WO2018028282A1 - 用于可穿戴设备的方法和可穿戴设备及相关的定位系统 - Google Patents
用于可穿戴设备的方法和可穿戴设备及相关的定位系统 Download PDFInfo
- Publication number
- WO2018028282A1 WO2018028282A1 PCT/CN2017/087153 CN2017087153W WO2018028282A1 WO 2018028282 A1 WO2018028282 A1 WO 2018028282A1 CN 2017087153 W CN2017087153 W CN 2017087153W WO 2018028282 A1 WO2018028282 A1 WO 2018028282A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wearable device
- information
- identity information
- module
- wearer
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012544 monitoring process Methods 0.000 claims abstract description 62
- 210000003462 vein Anatomy 0.000 claims description 33
- 238000004891 communication Methods 0.000 claims description 29
- 229910052751 metal Inorganic materials 0.000 claims description 25
- 239000002184 metal Substances 0.000 claims description 25
- 230000001681 protective effect Effects 0.000 claims description 24
- 230000007704 transition Effects 0.000 claims description 12
- 238000006073 displacement reaction Methods 0.000 claims description 6
- 230000009471 action Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 7
- 210000000707 wrist Anatomy 0.000 description 7
- 230000008901 benefit Effects 0.000 description 3
- 239000008280 blood Substances 0.000 description 2
- 210000004369 blood Anatomy 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- WHXSMMKQMYFTQS-UHFFFAOYSA-N Lithium Chemical compound [Li] WHXSMMKQMYFTQS-UHFFFAOYSA-N 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 230000036760 body temperature Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 229910052744 lithium Inorganic materials 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
- G06F1/1694—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675 the I/O peripheral being a single or a set of motion sensors for pointer control or gesture input obtained by sensing movements of the portable computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0225—Monitoring making use of different thresholds, e.g. for different alarm levels
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0286—Tampering or removal detection of the child unit from child or article
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0288—Attachment of child unit to child/article
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/182—Level alarms, e.g. alarms responsive to variables exceeding a threshold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/3888—Arrangements for carrying or protecting transceivers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/20—Cameras or camera modules comprising electronic image sensors; Control thereof for generating image signals from infrared radiation only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/163—Wearable computers, e.g. on a belt
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0266—System arrangements wherein the object is to detect the exact distance between parent and child or surveyor and item
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0272—System arrangements wherein the object is to detect exact location of child or item using triangulation other than GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/30—Transforming light or analogous information into electric information
- H04N5/33—Transforming infrared radiation
Definitions
- the present disclosure relates to the field of wearable technologies, and in particular, to a method and a wearable device for a wearable device and an associated positioning system.
- Existing wearable devices typically include a positioning module and a communication module.
- the wearable device can acquire the wearable device, that is, the position information of the wearer, through the positioning module, and then send the location information to the guardian through the communication module ( Terminals such as parents).
- the guardian can know the position of the wearer in time, thereby preventing the wearer from losing.
- the wearable device may be separated from the wearer when the wearer is not at the guardian's side. This is for example because the wearable device is removed by the wearer or removed by someone other than the guardian and the wearer. In this case, the wearable device can no longer function to position the wearer, and thus does not function to prevent the wearer from losing.
- Embodiments of the present disclosure are directed to methods and wearable devices for wearable devices and related positioning systems.
- embodiments of the present disclosure are directed to a method for a wearable device.
- the wearable device is attached to the wearer by an attachment component.
- the method includes the steps of: collecting identity information of an operator operating the wearable device; detecting whether the collected identity information matches pre-stored target identity information; and collecting the identity information and the target identity letter Disabling the attachment component from the wearer when the information is not matched; acquiring the location information of the wearable device; and transmitting the collected identity information to the monitoring terminal of the wearable device along with the location information .
- the method further includes: acquiring distance information between the wearable device and a preset location; and transmitting the distance information to the Monitor the terminal.
- the method further includes: comparing a distance and a distance threshold indicated by the distance information; and when the distance information When the indicated distance is greater than the distance threshold, the indication information is sent to the monitoring terminal, so that the monitoring terminal sends a first alarm signal according to the indication information.
- the method further includes: when the distance indicated by the distance information is greater than the distance threshold, causing a second to be issued on the wearable device Alarm signal.
- the operator's identity information is a vein image of the operator's finger.
- the collecting step can be performed by acquiring a vein image of the operator's finger via an infrared charge coupled device CCD camera.
- the method further includes: when the collected identity information matches the target identity information, allowing the attachment component to be from the wearer Unlink.
- inventions of the present disclosure are directed to a wearable device.
- the wearable device includes: a positioning module, an identity recognition module, an attachment component, and a communication module.
- the attachment assembly is configured to attach the wearable device to a wearer.
- the identity recognition module is configured to collect identity information of an operator operating the wearable device, detect whether the collected identity information matches pre-stored target identity information, and collect the identity information and the pre-stored target identity. When the information does not match, the attachment component is prohibited from being unattached from the wearer and the collected identity information is sent to the communication module.
- the positioning module is configured to acquire location information of the wearable device, and send the location information to the communication module.
- the communication module is configured to send the collected identity information to the monitoring terminal of the wearable device along with the location information.
- the identity recognition module includes: an identification submodule, a storage submodule, and a control submodule.
- the identification submodule is configured to collect identity information of the operator.
- the deposit is configured to store the target identity information.
- the control submodule is configured to match the collected identity information with the target identity information and determine whether to send the unattached control command to the attached component based on the matching result.
- the wearable device further includes: a protective case.
- the positioning module, the identity recognition module, the attachment component, and the communication module are disposed within the protective case.
- the attachment assembly includes a motor, a spring, a metal handle, and a snap member disposed on a side of the protective case.
- the spring is configured to control the displacement of the metal shank by a transition between a compressed state and a free state.
- the metal handle is configured to be pressed by the spring to be engaged with the engaging member when the spring is in a compressed state, thereby enclosing a closed space together with the side of the engaging member and the protective casing, and when the spring When in the free state, it is possible to generate a displacement under the action of an external force, thereby being separated from the snap-in member and forming a gap therebetween.
- the motor is configured to generate a corresponding motion in accordance with a control command of the control and storage sub-module to control a state transition of the spring.
- the positioning module is further configured to acquire distance information between the wearable device and a preset location, and send the distance information to the control submodule; and the control submodule And transmitting the distance information to the monitoring terminal by using the communication module.
- control submodule is further configured to: when detecting that the distance indicated by the distance information is greater than a distance threshold, send, by using the communication module, indication information to the monitoring terminal, so that the monitoring terminal is configured according to the monitoring terminal The indication information sends a first alarm signal.
- control submodule is further configured to instruct to issue a second alert signal on the wearable device when detecting that the distance indicated by the distance information is greater than a distance threshold.
- the identity information of the operator is a vein image of the operator's finger
- the identification sub-module is a vein recognition sub-module.
- a sensing area is disposed on the surface of the protective shell, such that when the operator's finger is placed on the sensing area, the identification sub-module can acquire the vein of the operator's finger through an infrared charge coupled device CCD camera image.
- the wearable device further includes: a display module disposed on a surface of the protective case.
- the display module is configured to display any one of time, matching result of the collected identity information and the target identity information, an alarm signal, and an operation prompt corresponding to the attached component.
- embodiments of the present disclosure are also directed to a positioning system that includes a monitoring terminal and a wearable device as described above.
- FIG. 1 is a schematic diagram of an implementation environment involved in various embodiments of the present disclosure
- FIG. 3 is a flow chart of another method provided by an embodiment of the present disclosure.
- FIG. 4a is a structural block diagram of a wearable device according to an embodiment of the present disclosure.
- 4b is a structural block diagram of an identity recognition module according to an embodiment of the present disclosure.
- FIG. 5 is a schematic structural diagram of a wearable device according to an embodiment of the present disclosure.
- FIG. 5b is a schematic diagram of an attached state of an attachment assembly according to an embodiment of the present disclosure.
- 5c is a schematic diagram of an unattached state of an attachment assembly provided by an embodiment of the present disclosure.
- FIG. 6 is a schematic diagram of the appearance of a wearable device according to an embodiment of the present disclosure.
- FIG. 1 shows a schematic diagram of an exemplary implementation environment involved in various embodiments of the present disclosure, which may include a monitoring terminal 100 and a wearable device 200.
- the monitoring terminal 100 is held by a guardian.
- the monitoring terminal 100 can be an electronic device such as a desktop computer, a mobile phone, a tablet computer, and a laptop computer.
- the wearable device 200 is worn by the ward, that is, the wearer.
- the wearer can be a child at home, a member of the elderly, or other subject who needs to be supervised.
- the wearable device 200 can collect information about the wearer when worn by the wearer.
- the wearable device 200 can collect location information through a positioning system, such as a GPS, and thereby determine the location of the wearer.
- the wearable device 200 can collect the wearer through the sensor. Physical condition information such as heart rate, body temperature and blood pressure.
- the wearable device 200 can be a portable electronic device that is attached to a body part of the wearer or attached to the wearer's garment or accessory.
- the wearable device can be a wearable watch or wristband attached to the wearer's wrist.
- the wearable device 200 is operable to communicate with the monitoring terminal 100 to periodically transmit the wearer's related information, such as the wearer's location information or physical condition information, to the monitoring terminal 100.
- the wearer's related information may also be transmitted in response to a request from the monitoring terminal 100.
- the monitoring terminal 100 can monitor the position of the wearer or monitor the physical condition of the wearer according to the wearer's related information, thereby achieving the purpose of monitoring.
- communication can be performed using one or more communication technologies. Communication techniques may include radio communication technology, internet technology, and/or any other suitable wireless or wired technology.
- monitoring terminal 100 and one wearable device 200 may exist in the present implementation environment.
- one monitoring terminal 100 can monitor multiple wearable devices 200 (such as in the case that a certain person needs to monitor multiple children and/or elderly people at the same time), or multiple monitoring terminals 100 can Monitor a wearable device 200 (such as if the parent is monitoring the child at the same time).
- the wearable device is worn by the wearer and can transmit information about the wearer to the monitoring terminal.
- the wearable device can also be removed from the wearer and thus separated from the wearer.
- the information received by the monitoring terminal from the wearable device may not represent the real condition of the wearer.
- the guardian continues to rely on such information for monitoring, the purpose of effective monitoring will not be achieved.
- the wearable device can be the wearable device 200 in the implementation environment shown in Figure 1, attached to the wearer by an attachment assembly, that is, worn by the wearer. As shown in FIG. 2, the method includes the following steps.
- Step 201 Collect identity information of an operator operating the wearable device.
- the operation may be to remove the wearable device from the wearer. Removal may refer to disengaging the accessory assembly from the wearer to separate the wearable device from the wearer.
- the operator can be either the wearer's guardian or the wearer himself. In some cases, the operator may also be some who want to steal or A person who has maliciously attempted to damage the wearable device.
- the collection of identity information can be done in a variety of ways. For example, the acquisition can be done by picking up the operator's voice. Alternatively, the acquisition can also be performed by taking an image of a certain body part of the operator.
- Step 202 Detect whether the collected identity information matches the pre-stored target identity information.
- the target identity information may be identity information of a target operator that is authorized to remove the wearable device.
- the target operator is typically the operator of the monitoring terminal of the wearable device, ie the guardian of the wearer of the wearable device. Alternatively, the target operator may also be a person who has obtained the trust of the guardian.
- the target identity information may be pre-collected and stored into the wearable device before the wearable device is used, and the target identity information may be identity information of one or more persons.
- Step 203 When the collected identity information does not match the target identity information, the attachment component is prohibited from being unattached from the wearer. Disabling the attachment assembly from unattaching can prevent the operator from removing the wearable device from the wearer. In some embodiments, the wearable device is prevented from being removed from the wearer by inhibiting the transition of the attachment assembly from the buckled state to the unlocked state. For example, when the wearable watch is worn on the wearer's wrist by the strap, the wearable device can be prevented from being removed from the wearer by disabling the strap of the strap.
- Step 204 Obtain location information of the wearable device. Since the wearable device is being worn by the wearer, the positional information of the wearable device also indicates the position of the wearer. Herein, when the wearer wears the wearable device, the position of the wearable device and the position of the wearer can be used interchangeably.
- the acquisition of location information may be performed periodically at predetermined intervals or immediately upon request. In some embodiments, once it is detected that the collected identity information does not match the target identity information, the acquisition of the location information is performed immediately. This makes it more accurate to know where the unlicensed operator wants to operate the wearable device.
- Step 205 Send the collected identity information along with the location information to the monitoring terminal of the wearable device.
- the monitoring terminal may be a terminal operated and monitored by the wearer's guardian.
- the wearable device can prohibit the attachment component from being unattached from the wearer when the identity information of the operator does not match the pre-stored target identity information, and at the same time, the identity of the collected operator
- the information and the wearer's location information are sent to the monitoring terminal of the wearable device.
- this increases the difficulty for an unauthorized operator to remove the wearable device from the wearer, making it easier for the guardian to obtain the wearer.
- the wearer's location information At the same time, this also enables the guardian to obtain the identity information of the unlicensed operator in time, thereby improving the safety and reliability of the wearable device.
- FIG. 3 illustrates a flow chart of another method for a wearable device in accordance with some embodiments of the present disclosure.
- the wearable device can be a wearable device 200 for use in the implementation environment shown in Figure 1, attached to the wearer by an attachment assembly. As shown in FIG. 3, the method includes the following steps.
- Step 301 Collect identity information of an operator operating the wearable device.
- the operator's identity information may be a vein image of the operator's finger.
- the acquisition can be performed by capturing a vein image of the operator's finger through an infrared charge coupled device (English: Charge-coupled Device; CCD) camera, and then using a finger vein recognition technique to generate a vein image based on the finger And identify the identity information of the operator.
- the finger vein recognition technique is a biometric recognition technique that uses an image of the internal vein of a finger for identification. This technique uses light of a specific wavelength to illuminate the finger so that it is absorbed by the blood flowing in the finger, thereby obtaining a vein image of the finger. Since the transmitted light penetrates the finger to acquire the internal vein image feature, the accuracy of the vein image of the finger is high.
- the operator's fingers and the wearable device may not be in contact, so there is no risk that the vein features will be maliciously copied by others.
- the blood in the finger is required to flow, so that others cannot make a fake.
- the identification of the identification via the finger vein image is high.
- the entire identification process can take less than a second, so the operation is very convenient.
- operator's identity information may also be other biometric statistical information, such as operator fingerprint information, palm print information, and the like.
- Step 302 Detect whether the collected identity information matches the pre-stored target identity information. When the collected identity information does not match the target identity information, step 303 is performed; when the collected identity information matches the target identity information, step 310 is performed.
- the target identity information pre-stored in the wearable device may be the identity information of the guardian.
- the identity information may be a fingerprint information of the guardian, a vein image of the guardian's finger, or the like.
- step 301 can collect the fingerprint information of the operator.
- step 301 can acquire a vein image of the operator's finger.
- Step 303 prohibiting the attachment component from being unattached from the wearer.
- the wearable device detects that the collected operator identity information does not match the pre-stored target identity information, indicating The current operator is not a licensed operator, such as a guardian.
- the attachment assembly remains attached, such as in a latched state, thereby preventing the wearable device from being removed. In this way, it is more difficult for an unauthorized operator to remove the wearable device from the wearer, so that the guardian can continue to monitor the wearer's position information.
- the wearable device can be attached to the wearer by an attachment assembly. When attached to the wearer, ie worn by the wearer, the attachment assembly is attached.
- the strap when a wearable watch is worn on the wearer's wrist, the strap is in a locked state.
- the wearable device When the wearable device is to be removed from the wearer, it is necessary to transition the attachment assembly from the attached state to the unattached state.
- the buckle of the strap needs to be untied to make it unfastened.
- Step 304 Obtain location information of the wearable device.
- the wearable device obtains current location information to implement the location function.
- the wearable device can timely transmit the acquired location information, that is, the location information of the wearer to the monitoring terminal, so that the guardian can understand the location of the wearer in substantially real time.
- distance information indicating a distance between the wearer and a certain preset position may also be acquired.
- the preset location may be the location of the monitoring terminal.
- the preset position may also be a fixed position, such as a place known to the wearer that the wearer should currently stay, such as the child's school or the museum the child is currently visiting.
- the wearable device can obtain the distance information indicating the position of the wearer and the monitoring terminal or the distance between the fixed position, and send the distance information to the monitoring terminal, so that the guardian can know the distance of the wearer from the self or the fixed position at any time. how far.
- step 306 it may be detected whether the distance indicated by the distance information is greater than a distance threshold.
- the detection can be performed by a wearable device.
- the distance threshold can be set to 50 meters.
- the indication information may be sent to the monitoring terminal, so that the monitoring terminal sends the first alarm signal according to the indication information.
- the indication information may be sent by the wearable device to the monitoring terminal, and the first alarm signal is used to prompt the guardian.
- the first warning signal may be: Your child has been more than 50 meters away from you.
- the wearable device may also be caused to issue a second alert signal.
- the second alert signal is used to prompt the wearer.
- the second alarm signal can be: your distance from the mother It has been more than 50 meters away.
- the second alert signal can be received by a person in the vicinity of the wearer. This allows the wearer to get help from nearby people in an emergency.
- the distance threshold used in step 307 is a first distance threshold
- the distance threshold used in step 308 is a second distance threshold.
- the first distance threshold and the second distance threshold may be the same or different.
- the second distance threshold may be less than the first distance threshold to enable the wearer to be prompted relatively earlier, thereby being more likely to remain active within a safe range.
- step 308 and step 307 are not dependent on order. Those skilled in the art having the benefit of this description will recognize alternative ordering. For example, step 308 and step 307 can be performed simultaneously.
- Step 309 When the collected identity information does not match the target identity information, after acquiring the location information of the wearable device, the collected identity information is sent to the monitoring terminal along with the location information. This enables the guardian to know in time that an unauthorized operator is attempting to remove the wearer, that is, the wearable device worn by the ward, and find the ward in time based on the identity information and the wearer's location information. And determine the identity of the unlicensed operator.
- the monitoring terminal may also issue a third alarm signal to prompt the custodian: an unlicensed operator is operating the wearable Equipment, and thus the current time the ward is in a more dangerous environment.
- the alarm signal may be in the form of a voice prompt, such as using a voice to broadcast related prompt information.
- the alert signal may be in the form of a visual cue, such as displaying relevant cue information on the display screen of the monitoring terminal/wearable device, blinking a certain signal light on the monitoring terminal/wearable device, and the like.
- the alert signal can also be in any other suitable manner that can be brought to the attention of the guardian/wearer.
- Step 310 When the collected identity information matches the target identity information, the attachment component is allowed to be unattached from the wearer.
- the matching of the collected operator's identity information with the pre-stored target identity information indicates that the operator is a licensed operator, such as a guardian.
- the wearable device allows the attachment assembly to be unattached from the wearer, allowing the guardian to remove/remove the wearable device from the wearer at any time.
- FIG. 4a illustrates a block diagram of a structure of a wearable device 200 in accordance with some embodiments of the present disclosure.
- the wearable device 200 includes a positioning module 410, an identity recognition module 420, an attachment component 430, and a communication module 440.
- Attachment assembly 430 is configured to attach the wearable device to the wearer.
- the identity recognition module 420 is configured to collect identity information of an operator operating the wearable device, detect whether the collected identity information matches the pre-stored target identity information, and does not match the collected identity information with the pre-stored target identity information.
- the attachment assembly is inhibited from being unattached from the wearer, thereby preventing the wearable device 200 from being removed from the wearer and transmitting the collected identity information to the communication module 440.
- the location module 410 is configured to acquire location information of the wearable device 200 and transmit the location information to the communication module 440.
- the communication module 440 is configured to transmit the collected identity information along with the location information to the monitoring terminal of the wearable device.
- the positioning module 410 can be a Global Positioning System (GPS) module.
- the communication module 440 can be a module that communicates by using a wireless communication technology, such as a General Packet Radio Service (English: General Packet Radio Service; GPRS) module.
- GPRS General Packet Radio Service
- FIG. 4b shows a block diagram of the architecture of the identity recognition module 420, in accordance with some embodiments of the present disclosure.
- the identity module 420 includes an identification submodule 421, a storage submodule 422, and a control submodule 423.
- the identification sub-module 421 is configured to collect the identity information of the operator.
- the operator's identity information may be a vein image of the operator's finger, or may be an operator's fingerprint information or any applicable biometric statistics.
- the storage sub-module 422 is configured to store target identity information.
- the target identity information can be the identity information of the guardian.
- the target identity information may be fingerprint information or a vein image of a finger.
- the identification sub-module may collect the fingerprint information of the operator; when the pre-stored target identity information is a vein image of the guardian's finger, the recognition sub-module may collect the operator's finger The vein image.
- the control sub-module 423 is configured to compare the collected identity information with the target identity information to detect whether the two match, and determine whether to send the unattached control command to the attach component based on the matching result. In some embodiments, the control sub-module 423 is configured to not send to the attached component when the collected identity information does not match the target identity information. A release control command is sent to disable the attachment assembly from being unattached from the wearer. The control sub-module 423 is further configured to transmit an un-attached control command to the attachment component when the acquired identity information matches the target information to allow the attachment component to be unattached from the wearer.
- the unattached command may cause the attachment assembly to transition from an attached state (eg, preventing the wearer from removing the wearable device from being locked) to an unattached state (eg, allowing the wearable device to be removed from the wearer) Open state).
- an attached state eg, preventing the wearer from removing the wearable device from being locked
- an unattached state eg, allowing the wearable device to be removed from the wearer
- a mismatch between the operator's identity information and the pre-stored target identity information indicates that the operator is not a licensed operator, such as a guardian.
- the control sub-module prohibits the attachment assembly from being unattached from the wearer. In this way, the difficulty of disassembling the wearable device from the wearer by the unauthorized operator is increased, so that the guardian can continue to obtain the position information of the wearer.
- the operator's identity information matches the pre-stored target identity information and the attachment component transitions to the unattached state according to the control command, the operator can open the attachment component to remove the wearable device from the wearer.
- the positioning module 420 is further configured to acquire distance information indicating a distance between the wearer and a preset position, such as a monitoring terminal, and send the distance information to the control sub-module 423.
- the positioning module not only monitors the position of the wearer in real time, but also monitors the wearer's distance from the preset position in real time.
- the control sub-module can send the distance information acquired by the positioning module to the monitoring terminal of the wearable device through the communication module, so that the guardian can know the distance of the wearer from the preset position, such as how far away from the user.
- control submodule 423 is further configured to: when detecting that the distance indicated by the distance information is greater than the first distance threshold, send the indication information to the monitoring terminal by using the communication module, so that the monitoring terminal sends the first alarm signal according to the indication information.
- the first alert signal is used to alert the guardian.
- the distance threshold can be 50 meters.
- control submodule 423 is further configured to instruct to issue a second alert signal on the wearable device when detecting that the distance indicated by the distance information is greater than the second distance threshold.
- the first distance threshold may be equal to the second distance threshold.
- the second alert signal is used to alert the wearer and/or to a person in the vicinity of the wearer for help. For example, when the distance between the wearer and the monitoring terminal is greater than 50 meters, both the wearable device and the monitoring terminal can issue an alarm signal, which will prevent the wearer from losing.
- FIG. 5a shows a block diagram of a wearable device 200 in accordance with some embodiments of the present disclosure.
- the wearable device 200 includes a protective case 450 and a positioning module 410 disposed within the protective case 450, an identification module 420, an attachment assembly 430, and communication. Module (not shown in Figure 5a).
- the wearer can wear the wearable device through the attachment assembly 430, such as by the attachment component 430 being hooked onto the strap of the wearer's wrist or other structure of the wearer's wrist.
- the identity module 420 can include an identification sub-module 421 and a control and storage sub-module 424.
- the attachment assembly 430 may include a motor 431, a spring 432, a metal handle 433, and a snap member 434 disposed at a side of the protective case 450, and is switched between an attached state and an unattached state by an action of each component.
- one end of the spring 432 is in contact with the motor 431, and the other end of the spring 432 is in contact with one end of the metal shank 433.
- the longitudinal direction of the motor 431 is perpendicular to the long axis direction of the spring 432.
- the spring 432 is configured to control the displacement of the metal shank by a transition between a compressed state and a free state.
- the metal handle 433 is configured to fit or separate from the snap-fit component 434 based on a state transition of the spring.
- FIG. 5b shows a schematic diagram of an attached state of the attachment assembly 430 in accordance with some embodiments of the present disclosure.
- the spring 432 In the attached state of the attachment assembly 430 (shown in the locked state), the spring 432 is in a compressed state, which presses the metal handle 433 to engage the other end of the metal handle 433 with the snap member 434, thereby engaging the card
- the component and the side of the protective casing together enclose a closed space.
- the strap on the wrist of the wearer or other structure on the wearer can be locked in the closed space formed by the side of the metal handle 433, the snap member 434 and the protective case 450, thus making the wearable device Attached to the wearer.
- FIG. 5c shows a schematic diagram of the unattached state of the attachment assembly 430, in accordance with some embodiments of the present disclosure.
- the spring 432 In the unattached state of the attachment assembly 430 (shown in an open state), the spring 432 is in a free state, thereby allowing the metal shank 433 to be displaced under the action of an external force, thereby being separated from the snap member 434, and in the metal handle and A gap is formed between the snap members.
- the operator can press the metal handle 433 such that the metal handle 433 slides and separates from the snap member 434.
- the other end of the metal handle 433 is not attached to the engaging member 434 and thereby a gap is formed therebetween.
- a strap or other structure on the wearer can be removed from the space formed by the sides of the metal handle 433, the snap member 434 and the protective shell 450 via the gap to remove the wearable device from the wearer.
- the motor 431 can generate a corresponding motion according to a control command of the control and storage sub-module 424 to control the state transition of the spring 432 and thereby control the displacement of the metal shank 433, The state transition of the attachment assembly 430 is thereby achieved. For example, when the motor 431 receives the de-attached control command sent by the control and storage sub-module 424, the motor 431 activates and generates a rotation to cause the spring 432 to change from the compressed state to the free state.
- the control and storage sub-module 423 can compare the operator's identity information with the pre-stored target identity information using a comparison algorithm, and when the operator's identity information matches the target identity information (eg, indicating that the operator is a guardian)
- the release command is sent to the motor 431, such as an instruction to open the attached component.
- the motor 431 Upon receipt of the open command, the motor 431 will, for example, rotate clockwise such that the spring 432 changes from a compressed state to a free state, and in turn causes the metal shank 433 to be pushed to form a gap with the snap member 434.
- the motor 431 can be held in the rotated position for 2 minutes to allow the operator sufficient time to manipulate, such as pressing the metal handle to remove the strap or other structure on the wearer via the gap, thereby from the wearer. Remove the wearable device.
- the control and storage sub-module 423 will not send a control command to the motor 431.
- the motor does not start and does not rotate, so that the metal handle 433 cannot be manipulated, and thus still encloses a closed space together with the side of the snap member and the protective case. In this way, the strap or other structure on the wearer is still locked in the closed space so that the wearable device will not be removed from the wearer.
- the motor 431 is further configured to return to a position prior to rotation after rotation for a predetermined period of time.
- the motor 431 can be automatically rotated counterclockwise back to the position before the motor was rotated, such that the spring 432 changes from a free state to a compressed state. At this time, the spring 432 presses the metal handle 433 to return to the engagement with the engaging member 434 and cannot slide.
- the protective case 450 further includes a housing 451 and a cover 452.
- a cover 452 is disposed at an upper end of the housing 451, and the cover 452 is engaged with the housing 451 to form an enclosed space to accommodate and protect various components of the wearable device.
- the operator's identity information is a vein image of the operator's finger.
- the identification sub-module 421 is a vein recognition sub-module.
- a sensing area 4521 is provided on the surface of the protective case, such as the surface of the cover 452.
- the recognition sub-module 421 can capture the vein image of the operator's finger through the infrared CCD camera.
- the identification sub-module 421 irradiates the light of a specific wavelength emitted by the infrared CCD to the sensing area 4521.
- the recognition sub-module 421 collects a vein image of the operator's finger and, in turn, identifies the operator's identity.
- the sensing area can be set to be similar The structure of the switch button.
- the identification sub-module can immediately collect the operator's identity information, such as a vein image of the finger.
- the guardian can press a finger on the sensing area 4521. in advance so that the identification sub-module collects the guardian's target identity. information.
- the identification sub-module 421 is a fingerprint identification sub-module.
- the wearable device 200 further includes a display module 460 disposed on the surface of the protective case.
- the display module 460 can be disposed within the recessed area 4522 on the cover 452.
- the display module 460 can be used to display any of the time, the matching result of the identity information and the target identity information, the warning signal, and the operation prompt corresponding to the attachment component.
- the display module may display an "identity mismatch" when the operator's identity information does not match the target identity information.
- the display module 460 can display: "You have walked out of the safe zone.” In yet another example, when the motor of the attachment assembly returns to its pre-rotation position after 5 seconds, the display module 460 can display: "The attachment assembly will lock after 5 seconds.”
- the wearable device 200 further includes: a power module 470.
- the power module 470 is disposed within the protective case 450.
- the power module is used to power the wearable device.
- the power module is a polymer lithium battery or a button battery.
- the power module is a rechargeable battery.
- any of the functions described herein can be implemented using software, firmware, hardware (eg, fixed logic circuitry), manual processing, or a combination of these implementations.
- the terms "module,” “function,” and “logic” as used herein generally mean software, firmware, hardware, or a combination thereof.
- a module, function, or logic represents program code or instructions that perform a specified task when executed on or by a processor (eg, one or more CPUs).
- the program code or instructions may be stored in one or more computer readable storage devices.
- the features of the techniques described herein are platform-independent, meaning that these techniques can be implemented on a wide variety of commercial computing platforms having a wide variety of processors.
- FIG. 6 illustrates a schematic view of the appearance of a wearable device in accordance with some embodiments of the present disclosure.
- the protective case of the wearable device includes a housing 451 and a case cover 452.
- the cover 452 is provided with a sensing area 4521 and a display module 460.
- One end of the metal handle 433 of the accessory assembly is engaged with the snap member 434 to place the accessory assembly in an attached state.
- the wearable device can send the identity information of the unlicensed operator and the location information of the wearable device to the monitoring terminal of the wearable device when the identity information of the operator does not match the pre-stored target identity information, so as to facilitate The guardian promptly understands the wearer's dangerous condition and refers to the unauthorized operator's identity information and the wearer's location information for subsequent tracking when the wearer is lost.
- the wearable device can prohibit the attachment component from being unattached from the wearer when the operator's identity information does not match the pre-stored target identity information, and the collected operator's identity information and the wearer's identity information
- the location information is sent to the monitoring terminal of the wearable device. This increases the difficulty for an unauthorized operator to disassemble the wearable device as compared to conventional wearable devices, allowing the guardian to continue to obtain the wearer's location information. At the same time, this also enables the guardian to obtain the identity information of the unlicensed operator in time, thereby improving the safety and reliability of the wearable device.
- the wearable device according to an embodiment of the present disclosure has a simple structure and is easy to implement.
- Embodiments of the present disclosure also provide a positioning system including a monitoring terminal and a wearable device.
- the wearable device may be a wearable device in accordance with an embodiment of the present disclosure, such as the wearable device illustrated in Figures 4a, 4b, 5a, or 6.
- the wearable device is for performing a method in accordance with an embodiment of the present disclosure.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Emergency Management (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Emergency Alarm Devices (AREA)
Abstract
Description
Claims (15)
- 一种用于可穿戴设备的方法,所述可穿戴设备通过附连组件而附连于佩戴者,所述方法包括以下步骤:采集操作所述可穿戴设备的操作者的身份信息;检测所采集的身份信息与预存的目标身份信息是否匹配;当所采集的身份信息与所述目标身份信息不匹配时,禁止所述附连组件从佩戴者解除附连;获取所述可穿戴设备的位置信息;以及将所采集的身份信息随所述位置信息一起发送至该可穿戴设备的监控终端。
- 根据权利要求1所述的方法,其中,在所述获取步骤之后,所述方法还包括:获取所述可穿戴设备与预设位置之间的距离信息;以及将所述距离信息发送至所述监控终端。
- 根据权利要求2所述的方法,其中,在所述获取所述可穿戴设备与所述预设位置之间的距离信息之后,所述方法还包括:比较所述距离信息指示的距离与距离阈值;以及当所述距离信息指示的距离大于所述距离阈值时,向所述监控终端发送指示信息,以使所述监控终端根据所述指示信息发出第一告警信号。
- 根据权利要求3所述的方法,其中,所述方法还包括:当所述距离信息指示的距离大于所述距离阈值时,使得在所述可穿戴设备上发出第二告警信号。
- 根据权利要求1至4任一所述的方法所述的方法,其中,所述操作者的身份信息为所述操作者的手指的静脉图像,且所述采集步骤包括:通过红外线电荷耦合元件CCD摄像头获取所述操作者的手指的静脉图像。
- 根据权利要求1至5任一所述的方法,其中,在所述检测步骤之后,所述方法还包括:当所采集身份信息与所述目标身份信息匹配时,允许所述附连组件从佩戴者解除附连。
- 一种可穿戴设备,包括:附连组件、身份识别模块、定位模块和通信模块,所述附连组件被配置用于将该可穿戴设备附连于佩戴者;所述身份识别模块被配置用于采集操作所述可穿戴设备的操作者的身份信息,检测所采集的身份信息与预存的目标身份信息是否匹配,且在所采集的身份信息与预存的目标身份信息不匹配时,禁止所述附连组件从佩戴者解除附连,并将所采集的身份信息发送至所述通信模块;所述定位模块用于获取所述可穿戴设备的位置信息,并将所述位置信息发送至所述通信模块;以及所述通信模块用于将所采集的身份信息随所述位置信息一起发送至该可穿戴设备的监控终端。
- 根据权利要求7所述的可穿戴设备,其中,所述身份识别模块包括:识别子模块、存储子模块和控制子模块,所述识别子模块用于采集所述操作者的身份信息;所述存储子模块用于存储所述目标身份信息;以及所述控制子模块用于将所采集的身份信息与所述目标身份信息进行匹配,且基于匹配结果来决定是否向附连组件发送解除附连的控制指令。
- 根据权利要求8所述的可穿戴设备,其中,所述可穿戴设备还包括:保护壳,所述定位模块、所述身份识别模块、所述附连组件和所述通信模块被设置在所述保护壳内;所述附连组件包括电机、弹簧、金属柄以及设置在所述保护壳的侧面的卡接部件;所述弹簧被配置为:通过在压缩状态和自由状态之间的转变来控制金属柄的位移;所述金属柄被配置为:当弹簧处于压缩状态时,被弹簧抵压成与卡接部件贴合,从而与所述卡接部件和所述保护壳的侧面一起围成闭合空间,而当弹簧处于自由状态时能够在外力的作用下产生位移,从而与卡接部件分开且在两者之间形成间隙;以及所述电机被配置为:根据控制子模块的控制指令来产生相应的运 动,以控制弹簧的状态转变。
- 根据权利要求8所述的可穿戴设备,其中,所述定位模块还被配置用于获取所述可穿戴设备与预设位置之间的距离信息,并将所述距离信息发送至所述控制子模块;以及所述控制子模块用于将所述距离信息通过所述通信模块发送至所述监控终端。
- 根据权利要求10所述的可穿戴设备,其中,所述控制子模块还被配置用于在检测到所述距离信息指示的距离大于距离阈值时,通过所述通信模块向所述监控终端发送指示信息,以使所述监控终端根据所述指示信息发出第一告警信号。
- 根据权利要求11所述的可穿戴设备,其中,所述控制子模块还用于在检测到所述距离信息指示的距离大于距离阈值时,指令在所述可穿戴设备上发出第二告警信号。
- 根据权利要求12所述的可穿戴设备,其中,所述操作者的身份信息为所述操作者的手指的静脉图像,所述识别子模块为静脉识别子模块,以及所述保护壳表面上设置有感应区,使得当所述操作者的手指放在所述感应区上时,所述识别子模块能够通过红外线电荷耦合元件CCD摄像头获取所述操作者的手指的静脉图像。
- 根据权利要求11或12所述的可穿戴设备,其中,所述可穿戴设备还包括:设置于保护壳表面上的显示模块,所述显示模块被配置用于显示时间、所采集的身份信息与所述目标身份信息的匹配结果、告警信号以及所述附连组件对应的操作提示中的任意一种。
- 一种定位系统,其中,包括如权利要求7至14任一项所述的可穿戴设备以及用于监控该可穿戴设备的监控终端。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/567,906 US10635796B2 (en) | 2016-08-11 | 2017-06-05 | Method for wearable device as well as wearable device and positioning system associated therewith |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610659719.5A CN106059615A (zh) | 2016-08-11 | 2016-08-11 | 定位方法及系统、可穿戴设备 |
CN201610659719.5 | 2016-08-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018028282A1 true WO2018028282A1 (zh) | 2018-02-15 |
Family
ID=57480449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/087153 WO2018028282A1 (zh) | 2016-08-11 | 2017-06-05 | 用于可穿戴设备的方法和可穿戴设备及相关的定位系统 |
Country Status (3)
Country | Link |
---|---|
US (1) | US10635796B2 (zh) |
CN (1) | CN106059615A (zh) |
WO (1) | WO2018028282A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112950893A (zh) * | 2021-01-27 | 2021-06-11 | 武汉中元华电科技股份有限公司 | 五防系统安全手环装置及控制方法 |
CN113891242A (zh) * | 2021-11-08 | 2022-01-04 | 广东乐心医疗电子股份有限公司 | 智能可穿戴设备的定位方法、装置以及系统 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106059615A (zh) | 2016-08-11 | 2016-10-26 | 京东方科技集团股份有限公司 | 定位方法及系统、可穿戴设备 |
CN107025761B (zh) * | 2017-04-19 | 2020-12-01 | 杭州联络互动信息科技股份有限公司 | 一种安抚奶嘴装置 |
US11036465B2 (en) * | 2019-10-28 | 2021-06-15 | Bose Corporation | Sleep detection system for wearable audio device |
CN110941864A (zh) * | 2019-11-12 | 2020-03-31 | 维沃移动通信有限公司 | 设备防丢失方法及智能穿戴设备 |
CN111265222A (zh) * | 2020-03-24 | 2020-06-12 | 孙孟良 | 一种icu患者非计划性拔管预警系统 |
CN114694413A (zh) * | 2020-12-30 | 2022-07-01 | 广东小天才科技有限公司 | 减少交通事故的交互方法及提醒系统 |
JP2022176817A (ja) * | 2021-05-17 | 2022-11-30 | 株式会社日立製作所 | 作業支援装置および作業支援方法 |
CN115297261A (zh) * | 2022-08-08 | 2022-11-04 | 杨志强 | 一种基于可穿戴智能设备的作业人员身份识别设备 |
US12046122B1 (en) * | 2023-01-05 | 2024-07-23 | Tawfeeq Baban | Lockable tracking bracelet for people and objects |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104183086A (zh) * | 2014-09-03 | 2014-12-03 | 杨伟特 | 一种人身安全防护方式及系统 |
CN204515777U (zh) * | 2015-03-26 | 2015-07-29 | 深圳市亚略特生物识别科技有限公司 | 身份识别装置 |
CN204931655U (zh) * | 2015-09-02 | 2016-01-06 | 美的集团股份有限公司 | 多功能智能监护镯子 |
CN105224847A (zh) * | 2015-09-23 | 2016-01-06 | 广东小天才科技有限公司 | 一种智能手表安全预警的方法及装置 |
CN105354901A (zh) * | 2015-11-02 | 2016-02-24 | 伍箭 | 一种基于指纹识别的儿童防丢方法及设备 |
CN106059615A (zh) * | 2016-08-11 | 2016-10-26 | 京东方科技集团股份有限公司 | 定位方法及系统、可穿戴设备 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110121975A1 (en) * | 2009-11-25 | 2011-05-26 | Dasher Dale L | Mobile system for probation release monitoring programs and other security-oriented applications |
US9937355B2 (en) * | 2010-11-08 | 2018-04-10 | Zoll Medical Corporation | Remote medical device alarm |
EP3007029B1 (en) * | 2014-10-07 | 2017-12-27 | LG Electronics Inc. | Mobile terminal and wearable device |
US9697657B2 (en) * | 2014-12-24 | 2017-07-04 | Intel Corporation | Techniques for access control using wearable devices |
CN205281757U (zh) * | 2015-04-15 | 2016-06-01 | 肖存华 | 智能防丢系统 |
WO2017031256A1 (en) * | 2015-08-17 | 2017-02-23 | Verie, Llc | Methods and systems for providing online monitoring of released criminals by law enforcement |
JP2017049762A (ja) * | 2015-09-01 | 2017-03-09 | 株式会社東芝 | システム及び方法 |
CN204964769U (zh) | 2015-09-22 | 2016-01-13 | 郭津汝 | 一种便携式儿童防丢失定位器 |
CN105829911A (zh) * | 2015-09-23 | 2016-08-03 | 深圳还是威健康科技有限公司 | 一种防止走失的方法、智能手环及终端 |
CN105551161B (zh) * | 2015-09-28 | 2018-05-15 | 宇龙计算机通信科技(深圳)有限公司 | 一种报警方法及用户终端 |
CN205121806U (zh) | 2015-10-27 | 2016-03-30 | 新乡医学院 | 一种儿童防丢失报警装置 |
CN205250561U (zh) * | 2015-12-18 | 2016-05-25 | 重庆蓝岸通讯技术有限公司 | 一种防拆卸的穿戴设备 |
US10133857B2 (en) * | 2016-05-18 | 2018-11-20 | Bank Of America Corporation | Phalangeal authentication device |
-
2016
- 2016-08-11 CN CN201610659719.5A patent/CN106059615A/zh active Pending
-
2017
- 2017-06-05 US US15/567,906 patent/US10635796B2/en active Active
- 2017-06-05 WO PCT/CN2017/087153 patent/WO2018028282A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104183086A (zh) * | 2014-09-03 | 2014-12-03 | 杨伟特 | 一种人身安全防护方式及系统 |
CN204515777U (zh) * | 2015-03-26 | 2015-07-29 | 深圳市亚略特生物识别科技有限公司 | 身份识别装置 |
CN204931655U (zh) * | 2015-09-02 | 2016-01-06 | 美的集团股份有限公司 | 多功能智能监护镯子 |
CN105224847A (zh) * | 2015-09-23 | 2016-01-06 | 广东小天才科技有限公司 | 一种智能手表安全预警的方法及装置 |
CN105354901A (zh) * | 2015-11-02 | 2016-02-24 | 伍箭 | 一种基于指纹识别的儿童防丢方法及设备 |
CN106059615A (zh) * | 2016-08-11 | 2016-10-26 | 京东方科技集团股份有限公司 | 定位方法及系统、可穿戴设备 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112950893A (zh) * | 2021-01-27 | 2021-06-11 | 武汉中元华电科技股份有限公司 | 五防系统安全手环装置及控制方法 |
CN113891242A (zh) * | 2021-11-08 | 2022-01-04 | 广东乐心医疗电子股份有限公司 | 智能可穿戴设备的定位方法、装置以及系统 |
CN113891242B (zh) * | 2021-11-08 | 2024-02-13 | 广东乐心医疗电子股份有限公司 | 智能可穿戴设备的定位方法、装置以及系统 |
Also Published As
Publication number | Publication date |
---|---|
US20180293369A1 (en) | 2018-10-11 |
US10635796B2 (en) | 2020-04-28 |
CN106059615A (zh) | 2016-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018028282A1 (zh) | 用于可穿戴设备的方法和可穿戴设备及相关的定位系统 | |
US11860987B2 (en) | Information processing device, application software start-up system, and application software start-up method | |
US10388130B2 (en) | Anti-theft method and system for baby stroller | |
WO2019024414A1 (zh) | 防止走失方法及终端设备 | |
WO2020125406A1 (zh) | 安全监护方法、装置、终端及计算机可读存储介质 | |
US10187364B2 (en) | Wearable user device for use in a user authentication system | |
US11722844B2 (en) | Personal monitoring system using a remote timer | |
JP5964190B2 (ja) | 端末装置 | |
JP6333603B2 (ja) | 情報処理装置及び情報処理システム | |
US20160050308A1 (en) | Movement-based, user identity authenticated unlocking and locking triggers for smartphones and wearable mobile devices | |
US20080266089A1 (en) | Electronic device security system and method | |
CN105224847B (zh) | 一种智能手表安全预警的方法及装置 | |
WO2018121792A1 (zh) | 一种电子监护器及其控制方法 | |
TWI585283B (zh) | Blue door lock system with emergency notification function and its operation method | |
KR20170067251A (ko) | 스마트기기를 이용한 긴급상황 구조요청방법 | |
US20150235016A1 (en) | Authentication device, authentication method and program | |
US20190186868A1 (en) | Method and system for securing firearms | |
JP7384154B2 (ja) | 情報処理装置、情報処理方法、情報処理プログラム、端末装置、端末装置の制御方法および制御プログラム | |
KR102047337B1 (ko) | 자전거 도난방지 구조 | |
CN105828025A (zh) | 采用内置相机的匿名解除检测 | |
CN105718780B (zh) | 一种锁屏模式的切换方法及终端 | |
CN105761424B (zh) | 一种信息验证方法和电子设备 | |
US10028118B2 (en) | Intelligent security identification apparatus and system | |
KR20200015291A (ko) | 시계형 스마트 웨어러블 장치 및 이를 포함하는 모니터링 시스템 | |
JP2002302811A (ja) | Gps付き衣服 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 15567906 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17838414 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 28/06/2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17838414 Country of ref document: EP Kind code of ref document: A1 |