignant case solver, case clue look-up device and net friend second note short message transfer station
Figure RE-GSB0000192119550000073
4.1 operator enrollment
Because the second-keeping APP information may relate to privacy of an individual user and a second-keeping object, in order to protect the second-keeping APP information, when each operator of the quasi-malignant case solver/case clue viewer needs to register, namely a worker operates for the first time to open a first-level window, the APP finds that the new face holes are popped up as a local operator registration form and stored in the local machine and cannot be deleted, so that the APP can send an opened notification letter to a short message sender and a headquarters mailbox. The sending of the short message is opened and is called as sending of the opening notice letter for short.
Local operator registration form of urban and western police quasi-malignant case solver
Figure RE-GSB0000192119550000074
When the certificate scanning piece and the real-time half-body portrait are clicked, buttons such as 'picture', 'short message', 'camera' and the like are popped up, and filling and inputting can be completed by pressing prompts.
4.2 open the second storage short message for the first time and after
Although any operator such as king x fills in the registration form of the operator of the local computer, opening the second-recording APP message has to agree that the message is to be opened in the resolver/viewer for a certain second, and no matter which second-recording message is double-clicked, such as double-clicking 111136 … … 180816185050, the APP immediately pops up a prompt:
Figure BSA0000197870190000121
here, the user if clicked
Figure BSA0000197870190000122
Returning to the previous step, e.g. clicking
Figure BSA0000197870190000123
The resolver pops up immediately to open the password input window, an
Figure BSA0000197870190000124
A button. The person on duty correctly inputs the opening password and clicks
Figure BSA0000197870190000125
And opening the double-clicked alarm short message.
And the Wangx also comprises other registered operators, and after the second-time short message of the user is opened for the first time in a certain day, the other second-time short messages which are double-clicked on the desktop of the same solution/look-up device in the same day are all directly opened.
4.3 time to send opening Notification letter
Wang x if a 153 … … sender's 3 seconds short message is opened at this moment, then half an hour later, the resolver automatically sends a notice letter to the sender: the city west party 020338 police officer opened 3 seconds of you 20181111 for short messages.
No matter who or how many seconds of short messages are opened for half an hour, the solver automatically sends the notification letter.
4.4 extracting second-time storage short message sent and stored by target person
In 2019-12-12, a short message of seconds 8 minutes of 8 months, 8 days and 8 hours in 2018 needs to be consulted by checking in a case clue consultant
Figure RE-GSB0000192119550000086
The viewer immediately pops up the following extraction edit column three:
please input the mobile phone number of the target person + the approximate year, month and day of second + the number of hours before and after the second + or the number of the front and back
Figure BSA0000197870190000127
”,
Zhao X just inputs the mobile phone number 136 … … of Zhang III according to the requirement, if the viewer has the second recorded information of Zhang III temporarily, the viewer immediately gives the information to be arranged on the search page from near to far according to the time.
If Zhao X also needs to consult the information recorded by Zhang III and more seconds, then input the time for Zhang III to be sent and stored, for example 201808080808, and the number of short messages before and after the time point 5, and then click
Figure RE-GSB0000192119550000088
The second recording machine immediately sends the following extraction letter to the headquarter mailbox:
extract 136 … … 1808080808 180808080808, 5 pieces, 391 …"if the short message of second memory which is extracted 10 pieces is received later or quickly or slowly, the short message is supplemented to the searching page and the window, and a case with an attribute on the window is marked as" extracted ".
Zhao X may also be entered after the time for saving Zhang III is 201808080808, the number of hours 24 is entered, and then click
Figure RE-GSB0000192119550000089
Therefore, the second machine sends the following extraction function to the headquarter mailbox: "Extract 136 … … 1808080808 180808080808, 24 hr 391 …". If so, all the second-stored short messages sent within 24 hours before or after 8 minutes of three years, 2018, 8 months, 8 days and 8 hours are added to the page and the window.
4.5 advising about the purpose of protecting life
Recording machines (members) in transfer station, especially town's resolvers if receiving three pieces of information
Figure BSA00001978701900001210
The alarm is a pre-alarm short message of Zhang III, and the receiving and the saving are replied after a dispute; then, calling a caller (if any) or calling back a call in dispute, and calling out who can call the caller to carry out the following care reminding; the descriptions below take the general case of the town institute's decomposer.
4.5.1 advisory reminder to protect Life
If the received pre-alarm message contains the detected mobile phone number of the caller, for example, the following pre-alarm (i) -is received
Figure BSA0000197870190000131
City west houseThe manual or intelligent solver of the alarm receiver immediately dials the number 156 … … of the caller, and after dialing, the caller is called or the following reminding (one) is played according to the key information of the early warning (i):
Figure RE-GSB0000192119550000092
not just as seen by your person,
Figure RE-GSB0000192119550000093
(wherein
Figure RE-GSB0000192119550000094
The position is originally the 'target', replaced)
If the caller does not ask with great mind "who you are? Saying or playing the later sentence of reminder (I) —
Figure RE-GSB0000192119550000095
Figure RE-GSB0000192119550000096
4.5.2 advisory reminder to protect Life
If the received pre-alarm short message does not have the detected mobile phone number of the receiver, the pre-alarm is only the pre-alarm of receiving the information of people and objects-
Figure BSA0000197870190000137
City west houseThe manual or intelligent resolver of the alarm receiver immediately dials the mobile phone number 136 … … of the alarm owner (owner), and after dialing, the alarm receiver speaks or plays the following reminding (II) according to the early warning (II):
"see (a)
Figure BSA0000197870190000138
You are now at
Figure BSA0000197870190000139
Five people in front of the south park at a distance of 12 meters from the bridgehead, i know the distance Three people, pine trees are arranged at two sides of the garden, so that people do not need to worry about the pine trees. "
4.5.3 advice type reminder to protect Life (III)
However, if the content of the received pre-alarm short message does not have the detected mobile phone number of the caller, the content of the pre-alarm short message has records of the caller's name and the like of the alarm, such as the following pre-alarm- (c) — is received
Figure BSA00001978701900001310
City west houseThe manual or intelligent solution device of the alarm receiving person immediately dials the mobile phone number 136 … … of the alarm receiving person to speak or play to the other partyReminding three:
"see (a)
Figure BSA00001978701900001311
You go from a certain Tun to the Yangtze Tun and then go 770 m. On the right side there is a big maple tree. Thank you help me see
Figure BSA00001978701900001312
I can not see for a long time
Figure BSA00001978701900001313
It is personal! "
4.5.4 use of broadcast horn alerts
If the alarm receives the warning, the second-time machine or the second-time watch of the alarm is damaged or the telephone is not called for other reasons, and the alarm point at the moment is provided with a broadcasting loudspeaker which can be connected with a borrowing telephone, the manual or intelligent resolver of the alarm in cities and west can also be immediately connected to play the reminding (two); however, to the extent that the warning is received, only the first sentence and the second sentence of reminder (iii) above can be played at high sound, or the high sound is played: the old populus tremuloides, I see what you go to a certain tomn of populus tremulans through 5G, and now, what you do not need to dry, i get to home to drink, and I have something to tell you twice and three times.
4.6 arrangement of alarm-processing of received alarm message
4.6.1 processing of received early warning information
If a user receives a certain alarm in the suspension alarm time period and sends a plurality of fragmentary early warning short messages such as 111136 … … 180816185050 +/-15, temporarily storing the fragmentary early warning short messages in a union set when the suspension alarm time period is exhausted; if no additional "136 … … alarm withdrawal" mail is received during the suspend alarm period, the mail is sent to the desktop immediately and blinks continuously until the alarm receiver clicks open.
The degradation device receives the early warning short message that the coming of the same name does not exist in the coming of the long body, immediately sends the short message to the window to flicker, and waits for the policeman to click to open.
4.6.2 processing of receiving homonymous early warning short message during opening early warning short message
The solver receives the same-name early warning short message of the same alarm before turning on and displaying a certain early warning short message, and then the short message and the early warning short message are displayed by taking the union of the two messages, and characters and pictures belonging to new information flicker continuously until being turned off.
4.6.3 processing method for processing early warning short message and receiving same name early warning short message
The solver processes a certain early warning message and then receives a later early warning message with the same name without directly deleting the early warning message.
4.6.4 processing alarm message
If the solver receives an alarm short message sent by 110136 … … 180816185050 from 136 … … (the second machine of Zhang III), wherein the alarm short message is sent by manual dialing of Zhang III, the alarm short message is stored and sent to a desktop to continuously flash until the alarm is clicked and opened by an alarm receiver.
4.7 open alarm message
And the warning short message is sent to the desktop to flash and is regarded as a warning short message. The early warning name of an early warning short message, 111136 … … 180816185050, which is flickered by an alarm taker on a single basis, is an alarm which is sent by a user with the telephone number of 136 … … within 50 minutes and 50 seconds at 8, 16 and 18 in 2018; the flashing warning name is then double clicked for the first time and the alarm is turned on, at least knowing the gender and age of the name of the alarm and the location of the alarm, such as 12 meters west of the south distance bridge in the Vanda park.
4.8 extracting the second record of the temporary alarm in the local computer
The alarm receiver needs to know the message just opened, such as 111136 … … 180816185050When the alarm is given, the APP starts to search immediately by double clicking the APP for the second time, the second note short message sent and stored by the 136 … … is searched in the local solver, and if the second note short message is newly created, more than one second note short message is created
Figure BSA0000197870190000141
Figure BSA0000197870190000142
The named letter clips are opened and arranged in the letter clips from near to far according to the storage time, and the letter clips need to be seen by double-clicking.
4.9 extract the recent seconds of the alarm in the transfer station
The alarm receiver can also extract the second-recording short message stored by the current alarm before alarming from the transfer station of the early-warning short message transferred this time. The method is that the early warning message name is double clicked for the third time, and the dissolving device immediately pops up a transfer station headquarter mailbox, a net friend Li IV and a Wang mailbox sending (mass sending) extraction edit bar IV for the early warning message at this time: "tα136…… 180816185050,24H,391…
Figure BSA0000197870190000143
", if not modified (24H) to other values, click
Figure BSA0000197870190000144
Then the extraction function (r): "tq 136 … … 180816185050, 24H, 391 …" is then returned to the group sending, if all the second short messages sent by the alarm 136 … … 24 after 24 hours can be extracted quickly or slowly, the second short messages are arranged in the newly-built said new short messages according to the sequence of sending and storing time from near to far
Figure BSA0000197870190000145
In the short message folder, the alarm receiver needs to see which double-click is needed.
4.10 extracting short messages close to the position and time of the current alarm
The police receiver and the investigation personnel can also search and extract the second storage short message of the witness which possibly exists according to the position and the time. E.g. to find witnessesShort message for second storageThe time and the place are not different from the radius of the south road of the Vanda park within the range of 25 meters from the west head of the bridge within 24 hours before 50 minutes when the current alarm is at 18 hours in 8, 16 and 2018. By making a fourth double click on saidShort message for second storageThe dissolving device is based onShort message for second storageThe fifth extraction edit column for popping the recorded position to send to a headquarter mailbox is as follows: "Extracts phi 50, 24H, 391 … at 12 m west of the south road distance bridge of 1808161850 Vanda park
Figure BSA0000197870190000146
", click
Figure BSA0000197870190000147
Then extraction letter- "Extracts phi 50, 24H, 391 … at 12 m west of the south road distance bridge of 180816185050 Vanda park' is immediately sent to headquarter mailbox for distance searchingSouth road distance bridge 12 m west in Wanda parkThe short message is sent within 24 hours within the central radius of 25 meters and 50 minutes within 8, 16, 18 and 18 in 2018, and if yes, the short message is automatically arranged in a newly-built short message folder from near to far
Figure BSA0000197870190000148
Among them.
And so on, if the position recorded by the double-clicked short message per second for the fourth time isFrom east longitude xxx ×Then, the solver pops up an extraction edit column five sent to the headquarters mailbox, which is: "180816185050 Dongchang× extract XXXXXXXXXXXXIII, 24H, 391 …
Figure BSA0000197870190000149
' … … finally automatically arrange the new letter clips from near to far if necessary
Figure BSA00001978701900001410
Among them.
4.11 removal of Pre-alert short message
Flashing on the desktop of the dissolving device, then double-clicking the opened early warning short message by an alarm receiver, automatically moving the early warning short message into a related newly-built short message folder after closing for 5 minutes or automatically closing after not operating for 20 minutes, and finally moving the related newly-built short message folder into a D disk and temporarily storing the newly-built short message folder for three months according to the sequence.
Website setting window for 5-second recorder running data and execution instruction
The instructions or data of the address, the charging standard, the prompt, the automatic alarm duration and the like executed by the second-recording APP are all executed by the second-recording machine, so that the second-recording APP can execute the instructions or the dataSecond-recording APP operation data and execution instruction also called second-recording machine operation data and execution instruction
5.1 second recorder operation data and execution instruction website setting window
Clicking on a website computer desktop before providing Zhi Qin APP user application form to society in a website raising stageServerGo to net to register the mother table icon, and then click
Figure BSA0000197870190000151
The opening is as follows:
Figure BSA0000197870190000152
the seven items from the beginning A to G do not belong to the items set by the website, so the font color is light. The website can modify and improve part of the operation data and the execution instruction in the window before upgrading each time according to the needs. The starting instructions of a certain function are more, and the user only needs to remember one or two.
5.2 generating application form
After the website building personnel complete the filling of the website setting, click to determine and self-check of the software, the fonts of the Zhiyun APP personal user application form and the Zhiyun APP public inspection user application form at the bottom of the window are available from shallow to deep at any time, and the website building personnel click the former to open the following characters:
Figure BSA0000197870190000161
the website staff can paste the user application form of the Zhiyun APP personal user and the Zhiyun APP public inspection user application form into the social-orientedWebsiteAnd other web pages for downloading, applying and accessing to the network by smart phones and computer users (the second-recording watch needs to be downloaded, installed, sold and sold by manufacturers). The items without numbers are typed, and the user can type the items when applying for the items or can type the items through a change table after accessing the network.
If the official examination unit clicks the 'Zhi Qin APP official examination user application form' to apply for use, the window where the official examination unit is locatedPop-upThe following cues:
Figure BSA0000197870190000162
5.3 prompt voice setting window
And in the setting window of the operation data and execution instruction website, clicking the z-th prompt voice setting to open:
Figure BSA0000197870190000163
the prompt voice setting window is provided with a plurality of prompt words which can be modified if necessary for upgrading the product. Wherein, the voice is required to be modified by the website headquarters in the stage of establishing the network, and audio-video files are made and stored in a website execution instruction setting window in a 7.1 network entry registration mother table for the generation of a network entry registration sublist.
5.4 exempt from the liability clause and setting window
And in the setting window of the operation data and execution instruction website, clicking the AA exemption clause setting, and opening:
Figure BSA0000197870190000164
6 instruction of parent APP and operation thereof
The second note APP is not different from the second parent in the safe driving and protecting navigation of people easily suffering from dark injuries, so that the second note APP can be called as the leading APP. When the method is used, the method can be set in advance, for example, shouting "dad" means commanding to send an early warning message, shouting "dad —" means commanding to directly send an alarm message, and the like. The "Times 'machine operation data and execution instruction set" synthesized according to the website and the user's personal settings is explained in detail as follows.
6.1 according to the manualsOpenDraft page and inserting selected portrait in the portrait position
The user draws a circle around the user's portrait on the screen and then repeatedly draws the circle once again, i.e. handwriting two overlapping portraitsOThen the page of the draft is opened and the periphery is written by two overlapped partsOThe portrait is inserted into the draft page receiver portrait position.
6.2 starting with the hand/password and/or distance valueCollectingIt is shown in
The manuscript page is opened to indicate the start of supplementCollectingSee-enterSelf-timerThree-second snapshotDetective probeAndrecording of soundStatus, if in the draft page
Figure BSA0000197870190000171
Clicked on, the edit state is entered. Push buttonHand commandPasswordDistance valueOpening a draft Page to beginCollectingThe instructions seen are 4:
clicking in personal mailboxDraft page(ii) a Secondly, in a standby state, continuously hitting the body once by four fingers (without using the barrier-free second recording machine), or tightly holding the waist of the mobile phone once (without using the barrier-free second recording machine); third, in the standby state, the owner's call is heardDraftOrThe leading and trailing of the parent(ii) a Fourthly, the distance of the second machine recording is less than or equal to 5 meters (the distance value is used as a command or started in the second and third generations).
6.2.1 additionSelf-timer
The page of the manuscript is opened to start, the second recording machine mainly focuses on the lower lens, if the machine host forgets, the second recording machine immediately vibrates for 1 second and gives out a prompt tone: "owner you wear the color clothing library, please take a next self-timer, do not want to add the self-timerNeglecting "the user looks at the lens, remembers the camera for secondsSubjective today's bust portraitThe new image can be automatically displayed for 0.3 second for new (mainly wearing new clothes) and effect, then the new image is replaced with the original image of the main portrait, and the replaced main portrait is stored in the personal mailboxReplaced main portrait position(ii) a Is prepared fromSubjective today's bust portraitOld and only effective inReplaced main portrait positionIf the original image is stored as well as worse, the image is not taken again, and only the image is taken out of the image position of the main person of the replacement machine.
6.2.2Second shooting picture
The owner only needs to be outside to prevent the owner from being hurt in the dark, the second recorder finishes 1 seen one-second snapshot, and the picture is calledSecond shooting picture. Second recorder with manuscript page openSnapshotThe function is started immediately, the video is shot immediately when people come within the range of 5 meters, 1 picture of the person and the scene are cut out from the video after the video reaches 1 second, or the pictures of the person and the scene are inserted into the picture position of the people coming on the draft page, and the rest pictures are deleted. The person who has once set as "prompt to run result" also sends a "second-time picture completed" prompt.
6.23Detective probe
The second-recording APP is designed and produced by developers to form a barrier-free second-recording machine which has an interphone function and also contains mobile phone number detecting software; the barrier-free second recorder is startedCollectingSimultaneously starting a function of detecting the mobile phone number, detecting the mobile phone number of a receiver within 5 meters of the local machine, and detecting the mobile phone number input position of the receiver immediately inserted into the draft page when detecting each receiver; the person who once set as 'prompt for result to be run' also sends "Detecting and detectingThe prompt is completed.
Then continue probing and inserting (if the developer believes this to be the case)Detecting and detectingThe difficulty is large and the implementation is left to the second or third generation products).
6.2.4Recording of sound
Second recording machine is onSnapshotDetective probeAnd simultaneously inserting the heard sound into the voice recording positions before and after the draft page is out of line.
6.3 opening according to the hand order and passwordLighting deviceFunction and insertion of the image position of the receiver
The user clicks the image position of the receiver on the draft page and clicks the camera to open (see the collection and transmission of the 3.2 second recording/early warning short message in detail), or the second recording machine hears the main callLighting deviceWhen in time, the self-timer function is immediately opened, and a prompt tone is sent out: please look at the lower lens. When people watch the lens, the second recorder feels the effect of the photo combination, the photo combination can be displayed for 0.3 second in an extending mode, and then the photo combination is inserted into the photo position of a receiver on the draft page.
6.4 Only by hand, password, distance valueDraft second
Draft secondI.e. sending a message seen by the second recorder owner. Firstly, without a real person present, a second recorder hears the owner calling 'daddy' to the second recorder; or the host clicks on the draft page to send and store the manuscript; or the owner clicks and sends the picture to the parent under the screen picture; or four fingers of the owner continuously hit the machine body or tightly hold the waist of the second recorder twice in the standby state; or the distance between the second recorder and the second recorder is less than or equal to 0.2 m, the second recorder immediately packs the draft as the manuscript into 193 second-stored short message group and sends the second-stored short message group to each member of the transfer station, and a 'login' prompt tone is sent out after the second-stored short message group is successfully sent out; the person who had been set as "prompt to run result" also sends "Draft secondThe prompt is completed.
6.5 starting from zero according to the password, distance valueSnapshotSecond moment of the heart
The second recording machine hears a short sentence of a particular relative plus a verb or a place name called by the owner, such as 'old man, I go to the head of the west mountain', or in a quiet environment without noisy human voice, when the distance between the visitor and the second recording machine is less than or equal to 5 m, or the waist is tightly held for three times, and the second recording machine is immediately started from zeroSnapshotOpening a new draft page (the old draft page is cleared except for the owner information and the position information)Collecting-immediate entrySelf-timerDetective probeSecond shooting pictureAndrecording of soundStatus. After 3 seconds, the drafts are immediately subjected to information union and packaged into second storage no matter how the conditions of self-shooting, detective shooting, second-shot picture shooting and recording are finishedThe short message group is sent to each member of the transfer station, and a prompt tone of 'login' is sent out after the short message group is successfully stored; the person who had been set as "prompt to run result" also sends "What is seen by snapshotIf the password is completed, continue to use the instruction.
6.6 sending the pre-warning from sending the existing draft to sending the draft in terms of abnormal silence, password and hand command
The temporary storage place of the early warning short message is a transfer station, the storage place is a headquarter mailbox, and if the sender does not additionally withdraw the reply letter in the temporary time period and has the locally-dispatched solver, the locally-dispatched solver is also forwarded to the locally-dispatched solver by the transfer station.
6.6.1 continuous sending of fragmented Pre-alerts from sending existing drafts according to abnormal quiet
The intelligent second recording machine, especially the second recording watch, can remember the activity amplitude and frequency of the owner in different time periods. When an active owner feels suddenly inactive in an active period, abnormal silence is detected, or original pulse information disappears under the condition that no information is input on the face of the owner or fingerprint of the owner is input, a watch peels off the owner without end, immediately packs a draft page as a manuscript into an early warning short message with a short message name of 111 beginning to be sent to a transfer station, completes early warning for one time, then develops second early warning, carries out 'one-second snapshot' from the new draft page, packs new information of the draft page into an early warning short message with a short message name of 111 beginning to be sent to the transfer station (a clearer portrait of the same visitor is also regarded as new information), completes second early warning, and continues until thirteenth early warning is completed, wherein the early warning time is 12 seconds according to 'running data and execution instruction set information'; if the information early warning duration value is 20 seconds, the twenty-first early warning short message is completed in total; the twenty-one fragmented early warning messages completed within 5 minutes are called as synchronous early warning messages (the existence of synchronous second storage messages is not excluded within 5 minutes). After finishing, sending out a prompt tone of 'login and login'; if the user sets the operation result to be prompted, the user also sends a prompt language such as early warning completion; and finally, combining the early warnings into 1 early warning short message for storage (only one person and one most clear portrait are stored).
If the short warning message such as '111136 … … 181111222222' is received in the second recorder, the solver, the viewer and the headquarter mailbox, if the mail of '136 … … alarm withdrawal' is not received in the temporary alarm time period, the received '111136 … … 181111222222' is transferred to the desktop of the local 110 information platform or the quasi-case solver continuously flickers until an alarm receiver clicks and opens the device.
6.6.2 Pre-warning of sending the fragmentary parts continuously from sending the existing draft according to the password and the hand command
The second recorder is continuously hit by four fingers or grips the waist of the mobile phone for three times or hears the second recorder in a standby state "Father Father and father'or'Is father and mother look what you see me?Police, what do you look at me?"or in the state of taking a snapshot," father "is heard, or in the state of standby, the other party is heard to speak with a movement → inlay you, kill you, drown you, strange you, poke you, or" leave "/" leave something else "/" leave something to play "+ one title of the caller as" lie tertiary ", the same as the previous section immediately — the draft is packed into an early warning short message and sent to a second line to finish the early warning for the 1 st time, and simultaneously the next second of" one second snapshot "is carried out to finish the early warning for the 2 nd time, and the duration lasts until the set automatic alarm duration is … ….
6.6.3 reminding and warning according to the result of the detection of the individual person
A second-recording mobile phone, a second-recording computer and a second-recording watch formed by a second-recording APP intelligent-upgrading communication product detect that a user alone accepts the invitation of others to move to other places in a standby state, and immediately send out a prompt such as' Xiaolixiali, where are you? "then the natural answer of the user is as" dadadad dad, i go somewhere with you "as the content of the second-recording short message encrypted and stored to the second-recording line.
6.7 sending back-withdrawing letter according to the password and the owner condition
After the early warning messages of the second recorder and the second recorder are sent out, if the owner says 'none, thank you for the rescue' of the government, or the owner is still felt to move freely without being limited by the person, and the second recorder takes the hand inThe pulse felt on the watch is still the subject pulse or is automatically picked up without being removed
Figure BSA0000197870190000191
Figure BSA0000197870190000192
A "self number + recall alarm" letter is, for example, "136 … … recall alarm".
6.8 according to withdrawal alarm letterCancellationEarly warning
The second recorder, the solver, the viewer and the headquarter mailbox receive early warning short messages (such as the early warning short messages) which are required to be forwarded to the quasi-malignant case solver (12110 information alarm platform) after the temporary alarm time period (initially planned to be 5 minutes)
Figure BSA0000197870190000193
If a letter with the content of '136 … … withdrawal alarm' is received in the temporary alarm time period, the alarm is sentCancellationAnd (6) forwarding.
6.9 not showing the main portrait according to being operated
When people except the owner use more than one item, particularly when the screen is switched from the closed state to the display state, the intelligent second recorder with the face recognition function finds that the owner does not immediately shoot the person with the half body and cut off the person with the half body and insert the person with the face recognition function into a second recording short message group, sends the second recording short message group to a second recording line, and carries out the second recording when the person with.
Therefore, the seconds which are automatically sent by the lost and stolen mobile phones can be extracted, and the user can be helped to recover the stolen and even robbed parent mobile phone.
6.10 directDialing 110Instruction of
The alarm is not required to be formally given after the owner waits for 5 minutes after the early warning short message is sent out, if the danger is urgent, the owner can manually dial 110 at any time, or the owner calls within 5 minutes after the early warning is sent out:father and motherOr the gangster can move once → pinch, strangle or poke one of you, or four fingers can continuously hit the body or tightly hold the waist of the second recorder four times, and then immediately go to one sideAnd sending the alarm short message, and simultaneously carrying out hands-free waiting for the connection of the alarm desk.
6.11 sending location Instructions according to location Requirements
The parent machine receiving the parent's guardian or guardian' sending positionShort message demand letterWhen the system is used, a 'position short message' is sent immediately, namely the position information in the manuscript page is packaged into a name immediately, and a second short message at the beginning of 193 is sent to the transfer station in a group;
in addition, if the leading mobile terminal is submerged in water, the short message demand letter of the sending position is not received, and the position short message is immediately sent to the transfer station in a group mode.
Other essential properties of 7-second recorder and decomposer
The mnemonic machine needs to be provided with a personalized operation database. Personalized operational database forStickingOr is called asStorage ofTwo things: firstly, a personalized operation data and execution instruction set of the parent machine and secondly a member mailbox set of a plurality of transfer stations are as follows:
Figure BSA0000197870190000194
the personalized extremely-close machine operation data and execution instruction set is hereinafter referred to as a personal database.
Only local transfer station member mailbox groups are pasted in the transfer station member mailbox set before roaming in the personal database of each user; when the terminal roams to the first place, the terminal is sent to a first transfer station member mailbox group by a server, and the 'transfer station member mailbox set' is changed into a group with 2 transfer station member mailboxes; when the user roams to the land of ethics, the user becomes a group … … of 3 transfer station members which originally plans a group of 10 transfer station members accommodated in a personal database of each user at most; when the system is adopted by the government, each transfer station member mailbox group contains mailbox address records of a local solver and a consultant.
When the user roams to the 10 th roaming place, namely the 11 th transfer station member mailbox group to the personal database, the third added transfer station member mailbox group in the personal database (namely the third place) is replaced.
In addition, the APP MEM and the digester must have the following properties.
7.1 No-signal virtual charging Window
If the user does not have a signal during charging, the second recorder can perform analog charging, namely opening the APP non-signal virtual charging window. After the user carries out charging operation, the virtual charging window has a virtual new charging date and a virtual charging sum of 30 yuan, and the second recorder is put into operation again for two days, so that the urgent need of the user is prevented from being influenced by temporary loss of the charging signal.
And when the signal is recovered, the second recording machine automatically carries out the subsequent work of substantial charging according to the specification of the virtual charging of the user. If no money is found in the related account, a prompt is sent out immediately: for a user who is honored, the relevant account number is free of money, virtual charging cannot be actually completed, and the user is worried to charge in time in order to prevent the user from being unable to use the APP until the user arrives.
Figure BSA0000197870190000201
If the user clicks
Figure BSA0000197870190000202
Then display charging window of exclusive individual user containing charging standard or no-signal virtual charging window
Figure BSA0000197870190000203
The present prompt is turned off.
The leading APP of the public inspection user is used in an unlimited manner, so that arrearage reminding is avoided.
7.2 deduction of fees from balances
As the seconds transmitted by the parent APP are encrypted, the parent APP can be used by the parent APP through a universal unlocking method and preferentially used as long as a wifi signal exists. The function transmission of using the intercom of ability use intercom function when not having the wifi signal, just use flow signal transmission when these both can not utilize, produce the flow expense by user's self-reliance.
The charging system of the individual user operates according to item H of the second recording machine operation data and execution instruction set, namely the size of the second recording/early warning short message is recorded according to the day and is 1 yuan per 1mb, and the balance is deducted from the balance according to 1mb when the size is less than 1 mb;
7.3 arrearage reminding (1)
When the account balance of a certain individual user is just reduced to be below 0 yuan, the following prompts pop up by the owner by using the mobile phone:
Figure BSA0000197870190000204
7.4 arrearage reminder-
When the account balance of a certain individual user is reduced to-19 yuan, the APP of the particular individual user is switched to be stopped and immediatelyPlay backThe following cues:
Figure RE-GSB0000192119550000105
7.5 arrearage reminding device
If the user does not charge, no ' don't care ' notice is set in the charging window, the machine will immediately move out the prompt voice to play by 8 seconds on day 2:
Figure RE-GSB0000192119550000106
7.6 arrearage reminding >
If the user does not charge, the ' don't care ' notice is not set in the charging window, and the recorder immediately plays the data by 8 seconds on day 2:
Figure 2
7.7 pass-by website password or self-password
The second recorder, the solver (parent machine and parent machine) for packaging draft pages and sending related letters must be encrypted by using a website password; and only the second-stored short message mail encrypted by using the website password or the main password of the mobile phone is received, stored/temporarily stored and accepted.
7.8 handling of the receipt of the number of the person under guardianship
If the personal mailbox receives a mail of '136 … … is your guardian' sent by the website server, immediately recording: "136 … … is my monitored person number";
after the personal mailbox receives a mail sent by the server, such as '136 … … is no longer your guardian', the personal mailbox immediately records: "136 … … is my monitored person number" delete.
7.9 Re-disseminating advisory reminders
The recorder, especially the solver, plays repeatedly immediately after listening to 'daddy and asking you to say again' as the reading reply of the one-machine-owner aloud at the transfer station. Some beginning words and even expression modes such as "good bar, i slowly say" natural is more wonderful can be intelligently added.
7.10 method for dealing with network no-signal
The parent APP sends a second note to the headquarters mailbox and may encounter a "send and store difficulty one" -the user lacks a network signal locally. "two difficulties in delivery" may also be encountered-the head of the headquarters mailbox lacks a network signal or goes wrong.
If the situation of sending and storing difficulty is met, the existing smart phone cannot deal with the situation. A developer is designed and produced a barrier-free second recorder (a barrier-free machine for short) with the function of an interphone, and the barrier-free second recorder is sold as a high-grade and special teaching device by a 'hurting education network in dark places for calling and stopping'. When the storage second recording/early warning/110 information is sent to the user, the encrypted second recording is sent at the frequency of 390MHz or 510MHz … … which is not used by the user at the time, the net friend barrier machine adds the mobile phone number +1 of the net friend barrier machine after receiving the second recording and temporarily stores the second recording into a personal mailbox, and the net friend barrier machine forwards the second recording and early warning to a headquarter mailbox when the network signal is recovered. Other more advanced technologies capable of dealing with the 'difficult to send and store' are preferably adopted, and the payment of patent fees is not concerned.
Since the cooperative production of barrier-free machines is only envisaged, only the second generation or even the third generation is expected. However, the situation of no signal of the network usually occurs rarely, and on days without an opportunity, the user can only be reminded as follows:
Figure BSA0000197870190000212
if the existing smart phone is only provided with the second-time-based APP for storage, the second-time-based APP can be responded, namely the second-time-based short message cannot be successfully sent to a headquarter mailbox and other target addresses, the second-time-based short message is sent to a local transfer station for temporary storage, namely temporary storage for short, and 3-5 members in the transfer station add own second names after receiving the second namesMobile phone number +2Temporarily storing the data in a personal mailbox, and forwarding the data to a headquarter mailbox and other target addresses when the network signal is recovered.
The transmission method for coping with the transmission difficulty II is derived from the technical characteristics of the invention patent 'field recording system'.
7.11 protection of short message per second
Firstly, the photo captured by the second recording APP can only be inserted into a manuscript page, and then copying, splicing, sending, setting, adding and editing buttons are not available, namely any other aspects except the second recording APP can not be used.
The seconds keeping in the personal mailbox, the seconds keeping in the personal mailbox or the seconds keeping in the.
And thirdly, the second notes of all users can be opened only by the second note APP. And before one or more seconds are opened for display-an advice letter is sent to the sender, such as: "193 … … … fairy tale dkn 181111" (meaning: 193 … … fairy tale opens the seconds of you 20181111.
7.12 temporary storage and transfer of the received second-hand message
Except for hand-recording secondThe four seconds recording machines outside the table receive the seconds recording short message such as
Figure BSA0000197870190000221
Reply "sd (received)" 30 seconds later, and add the attached number after second is notedSelf number +2Temporary storage is given; if the phone is received by the interphone function, the phone number +1 is added after the second is noted, the phone is temporarily stored in the phone, and when the signal to the headquarter mailbox is recovered, the phone is sent to the headquarter mailbox, and a reply of 'sd (received)' is obtained and deleted after 5 hours are finished.
7.13 merging, temporary storage and forwarding of received early warning short messages
Second recording machine continuously receiving transmission of same user such as Liquan once per second
Figure BSA0000197870190000222
The early warning messages are ten-fold, and the early warning messages are collected and integrated into one early warning message after 15 seconds and named by the latest early warning name such as
Figure BSA0000197870190000223
Temporarily storing in a mailbox, and replying to 'received'; under the condition that a local quasi-malignant case solver does not support, immediately forwarding the received early warning short message to a local dispatching place 12110 alarm platform after the lapse of the suspension alarm time period and when no additional 'alarm withdrawal' mail is received; under the condition of having the support of the solver, immediately forwarding to the solver after temporary storage; if additional "alarm withdrawal" mail is received later, it is also immediately forwarded to the solver.
7.14 receiving video from external device
In order to conveniently and effectively capture and send and store the accidental portrait even if the second recorder is placed in an underwear pocket, the second recorder is designed to be capable of wirelessly receiving the portrait or encrypted portrait transmitted by external equipment; external audio-video equipment such as: a camera in the cap, a glasses camera, an earphone camera, a monitoring probe in the vehicle, a wristwatch camera and the like. This step needs to be done in cooperation with the relevant manufacturers.
7.15 Notification of No network Signal
When the second counter meets the condition of no network signal, an alarm sound of 'no signal' is sent out immediately; when the network signal is from absent to present, an alarm sound is immediately sent out to indicate that the network signal is present.
7.16 sending Address information
The minutes recorder immediately sends the location information of the place B to the server as the user travels from the place A and/or goes on business to the place B.
7.17 saving the manuscript and deleting after it is finished
The second recording machine stores the manuscript in the personal mailbox every time of sending the second recording and sending the early warning. After the total is full 500mb (initially), the seconds which are not set as star are deleted according to the first-in first-out principle.
7.18 satisfying the public inspection method to extract the number and time of the mobile phone and the position and time
The method is consistent with the method of 8.6 meeting the public inspection method for extracting the mobile phone number and time and the method of 8.7 meeting the public inspection method for extracting the position and time.
8 headring goose of headquarter mailbox-second line recording
In the computer window of the injury education network headquarters in the dark place of calling and stopping, the following 4 part icons are displayed:
first server, network access registration mother table, second server, network access registration son table
(III) operation statistical table for preventing disaster second recording of headquarter mailbox (IV)
Headquarters mailboxThe short message is a transfer station backbone for storing short messages in seconds. It can arrange all the short messages in the mail box according to the size of the mobile phone number and the time sequence. A certain stripShort message for second storageIf the person to be opened is extracted, the number and the opening time of the person to be opened are recorded in the right record column; for example:
Figure BSA0000197870190000231
the headquarter mailbox is the 1 st accessory from the user group to the parent APP (second machine), and the second deposit short messages of all users are directly or indirectly pasted. And storing the short messages in all seconds, allowing a user with a public inspection identity to be extracted and opened, and also allowing a sender to be extracted and opened, and relatives and friends of the sender/or a guardian. Buttons such as 'open, copy, cut, paste, send, delete, rename' are not arranged in the window, and other buttons such as 'open, copy, cut, paste, send, delete, rename' can not be arranged in other modes.
The headquarter mailbox and the following servers only store and accept the second-storage short messages and mails encrypted by the website passwords.
8.1 statistical tables
The headquarter mailbox comprises a harmful second recording operation statistical table, and the form content is as follows.
Figure BSA0000197870190000232
Where all data is updated in real time. This list can be opened for viewing by the server.
8.2 merging, storing and counting of received seconds note short messages
The headquarters mailbox receives the seconds short message without the attached number, such as
Figure BSA0000197870190000233
Replying to 'receiving', pasting (storing) in a mailbox, and recording a ticket 1 in the fourth column in the operation statistical table; if the second note short message with the same name is received but the second note short message with the attached number is received
Figure BSA0000197870190000234
One or more of which attach numbers such as
Figure BSA0000197870190000235
Cutting off, pasting to the third column of statistical table, returning to "close", taking the union of two short messages to replace the pasted one, and marking the corresponding ticket number to the third column according to the number of the ticket.
8.3 merging, storing, counting and forwarding the received early warning short messages
Headquarters mailboxReceiving the same user, e.g. a lee transmission, consecutively once per second
Figure BSA0000197870190000236
The early warning messages are taken after 30 seconds and are integrated into one early warning message, and the latest early warning name is named as
Figure BSA0000197870190000237
Pasting in the mailbox, replying to 'received', and marking a ticket 1 in the fifth column of the statistical table; under the condition of no support of a local quasi-malignant case solver, immediately forwarding the received early warning short message to a local dispatch short message alarm platform (if yes) after the time period of the suspended alarm is over and the additional 'alarm withdrawing' mail is not received; in the case of local dispatch of the used solver, after the fifth bar notes 1, the solver is immediately forwarded after the lapse of the pending alarm period and the additional "alarm back" mail is not received.
If the early warning short message of the fourth plum sent by the second recorder of Zhang III is received again, the receipt is replied, the attached number is cut off, the ticket 1 is marked for the seventh column according to the fact that the tail end of the attached number is 1 or 2, the ticket 1 is marked for the seventh column of 2, and finally the sum of the two tickets replaces the early warning short message pasted in the mailbox earlier, if the early warning short message of the fourth plum sent by the second recorder of Wang Wu and Zhao Qi … … is received again, the operation is consistent with the above.
8.4 satisfying user self-lift
Headquarters mailbox received from user 136 … … "Extracted from 1910101010, 1, 631 …"extract letter, immediately find second name in mailbox containing 136 … …, send time and save time as10 months in 2019, 10 days in 10 hours and 10 minutes in 10 daysThe most recent before and afterEach 1 pieceIf yes, copying the second-stored short message and changing the original website password into the extraction letter631…Later, the reply is sent;
if there is no seconds in the headquarters mailbox for 136 … …, then the method reverts to: "sorry, total mailbox has no seconds to send to store 136 … …". Such a reply, if not, is also available in sections 8.5 and 8.6 below and will not be described in detail.
This strip is less necessary and is not shown in the drawings.
8.5 the requirement of the guardian and the public inspection method for extracting the number and time of the mobile phone
Receiving a user's call from headquarters mailbox "Extraction of 139 … … 1903030303, 24H, 631 … …The extraction letter is immediately stored in the temporary storage place of the extraction letter together with the mobile phone number of the person who extracts the letter, and a sender in the mailbox is searched139…In "3 months in 2019 and 3 hours in 3 days and 3 minutes' all second-stored short messages sent within 24 hours before and after, if yes, copying and converting the original website password into the extraction letter631…Later, the reply is sent; if the H value in the extraction letter is larger than a plurality of days or even a plurality of years later, the later reply is sent in the value range (unless the front headquarter mailbox receives the withdrawal letter of the extraction letter, the extraction letter is removed from the temporary storage position of the extraction letter, the same is applied below);
if it receives "Extracting 136 … … 1808080808 180808080808, 5 pieces, 391 …"extracting letter, immediately searching for the sender in mailbox139……In "8 months in 2019, 8 hours in 8 days and 8 minutes in 8 hours' store the short message in 5 seconds before and after, copy and change the original website password into the extraction letter if there is any391…And later giving a reply to send.
8.6 satisfying the public inspection method to extract according to position and time
Receiving a request sent by a user from a headquarter mailbox "Extracting phi at 12 m west of 180816185050 Vanda park south road distance bridge 50,24H,391…"extracting letter, immediately finding the position in mailboxSouth road distance bridge 12 m west in Wanda parkThe diameter is within 50 m,8 month, 16 day, 18 hour, 50 minutes and 50 seconds in 2018All the second-stored short messages sent within 24 hours before and after the second-stored short messages are copied and the original website passwords are converted into extraction letters if the second-stored short messages exist391…Later, the reply is sent; if the H value is larger than a plurality of days or years later, the reply is sent in the future if the H value is within the range;
if a user sends a message "180816185050 is extracted from the plant material by the method of drawing the plant material east via XXXX X North latitude XX X phi 50, 24H,391…"extraction letter of, look up immediatelyFind the location in the mailboxFrom east longitude xxxThe diameter is within 50 m,8 month, 16 day, 18 hour, 50 minutes and 50 seconds in 2018All the second-stored short messages sent within 24 hours before and after the second-stored short messages are copied and the original website passwords are converted into extraction letters if the second-stored short messages exist391…And later giving a reply to send.
8.7 auto delete due
The headquarters mailbox storage space should be 3T and above. The user sends the stored seconds, and when the occupied space is 80%, the seconds are automatically deleted according to a first-in first-out principle; when the shelf life is less than one year, on the forehead of the statistical table: "current headquarters mailbox occupancy is 80%, deleted for up to one year shelf life" is darkened by light, and each workday 9: 00 flashes and sends a beep of "beep" 1 time per minute for half an hour or the end of the "close" click.
8.8 upgrading version has the capability of receiving the second-time recorder and sending the second-time storage short message by the talkback technology
The headquarters mailbox of the upgrade version is designed to have the capability of receiving the second-time recorder and sending the second-time storage short message by the talkback technology, and detailed indexes are omitted.
9 Server, network entry registry
The server and the registry of the APP for preventing the concealed murder are two brands of a department, are used for generating a user registry of the APPs suitable for the personality of the user, and are also used for serving the APPs of all users. Is the 2 nd fitting of APP.Mailbox address impersonation Is www.jtadshjyw.com.cnIt is pasted on the W-th bar of the second machine operation data and execution instruction set. There is a connection to the headquarters mailbox.
9.1 registration mother Table for network access
At the beginning of building a station, the software or software program provided by the inventor comprises a second recording APP, a headquarter mailbox and an access registration mother table, wherein the personal version of the access registration mother table is as follows:
parent APP user network registration mother table (personal type)
Figure BSA0000197870190000251
The contents of the "website present fee" and "billing standard" columns in this mother table are the website setting values described above.
9.2 user applies for network entry
The smart phone user opens three times to download on the network and complete filling the following application forms:
<most-matched APP personal user application form
Figure RE-GSB0000192119550000123
Figure RE-GSB0000192119550000124
9.3 generating a private network entry registry
Zhang Sanjian completes filling the application form and clicks
Figure BSA0000197870190000261
Then the application form is automatically sent to the website headquarters server. The server discriminates the data of the application form after receiving the data, and randomly generates the following registration form after finding out that the data is not proper.
Online use registration table for leading APP personal users
Figure RE-GSB0000192119550000132
Figure RE-GSB0000192119550000133
The server can distinguish each natural person from the identification number. If a natural person uses another mobile phone number to apply for use again, the generated 'registration form' website sends a fee for one grid display: the last time the data is sent; one account balance grid shows the last balance.
9.4 sending and installing APP software to users
After the exclusive registration form is generated, the website server immediately sends a software personal version of exclusive Zhi parent APP issued to Zhang III to the mobile phone with number 136 … …, and after Zhang III receives the software personal version, the mobile phone is installed by clicking, so that the first generation of the second recorder is formed. The appearance of the memo recorder is shown by adding an icon "to the parent APP" on the screen. After the installation is finished, the following prompt words are displayed on a view screen:
Figure BSA0000197870190000263
if no local government exists, the public inspection method of the product accepts the cooperation of installing and using case clue consultants and dispatching the installed and used quasi-malignant case solvers, and in the case that only three persons are used in a network, the following clues are displayed:
Figure RE-GSB0000192119550000135
even if a local public inspection method is matched with a case clue viewer and a quasi-malignant case solver or a transfer station which helps each other and calls a murder in a dark place is established, each user needs to pay attention to the following non-signal prompt:
Figure BSA0000197870190000271
9.5 generating dedicated run data and executing instruction sets
After the third user becomes a new user, the third user firstly sets all items in chapter 2, namely the second machine running data and the instruction execution owner setting window, and then automatically links to the following exclusive instruction set, so that the third user can be put into use.
Figure BSA0000197870190000272
9.6 handling of received Change tables
Suppose that the server receives the change form from Zhang III as described in "3.6 Change registration info" and is immediately pasted to the lower side of the user Zhang III's log-in form. The change table is filled with a lattice of 'guardian/guardian mobile phone numbers': 159 … … #, 138 … … (for example), and the lattice in the registry was originally registered as 158 … … #, the server then:
firstly, sending letter to 159 and 159 … … of user 159 and 136 … … are your relatives and friends and secondly, sending letter to 138 and 138 … … of user 138 and 136 … … are your guardians "
③ the user 158 … … is sent a letter "136 … … is no longer your relatives", other variations are illustrated from the above.
9.7 registration of local transfer station member mailbox groups
User a, user b, and user c … … are typically more successful in sending messages to each other than to one in kilometers, if they are co-located, especially at a base station. Based on this, the invention takes the local mailbox group which can easily and successfully send the short message of the second storage as the mail groupLocal transfer station member mailboxAnd carrying out group registration so that the server can be sent to relevant users for use.
9.8 reissue of local transfer station member mailbox address
When any user accesses the network, the number of the mailbox address collection mailboxes of the members of the transfer station is less and insufficient, and once the number of the easy-to-connect mailboxes is increased, the server can provide supplement by sending when the number of the available mailboxes is increased, so that the transfer station of the user is enriched.
9.9 reissue roaming ground transfer station member mail box address
The server receives "roaming intent: the encrypted letters of Shanghai Wai beach, Hangzhou West lake … … "will: the Shanghai beach transfer station member mailbox address set and the Hangzhou West lake transfer station member mailbox address set … … are encrypted and sent to the personal mailbox personal database of the receiver.
When the number of the easy-to-connect mailboxes is rare, the roamed mailboxes are also sent to the personal database of the receiver, so that the matching amount is sufficient as much as possible.
Third, analysis of necessity and effectiveness of the dark injury of the called and stopped states
In other words, the parent APP can be used conveniently and quickly by the personnel who are easily subjected to the hidden trouble, and the method for promoting the social civilization progress is as followsEffectiveness of——
Indirect effectivenessThe deceased or deceased generation of the enlightening case, which is wanted to pursue, escape and throw no way on the body and on the net, or the foggerant society of the vengeance, can satisfy the needs and can be used as a cushion. However, once a murder is ready to be murder, the user calls the self solstice or immediately exposes the murder place by holding the waist of the second recorder, the user with alertness still records the second-shot picture of the situation of people and objects, so the scoundrel can be exposed to nothing as long as a network signal exists, the high-configuration barrier-free second recorder can enable the scoundrel to be shAN _ SNed nowhere without the network signal, the number of the crinkler such as a mobile phone can be detected, the criminal does not need to be rewarded by the means of continuously exciting contradictions, the security work efficiency is improved, and the law management persuasion is improved.
Direct effectivenessAs described in the first page of the invention, the calling of the owner to the next can call off most of the fear of exposure and protect both parties from death. Therefore, the incidence rate of criminal crimes can be greatly reduced, and the progress of social civilization is promoted.
10.1 practice of persons with alertness
How to prevent even the injury from being called or stopped in darkness is proposed, besides the prompting words in the ' 2.3 arrival early warning duration setting window ' and ' 3.2 second recording/early warning short message collection and sending ', the website also aims to teach the user (the following paragraphs with various continuous underlines) ' -the user
Respected user: if you call Huang Xli, you wear red clothes to go to the first part of west mountain in the Changhu village in a certain day On the way of no one, when people want to protect the body by the APP, the mobile phone is taken out actively and looks at the screen, and the people are shout by the volume of the normal speaking The person says that the person goes to the west and reaches the old, i goes to the west in the long-term village The 'step on' indicates that the snapshot function is started.
If the APP of your leading person does not have a camera in the cap and does not have the cooperation of the cameras such as glasses and earphones, a male is met When the child (long hair) comes straight and stays at a distance of seven to eight meters while the child (long hair) is still, the user holds the waist of the mobile phone with one hand and enables the mobile phone to be close to Right ear (or left ear), shout loud you
Figure BSA0000197870190000291
Is old and old, see me? Then turned 90 deg. to the left (if The mobile phone turns right by 90 degrees beside the left ear-let the mobile phone lens stay for 1-3 seconds towards the coming person. Handle of second-hand watch The ear-covering type ear-warming mask is prepared by the following steps: hear the return of loud hands-free "see
Figure BSA0000197870190000292
Figure BSA0000197870190000293
You now go from Changhu village to West mountain road In the top, when you walk 1200 m, you come a man in front of your eyes, and there are three longan trees on the left, so people do not feel afraid. "this is nothing more than telling the coming: the person, the inexperienced person of the property, and the person who shouts at that time are known. This is even if you do so The public security contributes a responsibility. If the caller is not a criminal, your yell will not lose the face of the body. Shouting oneself after all Is of human nature and does not interfere with others.
In a word, if you worry about the occurrence of a murder injury, you are shout
Figure BSA0000197870190000294
Or
Figure BSA0000197870190000295
Extreme and extreme, can The lens can be swept across and the scenery on both sides is more in place.
10.2 practice of persons without vigilance
The first measure of reminding is "direct effective for alert use" in the previous section. Although the injury is called to stop in darkness with greater confidence, the child user may not be able to do so with the alertness and some operational ability.
However, the last APP is used to prevent the hidden injury, but the APP is not only effective in alertness, but also can be effective for the user only by the nature of humanity without alertness, namely a second measure for reminding.
10.2.1 user could call active
The web site can be designed in this way andteaching a user:
if you want your child to use the watch for personal memory when you are out, you can teach TA to be out of fear Wait to remember the watch for a second and yell "daddy and daddy". If the distance from the mature person such as the King Tertiary is 3.5 meters Shouting "father and mother, i see a queen tert" -if we do not know which tert, i say "i see a tert", preferably, the user can lift the hand wearing the watch to touch the chin or cover the mouth while the user's face is exposed, so that the user can see the watch and the roadside Scenery (1-3 seconds, it is this that is the bracelet alsoMethod) if the user continues to forcibly hug the collar before the collar is tightly hugged Shouting "father and father" for two to three times.
10.2.2 the user will not be unable to call
If the user, especially a child user, suddenly goes faint due to the operation of a malicious visitor, the user cannot shout "dad and mom", and the possibility of direct effectiveness also exists, namely a third measure:
the intelligent watch second recorder packs the existing draft into a package immediately when the owner is unconscious or controlled, suddenly stops when the owner feels the activity, is abnormally quiet, or the original pulse information disappears under the condition of no face input or fingerprint input of the owner, and the watch peels off the ownerEarly warning short messageSend to the second line and go back "One second grab Swatter"send early warning 12 times;
so that issued by the child userEarly warning short messageAt least comprises the information of event time and position; and also has a high possibility of containing a portrait left when the caller picks off the watch for second time, and a possibility of detecting the number of the caller's mobile phone, so thatThe members of the digestionA targeted alert can be issued with the possibility of prompting a criminal to hold his or her hands.
10.3 making method of drivers of vulnerable persons
Many drivers like to play honest signs for business solicitation, and meanwhile, in order to avoid dark injuries, the drivers should not exclude the driver from sticking own half-body close photos on the door leaves of the cab (of course, private cars do not do so absolutely for keeping secret), and the drivers should be matched with close-photo advertising words: the head portrait in the vehicle and the head portrait outside the vehicle are both safe and welcome to remember me.
Therefore, a driver can directly and robustly install and use the leading APP monitoring probe in the vehicle; the passenger just hears the broadcast' the head is in the car, the head is outside the car, the passenger feels safe and welcomes to remember like the person, the passenger tries to see the prompt when seeing the evil memorial personnel who fierce in remote places, the passenger knows nothing to go to the head when being conscious, the fear that the passenger is exposed is that the evil memorial is silently collected, or the passenger gets off the car and goes to compile a reason that the mind is changed. In case that a minded person is unconscious, and goes to a remote place to shout and stop for a devil, you say that a loudly shout your ancestor is like "arrange long, you say where I am? The 'row length' gives a reminder to the noodle.
10.4 method for making passenger with easy person
First serve of userPassenger's seatOn the day, a passenger vehicle which has a head portrait in the vehicle and a head portrait outside the vehicle, both are safe and welcome to remember what's the name of the passenger vehicle is found at a station, the head portrait is carefully seen down and confirmed as one person with a driver, then the passenger vehicle takes a picture by a second recorder, two overlapped circles are drawn on the periphery of the passenger vehicle, a manuscript is clicked on a popped-up draft page to send the manuscript, and a network signal is successfully sent and stored. The user a does not have to worry about secret injuries from the driver when riding the driver's car.
User YidangPassenger's seatOn the day, when a passenger car is carried in a station, but the passenger car does not find that the head is in the car and the head is outside the car, the passenger car is a safe feeling and welcomes to remember like the Chinese character I, and she asks a driver: "how much do you spend on going to a certain place by the master? "× prime" "is not very expensive, but is my dad let me sit in front of the car giving him a look at your photo of the driver, do you agree? We can do all together. "user B gets compliant, so take second machine to sweep the driver's picture (must confirm not to be fake) or finish a piece of the comic, draw two overlapping circles in the periphery of the comic, click and send the manuscript on the page of the popped up draft, or say to second machine once" dad, I'm get on "and can deliver successfully, then user B takes the car of this driver and needn't worry about the secret injury from this driver either.

Claims (1)

1. An application program, namely an adversary APP for preventing and calling and stopping dark damage, is used for upgrading communication products to form an adversary mobile phone, an adversary computer, an adversary watch, a quasi-malignant case solver and a case clue viewer which are matched with each other; 3-5 front two stations which are not easy to block two-by-two communication-government adoption also comprises the latter two stations-and a headquarter mailbox is added to form a second scoring line-second recording transfer station. When the owner calls the leading person in a secretly-protected manner or violently struggles to cause the leading person to shake violently, the former three immediately encrypt and group-send the early warning short message containing the position and the seen information to the second recording branch and open the hands-free mode to wait for the return call; members of an intelligent or non-intelligent second scoring line dial back calls at any time, who dials through the phone numbers according to the received early warning short message loud call, and a person who is just criminal who walks to the owner can hear that' someone and things are seen by someone, someone is in the current position, someone is in the front of eyes, someone is on the left and right sides, and someone is not heard by a regular person and cannot be reminded by the person who conspires to take the criminal in the dark place at the moment-another person who sees the conditions of the person and the things at the moment can never take the criminal in the dark place; if the caller is not a criminal, the owner calls the phone to the parent, and the caller can call the phone without losing the two body sides; if the caller is the expert who tries to invisibly murder and reports or intends to rape killer and crime officer who tries to make financial disasters, the caller calling the criminal just can call the criminal to stop and fear exposure, so that the criminal can be prevented from dying, and the minority who can not call the criminal can call the criminal to expose and can not be cut by any countermeasure; the intelligent communication tool cannot prevent and call out injuries darkly and tell victims to finish the historical declaration. It is characterized in that:
(1) if the owner is heard to say 'no matter' or 'safe' in the temporary alarm time period or feels that the owner still freely moves without being limited by the person, the temporary alarm time period convenient for determining the alarm withdrawal is reserved for the group sending of the early warning short message of the parent APP, the alarm withdrawal letter is additionally sent for the alarm withdrawal, the alarm winning time can not be interfered, and the work of the police can not be disturbed by unnecessary alarm,
(2) the one-key of the waist of the hand-held seconds recorder, especially the instruction of sending an extremely calling as a pre-alarm is another measure for gaining the alarm time without interference,
(3) each member of the second-recording branch line receives a plurality of fragmentary synchronous second-storing short messages continuously sent by a user in a group, temporarily stores the union of the fragmentary synchronous second-storing short messages and forwards the union to a headquarter mailbox; if the received short warning message is an early warning short message and the alarm is not received in the suspension alarm time period, the alarm is withdrawn additionally by the alarm, and a receiving mailbox is provided by the police, and the alarm is forwarded to the receiving mailbox; if the police uses the solver, the data is directly forwarded to the solver desktop and continuously flickers until being clicked,
(4) the solver displays the early warning short messages of a certain user, receives a plurality of early warning short messages which are continuously sent by the user before closing, immediately displays the union information of the early warning short messages and the early warning short messages, the characters and the pictures which belong to new information flicker continuously until being closed,
(5) the warning criminals can not realize the primary warning and the advanced warning of the hidden underground hand-besides the loud warning, a resolver controlled by the police station can be connected with a certain broadcast loudspeaker for warning, if the received early warning short message contains the mobile phone number of the detected criminal, the member who marks the mark in seconds can directly call the criminal to send the warning,
(6) an intelligent leading mobile phone, a leading computer and a leading watch find that the owner is invited to move along with the leading mobile phone and immediately give a ringtone and a safety prompt such as' shouli, where are you? So that the user can naturally drag the parent machine for a while to say that the parent machine says that the parent machine is to a place, the objections of the parent machine can be avoided, the parent machine can conveniently and immediately encrypt and store the second message of the owner and the person who are together, the related departments can know the message at a glance after the message is not seen by the related departments, the situation that the parent machine enters a shielded room, a vehicle and other areas and is aged can be prevented from being killed,
(7) the position information of the short message draft page is inserted and changed at any time, if the parent machine receives a short message demand letter of 'sending position' sent by the guardian/the protector or immediately sends the position short message in a group way along with the host machine is submerged, the parent machine can conveniently find child users who go out of air, and is particularly convenient for related departments to organize and rescue drowning people,
(8) the recording machine finds that the recording machine is not operated by the owner and immediately takes a second shot and encrypts a second recording short message containing the portrait and the position information of the operator when the recording machine is used by people except the owner for more than one item, particularly the screen is converted from the closed state to the display state, so as to trace the lost and stolen mobile phone and resist the actions of stealing and robbing the mobile phone,
(9) the guardian/protector communication signal code input window is arranged, the user can input the guardian/protector number and send the second storage early warning message to the related second scoring bank once the number is input, the second scoring bank member comprises the parent machine of the guardian/protector, the guardian/protector user can personally identify the guardian at any time,
(10) the parent machine, the solver, the headquarter mailbox and the server send/mass-send the second-time-stored short messages and the letters are encrypted by a website password or an owner password of the opposite party, and only the second-time-stored short messages and the letters encrypted by the website password or the local password are received, stored/temporarily stored and accepted,
(11) the recording machine receives the extraction letter with the opening password, immediately gives related search, immediately copies all the letters with the same or similar positions, sends the opening password after replacing the website password of the short message,
(12) the short message names beginning with 193/or 110 generated by the parent APP respectively represent the seconds recording short message/early warning short message, + the mobile phone number defines the sender/alarm, the year, month, day, hour, minute and second defines the time of seconds recording/early warning,
(13) the first double-click opens the short message name generated by the leading APP in the leading device, the second double-click searches whether all the short messages containing the mobile phone number name in the computer are displayed from near to far, the third double-click returns to group sending to extract the second-stored short message extraction letter with the mobile phone number, the fourth double-click sends the second-stored short message containing the possible witnesses with close position and time to the headquarter mailbox,
(14) related personnel need to open the second-time short message, and then provide the opened recording machine to automatically send the second-time short message sender and the headquarter mailbox to send the notice letter, and the second-time short message and the notice letter are sent to the second-time headquarter mailbox which can not be deleted and destroyed by human beings, thereby not only inhibiting related personnel from randomly opening the short message which is not needed to be opened, being beneficial to protecting the privacy of the user, but also checking whether the short message which is supposed to be opened is opened, and the related departments are used as or not, honestly used as or dishonest as all to be checked,
(15) the parent machine sends the second recording short message and the early warning short message to the dispersed second recording branches at each place/each place of a plurality of recording machines, thereby greatly increasing the difficulty of criminal organization secret crime conscientiously,
(16) the advanced technology of other people is introduced as much as possible to enhance the second recording performance of the parent APP so as to force the criminal to be incapable of doing dark injury.
CN201911305501.XA 2019-10-10 2019-12-09 Supreme APP for preventing and treating dark-ground injury Pending CN112637404A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019109924313 2019-10-10
CN201910992431 2019-10-10

Publications (1)

Publication Number Publication Date
CN112637404A true CN112637404A (en) 2021-04-09

Family

ID=75283708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911305501.XA Pending CN112637404A (en) 2019-10-10 2019-12-09 Supreme APP for preventing and treating dark-ground injury

Country Status (1)

Country Link
CN (1) CN112637404A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1462128A (en) * 2002-05-31 2003-12-17 韦成自 Field recording network and recording network machine
CN101212747A (en) * 2006-12-30 2008-07-02 大唐移动通信设备有限公司 Method and device for implementing automatic alarm from mobile terminal
CN101246633A (en) * 2008-04-02 2008-08-20 朱凯 Cooperative alarming and deterring method and device
CN201191442Y (en) * 2008-03-21 2009-02-04 宇龙计算机通信科技(深圳)有限公司 Electronic alarm, alarming receiver and mobile terminal
CN103546642A (en) * 2013-10-26 2014-01-29 江南大学 Intelligent gesture distress system and method
CN104580666A (en) * 2013-10-20 2015-04-29 张献来 Mobile intelligent help-calling system
CN105530600A (en) * 2014-09-29 2016-04-27 北京壹人壹本信息科技有限公司 Anti-loss method and anti-loss system for mobile terminal, and mobile terminal
CN105654662A (en) * 2016-01-06 2016-06-08 邓辉 Personal portable type security active early-warning system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1462128A (en) * 2002-05-31 2003-12-17 韦成自 Field recording network and recording network machine
CN101212747A (en) * 2006-12-30 2008-07-02 大唐移动通信设备有限公司 Method and device for implementing automatic alarm from mobile terminal
CN201191442Y (en) * 2008-03-21 2009-02-04 宇龙计算机通信科技(深圳)有限公司 Electronic alarm, alarming receiver and mobile terminal
CN101246633A (en) * 2008-04-02 2008-08-20 朱凯 Cooperative alarming and deterring method and device
CN104580666A (en) * 2013-10-20 2015-04-29 张献来 Mobile intelligent help-calling system
CN103546642A (en) * 2013-10-26 2014-01-29 江南大学 Intelligent gesture distress system and method
CN105530600A (en) * 2014-09-29 2016-04-27 北京壹人壹本信息科技有限公司 Anti-loss method and anti-loss system for mobile terminal, and mobile terminal
CN105654662A (en) * 2016-01-06 2016-06-08 邓辉 Personal portable type security active early-warning system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
田思维等: "FY3地面业务系统关键信息短信报警平台的设计及实现", 《气象科技》 *

Similar Documents

Publication Publication Date Title
US20110299666A1 (en) Dynamic Emergency Disaster Plan
CN106600730A (en) Mobile terminal-based campus safety management system
Ellcessor In case of emergency: How technologies mediate crisis and normalize inequality
Ference “Together we can”: redefining work in Nairobi's urban transportation sector
Boylan et al. Preliminary report on the January 2013 fires in the south-eastern Tasmania research project
CN101409867A (en) Target locating method based on global navigation locating function and SMS
Wicker Cellular convergence and the death of privacy
Dotson-Renta Immigration, popular culture, and the re-routing of European Muslim identity
US20150205861A1 (en) Method and System for Interactive Notation and Text Data Storage with a Mobile Device
Watanabe Out of Time’s Afrocentric Subtext: Carl Franklin’s Postfeminist Technoscientific Adaptation of Sophocles’s King Oedipus
Long et al. Techno security's guide to managing risks for it managers, auditors, and investigators
CN112637404A (en) Supreme APP for preventing and treating dark-ground injury
Hountondji Daily Life in Black Africa: nineteen Elements for a Critique
Root When the price of water is sexual assault
WO2016161846A1 (en) Novel abduction prevention method and method for addressing social issue of whether to provide assistance
Murdocca ‘A Matter of Time and a Matter of Place’: Colonial Inquiries and the Politics of Testimony
Yulianto et al. A review of pre-disaster public awareness activities on public readiness: The 2010 Mentawai tsunami
Krause-Ono Comparative analysis of three national primetime TV news broadcasts (preliminary results)
CN101632310A (en) First aid information for cellular telephones and electronic devices
Forman Eye of the storm: Inside city hall during Katrina
KishorBabu et al. Exigency alert and tracking system
CN1079616C (en) Multi-information clock and watch system with personal article safeguard
Southall How to be a Ghost Hunter
CN106230458B (en) A kind of monitoring method based on mobile terminal GPS, system
RU2598294C2 (en) Broadcasting system for alerting mobile communication subscribers on occurrence of emergency situations, user communication device and method of its operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 530024 Unit 2, Building 1, Saina North Bank, Jiahe City, Santang Town, Xingning District, Nanning City, Guangxi Zhuang Autonomous Region

Applicant after: Wei Chengzi

Address before: 547499 No.7 Bala primary school, Donglan Town, Donglan County, Hechi City, Guangxi Zhuang Autonomous Region

Applicant before: Wei Chengzi