TW202037195A - Block chain-based smart alarm method and apparatus, and electronic device - Google Patents

Block chain-based smart alarm method and apparatus, and electronic device Download PDF

Info

Publication number
TW202037195A
TW202037195A TW108133588A TW108133588A TW202037195A TW 202037195 A TW202037195 A TW 202037195A TW 108133588 A TW108133588 A TW 108133588A TW 108133588 A TW108133588 A TW 108133588A TW 202037195 A TW202037195 A TW 202037195A
Authority
TW
Taiwan
Prior art keywords
confirmation message
user equipment
user
patent application
smart contract
Prior art date
Application number
TW108133588A
Other languages
Chinese (zh)
Other versions
TWI711319B (en
Inventor
栗志果
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202037195A publication Critical patent/TW202037195A/en
Application granted granted Critical
Publication of TWI711319B publication Critical patent/TWI711319B/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/016Personal emergency signalling and security systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Emergency Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A block chain-based smart alarm method and apparatus, and an electronic device, being applied to a block chain node. The block chain-based smart alarm method comprises: receiving a safety confirmation message sent by user equipment, the safety confirmation message being generated by the user equipment in response to a detected user state confirmation operation; and invoking a smart contract, the smart contract being used to determine whether a reception interval for the safety confirmation message satisfies a preset reception period, and if the reception interval does not satisfy the preset reception period, trigger an alarm operation.

Description

基於區塊鏈的智慧報警方法及裝置、電子設備Block chain-based smart alarm method and device, and electronic equipment

本說明書一個或多個實施例涉及區塊鏈技術領域,尤其涉及一種基於區塊鏈的智慧報警方法及裝置、電子設備。One or more embodiments of this specification relate to the field of blockchain technology, and in particular to a smart alarm method and device based on blockchain, and electronic equipment.

在相關技術中,用戶在面臨緊急狀況時,可以透過手機撥打報警電話(或其他緊急電話)的方式進行報警。但是,成功報警的前提是:用戶能夠及時發現緊急狀況、成功拿出手機,並順利撥號或按壓手機上的組合按鍵。In related technologies, when facing an emergency, a user can make an alarm by dialing an alarm call (or other emergency call) through a mobile phone. However, the prerequisite for a successful alarm is that the user can detect the emergency in time, successfully take out the mobile phone, and smoothly dial or press the combination button on the mobile phone.

有鑑於此,本說明書一個或多個實施例提供一種基於區塊鏈的智慧報警方法及裝置、電子設備。 為實現上述目的,本說明書一個或多個實施例提供技術方案如下: 根據本說明書一個或多個實施例的第一方面,提出了一種基於區塊鏈的智慧報警方法,應用於區塊鏈節點,所述方法包括: 接收用戶設備發送的安全確認消息,所述安全確認消息由所述用戶設備回應於檢測到的用戶狀態確認操作而產生; 調用智慧合約,所述智慧合約被用於確定對所述安全確認消息的接收間隔是否滿足預設接收週期,並在所述接收間隔不滿足所述預設接收週期的情況下觸發報警操作。 根據本說明書一個或多個實施例的第二方面,提出了一種基於區塊鏈的智慧報警裝置,應用於區塊鏈節點,所述裝置包括: 接收單元,接收用戶設備發送的安全確認消息,所述安全確認消息由所述用戶設備回應於檢測到的用戶狀態確認操作而產生; 調用單元,調用智慧合約,所述智慧合約被用於確定對所述安全確認消息的接收間隔是否滿足預設接收週期,並在所述接收間隔不滿足所述預設接收週期的情況下觸發報警操作。 根據本說明書一個或多個實施例的第三方面,提出了一種電子設備,包括: 處理器; 用於儲存處理器可執行指令的記憶體; 其中,所述處理器透過運行所述可執行指令以實現如上述實施例中所述的方法。In view of this, one or more embodiments of this specification provide a block chain-based smart alarm method and device, and electronic equipment. To achieve the foregoing objectives, one or more embodiments of this specification provide technical solutions as follows: According to the first aspect of one or more embodiments of this specification, a smart alarm method based on blockchain is proposed, which is applied to blockchain nodes, and the method includes: Receiving a security confirmation message sent by a user equipment, the security confirmation message being generated by the user equipment in response to a detected user status confirmation operation; A smart contract is invoked, and the smart contract is used to determine whether the receiving interval of the safety confirmation message meets a preset receiving period, and triggering an alarm operation when the receiving interval does not meet the preset receiving period. According to the second aspect of one or more embodiments of this specification, a smart alarm device based on blockchain is proposed, which is applied to a blockchain node, and the device includes: A receiving unit to receive a security confirmation message sent by a user equipment, the security confirmation message being generated by the user equipment in response to a detected user status confirmation operation; The calling unit calls a smart contract, the smart contract is used to determine whether the receiving interval of the safety confirmation message meets the preset receiving period, and triggers an alarm if the receiving interval does not meet the preset receiving period operating. According to a third aspect of one or more embodiments of this specification, an electronic device is proposed, including: processor; Memory used to store executable instructions of the processor; Wherein, the processor executes the executable instruction to implement the method described in the above-mentioned embodiment.

這裡將詳細地對示例性實施例進行說明,其示例表示在圖式中。下面的描述涉及圖式時,除非另有表示,不同圖式中的相同數字表示相同或相似的要素。以下示例性實施例中所描述的實施方式並不代表與本說明書一個或多個實施例相一致的所有實施方式。相反,它們僅是與如所附申請專利範圍中所詳述的、本說明書一個或多個實施例的一些方面相一致的裝置和方法的例子。 需要說明的是:在其他實施例中並不一定按照本說明書示出和描述的順序來執行相應方法的步驟。在一些其他實施例中,其方法所包括的步驟可以比本說明書所描述的更多或更少。此外,本說明書中所描述的單個步驟,在其他實施例中可能被分解為多個步驟進行描述;而本說明書中所描述的多個步驟,在其他實施例中也可能被合併為單個步驟進行描述。 圖1是一示例性實施例提供的一種基於區塊鏈的智慧報警方法的流程圖。如圖1所示,該方法應用於區塊鏈節點,可以包括以下步驟: 步驟102,接收用戶設備發送的安全確認消息,所述安全確認消息由所述用戶設備回應於檢測到的用戶狀態確認操作而產生。 在一實施例中,用戶設備可以為用戶使用的手機、平板電腦、智慧手錶等任意類型的電子設備,本說明書並不對此進行限制。透過在電子設備上登錄用戶的已註冊帳號、使用該用戶實名登記的電話卡或預先將電子設備的MAC位址等標識與用戶進行綁定,可以建立該電子設備與用戶之間的唯一映射關係,使得該電子設備可以被認定為該用戶對應的用戶設備。 在一實施例中,區別於用戶在緊急狀況下實施報警等觸發動作,用戶可以在尚未面臨緊急狀況之前、處於安全狀態的情況下,針對用戶設備實施用戶狀態確認操作,以表明該用戶尚處於安全狀態下。用戶可以在用戶設備上進行設定,以確定是否需要開啟智慧報警功能,該智慧報警功能用於實現本說明書的智慧報警方案;換言之,當該智慧報警功能被開啟時,即可基於本說明書的技術方案實現智慧報警。其中,用戶可以手動開關智慧報警功能,也可以設定一定的判斷規則,以使得用戶設備可以基於該判斷規則自動開關智慧報警功能;例如,判斷規則可以包括時間範圍,譬如該時間範圍可以為每天晚上的9點-12點,使得當處於時間範圍時用戶設備可以自動開啟智慧報警功能,否則自動關閉智慧報警功能;再例如,判斷規則可以包括地理位置範圍,譬如該地理位置範圍可以為犯罪率較高的地區,使得當用戶設備處於該地理位置範圍時可以自動開啟智慧報警功能,否則自動關閉智慧報警功能;又例如,判斷規則可以包括時間範圍和地理位置範圍,使得當處於時間範圍且用戶設備處於該地理位置範圍時,用戶設備可以自動開啟智慧報警功能,否則自動關閉智慧報警功能。 在一實施例中,用戶狀態確認操作可以包括:解鎖用戶設備、開啟用戶設備的攝影機、透過用戶設備的攝影機進行拍攝等至少之一,本說明書並不對此進行限制。 在一實施例中,用戶設備的使用者預先獲得對應的數位身分,並向用戶設備進行授權,使得用戶設備可以基於該數位身分對所發送的安全確認消息進行簽名,而區塊鏈節點可以據此對安全確認消息的發送方進行身分驗證,以識別出非法用戶冒用身分的行為。同時,當發現存在非法用戶冒用身分的行為時,可以判定用戶設備的使用者存在較高的面臨緊急狀態的風險,從而向該用戶設備的使用者進行風險提醒;或者,用戶設備的使用者甚至可能已經面臨緊急狀況,可以透過觸發報警操作,向警方及時彙報相關資訊,以便確認使用者的真實處境,從而解除安全風險。 在一實施例中,當用戶設備基於使用者的數位身分對所發送的安全確認消息進行簽名時,使得使用者即便並未登錄已註冊帳號、用戶設備並未使用該用戶實名登記的電話卡、用戶設備的MAC位址等標識並未預先與該使用者進行綁定的情況下,也可以透過該簽名來表明使用者的身分。 步驟104,調用智慧合約,所述智慧合約被用於確定對所述安全確認消息的接收間隔是否滿足預設接收週期,並在所述接收間隔不滿足所述預設接收週期的情況下觸發報警操作。 在一實施例中,當用戶已經面臨緊急狀況時,比如搶劫、綁架等,一方面用戶可能受到犯罪分子的威脅而無法順利拿出用戶設備進行操作,或者用戶設備可能已經被犯罪分子搶奪或損毀,另一方面用戶可能已經喪失了對用戶設備進行操作的能力(如受傷或暈厥等),因而本說明書中透過在用戶處於安全狀態時實施用戶狀態確認操作、並由區塊鏈節點接收和統計用戶設備相應發送的安全確認消息,可以在安全確認消息的接收狀況異常(如接收間隔不滿足預設接收週期)時,推測出用戶可能已經面臨緊急狀況,而無需用戶在面臨緊急狀況時實施任何操作,既可以降低用戶的操作難度、提升對用戶狀態的判斷準確度,又能夠避免用戶在緊急狀況下對用戶設備的操作引起犯罪分子的疑慮或激怒犯罪分子,有助於保障用戶的人身安全。 在一實施例中,透過調用智慧合約對安全確認消息的接收狀況進行識別確認,可以確保該識別確認的操作能夠自動、可靠地實施,不易受到影響,從而準確觸發報警操作,以維護用戶的人身安全。 在一實施例中,當安全確認消息的接收間隔過大,比如超出預設接收週期且差值大於預設數值時,用戶很可能已經面臨緊急狀況而無法實施用戶狀態確認操作,可以判定為不滿足該預設接收週期,從而觸發報警操作;或者,當安全確認消息的接收間隔過小,比如同一預設接收週期內收到多條安全確認消息時,用戶很可能已經面臨緊急狀況但不便於實施報警等容易引起犯罪分子的疑慮或激怒犯罪分子的操作,因而可以連續實施用戶狀態確認操作而造成安全確認消息的異常發送,此時可以判定為不滿足該預設接收週期,從而觸發報警操作。 在一實施例中,當智慧報警功能被開啟時,用戶設備可以基於上述的預設接收週期向用戶發出提示,以使得用戶在處於安全狀態的情況下,按時完成用戶狀態確認操作,避免由於忘記操作等原因而造成安全確認消息的發送狀況出現異常,防止由此造成的誤報警。 在一實施例中,所述智慧合約還用於在觸發報警操作時,向報警對象提供已收到的來自所述用戶設備的安全確認消息,以供報警對象(如警方)進行參考,比如報警對象可以對安全確認消息的數量、發送方、接收間隔等進行確認,從而分析出相關用戶是否已面臨緊急狀況等。 在一實施例中,所述安全確認消息中包含所述用戶設備所處環境的環境描述資訊。例如,所述環境描述資訊可以包括以下至少之一:所述用戶設備拍攝的照片或視訊、所述用戶設備採集的音訊、所述用戶設備採集的定位資訊、所述用戶設備產生的軌跡資訊等,本說明書並不對此進行限制。那麼,透過將安全確認消息提供至報警對象,尤其是當安全確認消息包含上述的環境描述資訊時,有助於報警對象據此確認相關用戶的所處位置、周邊建築,甚至從照片、音訊或視訊中分辨出疑似犯罪分子或者分析出可能面臨何種緊急狀況等,使得報警對象更好地協助相關用戶脫離緊急狀況。 在一實施例中,區塊鏈節點可以將安全確認消息和/或所述安全確認消息的數位摘要資訊(如散列值)發佈至區塊鏈,可以對安全確認消息進行存證,以便於後續查閱、管理或追責。 在一實施例中,區塊鏈節點可以分析所述安全確認消息包含的內容,並向所述智慧合約傳遞分析結果,使所述智慧合約在根據所述分析結果確認存在異常內容時,觸發所述報警操作。用戶在實施用戶狀態確認操作時,可能尚未意識到已經面臨緊急狀況或者存在面臨緊急狀況的風險,或者犯罪分子在實施犯罪後可能模擬用戶行為而實施用戶狀態確認操作,使得區塊鏈節點對安全確認消息的接收間隔並無異常,此時可以透過對安全確認消息包含的內容進行分析,比如照片或視訊中包含的人、地點、行為(如打鬥、求救手勢等)等資訊,視訊或音訊中出現的哭叫、求救等聲音,非正常的定位資訊或軌跡資訊等,以分析出可能存在的安全問題,從而及時觸發報警操作。 圖2是一示例性實施例提供的一種智慧報警的整體架構示意圖。如圖2所示,假定用戶A使用手機21的過程中,可以針對該手機21實施用戶狀態確認操作,而手機21可以據此產生相應的安全確認消息,並將該安全確認消息發送至伺服器22。進一步地,伺服器22可以透過調用智慧合約,對安全確認消息的接收情況予以確認,從而在達到預設條件時,自動觸發報警操作。 為了便於理解,下面針對手機21、伺服器22分別在智慧報警過程中實現的操作和功能,結合圖3對本說明書的智慧報警方案進行詳細說明。圖3是一示例性實施例提供的一種用於實現智慧報警的互動示意圖。如圖3所示,該互動過程可以包括以下步驟: 步驟301,在手機21與伺服器22之間實現對綁定關係的建立。 在一實施例中,所需建立的綁定關係為用戶A的身分資訊與手機21的設備資訊之間的綁定關係。基於該綁定關係,使得伺服器22在接收到手機21後續發送的安全確認消息時,可以確認該安全確認消息對應於該用戶A。 例如,用戶A可以預先在伺服器22處進行帳號註冊,得到與用戶A唯一對應的已註冊帳號。然後,用戶A可以透過在手機21上登錄該已註冊帳號,而伺服器22基於該已註冊帳號在手機21上的登錄資訊,確定該已註冊帳號(對應於用戶A)與手機21之間建立了綁定關係。類似地,用戶A可以在手機21上使用已實名登記的手機號碼,同樣可以使得伺服器22確定該手機號碼(對應於用戶A)與手機21之間建立了綁定關係。 步驟302,手機21啟用智慧報警功能。 在一實施例中,手機21可以默認關閉智慧報警功能,而用戶A可以在需要時臨時開啟該智慧報警功能;比如,當用戶A在某一天加班到較晚時,可以透過開啟該智慧報警功能,以保障回家途中的安全性。 在一實施例中,手機21可以透過對預設條件的判斷,以自動開啟和關閉智慧報警功能。例如,用戶A可以設定該預設條件包括:a.時間條件為晚上10點至次日淩晨4點、b.地理位置條件為處於某攝影機未覆蓋區域;那麼,透過對時間資訊和地理位置資訊的綜合判斷,比如當手機21在晚上11點處於上述的攝影機未覆蓋區域時,可以判定為滿足上述的預設條件,因而可以自動開啟智慧報警功能;而當未處於上述時間段或離開相關攝影機未覆蓋區域時,手機21可以自動關閉智慧報警功能。 步驟303,手機21可以在提醒時刻實施操作提醒。 在一實施例中,基於本說明書的技術方案,當智慧報警功能開啟時,用戶A需要定期實施預定義的用戶狀態確認操作,以表明自身尚處於安全狀態。而為了避免用戶A由於忘記實施該用戶狀態確認操作而導致誤判,手機21可以按照預設週期確定相應的提醒時刻,從而在提醒時刻針對用戶A實施操作提醒,使得用戶A可以按時實施用戶狀態確認操作。 針對用戶狀態確認操作的提醒可以為用戶A預定義的特殊提醒方式,且提醒內容避免透露與智慧報警功能相關的資訊,比如當用戶狀態確認操作為拍攝操作時,可以輸出“請拍攝照片”或類似的提醒內容,而避免輸出“請拍攝至少一張照片,以確認自身處於安全狀態,否則將觸發報警”或類似的提醒內容,從而在用戶A已面臨緊急狀況的情況下,防止向犯罪分子發出提示,避免犯罪分子模擬或脅迫用戶A實施相關操作。甚至,可以避免在提醒內容中包含與操作類型相關的資訊,比如可以輸出“請執行預設操作”或類似的提醒內容,而避免輸出“請拍攝照片”或類似的提醒內容。 步驟304,手機21檢測到拍攝操作。 在一實施例中,當預定義的用戶狀態確認操作為拍攝操作時,如果用戶A尚處於安全狀態,可以主動或在上述操作提醒的提示作用下,開啟手機21的攝影機以實施拍攝操作,比如拍攝至少一張照片。 當然,用戶狀態確認操作可以包括其他類型,比如對手機21進行解鎖、在手機21上輸入特定字符串等,本說明書並不對此進行限制。 步驟305,手機21收集環境描述資訊。 在一實施例中,在用戶A實施預定義的用戶狀態確認操作之前、過程中或之後,手機21可以對所處環境進行資訊採集,得到相應的環境描述資訊,以用於從更多維度、更為詳細地描述手機21或用戶A所處的環境。比如,該環境描述資訊可以包括:手機21在步驟304中拍攝的照片、手機21在攝影機開啟後採集的視訊、手機21採集的音訊、手機21採集的定位資訊、手機21產生的軌跡資訊等,本說明書並不對此進行限制。 步驟306,手機21向伺服器22發送安全確認消息。 在一實施例中,安全確認消息可以包含上述的環境描述資訊。此外,用戶A可以預先註冊得到唯一對應的數位身分,該數位身分由一組公私鑰對進行表徵;相應地,手機21可以透過對應於用戶A的數位身分的私鑰對安全確認消息進行簽名。 步驟307,伺服器22可以對收到的安全確認消息進行簽名驗證。 在一實施例中,伺服器22收到手機21上傳的安全確認消息後,可以透過用戶A對應的公鑰進行驗簽,以確定該安全確認消息已由用戶A進行授權,且並非由不法分子冒充用戶A的身分進行發送。 在一實施例中,當驗簽未通過時,由於手機21預先綁定至用戶A,表明可能存在不法分子冒充用戶A的身分,而用戶A存在處於緊急狀況的風險,伺服器22可以觸發報警操作。 步驟308,伺服器22調用智慧合約,以驗證接收間隔是否合規。 在一實施例中,伺服器22上運行有區塊鏈的客戶端,使得該伺服器22被配置為一區塊鏈節點,而伺服器22可以據此調用智慧合約,並將對安全確認消息的接收時刻輸入智慧合約,以由智慧合約驗證來自手機21的安全確認消息的接收間隔是否符合預設接收週期。 例如,假定預設接收週期為5分鐘、預警時長為3分鐘,那麼假定最近一次為22:20接收到手機21發送的安全確認消息,那麼正常情況下應當在22:25左右收到手機21再次發送的安全確認消息;而考慮到用戶A的操作無法十分準時,上述3分鐘的預警時長可以作為容錯時間段,那麼如果在22:28仍未收到手機21再次發送的安全確認消息,智慧合約可以判定為用戶A並未按時實施用戶狀態確認操作,用戶A具有較大概率面臨了緊急狀況,因而智慧合約可以自動觸發報警操作。 再例如,假定預設接收週期為5分鐘,那麼假定最近一次為22:20接收到手機21發送的安全確認消息,那麼正常情況下應當在22:25左右收到手機21再次發送的安全確認消息;而智慧合約如果在22:22就再次收到手機21再次發送的安全確認消息,甚至連續收到多條安全確認消息,那麼智慧合約可以判定為用戶A可能已經面臨了緊急狀況,並希望透過上述的異常操作發出警告,因而智慧合約可以自動觸發報警操作。 步驟309,伺服器22透過調用智慧合約,驗證環境描述資訊。 在一實施例中,當安全確認消息包含環境描述資訊時,伺服器22可以提取該環境描述資訊或其進一步包含的資訊內容,並將該環境描述資訊或資訊內容輸入智慧合約,以由智慧合約進行檢驗。 在一實施例中,智慧合約對安全確認消息的接收間隔可能驗證通過,但透過對上述環境描述資訊或資訊內容進行分析,比如拍攝的照片中是否包含可疑人員(比如透過人臉識別確定照片中的人具有犯罪前科等)、拍攝的視訊中是否包含正在發生的犯罪行為、拍攝的視訊或採集的音訊中是否包含打鬥聲或呼救聲等,可以進一步確定已收到的安全確認消息是否為用戶A在安全狀態下發送,是否存在犯罪分子模擬用戶A或脅迫用戶A實施用戶狀態確認操作的情況等。如果發現存在犯罪分子模擬用戶A或脅迫用戶A的情況或風險,智慧合約可以觸發報警操作。 在一實施例中,當智慧合約已經驗證為安全確認消息的接收間隔不正常時,可以透過對環境描述資訊或資訊內容進行分析,以獲取用戶A的周邊環境(如街道狀態、周邊建築等)、周圍人員、地理位置資訊、行走軌跡資訊以及用戶A的面部表情、發出的聲音和行為動作等,並在實施報警操作時將相關資訊提供至報警對象,以便於報警對象實施更為準確的分析和更有效的處理措施。 需要指出的是,當手機21的智慧報警功能處於開啟狀態時,將持續循環實施上述的步驟303~309,從而對用戶A實現持續保護,直至用戶A到達安全區域並關閉該智慧報警功能。 圖4是一示例性實施例提供的一種設備的示意結構圖。請參考圖4,在硬體層面,該設備包括處理器402、內部匯流排404、網路介面406、內部記憶體408以及非易失性記憶體410,當然還可能包括其他業務所需要的硬體。處理器402從非易失性記憶體410中讀取對應的電腦程式到內部記憶體408中然後運行,在邏輯層面上形成基於區塊鏈的智慧報警裝置。當然,除了軟體實現方式之外,本說明書一個或多個實施例並不排除其他實現方式,比如邏輯裝置抑或軟硬體結合的方式等等,也就是說以下處理流程的執行主體並不限定於各個邏輯單元,也可以是硬體或邏輯裝置。 請參考圖5,在軟體實施方式中,該基於區塊鏈的智慧報警裝置應用於區塊鏈節點,可以包括: 接收單元51,接收用戶設備發送的安全確認消息,所述安全確認消息由所述用戶設備回應於檢測到的用戶狀態確認操作而產生; 調用單元52,調用智慧合約,所述智慧合約被用於確定對所述安全確認消息的接收間隔是否滿足預設接收週期,並在所述接收間隔不滿足所述預設接收週期的情況下觸發報警操作。 可選的,所述安全確認消息由所述用戶設備的使用者透過對應的數位身分進行簽名。 可選的,所述安全確認消息中包含所述用戶設備所處環境的環境描述資訊。 可選的,所述環境描述資訊包括以下至少之一:所述用戶設備拍攝的照片或視訊、所述用戶設備採集的音訊、所述用戶設備採集的定位資訊、所述用戶設備產生的軌跡資訊。 可選的,所述智慧合約還用於在觸發報警操作時,向報警對象提供已收到的來自所述用戶設備的安全確認消息。 可選的,還包括: 分析單元53,分析所述安全確認消息包含的內容; 傳遞單元54,向所述智慧合約傳遞分析結果,使所述智慧合約在根據所述分析結果確認存在異常內容時,觸發所述報警操作。 可選的,還包括: 發佈單元55,將所述安全確認消息和/或所述安全確認消息的數位摘要資訊發佈至區塊鏈。 上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、行動電話、相機電話、智慧電話、個人數位助理、媒體播放器、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。 本說明書提出了一種電腦可讀媒體,其上儲存有電腦指令,該指令被處理器執行時實現本說明書的技術方案,比如上述任一實施例的基於區塊鏈的智慧報警方法,此處不再一一贅述。 在一個典型的配置中,電腦包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和內部記憶體。 內部記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非易失性內部記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。內部記憶體是電腦可讀媒體的示例。 電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變內部記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可編程唯讀記憶體(EEPROM)、快閃記憶體或其他內部記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶、磁碟儲存、量子記憶體、基於石墨烯的儲存媒體或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多任務處理和並行處理也是可以的或者可能是有利的。 在本說明書一個或多個實施例使用的術語是僅僅出於描述特定實施例的目的,而非旨在限制本說明書一個或多個實施例。在本說明書一個或多個實施例和所附申請專利範圍中所使用的單數形式的“一種”、“所述”和“該”也旨在包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本文中使用的術語“和/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。 應當理解,儘管在本說明書一個或多個實施例可能採用術語第一、第二、第三等來描述各種資訊,但這些資訊不應限於這些術語。這些術語僅用來將同一類型的資訊彼此區分開。例如,在不脫離本說明書一個或多個實施例範圍的情況下,第一資訊也可以被稱為第二資訊,類似地,第二資訊也可以被稱為第一資訊。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“回應於確定”。 以上所述僅為本說明書一個或多個實施例的較佳實施例而已,並不用以限制本說明書一個或多個實施例,凡在本說明書一個或多個實施例的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本說明書一個或多個實施例保護的範圍之內。The exemplary embodiments will be described in detail here, and examples thereof are shown in the drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with one or more embodiments of this specification. On the contrary, they are only examples of devices and methods consistent with some aspects of one or more embodiments of this specification as detailed in the scope of the appended application. It should be noted that in other embodiments, the steps of the corresponding method may not be executed in the order shown and described in this specification. In some other embodiments, the method includes more or fewer steps than described in this specification. In addition, a single step described in this specification may be decomposed into multiple steps for description in other embodiments; and multiple steps described in this specification may also be combined into a single step in other embodiments. description. Fig. 1 is a flowchart of a block chain-based smart alarm method provided by an exemplary embodiment. As shown in Figure 1, the method is applied to blockchain nodes and can include the following steps: Step 102: Receive a security confirmation message sent by the user equipment, where the security confirmation message is generated by the user equipment in response to a detected user status confirmation operation. In an embodiment, the user equipment may be any type of electronic equipment such as a mobile phone, a tablet computer, or a smart watch used by the user, which is not limited in this specification. By logging in the user’s registered account on the electronic device, using the user’s real-name registered phone card, or pre-binding the electronic device’s MAC address and other identifiers with the user, a unique mapping relationship between the electronic device and the user can be established. So that the electronic device can be identified as the user device corresponding to the user. In one embodiment, different from the user’s triggering actions such as alarming in an emergency, the user can perform a user status confirmation operation on the user equipment before facing the emergency and in a safe state to indicate that the user is still in In a safe state. The user can make settings on the user device to determine whether the smart alarm function needs to be turned on. The smart alarm function is used to implement the smart alarm solution in this manual; in other words, when the smart alarm function is turned on, it can be based on the technology in this manual The solution realizes smart alarm. Among them, the user can manually switch the smart alarm function, or set a certain judgment rule, so that the user equipment can automatically switch the smart alarm function based on the judgment rule; for example, the judgment rule can include a time range, for example, the time range can be every night When it is within the time range, the user equipment can automatically turn on the smart alarm function, otherwise it will automatically turn off the smart alarm function; for another example, the judgment rule may include a geographic location range, for example, the geographic location range can be a higher crime rate. High areas, so that when the user equipment is in the geographic area, the smart alarm function can be automatically turned on, otherwise the smart alarm function is automatically turned off; for another example, the judgment rule can include the time range and the geographic location range, so that when the user equipment is in the time range and the user equipment When in this geographic location, the user equipment can automatically turn on the smart alarm function, otherwise it will automatically turn off the smart alarm function. In an embodiment, the user status confirmation operation may include at least one of unlocking the user equipment, turning on the camera of the user equipment, and shooting through the camera of the user equipment, which is not limited in this specification. In one embodiment, the user of the user equipment obtains the corresponding digital identity in advance and authorizes the user equipment, so that the user equipment can sign the sent security confirmation message based on the digital identity, and the blockchain node can use the data This verifies the identity of the sender of the security confirmation message to identify fraudulent use of identity by illegal users. At the same time, when an illegal user is found to be fraudulent, it can be determined that the user of the user equipment has a higher risk of facing an emergency, so as to remind the user of the user equipment of the risk; or, the user of the user equipment You may even be facing an emergency situation, you can trigger an alarm operation to report relevant information to the police in a timely manner to confirm the user's real situation and eliminate the security risk. In one embodiment, when the user equipment signs the sent security confirmation message based on the user’s digital identity, even if the user has not logged in to the registered account, the user equipment does not use the phone card registered with the user’s real name. If the device's MAC address and other identifiers are not bound to the user in advance, the signature can also be used to indicate the user's identity. Step 104: Invoke a smart contract, which is used to determine whether the receiving interval of the security confirmation message meets a preset receiving period, and triggers an alarm if the receiving interval does not meet the preset receiving period operating. In one embodiment, when the user is already facing an emergency situation, such as robbery, kidnapping, etc., on the one hand, the user may be threatened by criminals and cannot successfully take out the user equipment for operation, or the user equipment may have been robbed or damaged by criminals. On the other hand, the user may have lost the ability to operate the user equipment (such as injury or fainting, etc.). Therefore, in this manual, the user status confirmation operation is implemented when the user is in a safe state, and the blockchain node receives and counts The security confirmation message sent by the user equipment can infer that the user may have been facing an emergency when the receiving status of the security confirmation message is abnormal (for example, the receiving interval does not meet the preset receiving period), without the user having to implement anything when facing an emergency. Operation can not only reduce the user’s operation difficulty, improve the accuracy of user status judgment, but also avoid the user’s operation on the user’s device in an emergency situation from causing criminals’ doubts or angering criminals, helping to protect the user’s personal safety . In one embodiment, by invoking a smart contract to identify and confirm the receiving status of the security confirmation message, it can be ensured that the identification and confirmation operation can be implemented automatically and reliably, and is not easily affected, so as to accurately trigger the alarm operation to protect the user's life. Safety. In one embodiment, when the receiving interval of the safety confirmation message is too long, such as exceeding the preset receiving period and the difference is greater than the preset value, the user is likely to have faced an emergency and cannot perform the user status confirmation operation, and it can be determined as not satisfied The preset receiving cycle triggers an alarm operation; or, when the receiving interval of safety confirmation messages is too small, for example, when multiple safety confirmation messages are received in the same preset receiving cycle, the user is likely to have faced an emergency but it is not convenient to implement an alarm Operations that easily cause criminals' doubts or irritate criminals can continuously perform user status confirmation operations and cause abnormal transmission of safety confirmation messages. At this time, it can be determined that the preset receiving period is not met, thereby triggering an alarm operation. In one embodiment, when the smart alarm function is turned on, the user equipment may send a prompt to the user based on the above-mentioned preset receiving period, so that the user can complete the user status confirmation operation on time when the user is in a safe state, and avoid Forgetting the operation and other reasons, the sending status of the safety confirmation message is abnormal to prevent false alarms caused by this. In one embodiment, the smart contract is also used to provide the security confirmation message received from the user equipment to the alarm object when the alarm operation is triggered, for the alarm object (such as the police) to refer to, such as alarm The object can confirm the number of safety confirmation messages, sender, receiving interval, etc., so as to analyze whether the relevant user is facing an emergency situation. In an embodiment, the security confirmation message includes environment description information of the environment in which the user equipment is located. For example, the environment description information may include at least one of the following: photos or videos taken by the user equipment, audio collected by the user equipment, positioning information collected by the user equipment, trajectory information generated by the user equipment, etc. , This manual does not limit this. Then, by providing the safety confirmation message to the alarm object, especially when the safety confirmation message contains the above-mentioned environmental description information, it is helpful for the alarm object to confirm the location of the relevant user, surrounding buildings, and even from photos, audio, or The video can identify suspected criminals or analyze what kind of emergency situation they may face, so that the target of the alarm can better assist the relevant user to get out of the emergency situation. In an embodiment, the blockchain node can publish the security confirmation message and/or the digital summary information (such as the hash value) of the security confirmation message to the blockchain, and the security confirmation message can be stored for convenience. Follow-up inspection, management or accountability. In one embodiment, the blockchain node may analyze the content contained in the security confirmation message, and transmit the analysis result to the smart contract, so that the smart contract triggers all abnormal content when it is confirmed based on the analysis result. Describe the alarm operation. When the user implements the user status confirmation operation, he may not realize that he is already facing an emergency situation or is facing the risk of an emergency situation, or criminals may simulate user behaviors after committing a crime and implement the user status confirmation operation, so that the blockchain node is safe Confirm that the receiving interval of the message is not abnormal. At this time, you can analyze the content contained in the safety confirmation message, such as the person, location, and behavior (such as fighting, gestures for help, etc.) contained in the photo or video, in the video or audio Sounds such as crying, calling for help, abnormal positioning information or trajectory information, etc., can be used to analyze possible safety issues and trigger alarm operations in time. Fig. 2 is a schematic diagram of the overall architecture of a smart alarm provided by an exemplary embodiment. As shown in Figure 2, it is assumed that user A can perform a user status confirmation operation on the mobile phone 21 during the process of using the mobile phone 21, and the mobile phone 21 can generate a corresponding security confirmation message accordingly and send the security confirmation message to the server twenty two. Further, the server 22 can confirm the receipt of the safety confirmation message by invoking the smart contract, so as to automatically trigger an alarm operation when the preset condition is reached. In order to facilitate understanding, the following is a detailed description of the smart alarm solution in this specification with reference to the operations and functions implemented by the mobile phone 21 and the server 22 during the smart alarm process, respectively, in conjunction with FIG. 3. Fig. 3 is a schematic diagram of interaction for realizing smart alarm provided by an exemplary embodiment. As shown in Figure 3, the interactive process may include the following steps: In step 301, a binding relationship is established between the mobile phone 21 and the server 22. In one embodiment, the binding relationship that needs to be established is the binding relationship between the identity information of the user A and the device information of the mobile phone 21. Based on the binding relationship, when the server 22 receives the security confirmation message subsequently sent by the mobile phone 21, it can confirm that the security confirmation message corresponds to the user A. For example, user A may register an account at the server 22 in advance to obtain a registered account uniquely corresponding to user A. Then, the user A can log in the registered account on the mobile phone 21, and the server 22 determines that the registered account (corresponding to the user A) and the mobile phone 21 are established based on the login information of the registered account on the mobile phone 21 Binding relationship. Similarly, the user A can use a real-name registered mobile phone number on the mobile phone 21, and the server 22 can also determine that the mobile phone number (corresponding to the user A) has established a binding relationship with the mobile phone 21. In step 302, the mobile phone 21 enables the smart alarm function. In one embodiment, the mobile phone 21 can turn off the smart alarm function by default, and user A can temporarily turn on the smart alarm function when needed; for example, when user A works overtime late on a certain day, he can turn on the smart alarm function To ensure safety on the way home. In one embodiment, the mobile phone 21 can automatically turn on and turn off the smart alarm function by judging preset conditions. For example, user A can set the preset conditions to include: a. Time condition is from 10 pm to 4 am of the next day, b. Geographical condition is to be in an area not covered by a certain camera; then, by comparing time information and geographic location information For example, when the mobile phone 21 is in the above-mentioned uncovered area of the camera at 11 o’clock in the evening, it can be determined that the above-mentioned preset conditions are met, and the smart alarm function can be automatically turned on; and when it is not in the above-mentioned time period or leaves the relevant camera When the area is not covered, the mobile phone 21 can automatically turn off the smart alarm function. In step 303, the mobile phone 21 can implement an operation reminder at the reminder moment. In one embodiment, based on the technical solution of this specification, when the smart alarm function is turned on, user A needs to periodically perform a predefined user status confirmation operation to indicate that he is still in a safe state. In order to avoid misjudgment caused by user A forgetting to perform the user status confirmation operation, the mobile phone 21 can determine the corresponding reminder time according to the preset period, so as to implement the operation reminder for user A at the reminder time, so that user A can implement the user status on time Confirm the operation. The reminder for the user status confirmation operation can be a special reminder method predefined by user A, and the reminder content avoids revealing information related to the smart alarm function. For example, when the user status confirmation operation is a shooting operation, it can output "please take a photo" or Similar reminder content, and avoid outputting "please take at least one photo to confirm that you are in a safe state, otherwise you will trigger an alarm" or similar reminder content, so as to prevent criminals from reporting to criminals when user A is facing an emergency Give a reminder to prevent criminals from simulating or coercing user A to perform related operations. Furthermore, it is possible to avoid including information related to the type of operation in the reminder content, for example, it is possible to output "please perform a preset operation" or similar reminder content, and avoid outputting "please take a photo" or similar reminder content. Step 304: The mobile phone 21 detects the shooting operation. In one embodiment, when the predefined user status confirmation operation is a shooting operation, if user A is still in a safe state, he can actively or under the prompt action of the above operation reminder, turn on the camera of the mobile phone 21 to perform the shooting operation, such as Take at least one photo. Of course, the user status confirmation operation may include other types, such as unlocking the mobile phone 21, inputting a specific character string on the mobile phone 21, etc. This specification does not limit this. Step 305: The mobile phone 21 collects environment description information. In one embodiment, before, during, or after user A performs a predefined user status confirmation operation, the mobile phone 21 can collect information about the environment in which it is located, and obtain corresponding environment description information, which can be used in more dimensions, The environment in which the mobile phone 21 or user A is located is described in more detail. For example, the environment description information may include: photos taken by the mobile phone 21 in step 304, video collected by the mobile phone 21 after the camera is turned on, audio collected by the mobile phone 21, positioning information collected by the mobile phone 21, trajectory information generated by the mobile phone 21, etc. This manual does not limit this. Step 306: The mobile phone 21 sends a security confirmation message to the server 22. In an embodiment, the safety confirmation message may include the above-mentioned environment description information. In addition, user A can register in advance to obtain a unique corresponding digital identity, which is characterized by a set of public and private key pairs; accordingly, the mobile phone 21 can sign the security confirmation message with the private key corresponding to user A's digital identity. In step 307, the server 22 may perform signature verification on the received security confirmation message. In one embodiment, after the server 22 receives the security confirmation message uploaded by the mobile phone 21, it can verify the signature with the public key corresponding to user A to confirm that the security confirmation message has been authorized by user A and is not by a criminal Send as user A. In one embodiment, when the verification fails, since the mobile phone 21 is pre-bound to the user A, it indicates that there may be criminals impersonating the identity of the user A, and the user A is at risk of being in an emergency, the server 22 can trigger an alarm operating. In step 308, the server 22 calls the smart contract to verify whether the receiving interval is compliant. In one embodiment, a blockchain client is running on the server 22, so that the server 22 is configured as a blockchain node, and the server 22 can call the smart contract accordingly and confirm the security message Enter the smart contract at the receiving time of the smart contract to verify whether the receiving interval of the security confirmation message from the mobile phone 21 meets the preset receiving period. For example, assuming that the preset receiving period is 5 minutes and the warning duration is 3 minutes, then assuming that the security confirmation message sent by the mobile phone 21 was received at 22:20 last time, then the mobile phone 21 should be received around 22:25 under normal circumstances. The security confirmation message sent again; and considering that user A's operations cannot be very punctual, the above 3-minute warning time can be used as a fault-tolerant time period, then if the security confirmation message sent again by the mobile phone 21 is not received at 22:28, The smart contract can determine that user A did not implement the user status confirmation operation on time, and user A has a higher probability of facing an emergency situation, so the smart contract can automatically trigger an alarm operation. For another example, assuming that the preset receiving period is 5 minutes, then assuming that the security confirmation message sent by the mobile phone 21 was received at 22:20 last time, then under normal circumstances, the security confirmation message sent by the mobile phone 21 should be received again at around 22:25. ; And if the smart contract receives the security confirmation message sent by the mobile phone 21 again at 22:22, or even receives multiple security confirmation messages continuously, then the smart contract can determine that user A may have been facing an emergency and hope to pass The above abnormal operation issues a warning, so the smart contract can automatically trigger the alarm operation. In step 309, the server 22 verifies the environment description information by calling the smart contract. In one embodiment, when the security confirmation message includes environment description information, the server 22 may extract the environment description information or the information content further contained therein, and input the environment description information or information content into the smart contract to obtain the smart contract. Perform inspection. In one embodiment, the smart contract may verify the receiving interval of the security confirmation message, but through the analysis of the above-mentioned environment description information or information content, such as whether the taken photo contains suspicious persons (such as confirming that the photo is contained in the photo through face recognition) People who have criminal history, etc.), whether the captured video contains an ongoing criminal act, whether the captured video or collected audio contains fighting sounds or calls for help, etc., to further determine whether the received security confirmation message is the user A is sent in a safe state, whether there are criminals simulating user A or coercing user A to perform user status confirmation operations, etc. If it is found that there is a situation or risk of criminals simulating user A or coercing user A, the smart contract can trigger an alarm operation. In one embodiment, when the smart contract has been verified that the receiving interval of the security confirmation message is abnormal, the surrounding environment (such as street status, surrounding buildings, etc.) of user A can be obtained by analyzing environment description information or information content , Surrounding people, geographic location information, walking trajectory information and user A’s facial expressions, sounds and behaviors, etc., and provide relevant information to the alarm object when the alarm operation is implemented, so that the alarm object can perform more accurate analysis And more effective treatment measures. It should be pointed out that when the smart alarm function of the mobile phone 21 is turned on, the above steps 303 to 309 will be continuously implemented in a loop, so as to achieve continuous protection for the user A until the user A reaches the safe area and turns off the smart alarm function. Fig. 4 is a schematic structural diagram of a device provided by an exemplary embodiment. 4, at the hardware level, the device includes a processor 402, an internal bus 404, a network interface 406, an internal memory 408, and a non-volatile memory 410. Of course, it may also include hardware required for other services. body. The processor 402 reads the corresponding computer program from the non-volatile memory 410 to the internal memory 408 and then runs it to form a smart alarm device based on the blockchain at the logical level. Of course, in addition to software implementation, one or more embodiments of this specification do not exclude other implementations, such as logic devices or a combination of software and hardware, etc., which means that the execution body of the following processing flow is not limited to Each logical unit can also be a hardware or a logical device. Please refer to Figure 5, in the software implementation, the smart alarm device based on the blockchain is applied to the node of the blockchain, which may include: The receiving unit 51 receives a security confirmation message sent by the user equipment, where the security confirmation message is generated by the user equipment in response to a detected user status confirmation operation; The calling unit 52 calls a smart contract, which is used to determine whether the receiving interval of the security confirmation message meets a preset receiving period, and triggers when the receiving interval does not meet the preset receiving period Alarm operation. Optionally, the security confirmation message is signed by the user of the user equipment through a corresponding digital identity. Optionally, the security confirmation message includes environment description information of the environment in which the user equipment is located. Optionally, the environment description information includes at least one of the following: photos or videos taken by the user equipment, audio collected by the user equipment, positioning information collected by the user equipment, and trajectory information generated by the user equipment . Optionally, the smart contract is also used to provide the alarm object with the received security confirmation message from the user equipment when an alarm operation is triggered. Optional, also includes: The analysis unit 53 analyzes the content contained in the safety confirmation message; The transmitting unit 54 transmits the analysis result to the smart contract, so that the smart contract triggers the alarm operation when it is confirmed that there is an abnormal content according to the analysis result. Optional, also includes: The publishing unit 55 publishes the security confirmation message and/or the digital summary information of the security confirmation message to the blockchain. The systems, devices, modules or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game console , Tablets, wearable devices, or a combination of any of these devices. This specification proposes a computer-readable medium on which computer instructions are stored. When the instructions are executed by a processor, the technical solutions of this specification are implemented, such as the block chain-based smart alarm method in any of the above embodiments. Let me repeat them one by one. In a typical configuration, a computer includes one or more processors (CPU), input/output interfaces, network interfaces, and internal memory. Internal memory may include non-permanent memory in computer-readable media, random access memory (RAM) and/or non-volatile internal memory, such as read-only memory (ROM) or flash memory Body (flash RAM). Internal memory is an example of computer-readable media. Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change internal memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM). ), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other internal memory technology, read-only CD-ROM (CD-ROM), digital multiple Functional DVD or other optical storage, magnetic cassette tape, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices or any other non-transmission media that can be used for storage and can be accessed by computing devices Information. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. It should also be noted that the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, product or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or include elements inherent to this process, method, commodity, or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the element. The foregoing describes specific embodiments of this specification. Other embodiments are within the scope of the attached patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order from the embodiment and still achieve desired results. In addition, the processes depicted in the drawings do not necessarily require the specific order or sequential order shown in order to achieve the desired result. In certain embodiments, multitasking and parallel processing are also possible or may be advantageous. The terms used in one or more embodiments of this specification are only for the purpose of describing specific embodiments, and are not intended to limit one or more embodiments of this specification. The singular forms "a", "the" and "the" used in one or more embodiments of this specification and the scope of the appended patent application are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and/or" used herein refers to and includes any or all possible combinations of one or more associated listed items. It should be understood that although the terms first, second, third, etc. may be used to describe various information in one or more embodiments of this specification, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of one or more embodiments of this specification, the first information can also be referred to as second information, and similarly, the second information can also be referred to as first information. Depending on the context, the word "if" as used herein can be interpreted as "when" or "when" or "in response to certainty". The above descriptions are only preferred embodiments of one or more embodiments of this specification, and are not used to limit one or more embodiments of this specification. All within the spirit and principle of one or more embodiments of this specification, Any modification, equivalent replacement, improvement, etc. made should be included in the protection scope of one or more embodiments of this specification.

21:手機 22:伺服器 51:接收單元 52:調用單元 53:分析單元 54:傳遞單元 55:發佈單元 402:處理器 404:內部匯流排 406:網路介面 408:內部記憶體 410:非易失性記憶體21: mobile phone 22: server 51: receiving unit 52: call unit 53: Analysis unit 54: transfer unit 55: release unit 402: processor 404: internal bus 406: network interface 408: internal memory 410: Non-volatile memory

圖1是一示例性實施例提供的一種基於區塊鏈的智慧報警方法的流程圖。 圖2是一示例性實施例提供的一種智慧報警的整體架構示意圖。 圖3是一示例性實施例提供的一種用於實現智慧報警的互動示意圖。 圖4是一示例性實施例提供的一種設備的結構示意圖。 圖5是一示例性實施例提供的一種基於區塊鏈的智慧報警裝置的方塊圖。Fig. 1 is a flowchart of a block chain-based smart alarm method provided by an exemplary embodiment. Fig. 2 is a schematic diagram of the overall architecture of a smart alarm provided by an exemplary embodiment. Fig. 3 is a schematic diagram of interaction for realizing smart alarm provided by an exemplary embodiment. Fig. 4 is a schematic structural diagram of a device provided by an exemplary embodiment. Fig. 5 is a block diagram of a smart alarm device based on blockchain provided by an exemplary embodiment.

Claims (15)

一種基於區塊鏈的智慧報警方法,應用於區塊鏈節點,該方法包括: 接收用戶設備發送的安全確認消息,該安全確認消息由該用戶設備回應於檢測到的用戶狀態確認操作而產生; 調用智慧合約,該智慧合約被用於確定對該安全確認消息的接收間隔是否滿足預設接收週期,並在該接收間隔不滿足該預設接收週期的情況下觸發報警操作。A smart alarm method based on block chain, applied to block chain nodes, the method includes: Receiving a security confirmation message sent by the user equipment, the security confirmation message being generated by the user equipment in response to a detected user status confirmation operation; The smart contract is called, and the smart contract is used to determine whether the receiving interval of the safety confirmation message meets the preset receiving period, and triggering an alarm operation if the receiving interval does not meet the preset receiving period. 根據申請專利範圍第1項所述的方法,該安全確認消息由該用戶設備的使用者透過對應的數位身分進行簽名。According to the method described in item 1 of the scope of patent application, the security confirmation message is signed by the user of the user equipment through a corresponding digital identity. 根據申請專利範圍第1項所述的方法,該安全確認消息中包含該用戶設備所處環境的環境描述資訊。According to the method described in item 1 of the scope of the patent application, the security confirmation message contains environmental description information of the environment in which the user equipment is located. 根據申請專利範圍第3項所述的方法,該環境描述資訊包括以下至少之一:該用戶設備拍攝的照片或視訊、該用戶設備採集的音訊、該用戶設備採集的定位資訊、該用戶設備產生的軌跡資訊。According to the method described in item 3 of the scope of patent application, the environment description information includes at least one of the following: photos or videos taken by the user equipment, audio collected by the user equipment, positioning information collected by the user equipment, and generated by the user equipment Track information. 根據申請專利範圍第1項所述的方法,該智慧合約還用於在觸發報警操作時,向報警對象提供已收到的來自該用戶設備的安全確認消息。According to the method described in item 1 of the scope of patent application, the smart contract is also used to provide the alarm object with the received safety confirmation message from the user equipment when the alarm operation is triggered. 根據申請專利範圍第1項所述的方法,還包括: 分析該安全確認消息包含的內容; 向該智慧合約傳遞分析結果,使該智慧合約在根據該分析結果確認存在異常內容時,觸發該報警操作。According to the method described in item 1 of the scope of patent application, it also includes: Analyze the content contained in the security confirmation message; The analysis result is transmitted to the smart contract, so that the smart contract triggers the alarm operation when it confirms that there is an abnormal content based on the analysis result. 根據申請專利範圍第1項所述的方法,還包括: 將該安全確認消息和/或該安全確認消息的數位摘要資訊發佈至區塊鏈。According to the method described in item 1 of the scope of patent application, it also includes: Publish the security confirmation message and/or the digital summary information of the security confirmation message to the blockchain. 一種基於區塊鏈的智慧報警裝置,應用於區塊鏈節點,該裝置包括: 接收單元,接收用戶設備發送的安全確認消息,該安全確認消息由該用戶設備回應於檢測到的用戶狀態確認操作而產生; 調用單元,調用智慧合約,該智慧合約被用於確定對該安全確認消息的接收間隔是否滿足預設接收週期,並在該接收間隔不滿足該預設接收週期的情況下觸發報警操作。A smart alarm device based on block chain, applied to block chain nodes, the device includes: The receiving unit receives a security confirmation message sent by the user equipment, where the security confirmation message is generated by the user equipment in response to a detected user status confirmation operation; The calling unit calls the smart contract, and the smart contract is used to determine whether the receiving interval of the safety confirmation message meets the preset receiving period, and triggering an alarm operation when the receiving interval does not meet the preset receiving period. 根據申請專利範圍第8項所述的裝置,該安全確認消息由該用戶設備的使用者透過對應的數位身分進行簽名。According to the device described in item 8 of the scope of patent application, the security confirmation message is signed by the user of the user equipment through a corresponding digital identity. 根據申請專利範圍第8項所述的裝置,該安全確認消息中包含該用戶設備所處環境的環境描述資訊。According to the device described in item 8 of the scope of patent application, the security confirmation message contains the environmental description information of the environment in which the user equipment is located. 根據申請專利範圍第10項所述的裝置,該環境描述資訊包括以下至少之一:該用戶設備拍攝的照片或視訊、該用戶設備採集的音訊、該用戶設備採集的定位資訊、該用戶設備產生的軌跡資訊。According to the device described in item 10 of the scope of patent application, the environment description information includes at least one of the following: photos or videos taken by the user equipment, audio collected by the user equipment, positioning information collected by the user equipment, generated by the user equipment Track information. 根據申請專利範圍第8項所述的裝置,該智慧合約還用於在觸發報警操作時,向報警對象提供已收到的來自該用戶設備的安全確認消息。According to the device described in item 8 of the scope of patent application, the smart contract is also used to provide the alarm object with the received security confirmation message from the user equipment when the alarm operation is triggered. 根據申請專利範圍第8項所述的裝置,還包括: 分析單元,分析該安全確認消息包含的內容; 傳遞單元,向該智慧合約傳遞分析結果,使該智慧合約在根據該分析結果確認存在異常內容時,觸發該報警操作。According to the device described in item 8 of the scope of patent application, it also includes: The analysis unit analyzes the content contained in the safety confirmation message; The transmission unit transmits the analysis result to the smart contract, so that the smart contract triggers the alarm operation when it confirms that there is an abnormal content based on the analysis result. 根據申請專利範圍第8項所述的裝置,還包括: 發佈單元,將該安全確認消息和/或該安全確認消息的數位摘要資訊發佈至區塊鏈。According to the device described in item 8 of the scope of patent application, it also includes: The publishing unit publishes the security confirmation message and/or the digital summary information of the security confirmation message to the blockchain. 一種電子設備,包括: 處理器; 用於儲存處理器可執行指令的記憶體; 其中,該處理器透過運行該可執行指令以實現如申請專利範圍第1至7項中任一項所述的方法。An electronic device including: processor; Memory used to store executable instructions of the processor; Wherein, the processor implements the method described in any one of items 1 to 7 of the scope of patent application by running the executable instruction.
TW108133588A 2018-12-05 2019-09-18 Block chain-based smart alarm method and device, and electronic equipment TWI711319B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811482684.8 2018-12-05
CN201811482684.8A CN110033602A (en) 2018-12-05 2018-12-05 Intelligent alarm method and device, electronic equipment based on block chain

Publications (2)

Publication Number Publication Date
TW202037195A true TW202037195A (en) 2020-10-01
TWI711319B TWI711319B (en) 2020-11-21

Family

ID=67235304

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108133588A TWI711319B (en) 2018-12-05 2019-09-18 Block chain-based smart alarm method and device, and electronic equipment

Country Status (3)

Country Link
CN (1) CN110033602A (en)
TW (1) TWI711319B (en)
WO (1) WO2020114112A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033602A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 Intelligent alarm method and device, electronic equipment based on block chain
CN111127824A (en) * 2019-09-17 2020-05-08 中国联合网络通信集团有限公司 Early warning method, device and system
CN112598183A (en) * 2020-12-26 2021-04-02 深圳市八方通达科技有限公司 Crime prediction method, system and storage medium based on block chain

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105118228A (en) * 2015-07-11 2015-12-02 深圳市前海安测信息技术有限公司 Automatic alarm system and method used for monitoring children safety
CN105096420A (en) * 2015-07-31 2015-11-25 北京旷视科技有限公司 Access control system and data processing method for same
CN106056516B (en) * 2016-05-31 2018-12-04 杭州致峰网络科技有限公司 monitoring method and system
CN106205043A (en) * 2016-08-29 2016-12-07 马良花 A kind of campus card of automatic alarm
US10257206B2 (en) * 2016-12-21 2019-04-09 International Business Machines Corporation Monitoring actions performed by a network of peer devices using a blockchain
CN107657401A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Express box monitoring method, device and system based on block chain technology
CN107317730B (en) * 2017-08-21 2020-09-04 上海点融信息科技有限责任公司 Method, equipment and system for monitoring state of block chain node
CN107707633A (en) * 2017-09-19 2018-02-16 深圳市易成自动驾驶技术有限公司 Information of vehicles processing method, equipment and readable storage medium storing program for executing
CN108156133B (en) * 2017-11-28 2021-04-27 黄敬易 Personal safety confirmation method, device and system and user terminal
CN108632381B (en) * 2018-05-14 2020-09-29 浪潮集团有限公司 Block chain-based environment supervision method and system
CN108777703A (en) * 2018-05-15 2018-11-09 维沃移动通信有限公司 A kind of abnormal behaviour processing method and system based on block chain
CN108665253A (en) * 2018-05-18 2018-10-16 百度在线网络技术(北京)有限公司 A kind of data processing method, device, equipment and the storage medium of block chain network
CN108804165A (en) * 2018-05-25 2018-11-13 李昭强 A kind of information processing method, device and storage medium based on user's unlocking behavioural analysis
CN110033602A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 Intelligent alarm method and device, electronic equipment based on block chain

Also Published As

Publication number Publication date
WO2020114112A1 (en) 2020-06-11
TWI711319B (en) 2020-11-21
CN110033602A (en) 2019-07-19

Similar Documents

Publication Publication Date Title
EP3350748B1 (en) Systems for providing online monitoring of released criminals by law enforcement
US11722844B2 (en) Personal monitoring system using a remote timer
TWI711319B (en) Block chain-based smart alarm method and device, and electronic equipment
CN107530011B (en) Personal safety and assurance mobile applications responsive to heart rate changes
US20140120977A1 (en) Methods and systems for providing multiple coordinated safety responses
CN106503666A (en) Safety monitoring method and device and electronic equipment
US9959425B2 (en) Method and system of privacy protection in antagonistic social milieu/dark privacy spots
AU2020200067A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
Handler et al. Security and privacy issues in healthcare monitoring systems: a case study
Saxena et al. IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends.
KR20160131678A (en) Portable device for protecting having camera and method for taking picture
CN105264483A (en) Web portal for managing premise security
US10492053B2 (en) System for a monitored and reconstructible personal rendezvous session
US20230230190A1 (en) Personal protector platform
KR20140019260A (en) How to prevent and respond to individual targets of crime using mobile networks and how to share information with law enforcement authorities
Rupa An Integrated digital authentication mechanism for intrusion detection system
Ahiara et al. An Internet of Things (IoT) Based Neighbourhood Distress Alert System
Sunitha et al. System for Women's Security using IoT
Devi et al. Smart alerting services: Safeguarding women and children in the digital age
Vikruthi et al. Design and Development of IoT based Smart Women Security Gadget
Shrenika et al. Design of smart device with Android based Application for self defense and self-protection-A Women Security Solution
Aiswarya et al. Quarantine Tracker.
Vachhani BACHELOR THESIS ASSIGNMENT
AU2013101014A4 (en) A Method for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
AU2013101013A4 (en) A Method for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)