CN114005265A - Alarm method, alarm device and communication terminal - Google Patents

Alarm method, alarm device and communication terminal Download PDF

Info

Publication number
CN114005265A
CN114005265A CN202010737074.9A CN202010737074A CN114005265A CN 114005265 A CN114005265 A CN 114005265A CN 202010737074 A CN202010737074 A CN 202010737074A CN 114005265 A CN114005265 A CN 114005265A
Authority
CN
China
Prior art keywords
alarm
contact
communication
identifier
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010737074.9A
Other languages
Chinese (zh)
Other versions
CN114005265B (en
Inventor
刘星
张颖哲
王麒云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hytera Communications Corp Ltd
Original Assignee
Hytera Communications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hytera Communications Corp Ltd filed Critical Hytera Communications Corp Ltd
Priority to CN202010737074.9A priority Critical patent/CN114005265B/en
Publication of CN114005265A publication Critical patent/CN114005265A/en
Application granted granted Critical
Publication of CN114005265B publication Critical patent/CN114005265B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems

Abstract

The application provides an alarm method, an alarm device and a communication terminal, wherein the method comprises the following steps: responding to the generated alarm request, and obtaining a first contact identifier meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule; transmitting the alarm request and the first contact identification to forwarding equipment so that the forwarding equipment sends the alarm request to one or more target terminals corresponding to the first contact identification; acquiring an alarm feedback message; and under the condition that the alarm feedback message represents that continuous alarm to the target terminal fails and the alarm failure frequency is greater than or equal to the frequency threshold value, a new first contact identifier meeting the preset condition is obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding equipment, so that the forwarding equipment sends the alarm request to one or more target terminals corresponding to the new first contact identifier.

Description

Alarm method, alarm device and communication terminal
Technical Field
The present application relates to the field of private network communication technologies, and in particular, to an alarm method, an alarm device, and a communication terminal.
Background
The emergency alert worker is a function specially designed for a user of the communication terminal in the face of a crisis situation. In case of an emergency, the user of the communication terminal needs to quickly and effectively notify the target contact, such as other communication terminals or monitoring center equipment, so as to be assisted.
In the conventional emergency alarm, when an alarm event occurs on a communication terminal, for example, a specific key is triggered or the terminal is in a specific state, the communication terminal sends an alarm request to a communication terminal corresponding to a preset target contact person to realize alarm.
However, the current target contact can only be a fixed contact or a contact group consisting of a plurality of contacts, so that if the target contact cannot respond to the alarm signaling, the alarm of the communication terminal fails, and therefore, the alarm reliability is low.
Disclosure of Invention
In view of this, the present application provides an alarm method, an alarm device and a communication terminal, so as to solve the technical problem that the alarm reliability of the communication terminal is low, as follows:
an alarm method is applied to a communication terminal, and comprises the following steps:
responding to the generated alarm request, and obtaining a first contact identifier meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
transmitting the alarm request and the first contact identification to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identification;
acquiring an alarm feedback message;
and under the condition that the alarm feedback message represents that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, newly acquiring a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to the forwarding equipment, so that the forwarding equipment sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
The above method, preferably, further comprises:
under the condition that the alarm feedback message represents that continuous alarm fails to be performed on target terminals corresponding to all contact identifiers in the first contact list, and the number of alarm failures is greater than or equal to the number threshold, obtaining a second contact identifier meeting the preset condition in a second contact list;
and transmitting the alarm request and the second contact identification to the forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identification.
In the above method, preferably, the first contact list includes at least two preset contact identifiers, and the contact identifiers correspond to one or more terminals;
the second contact list includes at least one historical contact identification corresponding to one or more terminals having a historical communication connection with the communication terminal.
Preferably, the obtaining a second contact identifier meeting the preset condition in the second contact list includes:
obtaining communication parameters between a target terminal and the communication terminal corresponding to each historical contact identifier in the second contact list;
obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters;
and obtaining a second contact identifier of which the alarm priority meets a priority rule in the second contact list.
Preferably, the communication parameters at least include: one or more of communication attribute, communication time parameter and communication success frequency;
the obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters includes:
obtaining a preset weight value of the communication parameter, wherein the size of the weight value represents a correlation value of the communication parameter and an alarm success event;
and processing the communication parameters based on the weight value to obtain a priority index, wherein the size of the priority index represents the alarm priority of the historical contact identifier corresponding to the communication parameters.
Preferably, in the above method, when the alarm feedback message indicates that the alarm to the target terminal is successful, the method further includes:
triggering the forwarding equipment to monitor whether a target terminal corresponding to a third contact identifier enters a connection state or not, so that the forwarding equipment sends the alarm request to the target terminal entering the connection state;
the third contact identifier is a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of a contact identifier corresponding to a target terminal with a successful alarm.
The above method, preferably, further comprises:
and under the condition that the alarm feedback message represents that the alarm to the target terminal fails and the number of times of the alarm failure is smaller than the number threshold, triggering the forwarding equipment to send the alarm request to one or more target terminals corresponding to the first contact identifier again.
The above method, preferably, before transmitting the alarm request and the multimedia data to the forwarding device, further includes:
collecting multimedia data around the communication terminal;
wherein said transmitting said alert request and said first contact identification to a forwarding device comprises:
and transmitting the multimedia data, the alarm request and the first contact identification to a forwarding device, so that the forwarding device sends the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identification.
An alarm device provided in a communication terminal, the device comprising:
the identification obtaining unit is used for responding to the generated alarm request and obtaining a first contact identification meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
a transmission unit, configured to transmit the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
the transmission unit is also used for obtaining an alarm feedback message; and under the condition that the alarm feedback message represents that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, the identifier obtaining unit is further configured to obtain a new first contact identifier meeting the preset condition again in the first contact list, and transmit the alarm request and the new first contact identifier to the forwarding device through the transmission unit, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
A communication terminal, comprising:
the processor is used for responding to the generated alarm request and obtaining a first contact identifier meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
the communication interface is used for transmitting the alarm request and the first contact identifier to a forwarding device so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
the communication interface is also used for obtaining an alarm feedback message; in a case that the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, the processor is further configured to: and newly obtaining a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to the forwarding device through the communication interface, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
According to the above scheme, after an alarm request is generated under the triggering of an alarm event, a first contact identifier meeting a preset condition is obtained in a first contact list comprising at least two contact identifiers, and the contact identifiers correspond to one or more terminals, so that after the alarm request and the first contact identifier are transmitted to a forwarding device, the forwarding device can send the alarm request to one or more target terminals corresponding to the first contact identifier to realize communication alarm, and under the condition that the alarm feedback message fed back to the communication terminal by the forwarding device indicates that the alarm failure to the first target terminal is greater than or equal to an alarm frequency threshold value, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding device, and the forwarding equipment sends the alarm request to one or more target terminals corresponding to the new first contact identification, so that the alarm is given to other new target terminals again after the alarm fails. Therefore, the method and the device are different from the existing situation of a single alarm terminal, and can alarm other terminals again when alarm failure occurs, so that the alarm reliability is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of an alarm method according to an embodiment of the present disclosure;
FIG. 2 is an illustration of an embodiment of the present application;
FIG. 3 is another flow chart of an alarm method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an alarm device according to a second embodiment of the present application;
fig. 5 is another schematic structural diagram of an alarm device according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of a communication terminal according to a third embodiment of the present application;
fig. 7-13 are other exemplary diagrams of embodiments of the present application, respectively.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a flowchart is shown for implementing an alarm method according to an embodiment of the present disclosure, where the method in this embodiment is suitable for a communication terminal capable of performing communication connection with other terminals through a communication base station, such as an intercom terminal, a mobile phone, or a pad terminal. The method in the embodiment is mainly used for transmitting the alarm to other terminals and improving the reliability of the alarm when the user of the communication terminal needs to give the alarm.
Specifically, the interaction flow among the communication terminal, the communication base station, and the target terminal in the alarm method in this embodiment may include the following steps:
step 101: the communication terminal responds to the generated alarm request, and obtains a first contact identification meeting a preset condition in a first contact list.
Wherein the alert request may be a request generated in case the communication terminal detects the occurrence of an alert event. The alarm event may be generated by a user performing an alarm operation on the communication terminal, for example, the user presses an alarm key in an intercom, and then, for example, the user puts the communication terminal upside down or switches a working mode of the communication terminal, and so on, the communication terminal monitors events such as the alarm key, a terminal posture or a terminal working mode in real time, so that under the condition that the alarm key is pressed, the terminal posture is put upside down or the terminal working mode is switched to a separate working mode, and so on, the communication terminal considers that the alarm event is detected, and at this time, an alarm request is generated under the trigger of the alarm event.
The alarm request at least includes the content of the contact identifier (user identity identifier and/or terminal identifier, etc.) and/or the timestamp, etc. of the communication terminal which needs to alarm currently, so as to represent the time and the identity of the alarm required by the current communication terminal.
In one implementation manner, the first contact list includes at least two preset contact identifiers, each contact identifier corresponds to one or more terminals, as shown in fig. 2, the first contact list includes a plurality of preset contact identifiers, each contact identifier has a corresponding terminal that can establish a communication connection with a communication terminal under a certain condition, and the contact identifier may correspond to one terminal, that is, a plurality of call contact terminals, or the contact identifier may correspond to a plurality of terminals, that is, group call contact terminals. The contact identifiers in the first contact list have alarm priority differences, and the alarm priority of the contact identifier which is ranked at the front is higher than the alarm priority of the contact identifier which is ranked at the back.
Correspondingly, the contact identifiers in the first contact list are sorted according to the respective alarm priorities, and the condition that the first contact identifier obtained in the first contact list meets the preset condition is that: the alarm priority of the contact identifier meets a priority rule, and the priority rule is as follows: the alarm priority of the contact identifier is the highest, and thus, obtaining the first contact identifier satisfying the preset condition in the first contact list can be understood as: and obtaining the contact identifier with the highest alarm priority from the contact identifiers in the first contact list as the first contact identifier.
Step 102: the communication terminal transmits the alarm request and the first contact identification to the forwarding device.
The forwarding device may be a communication base station to which the communication terminal is connected, or the forwarding device may be another terminal capable of performing data transmission with the communication terminal, such as another mobile phone, a pad, or an intercom.
In this specification, a forwarding device is taken as an example of a communication base station, and a technical solution of the present application is described.
Specifically, in this embodiment, the current communication terminal may transmit the alarm request and the first contact identifier to the communication base station through a communication network between the current communication terminal and the communication base station.
Step 103: and the communication base station sends the alarm request to one or more target terminals corresponding to the first contact identification so as to page the target terminals.
As can be seen, after receiving the alarm request and the first contact identifier, the communication base station sends the alarm request to one or more target terminals corresponding to the first contact identifier, so as to implement alarm transmission to the target terminals.
In one implementation, before sending the alert request, or while generating the alert request, the communication terminal collects multimedia data, such as audio data and/or video data, around the communication terminal, and correspondingly, while transmitting the alert request in step 102, the communication terminal transmits the multimedia data and the first contact identifier to the communication base station, and then the communication base station sends the alert request and the multimedia data to one or more target terminals corresponding to the first contact identifier.
Step 104: the communication terminal obtains the alarm feedback message.
The following situations exist in the alarm feedback message obtained by the communication terminal:
in one case, the alarm feedback message is an alarm feedback message transmitted from the target terminal to the communication base station when a single target terminal receives an alarm request forwarded by the communication base station and performs an alarm response, such as an acknowledgement character ack (acknowledgement character) that represents that the target terminal has successfully received an alarm of the communication terminal;
in another case, the alarm feedback message is an alarm feedback message transmitted from the target terminal to the communication base station when any one or more target terminals in the terminal group receive the alarm request forwarded by the communication base station and perform an alarm response, such as an ACK indicating that the target terminals in the terminal group have successfully received the alarm of the communication terminal;
in another case, the alarm feedback message is generated by the communication base station when the communication base station sends an alarm request to a single target terminal or target terminals in a terminal group and detects that the single target terminal or all the target terminals in the terminal group are not online or have no feedback, and the alarm feedback message represents that the target terminal is not online or has no feedback and the alarm fails;
in another case, the alarm feedback message is generated by the communication terminal when the timer recorded according to the timestamp is overtime while the communication terminal generates the alarm request, and the alarm feedback message represents that the response of the communication base station or the target terminal is overtime and the alarm fails;
and so on.
It should be noted that the alarm feedback message obtained by the communication terminal may be one, that is, the alarm feedback message that alarms on a certain target terminal or one or more target terminals in the terminal group through the communication base station at a time; the alarm feedback message may also be multiple, that is, the alarm feedback message that alarms to a single target terminal or one or more target terminals in the terminal group through the communication base station multiple times. Therefore, the alarm feedback message obtained by the communication terminal can represent whether the alarm is successful or not, and further can represent the times of success or failure of the alarm according to the number of the alarm feedback messages.
Step 105: the communication terminal judges whether the alarm feedback message represents that the alarm to the target terminal is successful, if so, the step 106 is executed; if the alarm feedback message represents that the alarm to the target terminal fails and the alarm failure frequency is less than the frequency threshold value, returning to re-executing the step 102, namely, the communication terminal re-sends the alarm request and the first contact identifier to the communication base station, and the communication base station re-sends the alarm request to the target terminal corresponding to the first contact identifier until the alarm is successful; if the communication terminal judges that the alarm feedback message represents that continuous alarm to the target terminal fails and the alarm failure frequency is greater than or equal to the frequency threshold value, the communication terminal returns to re-execute step 101 to re-obtain a new first contact identifier meeting the preset condition in the first contact list, and then after the communication terminal transmits the alarm request and the new first contact identifier to the communication base station, the communication base station transmits the alarm request to one or more target terminals corresponding to the new first contact identifier.
The number threshold may be set according to a requirement, for example, 3 times or 2 times, and represents the number of times that the alarm to the same target terminal may be attempted.
Step 106: the communication terminal sends a call request to the target terminal to establish a call connection with the target terminal through the communication base station.
In the call connection, the communication terminal and the target terminal can communicate with each other, so that the user of the target terminal can provide rescue for the communication terminal.
Specifically, the communication terminal determines whether the number of alarm feedback messages representing continuous alarm failures to the same target terminal exceeds a threshold, if so, the step 101 is returned to be executed again, the communication base station finds a new first contact identifier meeting a preset condition in a first contact list, and then the communication terminal alarms to the new target terminal through the communication base station.
In the embodiment, when a new first contact identifier is obtained in the first contact list, the other contact identifiers except the contact identifier corresponding to the target terminal which has failed to alarm and the frequency of which exceeds the threshold value are obtained, and accordingly, the obtained new first contact identifier may have an alarm priority lower than that of the previous first contact identifier, so that in the embodiment, according to the alarm priority of the contact identifier in the first contact list, the target terminals corresponding to the contact identifiers sequentially send alarm requests through the communication base station until the alarm is successful, and thus, the alarm reliability is increased by adding the alarmable contact identifier in the embodiment, so as to provide timely rescue for the user of the communication terminal.
For example, for the communication terminal a, after generating the alarm request, a first contact identifier B with the highest alarm priority is obtained in a first contact list, and then the communication terminal a transmits the alarm request and the first contact identifier B to the communication base station, the communication base station transmits the alarm request to a target terminal B (which may be a single terminal or a terminal in a terminal group) corresponding to the first contact identifier B, and if the alarm feedback message obtained by the communication terminal a indicates that the target terminal is not online and the alarm fails, the communication terminal a transmits the alarm request and the first contact identifier B to the communication base station again, and the communication base station retransmits the alarm request to the target terminal B corresponding to the first contact identifier B, and so on, until the alarm succeeds to continue a subsequent communication call flow, or until the communication terminal a continuously receives 3 alarm feedback messages indicating that the alarm to the target terminal B fails, at this time, the alarm is failed 3 times continuously to the target terminal B, the communication terminal a does not send the alarm request to the target terminal B through the communication base station any more, but obtains a new first contact identifier C with a higher alarm priority in the first contact list again, and then sends the alarm request and the first contact identifier C to the communication base station through the communication terminal a, the communication base station sends the alarm request to the target terminal C (which may be a single terminal or a terminal in a terminal group) corresponding to the first contact identifier C, if the alarm feedback message obtained by the communication terminal a indicates that the target terminal is not on-line and the alarm is failed, the communication terminal a sends the alarm request and the first contact identifier C to the communication base station again, and the communication base station sends the alarm request to the target terminal C corresponding to the first contact identifier C again, and so on until the alarm succeeds in continuing the subsequent communication call flow, or until the communication terminal a continuously receives 3 alarm feedback messages indicating that the alarm to the target terminal C is failed, at this time, the alarm to the target terminal C is failed for 3 times continuously, the communication terminal a does not continuously send an alarm request to the target terminal C through the communication base station, but obtains a new first contact identifier D with a higher alarm priority in the first contact list again, and so on until the alarm is successfully sent and a subsequent communication call flow is continued, or until the communication terminal a fails to send the alarm to the target terminal corresponding to all the contact identifiers in the first contact list for 3 times continuously.
It can be known from the above solutions that, in the alarm method provided in the first embodiment of the present application, after an alarm request is generated under the trigger of an alarm event, a first contact identifier meeting a preset condition is obtained in a first contact list including at least two contact identifiers, where the contact identifiers correspond to one or more terminals, so that, after the alarm request and the first contact identifier are transmitted to a communication base station, the communication base station can send the alarm request to one or more target terminals corresponding to the first contact identifier to implement communication alarm, and in a case that a number of times that an alarm feedback message fed back to the communication terminal by the communication base station indicates that an alarm to the first target terminal fails is greater than or equal to an alarm number threshold, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the communication base station, and the communication base station sends the alarm request to one or more target terminals corresponding to the new first contact identification, so that the alarm is given to other new target terminals again after the alarm fails. Therefore, in the embodiment, the plurality of contact identifiers are set in the first contact list, which is different from the situation of the existing single alarm terminal, and in the embodiment, when the alarm fails, the alarm can be re-sent to other terminals, so that the alarm reliability is improved.
In another implementation manner, as shown in fig. 3, it is determined in step 105 that the alarm feedback message represents that continuous alarm failure is performed on target terminals corresponding to all contact identifiers in the first contact list, and the number of times of alarm failure is greater than or equal to a number threshold, where the method in this embodiment may further include the following steps:
step 107: the communication terminal obtains a second contact list.
Wherein the second contact list is available in advance, and the second contact list comprises at least one historical contact identifier. The historical contact identification corresponds to one or more terminals having a historical communication connection with the communication terminal. That is to say, in this embodiment, when the communication terminal finds that the alarm that the target terminals corresponding to all the contact identifiers in the first contact list continuously exceed the threshold number of times fails, the communication terminal does not insist on giving an alarm to the target terminals corresponding to the contact identifiers in the first contact list, but obtains the communication identifiers corresponding to the terminals that have historical communication connection with the communication terminal to form a second contact list, for example, obtains a historical call record of the communication terminal as the second contact list, where the historical call record has identifiers of a plurality of historical call contacts.
It should be noted that, a historical contact identifier may correspond to a terminal, that is, a historical communication connection with which the communication terminal has had a call, or, a historical contact identifier may correspond to a terminal group, that is, a historical communication connection with which the communication terminal has had a call, with one or more terminals in the terminal group.
Specifically, in this embodiment, all the historical contact identifiers corresponding to the communication terminals may be filled in the second contact list, or in this embodiment, the historical contact identifier corresponding to the terminal whose communication parameter representation corresponds to the successful historical communication connection may be selected from all the historical contact identifiers and filled in the second contact list.
Step 108: and the communication terminal obtains a second contact identification meeting the preset condition in the second contact list.
In an implementation manner, first, in this embodiment, communication parameters between the target terminal and the communication terminal corresponding to each historical contact identifier in the second contact list, such as any one or any combination of communication attributes, such as parameters of an individual call or a group call, communication time parameters, such as parameters of communication duration, interval duration from the current time, and the like, and parameters of communication success times or failure times, and the like, may be obtained first;
and then, based on the communication parameters, obtaining the alarm priority of each historical contact identifier in the second contact list.
Specifically, when the alarm priority is obtained, a preset weight value of each communication parameter may be obtained first, and then the communication parameters are processed based on the weight value to obtain a priority index, and the size of the priority index may represent the alarm priority of the history contact identifier corresponding to the communication parameter.
The weight value represents a correlation value between the communication parameter and the alarm success event, and the correlation value can be set according to a natural rule, for example, the higher the communication success frequency in the communication parameter is, the higher the alarm success rate of the terminal alarm corresponding to the communication parameter is, and the higher the correlation value between the corresponding communication parameter and the alarm success event is; for another example, the shorter the interval duration from the current time in the communication parameters is, the higher the alarm success rate of the terminal alarm corresponding to the communication parameters is, and the higher the correlation value between the corresponding communication parameters and the alarm success event is; for another example, if the communication parameter is a call attribute, the alarm success rate of the terminal alarm corresponding to the communication parameter is higher than the call attribute, and accordingly, the correlation value between the communication parameter of the call attribute and the alarm success event is higher; and so on. Based on this, in the weight value of each communication parameter, the higher the corresponding correlation value is, the larger the corresponding preset weight value is, for example, the weight value of the communication parameter of each call attribute may be 0.6 or 0.8, and the weight value of the communication parameter of each call attribute may be 0.4 or 0.2; the weight value of the communication parameter with the shortest interval duration from the current time may be 0.6, and the weight value of the communication parameter with the second shortest interval duration may be 0.5, so that the weight value of the corresponding communication parameter is smaller as the interval duration is smaller; the weight value of the communication parameter of the communication success times can be obtained by multiplying the value of the communication success times by the weight value of the corresponding call or group call attribute, and the like.
Correspondingly, after the weight values are obtained, the weight values can be multiplied or added to obtain priority indexes, and the difference of the sizes of the priority indexes can represent the difference of the alarm priorities among the corresponding historical contact identifiers.
And finally, obtaining a second contact identifier with the alarm priority meeting the priority rule in the second contact list. For example, the contact identifier with the highest alarm priority in the second contact list is obtained as the second contact identifier.
In another implementation manner, the historical contact identifiers in the second contact list have preset alarm priorities, and based on this, in this embodiment, the second contact identifiers having preset alarm priorities that satisfy the priority rules may be obtained in the second contact list. For example, in this embodiment, the contact identifier with the highest alarm priority preset in the second contact list is obtained as the second contact identifier.
Step 109: the communication terminal transmits the alarm request and the second contact identification to the communication base station.
In this embodiment, the current communication terminal may transmit the alarm request and the second contact identifier to the communication base station through a communication network between the current communication terminal and the communication base station.
Step 110: and the communication base station sends the alarm request to one or more corresponding target terminals of the second contact identification.
As can be seen, after receiving the alarm request and the second contact identifier, the communication base station sends the alarm request to one or more target terminals corresponding to the second contact identifier, so as to implement alarm transmission to the target terminals.
Therefore, in this embodiment, when it is found that the target terminals corresponding to all the contact identifiers in the first contact list all fail to alarm continuously and the number of times of continuous alarm failure of each terminal is greater than or equal to the number threshold, if the alarm fails for 3 times continuously, the communication terminal is no longer in the process of transmitting the alarm to the terminal corresponding to the contact identifier in the first contact list, but obtains the historical contact identification of the terminal which has been in historical communication connection in the historical communication record of the communication terminal, and then a second contact series table is formed, so that the communication terminal can obtain a second contact identifier meeting the preset condition, namely the highest alarm priority, from the second contact list, and then sends an alarm request to a target terminal corresponding to the second contact identifier through the communication base station for alarm transmission, therefore, the scale of the terminal which can be used for alarming is further increased, and the reliability of alarming is further improved.
In another implementation, after the communication terminal transmits the alarm request and the first contact identifier or the second contact identifier to the communication base station, the communication base station can store the contact identifications and the corresponding alarm requests, correspondingly, the communication terminal triggers the communication base station in such a way that when the alarm feedback message represents that the alarm is successful to the target terminal corresponding to the first contact identification or the second contact identification, monitoring whether a target terminal corresponding to the currently stored third association identifier enters a connection state or not so that the communication base station sends an alarm request to the target terminal entering the connection state, therefore, the target terminal receiving the alarm request can return the alarm feedback message to the communication terminal through the communication base station according to the corresponding user input operation or automatically, and the communication terminal establishes communication with the target terminal at the same time by representing the success or failure of the alarm.
The third contact identifier may be a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of the target terminal with a successful alarm.
That is, after the communication terminal has failed to alarm and has successfully reported again, the communication base station may monitor whether the target terminal that has failed to alarm enters the connected state after the communication terminal has successfully reported, and the alarm priority of the third contact identifier corresponding to the target terminal that has failed to alarm is certainly higher than the alarm priority of the contact identifier that has successfully reported at present, so that the communication base station monitors whether the target terminal that has failed to alarm has the possibility of successful alarm, such as whether to enter the connected state, and therefore, after monitoring that the target terminals corresponding to the contact identifiers with higher alarm priority enter the connected state, the communication base station sends the stored corresponding alarm requests to the target terminals that have entered the connected state, thereby attempting to add the target terminals corresponding to the contact identifiers with higher alarm priority to the alarm call, to increase the efficiency of rescuing the user of the communication terminal.
Referring to fig. 4, a schematic structural diagram of an alarm device according to a second embodiment of the present disclosure is provided, where the alarm device may be disposed in a communication terminal capable of performing communication connection with other terminals through a communication base station, such as an intercom terminal, a mobile phone, or a pad. The device in the embodiment is mainly used for transmitting the alarm to other terminals and improving the reliability of the alarm when the user of the communication terminal needs to give the alarm.
Specifically, the apparatus in this embodiment may include the following structure:
an identifier obtaining unit 401, configured to obtain, in response to the generated alarm request, a first contact identifier that meets a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
the first contact list comprises at least two preset contact identifications, and the contact identifications correspond to one or more terminals;
a transmitting unit 402, configured to transmit the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
the transmission unit 402 is further configured to obtain an alarm feedback message; when the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, the identifier obtaining unit 401 is further configured to obtain a new first contact identifier meeting the preset condition again in the first contact list, and transmit the alarm request and the new first contact identifier to the forwarding device through the transmission unit 402, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
It can be known from the above solution that, in the alarm apparatus provided in the second embodiment of the present application, after an alarm request is generated under the trigger of an alarm event, a first contact identifier meeting a preset condition is obtained in a first contact list including at least two contact identifiers, where the contact identifiers correspond to one or more terminals, so that, after the alarm request and the first contact identifier are transmitted to a forwarding device, the forwarding device can send the alarm request to one or more target terminals corresponding to the first contact identifier to implement communication alarm, and in a case that a number of times that an alarm feedback message fed back to the communication terminal by the forwarding device indicates that an alarm to the first target terminal fails is greater than or equal to an alarm number threshold, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding device, and the forwarding equipment sends the alarm request to one or more target terminals corresponding to the new first contact identification, so that the alarm is given to other new target terminals again after the alarm fails. Therefore, in the embodiment, the plurality of contact identifiers are set in the first contact list, which is different from the situation of the existing single alarm terminal, and in the embodiment, when the alarm fails, the alarm can be re-sent to other terminals, so that the alarm reliability is improved.
In one implementation, as shown in fig. 5, the apparatus may further include the following structure:
a history obtaining unit 403, configured to obtain a second contact list, where the second contact list includes at least one history contact identifier, and the history contact identifier corresponds to one or more terminals having history communication connections with the communication terminal;
the identifier obtaining unit 401 is further configured to obtain, in the second contact list, a second contact identifier that meets the preset condition when the alarm feedback message indicates that continuous alarm fails to be performed on target terminals corresponding to all contact identifiers in the first contact list and the number of times of the alarm failure is greater than or equal to the number threshold; and transmitting the alarm request and the second contact identifier to a forwarding device through the transmission unit 402, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identifier.
Therefore, in this embodiment, when it is found that the target terminals corresponding to all the contact identifiers in the first contact list all fail to alarm continuously and the number of times of continuous alarm failure of each terminal is greater than or equal to the number threshold, if the alarm fails for 3 times continuously, the communication terminal is no longer in the process of transmitting the alarm to the terminal corresponding to the contact identifier in the first contact list, but obtains the historical contact identification of the terminal which has been in historical communication connection in the historical communication record of the communication terminal, and then a second contact series table is formed, so that the communication terminal can obtain a second contact identifier meeting the preset condition, namely the highest alarm priority, from the second contact list, and then send the alarm request to a target terminal corresponding to the second contact identifier through the forwarding equipment for alarm transmission, therefore, the scale of the terminal which can be used for alarming is further increased, and the reliability of alarming is further improved.
In an implementation manner, when the identifier obtaining unit 401 obtains the second contact identifier meeting the preset condition in the second contact list, the method specifically includes:
obtaining communication parameters between a target terminal and the communication terminal corresponding to each historical contact identifier in the second contact list; obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters; and obtaining a second contact identifier of which the alarm priority meets a priority rule in the second contact list.
Optionally, the communication parameters at least include: one or more of communication attribute, communication time parameter and communication success frequency;
when the identifier obtaining unit 401 obtains the alarm priority of each historical contact identifier in the second contact list based on the communication parameter, the method specifically includes:
obtaining a preset weight value of the communication parameter, wherein the size of the weight value represents a correlation value of the communication parameter and an alarm success event; and processing the communication parameters based on the weight value to obtain a priority index, wherein the size of the priority index represents the alarm priority of the historical contact identifier corresponding to the communication parameters.
In an implementation manner, in a case that the alarm feedback message indicates that the alarm to the target terminal is successful, the apparatus is further configured to trigger the forwarding device to monitor whether a target terminal corresponding to a third contact identifier enters a connected state, so that the forwarding device sends the alarm request to the target terminal entering the connected state;
wherein the third association identifier comprises: and the first connection list and/or the second connection list have failed alarm and the alarm priority is higher than the contact identifier corresponding to the target terminal with successful alarm.
In one implementation, in a case that the alarm feedback message indicates that the alarm to the target terminal failed and the number of times of the alarm failure is less than the number threshold, the apparatus is further configured to: and triggering the forwarding equipment to send the alarm request to one or more target terminals corresponding to the first contact identification again.
In one implementation, before the transmission unit transmits the alarm request and the multimedia data to the forwarding device, the identifier obtaining unit is further configured to collect multimedia data around the communication terminal;
wherein the transmitting unit transmits the alarm request and the first contact identifier to a forwarding device, and includes:
and transmitting the multimedia data, the alarm request and the first contact identification to the forwarding equipment, so that the forwarding equipment sends the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identification.
Referring to fig. 6, a schematic structural diagram of a communication terminal according to a third embodiment of the present disclosure is provided, where the communication terminal may be a communication terminal capable of performing communication connection with other terminals through a communication base station, such as an intercom terminal, a mobile phone, or a pad. The communication terminal in the embodiment is mainly used for performing alarm transmission on other terminals and improving the reliability of alarm.
Specifically, the communication terminal may include the following structure:
a processor 601, configured to obtain, in response to the generated alert request, a first contact identifier that meets a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
a communication interface 602, configured to transmit the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier, as shown in fig. 6;
the communication interface 602 is further configured to obtain an alarm feedback message; in a case that the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of times of the alarm failure is greater than or equal to a number threshold, the processor 601 is further configured to: and newly obtaining a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to a forwarding device through the communication interface 602, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier. (ii) a
In addition, the communication terminal in this embodiment may further include a display to provide an interface for a user to perform preset, such as setting a contact identifier in the first contact list.
It can be known from the above solutions that, in a communication terminal provided in the third embodiment of the present application, after an alarm request is generated under the trigger of an alarm event, a first contact identifier meeting a preset condition is obtained in a first contact list including at least two contact identifiers, where the contact identifiers correspond to one or more terminals, so that, after the alarm request and the first contact identifier are transmitted to a forwarding device, the forwarding device can send the alarm request to one or more target terminals corresponding to the first contact identifier to implement communication alarm, and in a case that a number of times that an alarm feedback message fed back to the communication terminal by a communication base station indicates that an alarm to the first target terminal fails is greater than or equal to an alarm number threshold, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding device, and the forwarding equipment sends the alarm request to one or more target terminals corresponding to the new first contact identification, so that the alarm is given to other new target terminals again after the alarm fails. Therefore, in the embodiment, the plurality of contact identifiers are set in the first contact list, which is different from the situation of the existing single alarm terminal, and in the embodiment, when the alarm fails, the alarm can be re-sent to other terminals, so that the alarm reliability is improved.
The following takes a communication terminal interphone as an example to illustrate the technical scheme in the application:
firstly, a plurality of contact persons can be configured (a plurality of contact identifiers are configured in a first contact list) in the scheme, and when the alarm fails to be sent to a certain contact person (to a corresponding interphone), the alarm can be sent to the next contact person; and when all the configured contacts fail to alarm, selecting the historical contacts according to the call records of the interphone, and carrying out emergency alarm again. And when selecting the historical contacts, the selection can be realized through a weighting configuration. When a contact person is selected from the configured contact persons or historical contact persons are selected from the call records, a priority ranking mode can be adopted, the interphone preferentially selects the contact person with the higher level, and when the alarm fails, the contact person with the second highest level is selected for emergency alarm; further, if the contact person with the second highest level is selected to alarm and alarm is successful, the interphone can detect whether the contact person (group/person) with the higher level is online through the base station, and if the contact person (group/person) with the higher level is online, the base station alarms the contact person with the higher level again and then the contact person with the higher level is merged into an alarm call, so that the alarm reliability is improved.
In a specific implementation, the scheme can be compatible with the existing scheme for setting the current contact or designating the contact as the first contact, more first contacts are added on the basis, and the scheme can be compatible with intelligently matching contacts in the historical call, as shown in fig. 7.
Correspondingly, when an alarm is given for multiple contacts, the method can be implemented by setting the priority, and the call diagram shown in fig. 8 is as follows:
1) the number of the alarm contact persons can be configured, and a multi-level priority mode is adopted among the contact persons.
2) The alarm contact is not limited to a calling type, namely, the individual calling contact or the group calling contact is not limited;
3) the interphone serving as an alarm initiator alarms the contact persons in sequence according to the priority, and automatically calls the second contact person under the condition that the first contact person cannot be connected; by analogy, the alarm reliability is improved by configuring a plurality of contact persons.
4) The scheme for judging that the contact person can not be connected is as follows:
a) if the emergency contact person calls individually, the emergency alarm call requires the intercom response reply of the destination party, if the initiator does not wait for the intercom response reply of the destination party after 3 times (variable times) of call alarm, the alarm contact person is considered to be unable to be connected, as shown in fig. 9:
firstly, an alarm initiator sends an alarm individual calling signaling to a base station and starts a timer, the base station forwards an alarm individual calling signaling request and pages to a called party, if the called party returns an alarm ACK response to the base station, the base station forwards the alarm ACK response to the initiator, the alarm is successful at the moment, the alarm initiator can carry out subsequent emergency calling to the called party through the base station, if the timer of the initiator is overtime and does not receive the alarm ACK response, the initiator can repeatedly alarm to the called party, and if the alarm lasts for 3 times or more, the initiator can alarm the next contact, namely, the alarm individual calling/group calling signaling request is repeatedly sent to the base station.
b) If the emergency contact is a group call, the base station detects that the group member is unmanned on line after alarming, and the base station informs an alarm initiator; or no response is made within a certain time (call back from the members in the group), the base station considers that the alarm contact cannot be connected, as shown in fig. 10:
firstly, an alarm initiator sends an alarm group call signaling to a base station and starts a timer, the base station forwards an alarm group call signaling request and pages to a called group, if a person in the called group answers the base station, the base station forwards a voice of the called group to the initiator, the alarm is successful at the moment, the alarm initiator can carry out subsequent emergency call to an answering party in the called group through the base station, if the timer of the initiator is overtime and does not receive the voice applied by the called group, the initiator can repeatedly alarm to the called group, and if the alarm lasts for 3 times or more and fails, the initiator can alarm the next contact, namely, repeatedly sends the alarm call/group call signaling request to the base station.
Based on the above scheme, if none of the configured contacts (the first and second … … nth contacts) can respond to cause failure of the initiator alarm, the initiator may enter a process of intelligently matching contacts, and then, by searching for contacts in the call record, and according to different contact information and weights, obtain a priority index of the contact through calculation to represent the priority of the contact, based on which the initiator may select the contact with the highest priority to alarm, as shown in fig. 11, where:
the contact information in the call record of the originating party includes: calling attribute (group/individual call), time length from the current call and calling success frequency; in the call attribute (group/individual call), the weight value of the contact person of the individual call can be 0.6, and the weight value of the contact person information of the group call can be 0.4; in the time length from the current call, the weight of the contact information with the shortest time instant length may be (first) 0.6, the second weight may be 0.5, the third weight may be 0.4, the fourth weight may be 0.3, the fifth weight may be 0.2, the sixth and nth >6 weights may be 0.1, and so on; the contact information weight for the call success number may be: (number of successes) multiplied by the weight of the call attributes (group/call);
accordingly, the priority index X for a contact may be given by the formula: x is (call attribute weight) (time to call time weight) (success times) and (call attribute weight).
As shown in fig. 12, is a flow chart of incorporating a contact (individual call) that once the alarm failed after the alarm was successful, wherein: alerting the originator that the emergency call has been established and that the called party of the call setup is not the first contact; the first contact B is a personal number, the base station finds the first contact B, and the base station starts up to be registered online; the base station pages the first contact B through signaling to inform the first contact B that an emergency call exists; the first contact B responds after receiving the paging, and applies for joining the existing emergency call; and the base station answers the first contact person, informs the first contact person of the calling information and merges the first contact person calling into the emergency call.
As shown in fig. 13, is a flowchart of incorporating a contact group (group call) that once an alert failed after the alert was successful, wherein: alerting the originator that the emergency call has been established and that the called party of the call setup is not the first contact; the first contact B is a group number, the base station finds that the group B of the first contact is online, and continuously informs the group B to establish an emergency call, and the group call of the first contact B is successfully established; meanwhile, the base station informs the alarm called party established before through signaling, and adds a new alarm call (a first contact B group emergency call); at this time, the two groups of contacts are merged into the same alarm call, and the follow-up emergency call is continued.
In addition, when the alarm initiator gives an alarm, usually the contact is in a crisis situation, and along with falling down or falling down of the alarm, the contact of the alarm initiator may not be as long as the alarm sends a long voice content. Therefore, the first voice transmission of the contact of the alert originator is particularly critical.
Therefore, according to the technical scheme of the application, before (or after) the alarm is sent successfully, the first call speech (matched with the automatic hot microphone to automatically transmit voice) of the contact of the alarm initiator is recorded by the interphone, if the called party does not answer the callback, and the initiator does not actively initiate a new speech, after a fixed period of time, the interphone repeatedly sends the first speech at intervals to alarm. If the subsequent called party has a call back or the calling party cancels the call, the recording is stopped to be sent.
In summary, the technical scheme in the application has the following technical characteristics:
1) multi-priority contacts: a plurality of contacts with different priorities are set in the emergency alarm, and fixed and dynamic matching of calling contacts is supported;
2) dynamically selecting a matched emergency contact: when the fixed configuration contact persons can not be connected, the dynamic matching is adopted to call the contact persons, and the contact persons are dynamically selected to continuously try to alarm according to the call type, the latest call time and the weight of the call times until the alarm is successful.
3) No answer automatically alerts the next contact: if the emergency contact person calls individually, if the alarm party does not answer the response of the destination party after 3 times (variable times) of call alarm, the alarm contact person is considered to be unable to be connected; if the emergency contact person is a group call, the base station detects that no person is online in the group member, and the base station informs an alarm initiator. Or no response (call back of the group members) within a certain time, the alarm contact person is considered to be unavailable. The terminal will continue to attempt to call the next matching contact in the above case.
4) Call merging into a first contact: after the alarm is successful, when the base station detects that a high-priority (first emergency contact) contact is online, the base station incorporates the contact into the established emergency alarm call.
5) The alarm party automatically sends the speech sound recording: after the alarm initiator releases the alarm key, if the called party does not call back and the calling party does not send out new voice (the calling party only speaks once), and the calling party speaks within the call maintaining time, the first speaking is repeatedly sent at the following interval time to alarm. If the called party calls back or the calling party cancels the call, the recording is stopped.
Therefore, according to the technical scheme, a plurality of emergency contacts can be configured, the emergency contacts can be freely switched according to the real-time state, and the alarm success rate can be greatly improved;
meanwhile, the method and the device can be compatible with the prior technical scheme, and can be popularized to more terminals according to the technical scheme for improving the alarm success rate;
moreover, if the first contact person is unable to call, the system detects that the first contact person is online in the subsequent calling process, and can pull the first contact person into the call, thereby ensuring that the most important contact person can be added into the emergency call at the first time.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that it is obvious to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and these modifications and improvements should also be considered as the protection scope of the present invention.

Claims (10)

1. An alarm method, applied to a communication terminal, the method comprising:
responding to the generated alarm request, and obtaining a first contact identifier meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
transmitting the alarm request and the first contact identification to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identification;
acquiring an alarm feedback message;
and under the condition that the alarm feedback message represents that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, newly acquiring a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to the forwarding equipment, so that the forwarding equipment sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
2. The method of claim 1, further comprising:
under the condition that the alarm feedback message represents that continuous alarm fails to be performed on target terminals corresponding to all contact identifiers in the first contact list, and the number of alarm failures is greater than or equal to the number threshold, obtaining a second contact identifier meeting the preset condition in a second contact list;
and transmitting the alarm request and the second contact identification to the forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identification.
3. The method according to claim 2, wherein the first contact list includes at least two preset contact identifiers, and the contact identifiers correspond to one or more terminals;
the second contact list includes at least one historical contact identification corresponding to one or more terminals having a historical communication connection with the communication terminal.
4. The method of claim 3, wherein obtaining the second contact identifier satisfying the preset condition in the second contact list comprises:
obtaining communication parameters between a target terminal and the communication terminal corresponding to each historical contact identifier in the second contact list;
obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters;
and obtaining a second contact identifier of which the alarm priority meets a priority rule in the second contact list.
5. The method of claim 4, wherein the communication parameters comprise at least: one or more of communication attribute, communication time parameter and communication success frequency;
the obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters includes:
obtaining a preset weight value of the communication parameter, wherein the size of the weight value represents a correlation value of the communication parameter and an alarm success event;
and processing the communication parameters based on the weight value to obtain a priority index, wherein the size of the priority index represents the alarm priority of the historical contact identifier corresponding to the communication parameters.
6. The method of claim 2, wherein in the event that the alert feedback message characterizes a success of alerting the target terminal, the method further comprises:
triggering the forwarding equipment to monitor whether a target terminal corresponding to a third contact identifier enters a connection state or not, so that the forwarding equipment sends the alarm request to the target terminal entering the connection state;
the third contact identifier is a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of a contact identifier corresponding to a target terminal with a successful alarm.
7. The method of claim 1, further comprising:
and under the condition that the alarm feedback message represents that the alarm to the target terminal fails and the number of times of the alarm failure is smaller than the number threshold, triggering the forwarding equipment to send the alarm request to one or more target terminals corresponding to the first contact identifier again.
8. A method according to claim 1, 2 or 3, wherein before transmitting the alarm request and the multimedia data to the forwarding device, the method further comprises:
collecting multimedia data around the communication terminal;
wherein said transmitting said alert request and said first contact identification to a forwarding device comprises:
and transmitting the multimedia data, the alarm request and the first contact identification to a forwarding device, so that the forwarding device sends the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identification.
9. An alarm device provided in a communication terminal, the device comprising:
the identification obtaining unit is used for responding to the generated alarm request and obtaining a first contact identification meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
a transmission unit, configured to transmit the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
the transmission unit is also used for obtaining an alarm feedback message; and under the condition that the alarm feedback message represents that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, the identifier obtaining unit is further configured to obtain a new first contact identifier meeting the preset condition again in the first contact list, and transmit the alarm request and the new first contact identifier to the forwarding device through the transmission unit, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
10. A communication terminal, comprising:
the processor is used for responding to the generated alarm request and obtaining a first contact identifier meeting a preset condition in a first contact list; the alarm priority of the preset condition representation contact identifier meets a priority rule;
the communication interface is used for transmitting the alarm request and the first contact identifier to a forwarding device so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
the communication interface is also used for obtaining an alarm feedback message; in a case that the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, the processor is further configured to: and newly obtaining a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to the forwarding device through the communication interface, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
CN202010737074.9A 2020-07-28 2020-07-28 Alarm method, device and communication terminal Active CN114005265B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010737074.9A CN114005265B (en) 2020-07-28 2020-07-28 Alarm method, device and communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010737074.9A CN114005265B (en) 2020-07-28 2020-07-28 Alarm method, device and communication terminal

Publications (2)

Publication Number Publication Date
CN114005265A true CN114005265A (en) 2022-02-01
CN114005265B CN114005265B (en) 2023-07-18

Family

ID=79920665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010737074.9A Active CN114005265B (en) 2020-07-28 2020-07-28 Alarm method, device and communication terminal

Country Status (1)

Country Link
CN (1) CN114005265B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886716A (en) * 2014-04-02 2014-06-25 上海理工大学 Tumble monitoring and alarming system
CN104980581A (en) * 2015-06-18 2015-10-14 惠州Tcl移动通信有限公司 Method and system for realizing automatic help seeking based on mobile terminal
CN105809909A (en) * 2016-03-30 2016-07-27 上海天奕无线信息科技有限公司 Electric vehicle and emergency call alarm system and method thereof
CN106331313A (en) * 2016-08-09 2017-01-11 中科创达软件科技(深圳)有限公司 Mobile terminal and mobile-terminal-based method for automatic calling by fallen old people
CN108243287A (en) * 2016-12-26 2018-07-03 国基电子(上海)有限公司 A kind of method and device that emergency contact is notified when dialing the police emergency number
CN108986398A (en) * 2018-06-29 2018-12-11 拉卡拉支付股份有限公司 Wearable device alarm method, device, electronic equipment and storage medium
CN110267250A (en) * 2019-07-04 2019-09-20 长沙环康科技有限公司 Intelligent rescue system and its backstage response rescue signal method
CN110910607A (en) * 2019-10-24 2020-03-24 李健 Intelligent alarm terminal
CN111314556A (en) * 2020-02-17 2020-06-19 深圳传音控股股份有限公司 Alarm method of mobile terminal, mobile terminal and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886716A (en) * 2014-04-02 2014-06-25 上海理工大学 Tumble monitoring and alarming system
CN104980581A (en) * 2015-06-18 2015-10-14 惠州Tcl移动通信有限公司 Method and system for realizing automatic help seeking based on mobile terminal
CN105809909A (en) * 2016-03-30 2016-07-27 上海天奕无线信息科技有限公司 Electric vehicle and emergency call alarm system and method thereof
CN106331313A (en) * 2016-08-09 2017-01-11 中科创达软件科技(深圳)有限公司 Mobile terminal and mobile-terminal-based method for automatic calling by fallen old people
CN108243287A (en) * 2016-12-26 2018-07-03 国基电子(上海)有限公司 A kind of method and device that emergency contact is notified when dialing the police emergency number
CN108986398A (en) * 2018-06-29 2018-12-11 拉卡拉支付股份有限公司 Wearable device alarm method, device, electronic equipment and storage medium
CN110267250A (en) * 2019-07-04 2019-09-20 长沙环康科技有限公司 Intelligent rescue system and its backstage response rescue signal method
CN110910607A (en) * 2019-10-24 2020-03-24 李健 Intelligent alarm terminal
CN111314556A (en) * 2020-02-17 2020-06-19 深圳传音控股股份有限公司 Alarm method of mobile terminal, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN114005265B (en) 2023-07-18

Similar Documents

Publication Publication Date Title
US6574480B1 (en) Method and apparatus for providing intelligent emergency paging
US7447564B2 (en) Robot
US6671351B2 (en) Assisted personal communication system and method
US7920679B1 (en) Communication system and method for notifying persons of an emergency telephone call
US7395057B2 (en) System and method for reconnecting dropped cellular phone calls
JP2007318642A (en) Method for congestion control, and subscriber terminal disaster system, and core network used for the method
CN103856596B (en) A kind of call method, device and terminal
CN100539467C (en) Be used for during emergency, connecting the method for calling out at travelling carriage
CN106470265A (en) Call handling method and device
US20070003045A1 (en) Off hold notification in communication networks
CN101902712A (en) Processing method and device for call failure
CN114005265A (en) Alarm method, alarm device and communication terminal
CN113066495B (en) Help seeking method, device, storage medium, and computer program product
JP2007159043A (en) Method and system for addressing prank call
US20120129486A1 (en) Help notification system and method
CN110708429A (en) Help calling method and system and computer readable storage medium
CN107104885B (en) A kind of method and device, the system of the biological information recognition alarm based on social software
CN108423505B (en) Elevator rescue intelligent terminal and elevator device and intelligent rescue mode
CN201242802Y (en) Wireless gateway
WO2023273673A1 (en) Police-report receiving and handling system and method
CN101119420A (en) Method of using voip for callback from an acd
CN109788445A (en) A kind of group-calling service method for building up, base station, eMME and system
CN111031524B (en) Bluetooth headset loss prevention device and method and Bluetooth headset charging box
JP2004289676A (en) Communication terminal and processing method for automatic reporting recorded message
JP4367224B2 (en) Remote monitoring and control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant