CN115909650A - Alarm method, alarm device, storage medium and electronic equipment - Google Patents

Alarm method, alarm device, storage medium and electronic equipment Download PDF

Info

Publication number
CN115909650A
CN115909650A CN202111109061.8A CN202111109061A CN115909650A CN 115909650 A CN115909650 A CN 115909650A CN 202111109061 A CN202111109061 A CN 202111109061A CN 115909650 A CN115909650 A CN 115909650A
Authority
CN
China
Prior art keywords
preset
alarm
information
received
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111109061.8A
Other languages
Chinese (zh)
Inventor
任行
李冰洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202111109061.8A priority Critical patent/CN115909650A/en
Publication of CN115909650A publication Critical patent/CN115909650A/en
Pending legal-status Critical Current

Links

Images

Abstract

The disclosure relates to an alarm method, an alarm device, a storage medium and an electronic device. The method comprises the following steps: in response to receiving a first preset alarm instruction, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received; and if the second preset alarm instruction is received within the first preset time, sending an alarm message to a preset contact. Therefore, the alarm can be triggered by combining the first preset alarm instruction and the second preset alarm instruction, a safe, concealed, quick and efficient alarm mode is provided, and the personal safety of the alarm person can be better maintained. In addition, a combined triggering alarm mode is adopted, false triggering alarm can be avoided, and waste of public resources is prevented.

Description

Alarm method, alarm device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to an alarm method, an alarm device, a storage medium, and an electronic device.
Background
In daily life, although the peace level is greatly improved, behaviors violating ethical regulations and even crimes can threaten the personal safety of people. When the events affecting personal safety occur, the traditional method is still used, and relatives and friends are called for help through telephone alarms or telephones. However, the personal safety of the alarm person may be endangered by telephone alarm or telephone help seeking relatives and friends.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides an alarm method, an alarm device, a storage medium, and an electronic device.
According to a first aspect of the embodiments of the present disclosure, there is provided an alarm method, including:
in response to receiving a first preset alarm instruction, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received;
and if the second preset alarm instruction is received within the first preset time, sending an alarm message to a preset contact.
Optionally, the first preset alarm instruction is any one of a first preset voice segment, a first preset touch operation and a first preset key operation, and the second preset alarm instruction is any one of a second preset voice segment, a second preset touch operation and a second preset key operation.
Optionally, the first preset alarm instruction is the first preset voice segment, the second preset alarm instruction is the second preset voice segment, and the first preset voice segment is unrelated to the second preset voice segment.
Optionally, the first preset alarm instruction is the first preset voice segment, and before the step of monitoring whether a second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received, the method further includes:
extracting first voiceprint characteristic information of the first preset alarm instruction;
determining whether the first voiceprint characteristic information is matched with prestored voiceprint characteristic sample information;
the monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received includes:
and if the first voiceprint characteristic information is matched with the voiceprint characteristic sample information, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received.
Optionally, the second preset alarm instruction is the second preset voice segment, and before the step of sending the alarm message to the preset contact, the method further includes:
extracting second voiceprint characteristic information of the second preset alarm instruction;
determining whether the second voiceprint characteristic information is matched with prestored voiceprint characteristic sample information;
the sending of the alarm message to the preset contact comprises the following steps:
and if the second voiceprint characteristic information is matched with the voiceprint characteristic sample information, sending an alarm message to a preset contact.
Optionally, the alert message includes target location information;
the target position information is obtained by the following method:
acquiring current positioning information of a current alarm person in a preset positioning mode;
acquiring track points of the current alarm in a second preset time before the current alarm receives the first preset alarm instruction;
and determining the current positioning information and the track points as the target position information.
Optionally, the obtaining of the track point of the current alarm person within a second preset time before the current alarm person receives the first preset alarm instruction includes:
and determining track points of the current alarm person in a second preset time length according to article distribution signing-in information of the current alarm person in the second preset time length before the current alarm person receives the first preset alarm instruction and/or historical positioning information of the current alarm person in the second preset time length.
Optionally, after the step of sending the alert message to the preset contact, the method further includes:
acquiring current environment information, wherein the current environment information comprises at least one of audio information, image information and current positioning information;
and sending the current environment information to the preset contact.
According to a second aspect of the embodiments of the present disclosure, there is provided an alarm device including:
the monitoring module is configured to respond to the reception of a first preset alarm instruction and monitor whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received;
and the alarm module is configured to send an alarm message to a preset contact if the monitoring module monitors that the second preset alarm instruction is received within the first preset time.
According to a third aspect of the embodiments of the present disclosure, there is provided an alarm device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
in response to receiving a first preset alarm instruction, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received;
and if the second preset alarm instruction is received within the first preset time, sending an alarm message to a preset contact.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the alarm method provided by the first aspect of the present disclosure.
According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the alarm method provided by the first aspect of the present disclosure is performed.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: and sending an alarm message to a preset contact under the condition that a first preset alarm instruction is received and a second preset alarm instruction is received within a first preset time later. Therefore, the alarm can be triggered by combining the first preset alarm instruction and the second preset alarm instruction, a safe, concealed, quick and efficient alarm mode is provided, and the personal safety of the alarm person can be better maintained. In addition, by adopting a combined alarm triggering mode, false alarm triggering can be avoided, and waste of public resources is prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a method of alerting according to an exemplary embodiment.
FIG. 2 is a flow chart illustrating a method of alerting according to another exemplary embodiment.
FIG. 3 is a flow chart illustrating a method of alerting according to another exemplary embodiment.
FIG. 4 is a flow chart illustrating a method of alerting according to another exemplary embodiment.
FIG. 5 is a flow chart illustrating a method of alerting according to another exemplary embodiment.
FIG. 6 is a block diagram illustrating an alarm device according to an exemplary embodiment.
FIG. 7 is a block diagram illustrating an alarm device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating an alarm method according to an exemplary embodiment, where the method may be applied to a terminal such as a smart phone, a smart wearable device (e.g., a smart band, etc.). As shown in fig. 1, the above-described alarm method may include the following S101 and S102.
In S101, in response to receiving the first preset alarm instruction, it is monitored whether a second preset alarm instruction is received within a first preset time period after receiving the first preset alarm instruction.
In S102, if a second preset alarm instruction is received within the first preset time period, an alarm message is sent to a preset contact.
In the disclosure, the first preset alarm instruction may be any one of a first preset voice segment, a first preset touch operation, and a first preset key operation, and the second preset alarm instruction may be any one of a second preset voice segment, a second preset touch operation, and a second preset key operation.
Illustratively, the first preset warning instruction is a first preset voice segment (e.g., "i want to go to the toilet"), and the second preset warning instruction is a second preset voice segment (e.g., "yes").
Further, for example, the first preset alarm instruction is a first preset voice segment, and the second preset alarm instruction is a second preset key operation (e.g., a volume up key or a volume down key).
The preset contact person can be a local police affair or a user friend. The alert message may include current alert person target location information. In addition, the current positioning information of the terminal can be acquired through a preset positioning mode (for example, GPS positioning) by a positioning module in the terminal, and is used as the target position information of the current alarm person.
In addition, in order to ensure the concealment of the alarm, the alarm message can be sent to the preset contact in the form of a short message, and a message sending interface is not displayed when the alarm message is sent.
It should be noted that the first preset time period may be a default value (for example, 30 s) or a value preset by a user, and is not specifically limited in this disclosure.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: and sending an alarm message to a preset contact under the condition that a first preset alarm instruction is received and a second preset alarm instruction is received within a first preset time later. Therefore, the alarm can be triggered by combining the first preset alarm instruction and the second preset alarm instruction, a safe, concealed, quick and efficient alarm mode is provided, and the personal safety of the alarm person can be better maintained. In addition, by adopting a combined alarm triggering mode, false alarm triggering can be avoided, and waste of public resources is prevented.
In addition, in order to further avoid false triggering of the alarm and effectively prevent waste of public resources, under the condition that the first preset alarm instruction is a first preset voice segment and the second preset alarm instruction is a second preset voice segment, the first preset voice segment is irrelevant to the second preset voice segment, so that false triggering of the alarm during normal conversation can be avoided.
In addition, in order to avoid the problem of inaccurate positioning or incapability of positioning due to weak positioning signals, the target position information can also comprise the latest activity track of the current alarm person besides the current positioning information of the current alarm person, so that the alarm information can be more detailed, and the subsequent rescue action is more convenient. Specifically, the target position information may be acquired through the following steps (1) to (3):
(1) And acquiring the current positioning information of the current alarm person in a preset positioning mode.
(2) And acquiring track points of the current alarm in a second preset time before the current alarm receives the first preset alarm instruction.
(3) And determining the current positioning information and the track points as target position information.
It should be noted that the second preset time period may be a default value (for example, 2 hours), or may be a value preset by a user, and is not specifically limited in this disclosure.
A detailed description is given below to the specific implementation manner of obtaining the track point within the second preset time before the current alarm person receives the first preset alarm instruction in step (2). Specifically, the method can be implemented in various ways, and in one implementation, the track point of the current alarm person within the second preset time period can be determined according to the historical positioning information of the current alarm person within the second preset time period.
In another embodiment, the track point of the current alarm person within the second preset time length can be determined according to the article distribution signing-in information of the current alarm person within the second preset time length before the current alarm person receives the first preset alarm instruction.
For example, the track point of the current alarm person within the second preset time length can be determined through the express sign-in place, the takeout delivery sign-in information and the like of the current alarm person within the second preset time length before the current alarm person receives the first preset alarm instruction.
In another embodiment, the track point of the current alarm person within the second preset time period may be determined according to the article delivery sign-in information of the current alarm person within the second preset time period before the current alarm person receives the first preset alarm instruction and the historical positioning information of the current alarm person within the second preset time period. Therefore, more detailed alarm information can be provided, and the follow-up rescue action is more convenient.
Fig. 2 is a flowchart illustrating an alarm method according to another exemplary embodiment, wherein the method may be applied to a terminal such as a smart phone, a smart wearable device (e.g., a smart band, etc.). As shown in fig. 2, the above-mentioned alarm method may include the following S201 to S204.
In S201, in response to receiving a first preset alarm instruction, first voiceprint feature information of the first preset alarm instruction is extracted.
In S202, it is determined whether the first voiceprint characteristic information matches the previously stored voiceprint characteristic sample information.
In the present disclosure, the pre-stored voiceprint feature sample information is voiceprint feature information of the terminal user, which is pre-stored in the terminal. If the first voiceprint characteristic information is matched with the prestored voiceprint characteristic sample information, it is indicated that the initiator of the first preset alarm instruction is the terminal user, and at this time, whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received can be monitored, that is, the following S203 is executed; if the first voiceprint characteristic information is not matched with the prestored voiceprint characteristic sample information, the initiator of the first preset alarm instruction is not the terminal user, and at the moment, whether the first preset alarm instruction is received or not can be continuously monitored.
In S203, if the first voiceprint feature information matches the voiceprint feature sample information, it is monitored whether a second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received.
In S204, if a second preset alarm instruction is received within the first preset time period, an alarm message is sent to a preset contact.
In the above embodiment, after receiving the first preset alarm instruction, first voiceprint characteristic information of the first preset alarm instruction is extracted, so as to verify whether an initiator of the first preset alarm instruction is the terminal user, and when it is confirmed that the initiator of the first preset alarm instruction is the terminal user, subsequent monitoring and alarm operations are executed, thereby effectively avoiding false triggering of an alarm in normal conversation.
Fig. 3 is a flowchart illustrating an alarm method according to another exemplary embodiment, wherein the method may be applied to a terminal such as a smart phone, a smart wearable device (e.g., a smart band, etc.). As shown in fig. 3, the above-described alarm method may include the following S301 to S304.
In S301, in response to receiving the first preset alarm instruction, it is monitored whether a second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received.
In S302, if a second preset alarm instruction is received within the first preset time period, second voiceprint feature information of the second preset alarm instruction is extracted.
In S303, it is determined whether the second voiceprint feature information matches the prestored voiceprint feature sample information.
In the present disclosure, if the second voiceprint feature information matches with the prestored voiceprint feature sample information, it indicates that the initiator of the second preset alarm instruction is the terminal user himself, and at this time, an alarm message may be sent to the preset contact person, that is, the following S304 is executed; if the second voiceprint characteristic information is not matched with the prestored voiceprint characteristic sample information, it is indicated that the initiator of the second preset alarm instruction is not the terminal user, and at this time, whether the first preset alarm instruction is received or not can be continuously monitored.
In S304, if the second voiceprint feature information matches the voiceprint feature sample information, an alarm message is sent to the preset contact.
In the above embodiment, after receiving the second preset alarm instruction, the second voiceprint feature information of the second preset alarm instruction is extracted first, so as to verify whether the initiator of the second preset alarm instruction is the terminal user himself or herself according to the second voiceprint feature information, and when confirming that the initiator of the second preset alarm instruction is the terminal user himself, the subsequent alarm operation is executed, thereby effectively avoiding false alarm triggering during normal conversation.
Fig. 4 is a flowchart illustrating an alarm method according to another exemplary embodiment, where the method may be applied to a terminal such as a smart phone, a smart wearable device (e.g., a smart band, etc.). As shown in fig. 4, the above-described alarm method may include the following S401 to S406.
In S401, in response to receiving the first preset alarm instruction, first voiceprint feature information of the first preset alarm instruction is extracted.
In S402, it is determined whether the first voiceprint feature information matches pre-stored voiceprint feature sample information.
In the present disclosure, if the first voiceprint feature information matches with the prestored voiceprint feature sample information, it indicates that the initiator of the first preset alarm instruction is the terminal user himself, and at this time, it may be monitored whether the second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received, that is, the following S403 is executed; if the first voiceprint characteristic information is not matched with the prestored voiceprint characteristic sample information, the initiator of the first preset alarm instruction is not the terminal user, and at the moment, whether the first preset alarm instruction is received or not can be continuously monitored.
In S403, if the first voiceprint feature information matches the voiceprint feature sample information, it is monitored whether a second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received.
In S404, if a second preset alarm instruction is received within the first preset time period, second voiceprint feature information of the second preset alarm instruction is extracted.
In S405, it is determined whether the second voiceprint feature information matches the previously stored voiceprint feature sample information.
In the present disclosure, if the second voiceprint characteristic information matches the prestored voiceprint characteristic sample information, it indicates that the initiator of the second preset alarm instruction is the terminal user himself, and at this time, an alarm message may be sent to the preset contact person, that is, the following S406 is executed; if the second voiceprint characteristic information is not matched with the prestored voiceprint characteristic sample information, the initiator of the second preset alarm instruction is not the terminal user, and at the moment, whether the first preset alarm instruction is received or not can be continuously monitored.
In S406, if the second voiceprint feature information matches the voiceprint feature sample information, an alarm message is sent to the preset contact.
In the above embodiment, after receiving the first preset alarm instruction, first voiceprint feature information of the first preset alarm instruction is extracted, so as to verify whether an initiator of the first preset alarm instruction is the terminal user himself or not according to the first voiceprint feature information, and when it is confirmed that the initiator of the first preset alarm instruction is the terminal user himself, the subsequent monitoring operation is executed; and when a second preset alarm instruction is received within the first preset time length, first extracting second voiceprint characteristic information of the second preset alarm instruction, verifying whether an initiator of the second preset alarm instruction is the terminal user according to the second voiceprint characteristic information, and executing subsequent alarm operation when the initiator of the second preset alarm instruction is confirmed to be the terminal user. Therefore, by the double authentication of the terminal user identity, the false triggering of the alarm by normal conversation can be avoided to the greatest extent.
Fig. 5 is a flowchart illustrating an alarm method according to another exemplary embodiment, wherein the method may be applied to a terminal such as a smart phone, a smart wearable device (e.g., a smart band, etc.). As shown in fig. 5, the above-mentioned alarm method may further include the following S103 and S104.
In S103, current environment information is collected.
In S104, the current environment information is sent to the preset contact.
In the present disclosure, the current environment information includes at least one of audio information, image information, and current location information (i.e., real-time location information).
Illustratively, the current environment information includes audio information, image information, and current location information. Namely, after alarming, the recording function of collecting audio information, the video recording function of collecting image information and the positioning function of collecting current positioning information can be automatically started to obtain the current environment information.
In the embodiment, after the alarm, the current environment information is collected and sent to the preset contact, so that the real-time situation of the current alarm person can be conveniently obtained, and the alarm person can be conveniently rescued in time according to the current environment information.
In addition, after the current environment information is acquired, the current environment information can also be stored in the local terminal, so that subsequent evidence obtaining is facilitated.
In addition, in order to make the alarm information more detailed and more convenient for subsequent rescue actions, the alarm information may further include identity information, an alarm instruction, and the like of a current alarm person (i.e., an end user). The identity information may include information such as name, age, contact address, occupation, emergency contact, etc., and the identity information may be pre-stored in the terminal by the terminal user. The alert specification may be text that the end user has previously stored in the terminal, for example, "personal hazard encountered".
Based on the same inventive concept, the disclosure also provides an alarm device. As shown in fig. 6, the apparatus 600 includes:
the monitoring module 601 is configured to monitor whether a second preset alarm instruction is received within a first preset time period after a first preset alarm instruction is received or not in response to receiving the first preset alarm instruction;
an alarm module 602 configured to send an alarm message to a preset contact if the monitoring module 601 monitors that the second preset alarm instruction is received within a first preset time period.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: and sending an alarm message to a preset contact under the condition that a first preset alarm instruction is received and a second preset alarm instruction is received within a first preset time later. Therefore, the alarm can be triggered by combining the first preset alarm instruction and the second preset alarm instruction, a safe, concealed, quick and efficient alarm mode is provided, and the personal safety of the alarm person can be better maintained. In addition, by adopting a combined alarm triggering mode, false alarm triggering can be avoided, and waste of public resources is prevented.
Optionally, the first preset alarm instruction is any one of a first preset voice segment, a first preset touch operation and a first preset key operation, and the second preset alarm instruction is any one of a second preset voice segment, a second preset touch operation and a second preset key operation.
Optionally, the first preset alarm instruction is the first preset voice segment, the second preset alarm instruction is the second preset voice segment, and the first preset voice segment is unrelated to the second preset voice segment.
Optionally, the first preset alarm instruction is the first preset voice segment, and the apparatus 600 further includes:
a first extracting module, configured to extract first voiceprint feature information of the first preset alarm instruction before the monitoring module 602 monitors whether a second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received;
a first determination module configured to determine whether the first voiceprint characteristic information matches pre-stored voiceprint characteristic sample information;
the monitoring module 602 is configured to monitor whether a second preset alarm instruction is received within a first preset time period after the first preset alarm instruction is received if the first voiceprint feature information matches the voiceprint feature sample information.
Optionally, the second preset alarm instruction is the second preset voice segment, and the apparatus 600 further includes:
a second extracting module, configured to extract second voiceprint feature information of the second preset alarm instruction before the alarm module 602 sends an alarm message to a preset contact;
a second determination module configured to determine whether the second voiceprint feature information matches pre-stored voiceprint feature sample information;
the alarm module 602 is configured to send an alarm message to a preset contact if the second voiceprint feature information matches the voiceprint feature sample information.
Optionally, the alert message includes target location information;
the target position information is obtained by an obtaining module, wherein the obtaining module comprises:
the positioning sub-module is configured to acquire current positioning information of a current alarm person in a preset positioning mode;
the acquisition sub-module is configured to acquire track points of the current alarm person within a second preset time period before the current alarm person receives the first preset alarm instruction;
a determination submodule configured to determine the current positioning information and the track point as the target position information.
Optionally, the obtaining sub-module is configured to determine, according to the article delivery signing-in information of the current alarm person within a second preset time period before the current alarm person receives the first preset alarm instruction and/or the historical location information of the current alarm person within the second preset time period, a track point of the current alarm person within the second preset time period.
Optionally, the apparatus 600 further comprises:
a collection module configured to collect current environment information after the alarm module 602 sends an alarm message to a preset contact, wherein the current environment information includes at least one of audio information, image information, and current positioning information;
the alarm module 602 is further configured to send the current environment information to the preset contact.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present disclosure also provides a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the alarm method provided by the present disclosure.
The present disclosure also provides an electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the alarm method provided by the disclosure is executed.
Fig. 7 is a block diagram illustrating an alarm device 800 according to an exemplary embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 7, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the alarm method described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 may include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 806 provides power to the various components of device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described alarm method.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described alert method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In another exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-mentioned alarm method when executed by the programmable apparatus.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice in the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (12)

1. An alarm method, comprising:
in response to receiving a first preset alarm instruction, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received;
and if the second preset alarm instruction is received within the first preset time, sending an alarm message to a preset contact.
2. The method according to claim 1, wherein the first preset alarm command is any one of a first preset voice segment, a first preset touch operation and a first preset key operation, and the second preset alarm command is any one of a second preset voice segment, a second preset touch operation and a second preset key operation.
3. The method according to claim 2, wherein the first predetermined alarm command is the first predetermined speech segment, the second predetermined alarm command is the second predetermined speech segment, and the first predetermined speech segment is not correlated with the second predetermined speech segment.
4. The method according to claim 2, wherein the first preset alarm command is the first preset voice segment, and before the step of monitoring whether a second preset alarm command is received within a first preset time period after the first preset alarm command is received, the method further comprises:
extracting first voiceprint characteristic information of the first preset alarm instruction;
determining whether the first voiceprint characteristic information is matched with prestored voiceprint characteristic sample information;
the monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received includes:
and if the first voiceprint characteristic information is matched with the voiceprint characteristic sample information, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received.
5. The method according to any one of claims 2 to 4, wherein the second preset alarm instruction is the second preset voice segment, and before the step of sending the alarm message to the preset contact, the method further comprises:
extracting second voiceprint characteristic information of the second preset alarm instruction;
determining whether the second voiceprint characteristic information is matched with prestored voiceprint characteristic sample information;
the sending of the alarm message to the preset contact comprises the following steps:
and if the second voiceprint characteristic information is matched with the voiceprint characteristic sample information, sending an alarm message to a preset contact.
6. The method according to any of claims 1-4, wherein the alert message includes target location information;
the target position information is obtained by the following method:
acquiring current positioning information of a current alarm person in a preset positioning mode;
acquiring track points of the current alarm person within a second preset time before the current alarm person receives the first preset alarm instruction;
and determining the current positioning information and the track points as the target position information.
7. The method according to claim 6, wherein the obtaining the track point of the current alarmer within a second preset time period before the current alarmer receives the first preset alarm instruction comprises:
and determining track points of the current alarm person in a second preset time length according to article distribution signing-in information of the current alarm person in the second preset time length before the current alarm person receives the first preset alarm instruction and/or historical positioning information of the current alarm person in the second preset time length.
8. The method according to any of claims 1-4, wherein after the step of sending an alert message to a preset contact, the method further comprises:
acquiring current environment information, wherein the current environment information comprises at least one of audio information, image information and current positioning information;
and sending the current environment information to the preset contact.
9. An alarm device, comprising:
the monitoring module is configured to respond to the reception of a first preset alarm instruction and monitor whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received;
and the alarm module is configured to send an alarm message to a preset contact if the monitoring module monitors that the second preset alarm instruction is received within the first preset time.
10. An alarm device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
in response to receiving a first preset alarm instruction, monitoring whether a second preset alarm instruction is received within a first preset time after the first preset alarm instruction is received;
and if the second preset alarm instruction is received within the first preset time, sending an alarm message to a preset contact.
11. A computer-readable storage medium, on which computer program instructions are stored, which program instructions, when executed by a processor, carry out the steps of the method according to any one of claims 1 to 8.
12. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: -performing the alarm method of any one of claims 1 to 8.
CN202111109061.8A 2021-09-22 2021-09-22 Alarm method, alarm device, storage medium and electronic equipment Pending CN115909650A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111109061.8A CN115909650A (en) 2021-09-22 2021-09-22 Alarm method, alarm device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111109061.8A CN115909650A (en) 2021-09-22 2021-09-22 Alarm method, alarm device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN115909650A true CN115909650A (en) 2023-04-04

Family

ID=86471567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111109061.8A Pending CN115909650A (en) 2021-09-22 2021-09-22 Alarm method, alarm device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115909650A (en)

Similar Documents

Publication Publication Date Title
EP3113466B1 (en) Method and device for warning
US11528354B2 (en) Personal emergency triggering, notification and communication for smartwatches
US11024152B2 (en) Systems and methods for managing an emergency situation
US10832697B2 (en) Systems and methods for managing an emergency situation
US20150358796A1 (en) Novel Alert Notification and Messaging System with Speech Recognition Capability
CN105898573B (en) Multimedia file playing method and device
CN107733872B (en) Information printing method and device
CN110737330A (en) Method and device for reminding abnormal travel and storage medium
CN106406175B (en) Door opening reminding method and device
CN110618783B (en) Text broadcasting method, device and medium
CN105472109A (en) Emergency contact person calling system and method
EP3163855B1 (en) Method and device for making call
CN106658754B (en) Method and device for recovering network connection
CN111181844A (en) Message processing method, device and medium
CN107734303B (en) Video identification method and device
CN106506808B (en) Method and device for prompting communication message
CN106550012B (en) Monitoring method of intelligent equipment and intelligent equipment
CN109521923B (en) Floating window control method and device and storage medium
CN108632391B (en) Information sharing method and device
CN111127846A (en) Door-knocking reminding method, door-knocking reminding device and electronic equipment
CN107677363B (en) Noise prompting method and intelligent terminal
CN106774902B (en) Application locking method and device
CN115909650A (en) Alarm method, alarm device, storage medium and electronic equipment
CN112217714B (en) Method, device, server, client, terminal and storage medium for deleting information in two directions in instant communication session
CN109144587B (en) Terminal control method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination