CN116543485A - Emergency help seeking method, system, electronic equipment and storage medium - Google Patents

Emergency help seeking method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN116543485A
CN116543485A CN202310712943.6A CN202310712943A CN116543485A CN 116543485 A CN116543485 A CN 116543485A CN 202310712943 A CN202310712943 A CN 202310712943A CN 116543485 A CN116543485 A CN 116543485A
Authority
CN
China
Prior art keywords
internet
things
distress
equipment
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310712943.6A
Other languages
Chinese (zh)
Inventor
练美英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smart Yunlian Information Technology Beijing Co ltd
Original Assignee
Smart Yunlian Information Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smart Yunlian Information Technology Beijing Co ltd filed Critical Smart Yunlian Information Technology Beijing Co ltd
Priority to CN202310712943.6A priority Critical patent/CN116543485A/en
Publication of CN116543485A publication Critical patent/CN116543485A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The application provides an emergency help seeking method, an emergency help seeking system, electronic equipment and a storage medium. The method comprises the following steps: receiving a first distress request sent by a distress device and used for requesting emergency rescue; generating a temporary password for starting the Internet of things equipment based on the first distress request; sending the temporary password and the identification information to a server; the identification information is used for identifying a distress person, distress equipment and/or Internet of things equipment, and can be used by the service end for acquiring a corresponding rescue plan; the rescue plan is used by the service end for executing first help seeking operation to the terminal equipment of the corresponding rescuer and providing the temporary password to the terminal equipment of the rescuer. According to the method, the intelligent door lock or the intelligent door is used for building the special life channel for emergency rescue, so that the rescue time can be obviously shortened, and the safety is high.

Description

Emergency help seeking method, system, electronic equipment and storage medium
Technical Field
The application relates to the technical field of internet of things, in particular to an emergency help seeking method, an emergency help seeking system, electronic equipment and a storage medium.
Background
With the increasing phenomenon of aging of population, the proportion of the aged population in the whole population structure is higher and higher, and the aged alone is more and more at home. Once the elderly are in danger of life-threatening emergency such as fall or sudden illness at home alone, how to quickly rescue is worth the problem of social widespread thinking.
Although some manufacturers developed elderly emergency callers, a help-seeking function was supported. However, in some very urgent situations, the elderly may lose the ability to open the door. Rescue workers come out of the door, and the door needs to be broken and disassembled, so that rescue time can be greatly delayed. Particularly, as the security level of the lock cylinder is higher and higher, the time for breaking and disassembling is longer and longer, and the emergency rescue is hindered.
Disclosure of Invention
In view of the foregoing problems in the prior art, the present application provides an emergency help seeking method, an emergency help seeking system, an electronic device and a computer readable storage medium, and the technical scheme adopted in the present application is as follows.
The first aspect of the application provides an emergency help seeking method, which is applied to Internet of things equipment, wherein the Internet of things equipment comprises an intelligent door lock or an intelligent door, and comprises the following steps:
receiving a first distress request sent by a distress device and used for requesting emergency rescue;
generating a temporary password for starting the internet of things equipment based on the first distress request;
the temporary password and the identification information are sent to a server; the identification information is used for identifying a distress person, distress equipment and/or Internet of things equipment, and can be used by the server to acquire a corresponding rescue plan; the rescue protocol is used by the server to execute a first distress operation to the terminal equipment of the corresponding rescuer, and the temporary password is provided for the terminal equipment of the rescuer.
In some embodiments, the generating, based on the first distress request, a temporary password for opening the internet of things device includes:
decrypting the first distress request based on the equipment key of the distress equipment to obtain an equipment identifier for identifying the distress equipment;
and generating the temporary password under the condition that the equipment identification passes verification.
In some embodiments, the sending the temporary password and the identification information to the server includes:
encrypting the temporary password, the equipment identifier, the anti-replay serial number and a first Internet of things identifier for identifying the Internet of things equipment through the Internet of things key of the Internet of things equipment to generate a second distress request;
sending the second help request and a second internet of things identifier for identifying the internet of things device to the server;
the second internet of things identifier is used by the server to acquire an internet of things key of the internet of things device, the second distress request is decrypted through the internet of things key, and the temporary password, the device identifier, the anti-replay serial number and the first internet of things identifier are acquired; the anti-replay serial number is used by the server to verify replay attack.
In some embodiments, the method further comprises:
responding to a first termination request of the internet of things equipment for executing unlocking operation or the request sent by the help seeking equipment for terminating emergency rescue, canceling the unlocking authority of the temporary password, and sending a second termination request to the server; the second termination request is used for requesting the server to terminate the first distress operation.
In some embodiments, the method further comprises:
based on the first help request, a second help seeking operation is executed on the environment space through the Internet of things equipment, wherein the second help seeking operation comprises light prompting through a light source on the Internet of things equipment, help seeking content displaying through a display unit of the Internet of things equipment and/or help seeking audio playing through the Internet of things equipment.
In some embodiments, the method further comprises:
acquiring a first rescue request for providing rescue for the second distress operation request;
based on the first rescue request, an unlocking request is sent to terminal equipment of the rescuer;
acquiring a temporary password fed back by the terminal equipment of the rescuer based on the unlocking request;
and executing unlocking operation under the condition that the temporary password passes verification.
The second aspect of the present application provides an emergency help seeking method, applied to a server, including:
receiving a temporary password and identification information sent by Internet of things equipment; the internet of things device comprises an intelligent door lock or an intelligent door; the temporary password is generated by the internet of things device in response to a first help seeking request sent by the help seeking device and used for requesting emergency rescue, and the temporary password is used for starting the internet of things device; the identification information is used for identifying the distress call person, the distress call equipment and/or the Internet of things equipment;
based on the identification information, a corresponding rescue plan is obtained; the rescue plan at least comprises a terminal identifier, wherein the terminal identifier is used for identifying terminal equipment of a rescuer;
and based on the terminal identification, executing a first distress operation to the terminal equipment of the rescuer, and providing the temporary password to the terminal equipment of the rescuer so as to request the rescuer to provide emergency rescue through the terminal equipment of the rescuer.
In some embodiments, the receiving the temporary password and the identification information sent by the internet of things device includes:
acquiring a second rescue request and a second internet identifier sent by the internet of things device;
Acquiring an Internet of things key of the Internet of things device based on the second Internet of things identifier;
and decrypting the second rescue request based on the Internet of things key, and acquiring the temporary password, the anti-replay serial number, the equipment identifier for identifying the help-seeking equipment and the first Internet of things identifier for identifying the Internet of things equipment.
In some embodiments, the acquiring the corresponding rescue plan based on the identification information includes:
verifying replay attack on the basis of the replay-preventing serial number, and verifying the first Internet of things identifier and the second Internet of things identifier;
and under the condition that replay attack is verified and passed, the first Internet of things identifier and the second Internet of things identifier are verified and passed, acquiring a corresponding rescue plan based on the equipment identifier and/or the first Internet of things identifier.
In some embodiments, the rescue protocol further includes distress information for recording a distress mode; the step of executing a first help seeking operation to the terminal equipment of the rescuer based on the terminal identification and providing the temporary password to the terminal equipment of the rescuer comprises the following steps:
based on the terminal identification, executing a first distress operation to the terminal equipment of the rescuer according to the distress mode of the distress information record, and providing the temporary password for the terminal equipment of the rescuer.
In some embodiments, the method further comprises:
acquiring a second termination request for requesting termination of emergency rescue, which is sent by the Internet of things equipment, wherein the second termination request carries the identification information;
and based on the identification information, terminating the first distress operation.
In some embodiments, the method further comprises:
and if a second termination request for requesting termination of emergency rescue is not received within a first time period after the first distress operation is performed to the terminal equipment, performing the first distress operation to the terminal equipment of another rescuer, and providing the temporary password to the terminal equipment of the other rescuer.
The third aspect of the application provides an emergency rescue system, which comprises a help seeking device and an Internet of things device, wherein the Internet of things device comprises an intelligent door lock or an intelligent door;
the help-seeking device is configured to: responding to a help-seeking trigger signal, and sending a first help-seeking request for requesting emergency rescue to the Internet of things equipment;
the internet of things device is configured to: generating a temporary password for starting the internet of things equipment based on the first distress request; the temporary password and the identification information are sent to a server; the identification information is used for identifying a distress person, distress equipment and/or Internet of things equipment, and can be used by the server to acquire a corresponding rescue plan; the rescue protocol is used by the server to execute a first distress operation to the terminal equipment of the corresponding rescuer, and the temporary password is provided for the terminal equipment of the rescuer.
In some embodiments, the emergency rescue system further comprises a terminal device configured to:
and responding to a first help seeking operation executed by the service end to the terminal equipment, and outputting help seeking content containing the temporary password so as to request a rescuer holding the terminal equipment to provide emergency rescue.
A fourth aspect of the present application provides an electronic device comprising at least a memory having a program stored thereon and a processor, which when executing the program on the memory, implements a method as described above.
A fifth aspect of the present application provides a computer-readable storage medium having stored therein computer-executable instructions that when executed implement a method as described above.
According to the emergency help seeking method, when a help seeking person is in an emergency, a first help seeking request can be sent to the Internet of things equipment through the help seeking equipment. The internet of things device can generate a temporary password for unlocking the intelligent door or the intelligent door lock based on the first help request, and the temporary password and identification information for identifying a help seeker, the help seeker and/or the internet of things device are sent to the server through the internet of things device. The service end obtains a rescue plan based on the identification information, executes first help seeking operation to terminal equipment of a corresponding rescuer based on the rescue plan, and provides a temporary password for the terminal equipment. The terminal equipment can respond to the first help seeking operation and output help seeking content containing the temporary password so as to request a rescuer holding the terminal equipment to provide emergency rescue. Therefore, after the rescuer arrives at the rescue site, the temporary password can be utilized to unlock the intelligent door lock or the intelligent door, the indoor space where the rescue seeker is located can be quickly accessed, emergency rescue is provided for the rescue seeker, and a special life channel is built for the emergency rescue through the intelligent door lock or the intelligent door, so that the rescue time can be remarkably shortened. Moreover, the temporary password is directly sent to the server by the intelligent door lock or the intelligent door, and is not forwarded by other internet of things equipment or mobile electronic equipment, so that the security is high.
Drawings
Fig. 1 is a system architecture diagram of a system architecture 100 to which an emergency rescue method according to an embodiment of the present application is applied;
FIG. 2 is a flow chart of an emergency help method according to an embodiment of the present application;
FIG. 3a is a flow chart of a portion of one embodiment of a method of emergency help according to an embodiment of the present application;
FIG. 3b is another partial flow chart of a particular embodiment of an emergency help method of an embodiment of the present application;
FIG. 4 is a flowchart of a binding operation between a terminal device and an Internet of things device;
FIG. 5 is a flow chart of a binding operation between a rescue device and an Internet of things device;
FIG. 6 is a flow chart for setting a rescue protocol;
fig. 7 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates an exemplary system architecture 100 to which the emergency rescue method according to the embodiments of the present application may be applied, and referring to fig. 1, the system architecture 100 includes help-seeking devices 111 and 112, an internet of things device 120, a server 130, an encryption device 131, and terminal devices 141 and 142.
The distress devices 111, 112 are provided for the distress, and the distress devices 111, 112 may be communicatively connected to the internet of things device 120. For example, the distress devices 111, 112 may be communicatively connected to the Internet of things device 120 via a wireless network such as Bluetooth, WIFI, sub-1GHz, zigBee, etc. Of course, the distress devices 111, 112 may also be connected to the server 130 through, for example, WIFI or NB-IoT. The distress devices 111, 112 may send a distress request to the internet of things device 120 when a distress person needs emergency assistance. A distress is understood to be a person in need of a distress, such as an elderly person, a minor, a patient, a pregnant woman or a disabled person, etc.
Alternatively, the help-seeking devices 111, 112 may be configured to be adapted to be carried with the help-seeking person. For example, the help seeking devices 111, 112 may be configured in a variety of configurations suitable for carrying about, such as a collar, a neck pendant, a bracelet, a key fob, etc.
Optionally, emergency call-for-help keys may be provided on the call-for-help devices 111, 112. In an emergency, the distress person may trigger an emergency distress key, and the distress devices 111, 112 may send a distress request to the internet of things device 120 in response to the emergency distress key being triggered.
Optionally, detection devices may also be provided on the distress devices 111, 112. The detection device may be used to detect vital signs of the distress, for example, to detect heart rate, blood pressure or body temperature of the distress, etc. The detection device may also be used to detect the movement status of the distress. The help-seeking devices 111, 112 may be configured to send a help-seeking request to the internet of things device 120 when it is determined that the help-seeking person needs emergency rescue in the event of an emergency condition based on the detection result of the detection device. For example, the help-seeking devices 111, 112 may determine that the help-seeking person is in an emergency condition when it is determined that the heart rate, blood pressure, body temperature, etc. of the help-seeking person are abnormal based on the vital sign detection result, and send a help-seeking request to the internet of things device 120. Also for example, the help-seeking devices 111, 112 may send a help-seeking request to the internet of things device 120 when it is determined that the help-seeking person is likely to fall based on the movement state detection result.
Optionally, the distress devices 111, 112 may further include an image capturing device, such as a camera, where the image capturing device is configured to capture an image of a target space, such as a living room, a kitchen, a bedroom, etc., and the distress devices 111, 112 may determine whether an emergency situation occurs to the distress person based on the image data captured by the image capturing device, and may send a distress request to the internet of things device 120 when it is determined that the emergency situation occurs to the distress person.
The internet of things device 120 may include a smart door lock or a smart door, and the internet of things device 120 may be capable of generating a temporary password for unlocking the smart door lock or the smart door. The internet of things device 120 may be communicatively connected with a server via a wireless or wired network, such as WIFI, NB-IoT, 4G network, or 5G network. The internet of things device 120 can interact with a server to receive or send information such as messages. For example, the internet of things device 120 may send a temporary password to the server or identification information for identifying the distress call, the distress call device, and/or the internet of things device. Optionally, the internet of things device 120 may further be provided with a display unit 121, a warning light, an audio output device, and the like. Taking the example that the internet of things device 120 includes an intelligent door lock, a display screen may be disposed on a lock body located outside the door.
The server 130 may include a server providing various services. For example, the server 130 may be configured to provide services such as binding, controlling, and unlocking for the internet of things device 120. The service end 130 may record rescue plans corresponding to the distress call, the distress call device and/or the internet of things device, and the service end 130 may also store identification information for identifying the distress call, the distress call device and/or the internet of things device in an associated manner. The server 130 may be hardware or software. When the server 130 is hardware, it may be implemented as a distributed server cluster formed by a plurality of servers, or may be implemented as a single server. When the server 130 is software, it may be implemented as a plurality of software or software modules (e.g., to provide distributed services), or may be implemented as a single software or software module.
Optionally, the server 130 may further be provided with an encryption machine 131, and the encryption machine 131 may store a key. The encryptor 131 may be used to encrypt, decrypt, sign or verify the interaction information of the server 130. Of course, in some cases, the functions of the encryptor 131 may also be performed by the server 130.
Terminal devices 141, 142 may be communicatively coupled to server 130, and terminal devices 141, 142 may also be communicatively coupled to internet of things device 120. Terminal devices 141, 142 may interact with server 130 to receive or transmit information. Terminal devices 141, 142 may also be in video or voice communication with server 130, etc., or with other possible devices via server 130, etc. For example, the terminal devices 141, 142 may receive a distress short message from the server 130, and the terminal devices 141, 142 may also answer a distress call sent by the server 130. Optionally, a client application, such as a smart door lock or a management tool for a smart door, etc., may also be installed on the terminal devices 141, 142. Terminal devices 141, 142 may receive and display push messages through clients.
Alternatively, terminal devices 141, 142 may include various electronic devices capable of interacting with server 130. For example, where the rescuer is a person, the terminal devices 141, 142 may include, but are not limited to, smartphones, smartwatches, smartbands, smartglasses, tablets, personal digital assistants, landline telephones, and the like. Where the rescuer is a social institution or community or the like, the terminal devices 141, 142 may include, but are not limited to, smartphones, tablets, notebooks, desktops, servers, landline telephones, and the like.
It should be noted that the numbers of the distress devices, the internet of things devices, the server, the encryptor and the terminal devices in fig. 1 are merely exemplary, and the system architecture 100 may include any number of the distress devices, the internet of things devices, the server, the encryptor and the terminal devices in practical application.
Fig. 2 is a flowchart of an emergency call-for-help method according to an embodiment of the present application, where the emergency call-for-help method according to an embodiment of the present application may specifically include the following steps.
S210, the help seeking device sends a first help seeking request for requesting emergency rescue to the Internet of things device.
Optionally, in response to a possible trigger form such as the distress person triggering the emergency rescue key, the distress device may generate or acquire a distress trigger signal, and send a first distress request to the internet of things device. The help seeking device can also monitor the state of the help seeker based on the movement state detection result and/or the vital sign detection result, and is triggered when the help seeker is determined to have an emergency, and sends a first help seeking request to the Internet of things device.
S220, the Internet of things device generates a temporary password for unlocking the intelligent door or the intelligent door lock based on the first help request.
Alternatively, the temporary password may be a one-time password, or may be a temporary password that is valid for a validity period. The internet of things equipment can be preset with a password algorithm, and a temporary password can be generated based on the password algorithm.
For example, the internet of things device may generate a time-based one-time password based on the timestamp through a cryptographic algorithm in response to obtaining the first distress request to obtain the timestamp.
Also for example, the distress device may obtain a timestamp in response to the distress trigger signal, and the first distress request may carry the timestamp. The internet of things device obtains the timestamp and may generate a time-based one-time password based on the timestamp.
It will be appreciated that the above-described temporary password generation is merely exemplary. In practical application, the internet of things device can generate the temporary password in various ways and by various algorithms, and the type of the temporary password and the type of the password algorithm are not limited here.
S230, the Internet of things device sends the temporary password and the identification information to the server. The identification information is used for identifying a distress call person, distress call equipment and/or Internet of things equipment.
Alternatively, the identification information may include personal information for identifying the distress call. Such as the name of the distress, the telephone, the home address, etc.
Alternatively, the identification information may include a device identification for identifying the distress device. The device identification includes, but is not limited to, an electronic serial number (RC-SN) of the help-seeking device, a cell phone number bound to the help-seeking device, an account name bound to the help-seeking device, and the like.
Optionally, the identification information may include an internet of things identification for identifying an internet of things device. The internet of things identifier includes, but is not limited to, an internet of things device number of the internet of things device, a mobile phone number bound to the internet of things device, an account name bound to the internet of things device, and the like. For example, where the internet of things device includes an intelligent door Lock, the internet of things identification may include a Lock number (Lock-SN) of the intelligent door Lock.
In some possible implementations, when the identification information includes one or more of the foregoing information, some or all of the one or more information may be used by the server to determine a unique corresponding rescue plan within a certain range.
S240, the server acquires the corresponding rescue plan based on the identification information.
Optionally, the service end may store the identification information and the rescue plan in association, and the rescue plan may be preset by the distress person, the rescue person or other authorized personnel through the terminal device or the internet of things device. The server may look up the rescue plan from the database based on the identification information. For example, the server may match the rescue protocol from the database based on at least one of the device number, the phone number, and the internet of things identification.
The rescue protocol includes at least a terminal identification for identifying a terminal device of the rescuer. It is understood that a rescuer may include a person, social entity, or community capable of providing emergency assistance to a rescuer. For example, a rescuer may include individuals such as relatives, friends, neighbors, etc. of a distress, and a rescuer may also include social institutions or communities such as a village committee, a resident committee, a street office, an emergency rescue agency, or a specialized rescue community.
The terminal identification may include various information capable of identifying the terminal device, such as a mobile phone number, a landline number, an electronic serial number of the terminal device, an IP address, a port number, and the like. In the case of a client installed on the terminal device, the terminal identification may also include the account name, account number, etc. of the account logged in on the client. For example, when the rescuer is set as a person such as a parent, a friend, or the like, the terminal identification may include a Mobile-number (Mobile-Num) or a Landline-Num. Where the rescuer is an emergency rescue agency, the terminal identification may include an emergency rescue telephone of the emergency rescue agency, such as 120, 999, 119, and so forth. When the terminal device is a server or a service system, the terminal identifier may also include an IP address and a port number of the server or the service system.
Optionally, the rescue protocol may further include distress information for recording distress modes including, but not limited to, a communication mode and a communication content of the first distress operation. Communication means include, but are not limited to, push messages, short messages, and/or voice communications. On the basis, the first help seeking operation comprises the step of sending help seeking push information, short messages and/or voice communication to the terminal equipment through the service end. The communication content comprises push content of push messages, short message content of short messages and/or voice content of voice communication, and the push content, the short message content and/or the voice content can comprise temporary passwords. For example, push content, text message content, or voice content may include: "distress personnel xxx, emergence emergency, need in time go to the door to rescue, address: xxxx, temporary unlocking password: xxxx. Of course, the push content, the short message content or the voice content can be flexibly set according to actual requirements, so long as the help-seeking requirements can be met.
S250, the service end executes a first help seeking operation to the terminal equipment of the rescuer based on the terminal identification, and provides the temporary password to the terminal equipment of the rescuer.
Optionally, in the case that the rescue plan includes the distress information for recording the distress mode, the first distress operation may be performed to the terminal device of the rescuer according to the distress mode recorded by the distress information based on the terminal identification and the distress message, and the temporary password may be provided to the terminal device of the rescuer. For example, according to the help seeking mode of the help seeking information record, the server may send voice communication and short message to the terminal device of the rescuer, or the server may send voice communication and push message to the terminal device of the rescuer, or the server may send voice communication, push message and short message to the terminal device of the rescuer.
It should be noted that, the communication manner and the communication content of the first distress operation are only exemplary, and the first distress operation should not be understood to be limited to the communication manner and the communication content. For example, in the case that the terminal device is a server or a service system of an emergency rescue agency, the service end may request to send a rescue request to the server or the service system of the emergency rescue agency based on a specific communication protocol, where the rescue request may carry a temporary password, an address of a distress call, a contact phone, a health record, and so on.
S260, the terminal equipment responds to the first help seeking operation and outputs help seeking content containing a temporary password so as to request a rescuer holding the terminal equipment to provide emergency rescue.
Optionally, the terminal device may play the voice content, the terminal device may also display the short message content of the short message, or the terminal device may also display the push message through the client. The voice content, the short message content and/or the push content may include a temporary password.
Optionally, the terminal device may also play the alarm audio in response to the first distress operation, display the prompt content such as SOS through the display unit of the terminal device, or turn on the light source of the terminal device in a specific manner, so as to attract the attention of the rescuer. For example, a flash of the terminal device is turned on and off at a specific frequency.
Alternatively, in the case that the terminal device is a server or a service system of the emergency rescue agency, the terminal device may notify emergency rescue personnel through the internal system. For example, rescue tasks are allocated to emergency rescue workers through an internal system, and related information such as temporary passwords, addresses of help seekers, contact phones and health records is shared to clients of the emergency rescue workers.
According to the emergency help seeking method, when a help seeking person is in an emergency, a first help seeking request can be sent to the Internet of things equipment through the help seeking equipment. The internet of things device can generate a temporary password for unlocking the intelligent door or the intelligent door lock based on the first help request, and the temporary password and identification information for identifying a help seeker, the help seeker and/or the internet of things device are sent to the server through the internet of things device. The service end obtains a rescue plan based on the identification information, executes first help seeking operation to terminal equipment of a corresponding rescuer based on the rescue plan, and provides a temporary password for the terminal equipment. The terminal device can respond to the first help seeking operation and output help seeking content containing a temporary password so as to request a rescuer holding the terminal device to provide emergency rescue. Therefore, after the rescuer arrives at the rescue site, the temporary password can be utilized to unlock the intelligent door lock or the intelligent door, the indoor space where the rescue seeker is located can be quickly accessed, emergency rescue is provided for the rescue seeker, and a special life channel is built for the emergency rescue through the intelligent door lock or the intelligent door, so that the rescue time can be remarkably shortened. Moreover, the temporary password is directly sent to the server by the intelligent door lock or the intelligent door, and is not forwarded by other internet of things equipment or mobile electronic equipment, so that the security is high.
In some embodiments, in conjunction with the illustration of fig. 3a, the distress device may obtain a device identification for identifying the distress device in response to the distress trigger signal; based on the device identification, a first distress request for requesting emergency rescue is sent to the Internet of things device. The internet of things device can verify the device identification, and under the condition that verification is passed, the first distress request is determined to be effective, and a temporary password is generated. Thus, illegal personnel can be prevented from disguising the help-seeking equipment and fraudulently getting the temporary password.
Alternatively, the device identification may include a device name, device number, device tag, etc. of the help-seeking device. The internet of things device can store the device identification of each distress device which is already bound with the internet of things device. Under the condition that the first distress request is obtained, the equipment identifier carried by the first distress request can be obtained, and the equipment identifier in the first distress request is matched with the equipment identifier stored in the Internet of things equipment. If the matching is successful, the equipment identification is determined to pass the verification, and if the matching is failed, the first distress request can be discarded or prompt information can be fed back to the distress equipment to prompt the distress equipment to fail.
Optionally, the device identifier of each distress device bound to the internet of things device may also be stored in the server. The internet of things device can also request the server to verify the device identifier, and determine whether to generate the temporary password based on a verification result fed back by the server.
In some embodiments, the help-seeking device may have its own device key (RC-K) and the Internet of things device may store the device key of the help-seeking device. The help seeking device can respond to the help seeking trigger signal to acquire a device identifier for identifying the help seeking device; and encrypting the equipment identifier based on the equipment key of the distress equipment to generate a first distress request.
The internet of things device receives the first distress request, and can decrypt the first distress request by using the stored device key to obtain the device identifier. Therefore, the communication safety between the distress equipment and the Internet of things equipment can be improved, illegal personnel can be further prevented from disguising the distress equipment to fraudulently fetch the temporary passwords, and the security of the user in the house is ensured while the life channel function of the intelligent door/intelligent door lock is realized.
Optionally, the distress device may send a clear device identifier and a first distress request to the internet of things device, where the first distress request includes the encrypted device identifier. The internet of things device may look up the saved corresponding device key based on the plaintext device identification to decrypt the encrypted device identification. The internet of things device may also sequentially attempt to decrypt the first distress request using the stored device key.
Alternatively, the device key may be a symmetric key or an asymmetric key. Under the condition that the equipment key is an asymmetric key, the help seeking equipment and the Internet of things equipment can respectively correspond to a private key and a public key which hold the asymmetric key.
In some embodiments, the identification information may include a device identification for identifying the distress device and an internet of things identification for identifying the internet of things device. The server can verify the equipment identifier and/or the Internet of things identifier, and under the condition that verification is passed, the rescue plan is obtained based on the equipment identifier and/or the Internet of things identifier. For example, the server may store the internet of things identifier, and the server may match the stored internet of things identifier with the received internet of things identifier, and if the matching is passed, determine that the physical network identifier passes the verification.
In some embodiments, the internet of things device may send the temporary password, the identification information, and the anti-replay serial number to the server. The server may verify whether playback impact behavior exists based on the anti-playback sequence number. And if the replay attack behavior verification is passed, acquiring a corresponding rescue plan based on the identification information. If the replay attack action fails to verify, prompt information can be fed back to the Internet of things equipment or the temporary password, the identification information and the anti-replay serial number can be discarded.
Alternatively, the anti-replay serial number may be a random number. The server side can acquire the previous random number or the random numbers sent by the Internet of things equipment based on the identification information, if the previous random number or the random numbers are the same as the current random number, the verification is determined to be failed, and if the random numbers are different, the verification is determined to be passed.
Optionally, the anti-replay serial number may be generated by a distress device or may be generated by an internet of things device. For example, the distress device may generate a random number (R1) in response to the distress trigger signal; and encrypting the device identifier and the random number (R1) based on the device key of the distress device, and generating a first distress request.
In some embodiments, in cooperation with the illustration of fig. 3b, the internet of things device may encrypt the temporary password and the identification information with the internet of things key to generate a second distress request; the internet of things device can send a second distress request and an internet of things identifier for identifying the internet of things device to the server. The server side can acquire the Internet of things key of the Internet of things device based on the Internet of things identifier, decrypt the second distress request based on the Internet of things key and acquire the temporary password identifier information. Therefore, an encryption communication link can be established between the Internet of things equipment and the server, and the communication safety is ensured.
Optionally, the internet of things key may be a symmetric key or an asymmetric key. In the case where the internet of things key is an asymmetric key, the internet of things device may generate the second distress request based on the identification information and the temporary key encrypted by one of the public key and the private key. The server may decrypt the second distress request based on the other of the public key and the private key.
Optionally, the internet of things key may be preset in the intelligent door or the intelligent door lock when the intelligent door or the intelligent door lock leaves the factory. For example, the public key and/or the private key may be preset in the smart door or the smart door lock. Optionally, in the case that the server is equipped with an encryptor, the public key and/or the private key of the internet of things device may be held by the encryptor, so as to ensure the security of the key.
The internet of things devices such as the intelligent door lock and the intelligent door use the security chip as a main control or trusted module, and factory leaving all have default factory leaving digital certificates. The factory digital certificate comprises Lock-K, wherein the Lock-K is a symmetric key or a pair of asymmetric keys which are negotiated in advance by the server and the Internet of things equipment, can be used for guaranteeing the credibility of the identity of the Internet of things equipment, and provides basic guarantee for the safety and credibility of the follow-up steps. Under the condition of adopting an asymmetric key, the server side generates a pair of public and private keys Lock-Kp and Lock-Kv for the Internet of things equipment. The public key Lock-Kp is stored on the server, and the private key Lock-Kv is issued to the Internet of things equipment in a non-network transmission mode.
With reference to fig. 3a and 3b, in some embodiments, the internet of things device may generate a second distress request based on the internet of things key of the internet of things device, the encrypted temporary password, the device identifier, the anti-replay serial number, and the first internet of things identifier for identifying the internet of things device; and sending a second distress request and a second internet-of-things identifier for identifying the internet-of-things device to the server.
The server side can acquire the internet of things key of the internet of things device based on the second internet of things identifier, decrypt the second distress request through the internet of things key, and acquire the temporary password, the device identifier, the anti-replay serial number and the first internet of things identifier.
The server may also verify replay attack based on the anti-replay sequence number, and the server may also verify whether the first internet of things identifier and the second internet of things identifier are consistent. Under the condition that replay attack verification passes and the first Internet of things identifier and the second Internet of things identifier pass, the server side can acquire a corresponding rescue plan based on the equipment identifier and/or the first Internet of things identifier. Therefore, not only can replay attack be verified, but also the identity of the Internet of things equipment can be verified, and the method has higher safety.
Optionally, the second internet of things identifier may include a lock end number of the intelligent door or the intelligent door lock, the server may obtain a lock end key based on the lock end number, and a mobile phone number bound to the intelligent door or the intelligent door lock, decrypt the second distress request based on the lock end key, and search for a rescue plan based on the mobile phone number, the device number, and the lock end number.
In some embodiments, the method further comprises: the internet of things device executes a second help seeking operation on the environment space based on the first help seeking request. The second help seeking operation comprises light prompt through a light source on the Internet of things device, help seeking content display through a display unit of the Internet of things device and/or help seeking audio playing through the Internet of things device. The environment space is a space outside the intelligent door or the door provided with the intelligent door lock. Such as corridor space or building exterior space.
Optionally, an indicator light or a display screen may be provided on the outside of the intelligent door or on the lock body of the intelligent door lock located outside the door, and the display screen may have a background light source. The intelligent door or the intelligent door lock can utilize the indicator light or the background light source as the warning light, and the indicator light or the background light source can be started in a specific mode to carry out lamplight prompt on the environment space. For example, the indicator light or the backlight may be controlled to emit red light and turned on and off at a specific frequency to draw attention from a pedestrian in the ambient space.
Optionally, a display screen may be provided on the outside of the intelligent door or on the lock body of the intelligent door lock located outside the door, where the intelligent door or the intelligent door lock may control the display screen to display help seeking contents such as SOS, emergency help seeking, etc.
Optionally, an audio playing device, such as a speaker, may also be provided on the smart door or smart door lock. The intelligent door or the intelligent door lock can control the loudspeaker to play the distress audio. For example, audio such as "emergency help" and "emergency help" can be played through a speaker.
Optionally, the intelligent door lock can also detect whether the pedestrian passes through the environment space through the sensor, and execute the second help seeking operation when the pedestrian passes through the environment space. For example, the smart door lock may detect whether a pedestrian passes through the environmental space through an infrared sensor or a sound sensor, and if so, may perform a second help-seeking operation.
In particular, when a pedestrian notices a second help seeking operation of the intelligent door or the intelligent door lock in the environment space and hopes to provide emergency rescue, the pedestrian usually draws attention of the help seeker through a mode of knocking the door or shouting. At this time, if the SOS person is conscious, the SOS device can send unlocking instructions to the intelligent door or the intelligent door lock so as to unlock the intelligent door or the intelligent door lock. In many cases, however, the help seeker may lose performance or consciousness, and the pedestrian outside the door still faces the problem of needing to break the door even if the pedestrian wants to provide rescue.
In order to overcome the technical problems, the emergency help-seeking method according to the embodiment of the application further comprises the following steps: the method comprises the steps that the Internet of things equipment obtains a first rescue request for providing rescue for a second help-seeking operation request; based on the first rescue request, an unlocking request is sent to terminal equipment of a rescuer; acquiring a temporary password fed back by terminal equipment of a rescuer based on an unlocking request; in the case where the temporary password authentication passes, an unlocking operation is performed.
Optionally, the first rescue request may include a touch instruction, a key instruction, a voice instruction, or the like acquired after the second distress operation is performed. After the internet of things device executes the second help seeking operation, if a touch instruction, a key instruction or a voice instruction is acquired, the situation that pedestrians exist in the environment space is indicated, the pedestrians notice the second help seeking operation, and an unlocking request can be sent to terminal equipment of a rescuer.
Alternatively, the unlocking request may include voice communication, push information, or short message. For example, the smart door or smart door lock may send a voice call or a video call to the terminal device so that pedestrians outside the door can communicate with a rescuer who holds a temporary password, expressing a desire to provide rescue. If the rescuer agrees to provide emergency rescue for pedestrians, the temporary password can be fed back through the terminal equipment so as to instruct the intelligent door or the intelligent door lock to execute unlocking operation.
Optionally, the intelligent door or the intelligent door lock may also send an unlocking request to the terminal device with unlocking authority based on the first rescue request. The intelligent door or the intelligent door lock can respond to an unlocking instruction sent by the terminal equipment with unlocking authority to execute unlocking operation. For example, the smart door or the smart door lock may send a voice call or a video call to the smart phone having the unlocking authority in response to the first rescue request, and if the user agrees to unlock, the operable terminal device sends an unlocking instruction to the smart door or the smart door lock to instruct the smart door or the smart door lock to perform the unlocking operation.
By adopting the scheme, the internet of things equipment such as the help seeking equipment, the intelligent door lock/the intelligent door and the like are networked, so that a faster and more convenient local emergency rescue channel and a remote emergency rescue channel are built. The intelligent door lock/the front door display unit of the intelligent door is used for displaying and prompting voice, and the like, so that local help seeking is carried out on personnel passing outside the door, and the time for a person seeking help to obtain rescue is further shortened.
In some embodiments, the method further comprises: responding to a first termination request sent by the Internet of things equipment for executing unlocking operation or the help seeking equipment for requesting termination of emergency rescue, and the Internet of things equipment withdraws the unlocking authority of the temporary password. Optionally, in the foregoing case, the internet of things device may further send a second termination request to the server; the second termination request is used for requesting the server to terminate the first distress operation. The server may terminate the first distress operation based on the identification information carried by the second termination request. The availability and/or the effective period of the temporary password can be timely cancelled by adopting the mode, convenience is provided for emergency rescue, and the safety of the person seeking help in the home is further ensured.
For example, when a rescuer arrives at a rescue scene, a temporary password is entered into the smart door or smart door lock. The intelligent door or the intelligent door lock acquires the temporary password, and the unlocking operation is executed under the condition that the temporary password passes verification. Then, the intelligent door or the intelligent door lock can automatically withdraw the unlocking authority of the temporary key, and a second termination request is sent to the server. The server side can mark the state of the help seeking operation as completed, and can also send notification information to the terminal equipment to inform the terminal equipment that the help seeker has obtained rescue or the emergency has been released.
Also for example, in the case that the SOS is conscious, the SOS can also send an unlocking instruction to the intelligent door or the intelligent door lock through the SOS equipment, the intelligent door or the intelligent door lock can respond to the unlocking instruction to execute the unlocking operation, the unlocking authority of the temporary password is withdrawn, and a second termination request is sent to the server.
For another example, in the case that the emergency situation of the distress call is relieved, if the distress call is taken by the distress call person by himself and the health situation is improved, or an emergency call is dialed by the distress call person by himself, or rescue is obtained by other means, the distress call person can operate the distress call device to send a first termination request to the internet of things device to request termination of emergency rescue.
In some embodiments, the internet of things device may generate a second termination request based on the internet of things key encrypting the first internet of things identifier, the device identifier, and the anti-replay serial number, and send the second internet of things identifier and the second termination request to the server.
The server side can acquire the internet of things key of the internet of things device based on the second internet of things identifier, decrypt the second termination request through the internet of things key, and acquire the first internet of things identifier, the device identifier and the anti-replay serial number.
The server can verify the first internet of things identifier and the second internet of things identifier again, and the server can verify whether the replay-preventing serial number received this time is consistent with the replay-preventing serial number triggering the first distress operation. If both the first distress operation and the second distress operation are verified, the state of the first distress operation can be marked as completed or rescued. The server side can also send notification information to the terminal equipment, and the terminal equipment is used for notifying the rescuer that the distress person needing emergency rescue has obtained rescue or the emergency condition has been relieved.
In some embodiments, the method further comprises: if a second termination request for requesting termination of emergency rescue is not received within a first time period after the service end performs the first distress operation to the terminal device, the service end performs the first distress operation to the terminal device of another rescuer, and provides a temporary password to the terminal device of the other rescuer.
If a second termination request for requesting termination of emergency rescue is still not received within a first time period after the first distress operation is performed, it is indicated that the distress person has not obtained a valid rescue for a relatively long time. The first distress operation may be performed to a terminal device of another rescuer and the temporary password may be provided to the terminal device of the other rescuer. For example, a push message, a short message, and/or a voice communication, etc. may be sent to the terminal device of the other rescuer.
Optionally, the terminal identification of the terminal device of the plurality of rescuers may be recorded in the rescue protocol, and the plurality of rescuers may have priority. The server side can sequentially execute the first help seeking operation to the terminal equipment of each rescuer based on the priority. Alternatively, the terminal identification for identifying the terminal device of the other rescuer may also not be recorded in the rescue protocol. For example, if the emergency is not released within the first time period after the terminal device performs the first distress operation in the record in the rescue protocol, the server may call 120 or 999 to request the emergency center to provide emergency rescue, and provide the temporary password to the emergency center, so as to ensure the life security of the distress call.
In some embodiments, the internet of things device may also store a rescue plan or a terminal identification of the terminal device of the rescuer. Under the condition that the physical network device acquires the first distress request, whether the terminal device of the rescuer has unlocking authority can be determined based on the terminal identification of the terminal device for identifying the rescuer. For example, the mobile phone number of the rescuer can be matched with the mobile phone number bound with the internet of things device, and if the matching is successful, the terminal device of the rescuer is determined to have unlocking authority. At this time, the internet of things device may request the rescuer holding the terminal device to provide emergency rescue by sending a third distress request to the terminal device through the server or directly based on the rescue plan or the terminal identifier of the terminal device for identifying the rescuer. Thus, unnecessary temporary password transmission operation can be reduced, and the intelligent door lock or the safety of the intelligent door can be improved.
After the intelligent door or the intelligent door lock is installed, a user can bind the intelligent door or the intelligent door with terminal equipment such as a smart phone, a tablet personal computer and the like. The terminal device may be a terminal device held by the rescuer, or may be a terminal device held by another user. Fig. 4 is a flowchart of a binding operation between a terminal device and an internet of things device, where the terminal device and the internet of things device may be bound by the following steps.
S301, the terminal equipment and the Internet of things equipment establish communication connection. For example, the smart phone may establish a wireless communication connection with the smart door or the smart door lock by bluetooth, WIFI, softAP, or the like.
S302, the terminal equipment sends a first binding request to the Internet of things equipment, wherein the first binding request can carry a terminal identifier of the terminal equipment. For example, the first binding request may carry a cell phone number of the smart phone.
S303, the Internet of things device can feed back the Internet of things identification to the terminal device based on the first binding request. For example, an electronic Serial Number (SN) of the smart door or smart door lock may be fed back to the smart phone.
S304, the Internet of things device can generate a second binding request based on the Internet of things key encryption terminal identifier and the Internet of things identifier of the Internet of things device, and the Internet of things identifier and the second binding request are sent to the server.
S305, the terminal equipment can respond to the acquired Internet of things identifier fed back by the Internet of things equipment and send a third binding request to the server, wherein the third binding request can carry the terminal identifier and the Internet of things identifier.
S306, the server can verify the Internet of things identification under the condition that the second binding request and the third binding request are received.
For example, when the smart door or the smart door lock leaves the factory, an electronic Serial Number (SN) of the smart door or the smart door lock may be entered into the server. The server can match the electronic serial number synchronously sent with the second binding request with the electronic serial number stored by the server. If the corresponding electronic serial number can be matched in the database of the server side, the verification is determined to pass.
S307, under the condition that the identification verification of the Internet of things passes, the server obtains the key of the Internet of things device based on the identification of the Internet of things. Alternatively, the physical network key may be a symmetric key, or may be a public key or a private key in an asymmetric key.
S308, decrypting the second binding request by the Internet of things key to obtain decrypted data.
S309, the server verifies whether the decryption data is consistent with the third binding request, if so, S310 is executed, and if not, prompt information is fed back to the terminal equipment and/or the Internet of things equipment to prompt that the binding is failed.
S310, the service end binds the terminal equipment and the Internet of things equipment based on the terminal identification and the Internet of things identification. For example, binding relationship information of the terminal device and the internet of things device can be constructed, and the terminal identifier and the internet of things identifier are stored in an associated mode.
S311, the server side sends notification information to the terminal equipment and the Internet of things equipment respectively, and the terminal equipment and the Internet of things equipment are notified of successful binding.
After the intelligent door or the intelligent door lock is installed, the help seeking equipment can be bound with the intelligent door or the intelligent door lock. Fig. 5 is a flowchart of a binding operation between a rescue device and an internet of things device, which may be bound by the following steps.
S401, communication connection is established between the distress device and the Internet of things device. For example, the help seeking device may establish a wireless communication connection with the smart door or the smart door lock by means of bluetooth, sub-1ghz, zigbee, or the like.
S402, the help seeking device sends a device identifier for identifying the help seeking device to the Internet of things device.
S403, the Internet of things device generates a device key of the distress device based on the device identification. For example, the smart door or smart door lock may generate a device key based on a key algorithm. The device key may be a symmetric key or an asymmetric key.
S404, the Internet of things equipment feeds back an Internet of things identification for identifying the Internet of things equipment and an equipment key to the help seeking equipment. The internet of things device can also send the internet of things identifier and the device identifier to the server, so that the server can determine the binding relationship between the internet of things device and the help seeking device.
S405, the distress device associates a storage device key and an Internet of things identifier.
Thus, the binding operation of the distress device and the Internet of things device is completed. In practical application, one Internet of things device can bind one or more distress devices. For example, in the case where there are a plurality of elderly people at home, help-seeking devices may be provided for the individual elderly people, respectively.
Under the condition that the terminal equipment and the help seeking equipment of the user are bound with the Internet of things equipment, a rescue plan can be set through the terminal equipment of the user. It should be noted that the user may be a distress, a rescuer, or other users. Fig. 6 is a flowchart of setting a rescue plan, which a user's terminal device can set by the following steps.
S501, a terminal device of a user sends a setting request for setting a rescue plan to a server. The setting request may carry a device identifier of the terminal device.
S502, the terminal equipment of the user obtains a setting interface fed back by the service end based on the setting request, wherein the setting interface comprises an Internet of things identifier of the Internet of things equipment bound with the terminal equipment and an equipment identifier of the distress equipment bound with the Internet of things equipment.
S503, the user selects the equipment identifier of any help-seeking equipment through the terminal equipment, and can input the rescue plan of the help-seeking equipment.
For example, the communication means may include push messages, short messages, and/or instant voice calls, and the communication content may include: "distress personnel xxx, emergence emergency, need in time go to the door to rescue, address: xxxx; temporary unlocking password: xxxx.
S504, the terminal equipment of the user sends the rescue plan to the server, and the rescue plan, the equipment identifier, the Internet of things identifier and the terminal identifier are stored in an associated mode through the server.
Referring to fig. 1, the embodiment of the application further provides an emergency rescue system, which includes help-seeking devices 111 and 112 and an internet of things device 120, wherein the internet of things device 120 includes an intelligent door lock or an intelligent door.
The distress devices 111, 112 are configured to: in response to the distress trigger signal, a first distress request for requesting emergency assistance is sent to the internet of things device 120.
The internet of things device 120 is configured to: generating a temporary password for starting the internet of things device 120 based on the first distress request; sending the temporary password and the identification information to the server 130; the identification information is used for identifying the distress person, the distress devices 111 and 112 and/or the internet of things device 120, and can be used by the service end 130 to obtain a corresponding rescue plan; the rescue protocol is used by the service 130 to perform a first distress operation to the terminal devices 141, 142 of the respective rescuers and to provide a temporary password to the terminal devices 141, 142 of the rescuers.
Optionally, the emergency rescue system may further include a service end 130, where the service end 130 is configured to: acquiring a corresponding rescue plan based on the identification information; the first distress operation is performed to the terminal devices 141, 142 of the respective rescuers based on the rescue protocol and the temporary password is provided to the terminal devices 141, 142 of the rescuers.
In some embodiments, the emergency rescue system further includes terminal devices 141, 142, terminal devices 141, 142 configured to: in response to the first distress operation performed by the server 130 to the terminal devices 141, 142, distress content including a temporary password is output to request a rescuer holding the terminal devices 141, 142 to provide emergency rescue.
Referring to fig. 7, the embodiment of the present application further provides an electronic device, which at least includes a memory 601 and a processor 602, where the memory 601 stores a program, and the processor 602 implements some or all of the steps in the emergency rescue method according to any of the embodiments above when executing the program on the memory 601.
Embodiments of the present application also provide a computer-readable storage medium having stored therein computer-executable instructions that, when executed in the computer-readable storage medium, implement some or all of the steps of the method of any of the embodiments above.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, an electronic device, a computer-readable storage medium, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied therein. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
The processor may be a general purpose processor, a digital signal processor, an application-specific integrated circuit (ASIC), a programmable logic device (programmable logic device, PLD), or a combination thereof. The PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), general-purpose array logic (generic array logic, GAL) or any combination thereof. The general purpose processor may be a microprocessor or any conventional processor or the like.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
The readable storage medium may be a magnetic disk, an optical disk, a DVD, a USB, a read-only memory (ROM), a random-access memory (RAM), etc., and the specific storage medium form is not limited in this application.
The above embodiments are only exemplary embodiments of the present application and are not intended to limit the present application, the scope of which is defined by the claims. Various modifications and equivalent arrangements may be made to the present application by those skilled in the art, which modifications and equivalents are also considered to be within the scope of the present application.

Claims (16)

1. The utility model provides an urgent SOS method which characterized in that is applied to thing networking equipment, thing networking equipment includes intelligent lock or intelligent door, includes:
receiving a first distress request sent by a distress device and used for requesting emergency rescue;
generating a temporary password for starting the internet of things equipment based on the first distress request;
the temporary password and the identification information are sent to a server; the identification information is used for identifying a distress person, distress equipment and/or Internet of things equipment, and can be used by the server to acquire a corresponding rescue plan; the rescue protocol is used by the server to execute a first distress operation to the terminal equipment of the corresponding rescuer, and the temporary password is provided for the terminal equipment of the rescuer.
2. The method of claim 1, wherein the generating a temporary password for turning on the internet of things device based on the first distress request comprises:
decrypting the first distress request based on the equipment key of the distress equipment to obtain an equipment identifier for identifying the distress equipment;
and generating the temporary password under the condition that the equipment identification passes verification.
3. The method of claim 2, wherein the sending the temporary password and the identification information to the server comprises:
encrypting the temporary password, the equipment identifier, the anti-replay serial number and a first Internet of things identifier for identifying the Internet of things equipment through the Internet of things key of the Internet of things equipment to generate a second distress request;
sending the second help request and a second internet of things identifier for identifying the internet of things device to the server;
the second internet of things identifier is used by the server to acquire an internet of things key of the internet of things device, the second distress request is decrypted through the internet of things key, and the temporary password, the device identifier, the anti-replay serial number and the first internet of things identifier are acquired; the anti-replay serial number is used by the server to verify replay attack.
4. The method according to claim 1, wherein the method further comprises:
responding to a first termination request of the internet of things equipment for executing unlocking operation or the request sent by the help seeking equipment for terminating emergency rescue, canceling the unlocking authority of the temporary password, and sending a second termination request to the server; the second termination request is used for requesting the server to terminate the first distress operation.
5. The method according to claim 1, wherein the method further comprises:
based on the first help request, a second help seeking operation is executed on the environment space through the Internet of things equipment, wherein the second help seeking operation comprises light prompting through a light source on the Internet of things equipment, help seeking content displaying through a display unit of the Internet of things equipment and/or help seeking audio playing through the Internet of things equipment.
6. The method of claim 5, wherein the method further comprises:
acquiring a first rescue request for providing rescue for the second distress operation request;
based on the first rescue request, an unlocking request is sent to terminal equipment of the rescuer;
acquiring a temporary password fed back by the terminal equipment of the rescuer based on the unlocking request;
and executing unlocking operation under the condition that the temporary password passes verification.
7. The emergency help seeking method is characterized by being applied to a server and comprising the following steps:
receiving a temporary password and identification information sent by Internet of things equipment; the internet of things device comprises an intelligent door lock or an intelligent door; the temporary password is generated by the internet of things device in response to a first help seeking request sent by the help seeking device and used for requesting emergency rescue, and the temporary password is used for starting the internet of things device; the identification information is used for identifying the distress call person, the distress call equipment and/or the Internet of things equipment;
Based on the identification information, a corresponding rescue plan is obtained; the rescue plan at least comprises a terminal identifier, wherein the terminal identifier is used for identifying terminal equipment of a rescuer;
and based on the terminal identification, executing a first distress operation to the terminal equipment of the rescuer, and providing the temporary password to the terminal equipment of the rescuer so as to request the rescuer to provide emergency rescue through the terminal equipment of the rescuer.
8. The method of claim 7, wherein the receiving the temporary password and the identification information sent by the internet of things device comprises:
acquiring a second rescue request and a second internet identifier sent by the internet of things device;
acquiring an Internet of things key of the Internet of things device based on the second Internet of things identifier;
and decrypting the second rescue request based on the Internet of things key, and acquiring the temporary password, the anti-replay serial number, the equipment identifier for identifying the help-seeking equipment and the first Internet of things identifier for identifying the Internet of things equipment.
9. The method of claim 8, wherein the acquiring the corresponding rescue protocol based on the identification information comprises:
Verifying replay attack on the basis of the replay-preventing serial number, and verifying the first Internet of things identifier and the second Internet of things identifier;
and under the condition that replay attack is verified and passed, the first Internet of things identifier and the second Internet of things identifier are verified and passed, acquiring a corresponding rescue plan based on the equipment identifier and/or the first Internet of things identifier.
10. The method of claim 8, wherein the rescue protocol further includes distress information for recording a distress mode; the step of executing a first help seeking operation to the terminal equipment of the rescuer based on the terminal identification and providing the temporary password to the terminal equipment of the rescuer comprises the following steps:
based on the terminal identification, executing a first distress operation to the terminal equipment of the rescuer according to the distress mode of the distress information record, and providing the temporary password for the terminal equipment of the rescuer.
11. The method of claim 7, wherein the method further comprises:
acquiring a second termination request for requesting termination of emergency rescue, which is sent by the Internet of things equipment, wherein the second termination request carries the identification information;
And based on the identification information, terminating the first distress operation.
12. The method of claim 7, wherein the method further comprises:
and if a second termination request for requesting termination of emergency rescue is not received within a first time period after the first distress operation is performed to the terminal equipment, performing the first distress operation to the terminal equipment of another rescuer, and providing the temporary password to the terminal equipment of the other rescuer.
13. The emergency rescue system is characterized by comprising a help seeking device and an Internet of things device, wherein the Internet of things device comprises an intelligent door lock or an intelligent door;
the help-seeking device is configured to: responding to a help-seeking trigger signal, and sending a first help-seeking request for requesting emergency rescue to the Internet of things equipment;
the internet of things device is configured to: generating a temporary password for starting the internet of things equipment based on the first distress request; the temporary password and the identification information are sent to a server; the identification information is used for identifying a distress person, distress equipment and/or Internet of things equipment, and can be used by the server to acquire a corresponding rescue plan; the rescue protocol is used by the server to execute a first distress operation to the terminal equipment of the corresponding rescuer, and the temporary password is provided for the terminal equipment of the rescuer.
14. The emergency rescue system of claim 13, further comprising a terminal device configured to:
and responding to a first help seeking operation executed by the service end to the terminal equipment, and outputting help seeking content containing the temporary password so as to request a rescuer holding the terminal equipment to provide emergency rescue.
15. An electronic device comprising at least a memory and a processor, the memory having a program stored thereon, characterized in that the processor, when executing the program on the memory, implements the method of any of claims 1 to 6 or implements the method of any of claims 7 to 12.
16. A computer readable storage medium having stored therein computer executable instructions, wherein the computer executable instructions in the computer readable storage medium when executed implement the method of any one of claims 1 to 6 or the method of any one of claims 7 to 12.
CN202310712943.6A 2023-06-15 2023-06-15 Emergency help seeking method, system, electronic equipment and storage medium Pending CN116543485A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310712943.6A CN116543485A (en) 2023-06-15 2023-06-15 Emergency help seeking method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310712943.6A CN116543485A (en) 2023-06-15 2023-06-15 Emergency help seeking method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116543485A true CN116543485A (en) 2023-08-04

Family

ID=87443753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310712943.6A Pending CN116543485A (en) 2023-06-15 2023-06-15 Emergency help seeking method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116543485A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055235A (en) * 2017-11-01 2018-05-18 华中科技大学 A kind of control method of smart lock, relevant device and system
CN108280911A (en) * 2018-02-05 2018-07-13 罗超凡 The elderly's intelligent medical monitor system based on Internet of Things
CN110084932A (en) * 2019-04-23 2019-08-02 上海救要救信息科技有限公司 A kind of rescue mode and equipment
CN110992532A (en) * 2019-11-29 2020-04-10 深圳市云天智能终端有限公司 Temporary authorized unlocking method and system for intelligent door lock
CN111815822A (en) * 2020-07-20 2020-10-23 中国联合网络通信集团有限公司 Unlocking method, terminal and intelligent door lock
CN112116777A (en) * 2020-09-25 2020-12-22 上海海事大学 Intelligent door lock system
CN112330855A (en) * 2020-10-15 2021-02-05 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN112396727A (en) * 2019-07-30 2021-02-23 广州泽塔软件科技有限公司 Response method and system of first-aid request and terminal equipment
CN114697897A (en) * 2020-12-14 2022-07-01 天津熵行科技有限公司 Emergency rescue method based on family health monitoring
CN115766281A (en) * 2022-12-09 2023-03-07 北京深盾科技股份有限公司 Method, system, electronic device and storage medium for preventing replay attack

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055235A (en) * 2017-11-01 2018-05-18 华中科技大学 A kind of control method of smart lock, relevant device and system
CN108280911A (en) * 2018-02-05 2018-07-13 罗超凡 The elderly's intelligent medical monitor system based on Internet of Things
CN110084932A (en) * 2019-04-23 2019-08-02 上海救要救信息科技有限公司 A kind of rescue mode and equipment
CN112396727A (en) * 2019-07-30 2021-02-23 广州泽塔软件科技有限公司 Response method and system of first-aid request and terminal equipment
CN110992532A (en) * 2019-11-29 2020-04-10 深圳市云天智能终端有限公司 Temporary authorized unlocking method and system for intelligent door lock
CN111815822A (en) * 2020-07-20 2020-10-23 中国联合网络通信集团有限公司 Unlocking method, terminal and intelligent door lock
CN112116777A (en) * 2020-09-25 2020-12-22 上海海事大学 Intelligent door lock system
CN112330855A (en) * 2020-10-15 2021-02-05 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN114697897A (en) * 2020-12-14 2022-07-01 天津熵行科技有限公司 Emergency rescue method based on family health monitoring
CN115766281A (en) * 2022-12-09 2023-03-07 北京深盾科技股份有限公司 Method, system, electronic device and storage medium for preventing replay attack

Similar Documents

Publication Publication Date Title
US11132877B2 (en) Doorbell communities
US9230424B1 (en) Doorbell communities
JP4874266B2 (en) Alarm system including alarm mobile terminal and alarm server
JP2020519208A (en) Secure communication method and smart lock system based on the method
US11651668B2 (en) Doorbell communities
KR20180010204A (en) DIY monitoring device and method
CN114374567A (en) Accessory communication control
US20130329047A1 (en) Escort security surveillance system
US10068077B2 (en) False alarm avoidance
US20210351920A1 (en) Secure communication method and smart lock system based thereof
US11651665B2 (en) Doorbell communities
JP2022528359A (en) Remote management of devices using blockchain and DICE-RIoT
CN110084932A (en) A kind of rescue mode and equipment
KR20100110203A (en) Emergency situation message system and the method which use the wireless communication terminal
EP3139564A1 (en) Encryption coding module
US11750514B1 (en) Connectivity candidate filtering
CN116543485A (en) Emergency help seeking method, system, electronic equipment and storage medium
Zhan et al. Authentication using multi-level social networks
WO2015047166A1 (en) A telecare system and an electronic lock device for use therein, and an associated method for monitoring attendance to a telecare alarm event in a telecare system
US20170011611A1 (en) System and method for alerting a user
JPH11234225A (en) Information communication station, information terminal and information communication system
US11979616B1 (en) Managing remote access to image capture devices
CN109104361A (en) Instant communicating method, device, electronic equipment and storage medium
US20230351041A1 (en) Methods and systems for managing personal data associated with image processing
US10970993B2 (en) Method for managing the assistance to a person in response to the emission of an alert

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination