CN114005265B - Alarm method, device and communication terminal - Google Patents
Alarm method, device and communication terminal Download PDFInfo
- Publication number
- CN114005265B CN114005265B CN202010737074.9A CN202010737074A CN114005265B CN 114005265 B CN114005265 B CN 114005265B CN 202010737074 A CN202010737074 A CN 202010737074A CN 114005265 B CN114005265 B CN 114005265B
- Authority
- CN
- China
- Prior art keywords
- alarm
- contact
- identifier
- request
- contact identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
- Telephone Function (AREA)
Abstract
The application provides an alarm method, an alarm device and a communication terminal, wherein the method comprises the following steps: responding to the generated alarm request, and obtaining a first contact identifier meeting preset conditions from a first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule; transmitting the alarm request and the first contact identifier to the forwarding device, so that the forwarding device transmits the alarm request to one or more target terminals corresponding to the first contact identifier; obtaining an alarm feedback message; and under the condition that the alarm feedback information indicates continuous alarm failure to the target terminal and the number of alarm failure times is larger than or equal to a number threshold, a new first contact identifier meeting a preset condition is obtained in the first contact list again, and the alarm request and the new first contact identifier are transmitted to the forwarding equipment, so that the forwarding equipment transmits the alarm request to one or more target terminals corresponding to the new first contact identifier.
Description
Technical Field
The present invention relates to the field of private network communications technologies, and in particular, to an alarm method, an alarm device, and a communication terminal.
Background
The emergency alert workers are functions specifically designed for use by users of the communication terminals in the face of crisis conditions. In case of emergency, the user of the communication terminal needs to quickly and effectively notify the target contact, such as other communication terminals or monitoring center devices, etc., in order to obtain assistance.
The current emergency alarm is that when an alarm event occurs on a communication terminal, such as a specific key is triggered or the terminal is in a specific state, the communication terminal sends an alarm request to a communication terminal corresponding to a preset target contact person to realize alarm.
However, the current target contact person can only be a fixed contact person or a contact group formed by a plurality of contact persons, so that if the target contact person cannot respond to the alarm signaling, the communication terminal will alarm to fail, and therefore, the situation of lower alarm reliability exists.
Disclosure of Invention
In view of this, the present application provides an alarm method, an alarm device and a communication terminal, so as to solve the technical problem of low alarm reliability of the communication terminal, as follows:
an alarm method applied to a communication terminal, the method comprising:
responding to the generated alarm request, and obtaining a first contact identifier meeting preset conditions from a first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
Transmitting the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
obtaining an alarm feedback message;
and under the condition that the alarm feedback message indicates continuous alarm failure to the target terminal and the number of alarm failures is greater than or equal to a number threshold, a new first contact identifier meeting the preset condition is obtained in the first contact list again, and the alarm request and the new first contact identifier are transmitted to the forwarding equipment, so that the forwarding equipment transmits the alarm request to one or more target terminals corresponding to the new first contact identifier.
The above method, preferably, further comprises:
when the alarm feedback message indicates that continuous alarm fails to all target terminals corresponding to all the contact identifiers in the first contact list and the alarm failure frequency is greater than or equal to the frequency threshold, obtaining a second contact identifier meeting the preset condition in a second contact list;
transmitting the alarm request and the second contact identification to the forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identification.
In the above method, preferably, the first contact list includes at least two preset contact identifiers, where the contact identifiers correspond to one or more terminals;
the second contact list includes at least one historical contact identifier corresponding to one or more terminals having a historical communication connection with the communication terminal.
In the above method, preferably, the obtaining, in the second contact list, a second contact identifier that meets the preset condition includes:
obtaining communication parameters between a target terminal corresponding to each historical contact identifier in the second contact list and the communication terminal;
based on the communication parameters, obtaining alarm priority of each historical contact identifier in the second contact list;
and obtaining a second contact identifier of which the alarm priority meets a priority rule in the second contact list.
In the above method, preferably, the communication parameters include at least: one or any of a communication attribute, a communication time parameter, and a number of successful communications;
the step of obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters comprises the following steps:
Obtaining a preset weight value of the communication parameter, wherein the weight value represents a correlation value between the communication parameter and an alarm success event;
and processing the communication parameters based on the weight values to obtain priority indexes, wherein the magnitude of the priority indexes represents the alarm priority of the historical contact identifiers corresponding to the communication parameters.
In the above method, preferably, in a case that the alarm feedback message indicates that the alarm to the target terminal is successful, the method further includes:
triggering the forwarding equipment to monitor whether a target terminal corresponding to a third link identifier enters a connection state or not, so that the forwarding equipment sends the alarm request to the target terminal entering the connection state;
the third contact identifier is a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of a contact identifier corresponding to a target terminal with successful alarm.
The above method, preferably, further comprises:
and triggering the forwarding equipment to send the alarm request to one or more target terminals corresponding to the first contact identifier again under the condition that the alarm feedback information indicates that the alarm to the target terminals fails and the number of alarm failures is smaller than the number threshold.
The above method, preferably, before transmitting the alarm request and the multimedia data to the forwarding device, the method further includes:
collecting multimedia data around the communication terminal;
wherein said transmitting said alert request and said first contact identification to a forwarding device comprises:
and transmitting the multimedia data, the alarm request and the first contact identifier to a forwarding device, so that the forwarding device transmits the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identifier.
An alarm device provided in a communication terminal, the device comprising:
the identification obtaining unit is used for responding to the generated alarm request and obtaining a first contact identification meeting preset conditions from the first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
the transmission unit is used for transmitting the alarm request and the first contact identifier to forwarding equipment so that the forwarding equipment can send the alarm request to one or more target terminals corresponding to the first contact identifier;
the transmission unit is also used for obtaining an alarm feedback message; and under the condition that the alarm feedback message indicates continuous alarm failure to the target terminal and the number of alarm failures is greater than or equal to a number threshold, the identifier obtaining unit is further used for obtaining a new first contact identifier meeting the preset condition in the first contact list again, and transmitting the alarm request and the new first contact identifier to a forwarding device through the transmission unit, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
A communication terminal, comprising:
the processor is used for responding to the generated alarm request and obtaining a first contact identifier meeting preset conditions from the first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
the communication interface is used for transmitting the alarm request and the first contact identifier to the forwarding equipment so that the forwarding equipment can send the alarm request to one or more target terminals corresponding to the first contact identifier;
the communication interface is also used for obtaining alarm feedback information; in the case that the alarm feedback message characterizes continuous alarm failure to the target terminal and the number of alarm failures is greater than or equal to a number threshold, the processor is further configured to: and re-acquiring a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to the forwarding device through the communication interface, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
According to the alarm method, the alarm device and the communication terminal, after an alarm request is generated under the triggering of an alarm event, a first contact identifier meeting a preset condition is obtained in a first contact list containing at least two contact identifiers, and the contact identifiers correspond to one or more terminals, so that after the alarm request and the first contact identifier are transmitted to the forwarding device, the forwarding device can transmit the alarm request to one or more target terminals corresponding to the first contact identifier, so as to realize communication alarm, and when the number of alarm failure times of an alarm feedback message characterization fed back to the communication terminal by the forwarding device to the first target terminal is greater than or equal to an alarm number threshold value, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding device, so that the forwarding device can transmit the alarm request to the one or more target terminals corresponding to the new first contact identifier, and then alarm to other new target terminals can be carried out again after the alarm failure. Therefore, the method and the device are different from the existing single alarm terminal, and can re-alarm other terminals when alarm failure occurs, so that alarm reliability is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings may be obtained according to the provided drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of an alarm method according to an embodiment of the present application;
FIG. 2 is an exemplary diagram of an embodiment of the present application;
FIG. 3 is another flow chart of an alarm method according to the first embodiment of the present application;
fig. 4 is a schematic structural diagram of an alarm device according to a second embodiment of the present application;
fig. 5 is another schematic structural diagram of an alarm device according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of a communication terminal according to a third embodiment of the present application;
fig. 7-13 are respectively other exemplary diagrams of embodiments of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Referring to fig. 1, a flowchart of an implementation of an alarm method according to an embodiment of the present application is provided, where the method in this embodiment is applicable to a communication terminal capable of performing communication connection with other terminals through a communication base station, such as a terminal of an intercom, a mobile phone, or a pad. The method in the embodiment is mainly used for transmitting the alarm to other terminals and improving the reliability of the alarm when the user of the communication terminal needs to alarm.
Specifically, in the alarm method in this embodiment, the interaction procedure between the communication terminal, the communication base station and the target terminal may include the following steps:
step 101: and the communication terminal responds to the generated alarm request and obtains a first contact identifier meeting the preset condition from the first contact list.
Wherein the alarm request may be a request generated in case the communication terminal detects the occurrence of an alarm event. The alarm event may be generated by an alarm operation performed on the communication terminal by the user, for example, the user presses an alarm button in the intercom, for example, the user puts the communication terminal upside down or switches the working mode of the communication terminal, and the communication terminal monitors events such as the alarm button, the terminal gesture or the terminal working mode in real time, so that the alarm event is considered to be detected when the alarm button is pressed, the terminal gesture is put upside down or the terminal working mode is switched to the single working mode, and at this time, an alarm request is generated under the triggering of the alarm event.
The alarm request at least comprises the contents such as a contact identifier (user identity identifier, terminal identifier and the like) and/or a time stamp and the like of the communication terminal which needs to be alerted at present, so as to represent the time of the current communication terminal which needs to be alerted and the identity of an alerter.
In one implementation, the first contact list includes at least two preset contact identifiers, where each contact identifier corresponds to one or more terminals, as shown in fig. 2, and the first contact list includes a plurality of preset contact identifiers, where each contact identifier corresponds to a terminal that may establish a communication connection with a communication terminal under a certain condition, and the contact identifier may correspond to one terminal, that is, a call contact terminal, or the contact identifier may correspond to a plurality of terminals, that is, a group call contact terminal. There is a distinction between contact identifiers in the first contact list that has an alarm priority that is higher for the preceding contact identifier than for the following contact identifier.
Correspondingly, the contact identifiers in the first contact list are ordered according to the respective alarm priorities, and the fact that the first contact identifiers obtained in the first contact list meet the preset conditions means that: the alarm priority of the contact identifier meets the priority rule, and the priority rule refers to: the alarm priority of the contact identifier is highest, and thus, obtaining the first contact identifier satisfying the preset condition in the first contact list can be understood as follows: and obtaining the contact identifier with the highest alarm priority from the contact identifiers in the first contact list as the first contact identifier.
Step 102: the communication terminal transmits the alarm request and the first contact identification to the forwarding device.
The forwarding device may be a communication base station to which the communication terminal is connected, or the forwarding device may be another terminal capable of performing data transmission with the communication terminal, such as another mobile phone, a pad, or an intercom.
In the present specification, a forwarding device is taken as an example of a communication base station, and the technical scheme of the present application is described.
Specifically, the current communication terminal in this embodiment may transmit the alarm request and the first contact identifier to the communication base station through a communication network with the communication base station.
Step 103: and the communication base station sends the alarm request to one or more target terminals corresponding to the first contact identification so as to page the target terminals.
It can be seen that, after receiving the alarm request and the first contact identifier, the communication base station sends the alarm request to one or more target terminals corresponding to the first contact identifier, so as to implement alarm transmission to the target terminals.
In one implementation, before the communication terminal sends the alarm request, or while the alarm request is generated, multimedia data, such as audio data and/or video data, etc., around the communication terminal are collected, and accordingly, in step 102, the multimedia data and the first contact identifier are transmitted to the communication base station together while the alarm request is transmitted, and then the communication base station sends the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identifier.
Step 104: the communication terminal obtains the alarm feedback message.
The alarm feedback information obtained by the communication terminal has the following conditions:
in one case, the alarm feedback message is an alarm feedback message transmitted to the communication base station by the target terminal under the condition that a single target terminal receives an alarm request forwarded by the communication base station and performs alarm response, such as a confirm character ACK (Acknowledge character) for indicating that the target terminal has successfully received an alarm of the communication terminal;
in another case, the alarm feedback message is an alarm feedback message transmitted by the target terminal to the communication base station under the condition that any one or more target terminals in the terminal group receive the alarm request forwarded by the communication base station and perform alarm response, such as an ACK representing that the target terminal in the terminal group has successfully received an alarm of the communication terminal;
in another case, the alarm feedback message is generated by the communication base station when the communication base station detects that all target terminals in a single target terminal or a terminal group are not online or have no feedback when sending an alarm request to the target terminals in the single target terminal or the terminal group, and the alarm feedback message represents that the target terminals are not online or have no feedback and the alarm fails;
In another case, the alarm feedback message is generated by the communication terminal under the condition that the timer recorded according to the timestamp is overtime while the communication terminal generates the alarm request, and the alarm feedback message represents that the response of the communication base station or the target terminal is overtime and the alarm fails; etc.
It should be noted that, the alarm feedback message obtained by the communication terminal may be one, that is, an alarm feedback message for alarming one or more target terminals in a certain target terminal or terminal group through the communication base station at a time; the alarm feedback message may also be a plurality of alarm feedback messages, i.e. alarm to one or more target terminals in a single target terminal or group of terminals through the communication base station a plurality of times. Therefore, the alarm feedback information obtained by the communication terminal can represent whether the alarm is successful or not, and further the number of times of success or failure of the alarm can be represented according to the number of the alarm feedback information.
Step 105: the communication terminal judges whether the alarm feedback message represents that the alarm to the target terminal is successful or not, if yes, the step 106 is executed; if the alarm feedback information indicates that the alarm to the target terminal fails and the number of times of alarm failure is smaller than the number threshold, returning to the re-execution step 102, namely re-sending the alarm request and the first contact identifier to the communication base station by the communication terminal, and re-sending the alarm request to the target terminal corresponding to the first contact identifier by the communication base station until the alarm is successful; if the communication terminal judges that the alarm feedback message indicates continuous alarm failure to the target terminal and the number of alarm failure times is greater than or equal to the number threshold, the communication terminal returns to re-execute step 101 to re-acquire a new first contact identifier meeting the preset condition in the first contact list, and then the communication terminal transmits the alarm request and the new first contact identifier to the communication base station, and the communication base station transmits the alarm request to one or more target terminals corresponding to the new first contact identifier.
The frequency threshold may be set according to requirements, such as 3 times or 2 times, and the number of times that the same target terminal may be tried to be alerted is represented.
Step 106: the communication terminal transmits a call request to the target terminal to establish a call connection with the target terminal through the communication base station.
In the call connection, a call can be made between the communication terminal and the target terminal, so that a user of the target terminal can rescue the communication terminal.
Specifically, the communication terminal judges whether the number of alarm feedback messages representing continuous alarm failure to the same target terminal exceeds a frequency threshold, if yes, the step 101 is re-executed, the communication base station finds a new first contact identifier meeting a preset condition in the first contact list, and the communication terminal alarms to the new target terminal through the communication base station, so that even if the communication terminal fails to alarm to the target terminal corresponding to the contact identifier which is just obtained in the first contact list, the communication terminal can continuously alarm again to the target terminal corresponding to the new contact identifier in the first contact list until the alarm is successful, and further alarm reliability is improved by sequentially alarming to the target terminals corresponding to different contact identifiers.
The communication terminal continuously alarms to the target terminal corresponding to the contact identifier with higher alarm priority through the communication base station and the number of times exceeds the threshold, so that when a new first contact identifier is obtained in the first contact list, the new first contact identifier is obtained in other contact identifiers except the contact identifier corresponding to the target terminal with the alarm failure and the number of times exceeding the threshold in the first contact list, and accordingly, the alarm priority of the obtained new first contact identifier may be lower than that of the previous first contact identifier.
For example, for communication terminal A, after generating the alarm request, obtain the first contact identifier B with highest alarm priority in the first contact list, and then communication terminal A transmits the alarm request and the first contact identifier B to the communication base station, the communication base station sends the alarm request to the target terminal B corresponding to the first contact identifier B (which may be a single terminal or a terminal in a terminal group), and if the alarm feedback message obtained by communication terminal A indicates that the target terminal does not have an online alarm failure, communication terminal A retransmits the alarm request and the first contact identifier B to the communication base station, and communication base station retransmits the alarm request to the target terminal B corresponding to the first contact identifier B, and so on until the alarm success continues to the subsequent communication call flow, or until communication terminal A continuously receives 3 alarm feedback messages indicating alarm failure to the target terminal B, at this time, communication terminal A does not continue to send the alarm request to the target terminal B through the communication base station, but retransmits the new contact identifier C with high alarm priority in the first contact list to the communication base station, and if the communication terminal C is not transmitted to the communication base station corresponding to the communication terminal B, and then the communication terminal C can have an online alarm request and the communication identifier C is retransmitted to the target terminal corresponding to the communication terminal B, and the communication base station resends the alarm request to the target terminal C corresponding to the first contact identifier C, and the method is repeated until the alarm is successful and the subsequent communication call flow is continued, or until the communication terminal A continuously receives 3 alarm feedback messages representing that the alarm to the target terminal C fails, at the moment, the alarm to the target terminal C fails continuously for 3 times, the communication terminal A does not continue to send the alarm request to the target terminal C through the communication base station, but acquires a new first contact identifier D with the highest alarm priority in the first contact list again, and the like until the alarm is successful and the subsequent communication call flow is continued, or until the communication terminal A continuously fails to alarm for 3 times to the target terminal corresponding to all the contact identifiers in the first contact list.
As can be seen from the foregoing, in the alert method provided in the first embodiment of the present application, after an alert request is generated under the triggering of an alert event, a first contact identifier meeting a preset condition is obtained in a first contact list including at least two contact identifiers, where the contact identifiers correspond to one or more terminals, so after the alert request and the first contact identifier are transmitted to a communication base station, the communication base station can send the alert request to one or more target terminals corresponding to the first contact identifier, so as to implement communication alert, and when the number of times of alert failure indicated by an alert feedback message fed back by the communication base station to the communication terminal to the first target terminal is greater than or equal to an alert number threshold, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alert request and the new first contact identifier are transmitted to the communication base station, so that the communication base station sends the alert request to the one or more target terminals corresponding to the new first contact identifier, thereby implementing alert to other new target terminals again after the alert failure. Therefore, in this embodiment, a plurality of contact identifiers are set in the first contact list, which is different from the existing single alarm terminal, and in this embodiment, when an alarm failure occurs, the alarm can be re-given to other terminals, so as to improve the alarm reliability.
In another implementation manner, as shown in fig. 3, in step 105, it is determined that the alarm feedback message indicates that continuous alarm fails to all target terminals corresponding to all contact identifiers in the first contact list, and the number of alarm failures is greater than or equal to the number threshold, where the method in this embodiment may further include the following steps:
step 107: the communication terminal obtains a second contact list.
Wherein the second contact list is pre-available and the second contact list includes at least one historical contact identification. The historical contact identity corresponds to one or more terminals having a historical communication connection with the communication terminal. That is, in this embodiment, when the communication terminal finds that the alarm fails that the number of times of the alarm for all the target terminals corresponding to the contact identifiers in the first contact list continuously exceeds the threshold value, the communication terminal does not keep alarming for the target terminal corresponding to the contact identifier in the first contact list, but obtains the communication identifier corresponding to the terminal having the historical communication connection with the communication terminal to form the second contact list, for example, obtains the historical call record of the communication terminal as the second contact list, where the historical call record has the identifiers of a plurality of historical call contacts.
It should be noted that a history contact identifier may correspond to a terminal, i.e. a terminal with which the communication terminal has had a history communication connection of a call, or a history contact identifier may correspond to a terminal group, i.e. a terminal with which the communication terminal has had a history communication connection of a group call with one or more terminals in the terminal group.
Specifically, in this embodiment, all the history contact identifiers corresponding to the communication terminal may be filled into the second contact list, or in this embodiment, the history contact identifiers corresponding to the terminal with successful history communication connection and corresponding to the communication parameter characterization may be selected from all the history contact identifiers to be filled into the second contact list.
Step 108: the communication terminal obtains a second contact identifier meeting preset conditions from the second contact list.
In one implementation manner, first, in this embodiment, communication parameters between a target terminal and a communication terminal corresponding to each historical contact identifier in the second contact list may be obtained first, for example, any one or any combination of multiple parameters of communication attributes such as parameters of a personal call or a group call, parameters of communication time such as a communication duration, a duration of an interval from a current time, and the like, and parameters of communication success times or failure times, and the like;
And then, based on the communication parameters, acquiring the alarm priority of each historical contact identifier in the second contact list.
Specifically, when the alarm priority is obtained, a preset weight value of each communication parameter can be obtained first, then the communication parameters are processed based on the weight values to obtain a priority index, and the magnitude of the priority index can represent the alarm priority of the historical contact identifier corresponding to the communication parameters.
The magnitude of the weight value characterizes the correlation value between the communication parameter and the alarm success event, and the correlation value can be set according to a natural rule, for example, the higher the communication success number in the communication parameter is, the higher the alarm success rate of the terminal corresponding to the communication parameter is for alarm, and the higher the correlation value between the corresponding communication parameter and the alarm success event is; for another example, the shorter the interval duration from the current moment in the communication parameters is, the higher the alarm success rate of the terminal corresponding to the communication parameters is, and the higher the correlation value between the corresponding communication parameters and the alarm success event is; for another example, if the communication parameter is a personal call attribute, the alarm success rate of alarming the terminal corresponding to the communication parameter is higher than that of the group call attribute, and correspondingly, the higher the correlation value between the communication parameter of the personal call attribute and the alarm success event is; etc. Based on this, the higher the corresponding correlation value is, the larger the corresponding preset weight value is, for example, the weight value of the communication parameter of the individual call attribute may be 0.6 or 0.8, and the weight value of the communication parameter of the group call attribute may be 0.4 or 0.2; the weight value of the communication parameter with the shortest interval duration from the current moment can be 0.6, and the weight value of the communication parameter with the next shortest interval duration can be 0.5, so that the smaller the interval duration is, the smaller the weight value of the corresponding communication parameter is; the weight value of the communication parameter of the number of successful communication times can be obtained by multiplying the value of the number of successful communication times by the weight value of the corresponding individual call or group call attribute, and the like.
Correspondingly, after the weight values are obtained, the weight values can be multiplied or added to obtain the priority indexes, and the difference of the priority indexes can represent the difference of the alarm priorities among the corresponding historical contact identifiers.
And finally, obtaining a second contact identifier with alarm priority meeting the priority rule from the second contact list. For example, the contact identifier with the highest alarm priority in the second contact list is obtained as the second contact identifier.
In another implementation manner, the historical contact identifier in the second contact list has a preset alarm priority, and based on this, in this embodiment, the second contact identifier with the preset alarm priority meeting the priority rule may be obtained in the second contact list. For example, in this embodiment, the contact identifier with the highest alarm priority preset in the second contact list is obtained as the second contact identifier.
Step 109: the communication terminal transmits the alarm request and the second contact identification to the communication base station.
The current communication terminal in this embodiment may transmit the alarm request and the second contact identifier to the communication base station through a communication network with the communication base station.
Step 110: the communication base station transmits an alarm request to one or more target terminals corresponding to the second contact identification.
It can be seen that after receiving the alarm request and the second contact identifier, the communication base station sends the alarm request to one or more target terminals corresponding to the second contact identifier, so as to implement alarm transmission to the target terminals.
Therefore, in this embodiment, when it is found that all the target terminals corresponding to the contact identifiers in the first contact list fail to continuously alarm, and the number of times that each terminal fails to continuously alarm is greater than or equal to the number threshold, for example, when 3 times of continuous alarm fails, the communication terminal does not perform alarm transmission on the terminal corresponding to the contact identifier in the first contact list, but obtains the historical contact identifier of the terminal having the historical communication connection in the historical communication record of the communication terminal, so as to form a second contact list, thereby the communication terminal can obtain the second contact identifier meeting the preset condition, that is, the highest alarm priority, in the second contact list, and then sends the alarm request to the target terminal corresponding to the second contact identifier for alarm transmission through the communication base station, thereby further increasing the terminal scale available for alarm, and further improving the reliability of alarm.
In another implementation manner, after the communication terminal transmits the alarm request and the first contact identifier or the second contact identifier to the communication base station, the communication base station may save the contact identifiers and the corresponding alarm requests, and accordingly, the communication terminal triggers the communication base station in this manner to monitor whether the currently stored target terminal corresponding to the third contact identifier enters a connection state when the alarm feedback message indicates that the alarm to the target terminal corresponding to the first contact identifier or the second contact identifier is successful, so that the communication base station sends the alarm request to the target terminal entering the connection state, and therefore, the target terminal receiving the alarm request may operate according to the corresponding user input or automatically return an alarm feedback message to the communication terminal through the communication base station to indicate that the alarm is successful or failed, and further, the communication terminal establishes a call with the target terminal simultaneously.
The third contact identifier may be a contact identifier in the first contact list and/or the second contact list, the target terminal corresponding to the third contact identifier fails to alarm, and the alarm priority of the third contact identifier is higher than that of the target terminal corresponding to the successful alarm.
That is, after the communication terminal has failed to alarm and has succeeded in alarming again, the communication base station may monitor whether the target terminal having failed to alarm enters the connection state after the communication terminal has succeeded in alarming, and the alarm priority of the third contact identifier corresponding to the target terminal having failed to alarm is definitely higher than the alarm priority of the contact identifier having successful current alarm, so that the communication base station monitors whether the target terminal having failed to alarm has a possibility of successful alarm, such as monitoring whether entering the connection state, and after monitoring that the target terminals corresponding to the contact identifiers having high alarm priorities enter the connection state, the communication base station sends the saved corresponding alarm request to the target terminals entering the connection state, so as to attempt to add the target terminal corresponding to the contact identifier having higher alarm priority into the alarm call, so as to increase the efficiency of rescuing the user of the communication terminal.
Referring to fig. 4, a schematic structural diagram of an alarm device according to a second embodiment of the present application may be provided in a communication terminal capable of being communicatively connected to other terminals through a communication base station, such as a terminal of an intercom, a mobile phone, or a pad. The device in the embodiment is mainly used for transmitting the alarm to other terminals and improving the reliability of the alarm when the user of the communication terminal needs to alarm.
Specifically, the apparatus in this embodiment may include the following structures:
an identifier obtaining unit 401, configured to obtain, in response to the generated alarm request, a first contact identifier that meets a preset condition in a first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
the first contact list comprises at least two preset contact identifiers, and the contact identifiers correspond to one or more terminals;
a transmitting unit 402, configured to transmit the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
the transmission unit 402 is further configured to obtain an alarm feedback message; in the case that the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of times of alarm failure is greater than or equal to a number threshold, the identifier obtaining unit 401 is further configured to retrieve a new first contact identifier that meets the preset condition from the first contact list, and transmit, through the transmission unit 402, the alarm request and the new first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier.
As can be seen from the foregoing, in the alarm device provided in the second embodiment of the present application, after an alarm request is generated under the triggering of an alarm event, a first contact identifier meeting a preset condition is obtained in a first contact list including at least two contact identifiers, where the contact identifiers correspond to one or more terminals, so after the alarm request and the first contact identifier are transmitted to a forwarding device, the forwarding device can send the alarm request to one or more target terminals corresponding to the first contact identifier, so as to implement communication alarm, and when the number of alarm feedback messages fed back by the forwarding device to the communication terminal indicates that the number of alarm failures to the first target terminals is greater than or equal to the threshold of alarm number, a new first contact identifier meeting the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding device, so that the forwarding device sends the alarm request to the one or more target terminals corresponding to the new first contact identifiers, thereby implementing that after the alarm failure, the alarm is performed again to other new target terminals. Therefore, in this embodiment, a plurality of contact identifiers are set in the first contact list, which is different from the existing single alarm terminal, and in this embodiment, when an alarm failure occurs, the alarm can be re-given to other terminals, so as to improve the alarm reliability.
In one implementation, as shown in fig. 5, the apparatus may further include the following structure:
a history obtaining unit 403, configured to obtain a second contact list, where the second contact list includes at least one history contact identifier, and the history contact identifier corresponds to one or more terminals having a history communication connection with the communication terminal;
the identifier obtaining unit 401 is further configured to obtain, in the second contact list, a second contact identifier that meets the preset condition when the alarm feedback message indicates that continuous alarm fails to all target terminals corresponding to all contact identifiers in the first contact list and the number of alarm failures is greater than or equal to the number threshold; and transmits the alarm request and the second contact identifier to a forwarding device through the transmission unit 402, so that the forwarding device transmits the alarm request to one or more target terminals corresponding to the second contact identifier.
Therefore, in this embodiment, when it is found that all the target terminals corresponding to the contact identifiers in the first contact list fail to continuously alarm, and the number of times that each terminal fails to continuously alarm is greater than or equal to the number threshold, for example, when 3 times of continuous alarm fails, the communication terminal does not perform alarm transmission on the terminal corresponding to the contact identifier in the first contact list, but obtains the historical contact identifier of the terminal having the historical communication connection in the historical communication record of the communication terminal, so as to form a second contact list, thereby the communication terminal can obtain the second contact identifier meeting the preset condition, that is, the highest alarm priority, in the second contact list, and then sends the alarm request to the target terminal corresponding to the second contact identifier to perform alarm transmission through the forwarding device, thereby further increasing the terminal scale available for alarm, and further improving the reliability of alarm.
In one implementation manner, when the identifier obtaining unit 401 obtains the second contact identifier that meets the preset condition in the second contact list, the method specifically includes:
obtaining communication parameters between a target terminal corresponding to each historical contact identifier in the second contact list and the communication terminal; based on the communication parameters, obtaining alarm priority of each historical contact identifier in the second contact list; and obtaining a second contact identifier of which the alarm priority meets a priority rule in the second contact list.
Optionally, the communication parameters include at least: one or any of a communication attribute, a communication time parameter, and a number of successful communications;
the identifier obtaining unit 401, when obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameter, specifically includes:
obtaining a preset weight value of the communication parameter, wherein the weight value represents a correlation value between the communication parameter and an alarm success event; and processing the communication parameters based on the weight values to obtain priority indexes, wherein the magnitude of the priority indexes represents the alarm priority of the historical contact identifiers corresponding to the communication parameters.
In one implementation manner, when the alarm feedback message indicates that the alarm to the target terminal is successful, the device is further configured to trigger the forwarding device to monitor whether the target terminal corresponding to the third association identifier enters a connection state, so that the forwarding device sends the alarm request to the target terminal entering the connection state;
wherein the third linkage identification comprises: and the alarm failure and the alarm priority in the first contact list and/or the second contact list are higher than the contact identifier corresponding to the target terminal with successful alarm.
In one implementation, in a case where the alert feedback message characterizes that alerting the target terminal has failed and the number of alert failures is less than the number threshold, the apparatus is further configured to: triggering the forwarding equipment to send the alarm request to one or more target terminals corresponding to the first contact identifier again.
In one implementation, before the transmission unit transmits the alarm request and the multimedia data to the forwarding device, the identifier obtaining unit is further configured to collect the multimedia data around the communication terminal;
Wherein the transmitting unit transmits the alarm request and the first contact identifier to a forwarding device, including:
and transmitting the multimedia data, the alarm request and the first contact identifier to the forwarding device, so that the forwarding device sends the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identifier.
Referring to fig. 6, a schematic structural diagram of a communication terminal according to a third embodiment of the present application may be a communication terminal capable of performing communication connection with other terminals through a communication base station, such as a terminal of an intercom, a mobile phone, or a pad. The communication terminal in the embodiment is mainly used for transmitting the alarm to other terminals and improving the reliability of the alarm.
Specifically, the communication terminal may include the following structure:
the processor 601 is configured to obtain, in response to the generated alarm request, a first contact identifier that meets a preset condition in a first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
a communication interface 602, configured to transmit the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier, as shown in fig. 6;
The communication interface 602 is further configured to obtain an alarm feedback message; in case the alarm feedback message characterizes that continuous alarm to the target terminal fails and the number of alarm failures is greater than or equal to a number threshold, the processor 601 is further configured to: and re-acquiring a new first contact identifier meeting the preset condition in the first contact list, and transmitting the alarm request and the new first contact identifier to a forwarding device through the communication interface 602, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier. The method comprises the steps of carrying out a first treatment on the surface of the
In addition, the communication terminal in this embodiment may further have a display, so as to provide an interface for the user to preset, for example, to set a contact identifier in the first contact list.
As can be seen from the foregoing, after an alarm request is generated under the triggering of an alarm event, a communication terminal provided in the third embodiment of the present application obtains, in a first contact list including at least two contact identifiers, a first contact identifier that meets a preset condition, where the contact identifiers correspond to one or more terminals, so after the alarm request and the first contact identifier are transmitted to a forwarding device, the forwarding device can send the alarm request to one or more target terminals corresponding to the first contact identifier, so as to implement communication alarm, and when an alarm feedback message fed back by a communication base station to the communication terminal indicates that the number of alarm failures to the first target terminal is greater than or equal to an alarm number threshold, a new first contact identifier that meets the preset condition can be obtained again in the first contact list, and the alarm request and the new first contact identifier are transmitted to the forwarding device, so that the forwarding device sends the alarm request to the one or more target terminals corresponding to the new first contact identifier, thereby implementing that after the alarm failures, the alarm is performed again to other new target terminals. Therefore, in this embodiment, a plurality of contact identifiers are set in the first contact list, which is different from the existing single alarm terminal, and in this embodiment, when an alarm failure occurs, the alarm can be re-given to other terminals, so as to improve the alarm reliability.
The following uses a communication terminal interphone as an example to illustrate the technical scheme in the application:
firstly, a plurality of contacts (a plurality of contact identifiers are configured in a first contact list) can be configured in the scheme, and when an alarm fails to be given to a certain contact (to a corresponding interphone), alarm transmission can be carried out to the next contact; when all configured contacts fail to alarm, the historical contacts can be selected according to the call records of the interphone, and emergency alarm is performed again. And when selecting the historical contact, the method can be realized through weighting configuration. When a contact person is selected from the configured plurality of contact persons or a history contact person is selected from the call records, a priority ordering mode can be adopted, the interphone preferentially selects a contact person with higher level, and when the alarm fails, the contact person with the next highest level is selected for emergency alarm; furthermore, if the contact person with the next highest level is selected for alarming and the alarming is successful, the interphone can also detect whether the contact person (group/person) with the highest level is online or not through the base station, and if so, the base station alarms the contact person with the highest level again and then the contact person with the highest level is integrated into an alarming call, so that the alarming reliability is improved.
In a specific implementation, the scheme can be compatible with the existing scheme of setting the current contact or designating the contact as the first contact, more first contacts are added on the basis, and the scheme can be compatible with contacts in intelligent matching history calls, as shown in fig. 7.
Accordingly, when alerting for multiple contacts, the method can be implemented by setting priority, and in combination with the call schematic shown in fig. 8, the following steps are adopted:
1) The alarm contacts can be configured into a plurality of contacts, and a multi-level priority mode is adopted among the plurality of contacts.
2) The alarm contacts are not limited to one call type, namely, the individual call contacts are not limited, and the group call contacts are also called;
3) The interphone serving as an alarm initiator sequentially alarms the contacts according to the priority, and automatically calls a second contact under the condition that the first contact cannot be connected; and so on, the alarm reliability is improved by configuring a plurality of contacts.
4) The scheme for judging that the contact person cannot be connected is as follows:
a) If the emergency contact is a personal call, the emergency alarm personal call requires the interphone of the destination party to answer, and if the sender does not answer after 3 (variable times) personal call alarms, the emergency alarm contact is considered to be unable to be connected, as shown in fig. 9:
Firstly, an alarm initiator sends an alarm individual call signaling to a base station and starts a timer, the base station forwards an alarm individual call signaling request and pages to a called party, if the called party returns an alarm ACK response to the base station, the base station forwards the alarm ACK response to the initiator, the alarm initiator can make subsequent emergency calls to the called party through the base station, if the timer of the initiator is overtime and does not receive the alarm ACK response, the initiator can repeatedly alarm to the called party, and if the alarm fails for 3 times or more, the initiator can alarm the next contact person, namely repeatedly send the alarm individual call/group call signaling request to the base station.
b) If the emergency contact is a group call, the base station detects that the group member is not on line after alarming, and the base station informs an alarming initiator; or no answer (group member call back) for a certain period of time, the base station considers the alert contact to be unable to be on, as shown in fig. 10:
firstly, an alarm initiator sends an alarm group call signaling to a base station and starts a timer, the base station forwards an alarm group call signaling request and pages to a called group, if someone in the called group answers to the base station, the base station forwards the voice of the called group to the initiator, the alarm is successful at this time, the alarm initiator can make subsequent emergency calls to the answering party in the called group through the base station, if the timer of the initiator is overtime and does not receive the voice applied by the called group, the initiator can repeatedly alarm to the called group, and if the alarm is continuously failed for 3 times or more, the initiator can alarm the next contact person, namely repeatedly send an alarm individual call/group call signaling request to the base station.
Based on the above scheme, if none of the configured contacts (the first and second … … nth contacts) can answer to cause the failure of the alarm of the initiator, the initiator can enter the flow of intelligently matching the contacts, then the priority index of the contacts is obtained by searching the contacts in the call record and calculating according to different contact information and weight values to represent the priority of the contacts, and based on the priority index, the initiator can select the contact with the highest priority to alarm, and the method is shown in fig. 11, wherein:
the contact information in the call record of the initiator includes: call attributes (group/individual calls), duration from the present call, number of call successes; in the call attribute (group/individual call), the contact weight of the individual call can be 0.6, and the contact information weight of the group call can be 0.4; in the time length of the call, the contact person information weight with the shortest time length, which is the nearest time, can be (first) 0.6, the second weight can be 0.5, the third weight can be 0.4, the fourth weight can be 0.3, the fifth weight can be 0.2, the sixth and n >6 weights can be 0.1, and so on; the contact information weight of the call success number may be: (number of successes) times the weight of the call attribute (group/individual call);
Accordingly, the priority index X for a contact may be represented by the formula: x= (call attribute weight) × (distance from this call time weight) × (success number) × (call attribute weight) is implemented.
As shown in fig. 12, a flow chart for incorporating a contact (individual call) who failed an alert after the alert was successful, wherein: the alarm initiator has established an emergency call and the call is established as a called Fang Feidi contact; the base station discovers the first contact B, and starts up to register on line; the base station pages the first contact B through signaling to inform the first contact B of an emergency call; the first contact B receives the response after paging and applies to join the existing emergency call; the base station answers the first contact, informs the first contact of the call information, and incorporates the first contact call into the emergency call.
As shown in fig. 13, a flowchart is shown for incorporating a contact group (group call) that failed to alarm after the alarm was successful, in which: the alarm initiator has established an emergency call and the call is established as a called Fang Feidi contact; the first contact B is a group number, the base station discovers that the first contact B is online, continuously informs the group B to establish an emergency call, and the group call establishment of the first contact B is successful; meanwhile, the base station informs the alarm called person established before to join a new alarm call (a first contact person B group emergency call) through signaling; at this point, both sets of contacts are merged into the same alert call, continuing with the subsequent emergency call.
In addition, when an alarm initiator alarms, usually contacts are in a crisis condition, and the contacts of the alarm initiator may not come to send long voice contents as soon as the alarm is fallen to the ground or the alarm is in motion. Thus, the first voice transmission of the alert initiator's contact is particularly critical.
Therefore, in the technical scheme of the application, before (or after) the alarm is sent successfully, the first call of the contact person of the alarm initiator (matched with the automatic heat microphone to automatically transmit voice) is recorded through the interphone, if the alarm is called, no person answers the callback, the initiator does not actively initiate the new call, and after a fixed period of time, the interphone repeatedly sends the first call at intervals to alarm. If the subsequent called party calls back or the calling party cancels the call, the recording is stopped to be sent.
In summary, the technical scheme in the application has the following technical characteristics:
1) Multiple priority contacts: setting a plurality of contacts with different priorities in emergency alarm, and supporting fixed and dynamic matching of calling contacts;
2) Dynamically selecting matching emergency contacts: when the fixed configuration contact cannot be connected, the dynamic matching call contact is adopted, and the contact is dynamically selected to continuously try to alarm according to the weight of the call type, the last call time and the number of calls until the alarm is successful.
3) The non-response automatic alarm next contact: if the emergency contact is an individual call, if the alarm party does not wait for the response reply of the destination party after 3 (variable times) individual call alarms, the alarm contact is considered to be unable to be connected at the time; if the emergency contact person is a group call, the base station detects that the group member is not online, and the base station notifies an alarm initiator. Or no response (group member call back) for a certain period of time, the alarm contact is considered to be unable to be turned on. The terminal will continue to attempt to call the next matching contact in the above situation.
4) The call is incorporated into the first contact: after the alarm is successful, when the base station detects that a high priority (first emergency contact) contact is online, the base station incorporates the contact into the established emergency alert call.
5) The alarm party speaks the voice record and sends automatically: after the alarm button is released by the alarm initiator, if the called party has no callback and the calling party has no new voice (the calling party only speaks once), the calling party speaks in the call maintaining time, and then the first speaking is repeatedly sent at a later interval to alarm. If the called party calls back or the calling party cancels the call, the recording is stopped.
Therefore, in the technical scheme of the application, a plurality of emergency contacts can be configured, the emergency contacts can be freely switched according to the real-time state, and the alarm success rate can be greatly improved;
Meanwhile, the method and the device can be compatible with the prior art, and meanwhile, the technical scheme for improving the alarm success rate can be popularized to more terminals;
moreover, if the first contact cannot be called through, in the subsequent calling process, the system detects that the first contact is online, and the first contact can be pulled into the call, so that the most important contact can be added into the emergency call in the first time.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described as different from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other. For the apparatus class embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference is made to the description of the method embodiments for relevant points.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.
Claims (8)
1. An alarm method, applied to a communication terminal, comprising:
responding to the generated alarm request, and obtaining a first contact identifier meeting preset conditions from a first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
transmitting the alarm request and the first contact identifier to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the first contact identifier;
Obtaining an alarm feedback message;
when the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of alarm failures is greater than or equal to a number threshold, a new first contact identifier meeting the preset condition is obtained in the first contact list again, and the alarm request and the new first contact identifier are transmitted to the forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier;
the method further comprises the steps of:
when the alarm feedback message indicates that continuous alarm fails to all target terminals corresponding to all the contact identifiers in the first contact list and the alarm failure frequency is greater than or equal to the frequency threshold, obtaining a second contact identifier meeting the preset condition in a second contact list; transmitting the alarm request and the second contact identification to the forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identification;
in the case that the alarm feedback message indicates that the alarm to the target terminal is successful, the method further comprises:
Triggering the forwarding equipment to monitor whether a target terminal corresponding to the third link identifier enters a connection state or not, so that the forwarding equipment sends the alarm request to the target terminal entering the connection state; the third contact identifier is a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of a contact identifier corresponding to a target terminal with successful alarm.
2. The method of claim 1, wherein the first contact list includes at least two preset contact identifiers, the contact identifiers corresponding to one or more terminals;
the second contact list includes at least one historical contact identifier corresponding to one or more terminals having a historical communication connection with the communication terminal.
3. The method according to claim 2, wherein obtaining a second contact identifier in the second contact list that meets the preset condition comprises:
obtaining communication parameters between a target terminal corresponding to each historical contact identifier in the second contact list and the communication terminal;
Based on the communication parameters, obtaining alarm priority of each historical contact identifier in the second contact list;
and obtaining a second contact identifier of which the alarm priority meets a priority rule in the second contact list.
4. A method according to claim 3, wherein the communication parameters include at least: one or any of a communication attribute, a communication time parameter, and a number of successful communications;
the step of obtaining the alarm priority of each historical contact identifier in the second contact list based on the communication parameters comprises the following steps:
obtaining a preset weight value of the communication parameter, wherein the weight value represents a correlation value between the communication parameter and an alarm success event;
and processing the communication parameters based on the weight values to obtain priority indexes, wherein the magnitude of the priority indexes represents the alarm priority of the historical contact identifiers corresponding to the communication parameters.
5. The method as recited in claim 1, further comprising:
and triggering the forwarding equipment to send the alarm request to one or more target terminals corresponding to the first contact identifier again under the condition that the alarm feedback information indicates that the alarm to the target terminals fails and the number of alarm failures is smaller than the number threshold.
6. The method according to claim 1 or 2, characterized in that before transmitting the alarm request to the forwarding device, the method further comprises:
collecting multimedia data around the communication terminal;
wherein said transmitting said alert request and said first contact identification to a forwarding device comprises:
and transmitting the multimedia data, the alarm request and the first contact identifier to a forwarding device, so that the forwarding device transmits the alarm request and the multimedia data to one or more target terminals corresponding to the first contact identifier.
7. An alarm device, characterized in that it is provided in a communication terminal, said device comprising:
the identification obtaining unit is used for responding to the generated alarm request and obtaining a first contact identification meeting preset conditions from the first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
the transmission unit is used for transmitting the alarm request and the first contact identifier to forwarding equipment so that the forwarding equipment can send the alarm request to one or more target terminals corresponding to the first contact identifier;
The transmission unit is also used for obtaining an alarm feedback message; the identification obtaining unit is further configured to, when the alarm feedback message indicates that continuous alarm to the target terminal fails and the number of alarm failures is greater than or equal to a number threshold, retrieve a new first contact identification that meets the preset condition in the first contact list, and transmit, through the transmission unit, the alarm request and the new first contact identification to a forwarding device, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identification;
the apparatus further comprises:
the identification obtaining unit is further configured to obtain, in a second contact list, a second contact identification that meets the preset condition when the alarm feedback message indicates that continuous alarm fails to all target terminals corresponding to all contact identifications in the first contact list and the number of alarm failures is greater than or equal to the number threshold; transmitting the alarm request and the second contact identification to the forwarding device through the transmission unit, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identification;
The device is further used for triggering the forwarding equipment to monitor whether the target terminal corresponding to the third contact identifier enters a connection state or not under the condition that the alarm feedback message indicates that the alarm to the target terminal is successful, so that the forwarding equipment sends the alarm request to the target terminal entering the connection state; the third contact identifier is a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of a contact identifier corresponding to a target terminal with successful alarm.
8. A communication terminal, comprising:
the processor is used for responding to the generated alarm request and obtaining a first contact identifier meeting a preset condition from the first contact list; the preset condition characterizes that the alarm priority of the contact identifier meets the priority rule;
the communication interface is used for transmitting the alarm request and the first contact identifier to the forwarding equipment so that the forwarding equipment can send the alarm request to one or more target terminals corresponding to the first contact identifier;
the communication interface is also used for obtaining alarm feedback information; in the case that the alarm feedback message characterizes continuous alarm failure to the target terminal and the number of alarm failures is greater than or equal to a number threshold, the processor is further configured to: a new first contact identifier meeting the preset condition is obtained in the first contact list again, and the alarm request and the new first contact identifier are transmitted to the forwarding device through the communication interface, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the new first contact identifier;
The communication terminal further includes:
the processor is further configured to obtain, in a second contact list, a second contact identifier that meets the preset condition when the alarm feedback message indicates that continuous alarm fails to all target terminals corresponding to all contact identifiers in the first contact list and the number of alarm failures is greater than or equal to the number threshold; transmitting the alarm request and the second contact identification to the forwarding device through the communication interface, so that the forwarding device sends the alarm request to one or more target terminals corresponding to the second contact identification;
the communication terminal is further used for triggering the forwarding device to monitor whether the target terminal corresponding to the third association identifier enters a connection state or not under the condition that the alarm feedback message indicates that the alarm to the target terminal is successful, so that the forwarding device sends the alarm request to the target terminal entering the connection state; the third contact identifier is a contact identifier in the first contact list and/or the second contact list, and the alarm priority of the third contact identifier is higher than that of a contact identifier corresponding to a target terminal with successful alarm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010737074.9A CN114005265B (en) | 2020-07-28 | 2020-07-28 | Alarm method, device and communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010737074.9A CN114005265B (en) | 2020-07-28 | 2020-07-28 | Alarm method, device and communication terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114005265A CN114005265A (en) | 2022-02-01 |
CN114005265B true CN114005265B (en) | 2023-07-18 |
Family
ID=79920665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010737074.9A Active CN114005265B (en) | 2020-07-28 | 2020-07-28 | Alarm method, device and communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114005265B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103886716A (en) * | 2014-04-02 | 2014-06-25 | 上海理工大学 | Tumble monitoring and alarming system |
CN104980581A (en) * | 2015-06-18 | 2015-10-14 | 惠州Tcl移动通信有限公司 | Method and system for realizing automatic help seeking based on mobile terminal |
CN105809909A (en) * | 2016-03-30 | 2016-07-27 | 上海天奕无线信息科技有限公司 | Electric vehicle and emergency call alarm system and method thereof |
CN106331313A (en) * | 2016-08-09 | 2017-01-11 | 中科创达软件科技(深圳)有限公司 | Mobile terminal and mobile-terminal-based method for automatic calling by fallen old people |
CN108243287A (en) * | 2016-12-26 | 2018-07-03 | 国基电子(上海)有限公司 | A kind of method and device that emergency contact is notified when dialing the police emergency number |
CN108986398A (en) * | 2018-06-29 | 2018-12-11 | 拉卡拉支付股份有限公司 | Wearable device alarm method, device, electronic equipment and storage medium |
CN110267250A (en) * | 2019-07-04 | 2019-09-20 | 长沙环康科技有限公司 | Intelligent rescue system and its backstage response rescue signal method |
CN110910607A (en) * | 2019-10-24 | 2020-03-24 | 李健 | Intelligent alarm terminal |
CN111314556A (en) * | 2020-02-17 | 2020-06-19 | 深圳传音控股股份有限公司 | Alarm method of mobile terminal, mobile terminal and storage medium |
-
2020
- 2020-07-28 CN CN202010737074.9A patent/CN114005265B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103886716A (en) * | 2014-04-02 | 2014-06-25 | 上海理工大学 | Tumble monitoring and alarming system |
CN104980581A (en) * | 2015-06-18 | 2015-10-14 | 惠州Tcl移动通信有限公司 | Method and system for realizing automatic help seeking based on mobile terminal |
CN105809909A (en) * | 2016-03-30 | 2016-07-27 | 上海天奕无线信息科技有限公司 | Electric vehicle and emergency call alarm system and method thereof |
CN106331313A (en) * | 2016-08-09 | 2017-01-11 | 中科创达软件科技(深圳)有限公司 | Mobile terminal and mobile-terminal-based method for automatic calling by fallen old people |
CN108243287A (en) * | 2016-12-26 | 2018-07-03 | 国基电子(上海)有限公司 | A kind of method and device that emergency contact is notified when dialing the police emergency number |
CN108986398A (en) * | 2018-06-29 | 2018-12-11 | 拉卡拉支付股份有限公司 | Wearable device alarm method, device, electronic equipment and storage medium |
CN110267250A (en) * | 2019-07-04 | 2019-09-20 | 长沙环康科技有限公司 | Intelligent rescue system and its backstage response rescue signal method |
CN110910607A (en) * | 2019-10-24 | 2020-03-24 | 李健 | Intelligent alarm terminal |
CN111314556A (en) * | 2020-02-17 | 2020-06-19 | 深圳传音控股股份有限公司 | Alarm method of mobile terminal, mobile terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114005265A (en) | 2022-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6574480B1 (en) | Method and apparatus for providing intelligent emergency paging | |
US6912384B2 (en) | Method and system for transferring a cellular phone call | |
EP1405699B1 (en) | Freely moving robot arranged to locate a user and make an emergency call on user's request | |
US20130223606A1 (en) | Method and apparatus for managing patients using group communication | |
US7792265B2 (en) | Call completion service in case of called party unavailability | |
JP2007318642A (en) | Method for congestion control, and subscriber terminal disaster system, and core network used for the method | |
CN100539467C (en) | Be used for during emergency, connecting the method for calling out at travelling carriage | |
CN114005265B (en) | Alarm method, device and communication terminal | |
JP2008234488A (en) | Safety-confirming system | |
JP2007159043A (en) | Method and system for addressing prank call | |
CN201315615Y (en) | Emergency system for seeking help | |
CN110266895B (en) | Call callback method, device and equipment | |
JP2019004307A (en) | Emergency reporting device and system | |
WO2023273673A1 (en) | Police-report receiving and handling system and method | |
JP5779111B2 (en) | Call line securing program, communication apparatus, and call line securing method | |
CN115941839A (en) | Processing method and processing device for emergency call | |
CN113438608A (en) | Wireless intelligent interactive communication method and communication system | |
CN110401940B (en) | Alarm processing method and device | |
CN111031524B (en) | Bluetooth headset loss prevention device and method and Bluetooth headset charging box | |
US20120076282A1 (en) | Telephone notification method and system, signaling monitoring unit and server | |
US10009943B2 (en) | Method for controlling disconnection during call, and terminal | |
JP2001148084A (en) | Position notification service system for portable terminal equipment and portable terminal equipment to be used for the same | |
JP4367224B2 (en) | Remote monitoring and control system | |
JP2005086544A (en) | Communication control system and communication control method | |
CN118353994A (en) | Incoming call answering method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |