WO2020173458A1 - 一种数据分析方法、电子设备及计算机可读介质 - Google Patents
一种数据分析方法、电子设备及计算机可读介质 Download PDFInfo
- Publication number
- WO2020173458A1 WO2020173458A1 PCT/CN2020/076759 CN2020076759W WO2020173458A1 WO 2020173458 A1 WO2020173458 A1 WO 2020173458A1 CN 2020076759 W CN2020076759 W CN 2020076759W WO 2020173458 A1 WO2020173458 A1 WO 2020173458A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- smart contract
- vehicle
- itinerary
- order
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000007405 data analysis Methods 0.000 title claims abstract description 15
- 238000012544 monitoring process Methods 0.000 claims abstract description 100
- 230000001960 triggered effect Effects 0.000 claims abstract description 26
- 230000001133 acceleration Effects 0.000 claims description 20
- 238000012806 monitoring device Methods 0.000 claims description 8
- 230000004913 activation Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000008921 facial expression Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 230000029305 taxis Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W50/00—Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
- B60W50/08—Interaction between the driver and the control system
- B60W50/14—Means for informing the driver, warning the driver or prompting a driver intervention
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/46—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W40/00—Estimation or calculation of non-directly measurable driving parameters for road vehicle drive control systems not related to the control of a particular sub unit, e.g. by using mathematical models
- B60W40/08—Estimation or calculation of non-directly measurable driving parameters for road vehicle drive control systems not related to the control of a particular sub unit, e.g. by using mathematical models related to drivers or passengers
- B60W40/09—Driving style or behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/56—Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/59—Context or environment of the image inside of a vehicle, e.g. relating to seat occupancy, driver state or inner lighting conditions
- G06V20/597—Recognising the driver's state or behaviour, e.g. attention or drowsiness
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/20—Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
- G08G1/205—Indicating the location of the monitored vehicles as destination, e.g. accidents, stolen, rental
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W50/00—Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
- B60W50/08—Interaction between the driver and the control system
- B60W50/14—Means for informing the driver, warning the driver or prompting a driver intervention
- B60W2050/143—Alarm means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/174—Facial expression recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- This application relates to the field of blockchain technology, and in particular to a data analysis method, electronic equipment, and computer-readable media.
- the embodiments of the present application provide a data analysis method, which can effectively reduce the safety risk of drivers or passengers during online car-hailing travel.
- an embodiment of the present application provides a data analysis method, which includes:
- the smart contract is triggered based on the travel data and the travel order, and an early warning operation corresponding to the smart contract is executed.
- the triggering of the smart contract based on the itinerary data and the itinerary order to execute an early warning operation corresponding to the smart contract includes:
- the method further includes:
- Private information includes driver information, passenger information, and emergency contact information.
- the smart contract is triggered and an alarm activation instruction is sent to the vehicle-mounted device, and the alarm instruction is used to cause the vehicle-mounted device to send alarm information to surrounding vehicles.
- the method further includes:
- prompt information is sent to the electronic device corresponding to the passenger.
- an embodiment of the present application provides an electronic device, and the electronic device includes:
- a generating unit configured to obtain an itinerary order, and generate a smart contract based on the itinerary order
- the obtaining unit is configured to obtain the itinerary data uploaded by the vehicle-mounted device
- the execution unit is configured to trigger the smart contract based on the travel data and the travel order, and execute an early warning operation corresponding to the smart contract.
- the execution unit includes:
- a judging subunit for judging whether the deviation between the travel path and the preset navigation route included in the travel order exceeds a first threshold based on the travel data
- the sending subunit is configured to, if it is determined that the deviation between the driving path and the preset navigation route exceeds a threshold, trigger the smart contract and send a monitoring instruction to the vehicle-mounted device, where the monitoring instruction is used to start the vehicle Monitoring equipment inside.
- the execution unit further includes:
- a receiving subunit configured to receive monitoring information sent by the vehicle-mounted device
- the release subunit is configured to trigger the smart contract and release the travel order when dangerous information exists in the monitoring information
- the sending subunit is also configured to trigger the smart contract to upload the travel order and the travel data to the police platform when dangerous information exists in the monitoring information.
- the judging subunit is further configured to judge whether the absolute value of the acceleration in the driving data is greater than a second threshold when there is dangerous information in the monitoring information;
- the sending subunit is further configured to trigger the smart contract when the absolute value of the acceleration in the driving data is greater than a second threshold, and send an alarm activation instruction to the vehicle-mounted device, the alarm instruction It is used to make the in-vehicle device send warning information to surrounding vehicles.
- the electronic device further includes:
- a receiving unit for receiving actual driver image information sent by the vehicle-mounted device
- a judging unit for judging whether the actual driver image information is consistent with pre-stored driver image information, where the pre-stored driver image information is a pre-stored driver image corresponding to the driver information included in the itinerary order;
- sending unit Used to send reminder information to the electronic device corresponding to the passenger when the actual driver image information is inconsistent with the pre-stored actual image information.
- an embodiment of the present application provides another electronic device, including a processor, a memory, and a communication module, wherein the memory is used to store program code, and the processor is used to call the program code to execute The above-mentioned first aspect and any of its optional methods.
- an embodiment of the present application provides a computer-readable storage medium, the computer storage medium stores a computer program, the computer program includes program instructions, and the program instructions when executed by a processor cause The processor executes the above-mentioned first aspect and any one of its optional methods.
- the itinerary order is acquired, and the smart contract is generated based on the itinerary order; then itinerary data uploaded by the vehicle-mounted device is acquired; finally, the travel data is triggered based on the itinerary data and the itinerary order.
- the smart contract executes the early warning operation corresponding to the smart contract.
- a smart contract for automatic warning is generated through the passenger's itinerary order, and then the itinerary data of the vehicle is obtained in real time, and the event that triggers the above-mentioned smart contract is determined according to the real-time itinerary data and the itinerary order ( That is, when there may be a potential safety hazard), if so, the above smart contract is triggered to execute the corresponding early warning operation, so that the potential safety hazard of passengers or drivers on the online car-hailing can be effectively reduced in time.
- FIG. 1 is a schematic flowchart of a data analysis method provided by an embodiment of the present application.
- FIG. 2 is a schematic flowchart of another data analysis method provided by an embodiment of the present application.
- FIG. 3 is a schematic block diagram of an electronic device provided by an embodiment of the present application.
- FIG. 4 is a schematic diagram of a device provided by an embodiment of the present application.
- the term “if” can be interpreted as “when" or “once” or “in response to determination” or “in response to detected” .
- the phrase “if determined” or “if detected [described condition or event]” can be construed as meaning “once determined” or “response to determination” or “once detected [described condition or event] depending on the context ]” or “in response to the detection of [the described condition or event]”.
- Blockchain is a chained data structure that connects data blocks in chronological order, and is a distributed ledger that cannot be tampered with or forged that is guaranteed by cryptography.
- the characteristics of the blockchain include openness, consensus, decentralization, trustlessness, transparency, mutual anonymity, non-tampering, and traceability. Among them, openness and transparency mean that anyone can participate in the blockchain network, each device can be used as a node, and each node is allowed to obtain a complete copy of the database. Nodes are based on a set of consensus mechanisms and jointly maintain the entire blockchain through competitive computing. If any node fails, the remaining nodes can still work normally. Among them, decentralization and de-trusting are arbitrary blockchains.
- nodes form an end-to-end network, and there is no centralized equipment and management organization.
- Data exchange between nodes is verified by digital signature technology, without mutual trust, as long as it is carried out in accordance with the established rules of the system, nodes cannot and cannot deceive other nodes.
- transparency and anonymity of both parties mean that the operating rules of the blockchain are open, and all data information is also open, so every transaction is visible to all nodes. Since there is no trust between nodes, there is no need to disclose identities between nodes, and each participating node is anonymous.
- non-tamperable and traceable means that the modification of the database by each or even multiple nodes cannot affect the database of other nodes, unless it can control more than 50% of the nodes in the entire network to modify at the same time, which is almost impossible to happen.
- each transaction is connected in series with two adjacent blocks through cryptographic methods, so it can be traced back to any transaction record.
- the blockchain can use a block-chain data structure to verify and store data, use a distributed node consensus algorithm to generate and update data, use cryptography to ensure the security of data transmission and access, and use automation
- the smart contract makes all the terms written as a program, these terms can be automatically executed on the blockchain, which ensures that when there are conditions that trigger the smart contract, the blockchain can be forced to execute according to the content in the smart contract, and not Obstructed by any external force, thus ensuring the validity and execution of the contract, not only can greatly reduce costs, but also improve efficiency.
- Each node on the blockchain has the same ledger, which can ensure that the ledger recording process is open and transparent.
- Blockchain technology can realize a kind of point-to-point, open and transparent direct interaction, making a high-efficiency, large-scale, non-centralized agent information interaction method a reality.
- the embodiments of the present application are mainly applied to blockchain node electronic devices, and there are many types of blockchain node electronic devices, which may be traditional electronic devices, large storage systems, desktop computers, notebook computers, tablet computers, and palmtops. Computers, smart phones, portable digital players, smart watches and smart bracelets and many more.
- the block chain node electronic device is one of the electronic devices in the block chain network determined according to the consensus mechanism. It should be understood that since the blockchain is a decentralized distributed database, each time data is processed, one of the electronic devices in the blockchain network needs to be selected as the executor to process the data. The rules for selecting electronic devices each time are the consensus mechanisms.
- the consensus mechanism can be Proof of Work (POW), Proof of Stake (POS), and Ripple consensus mechanism.
- terminals include, but are not limited to, devices with communication functions, smart phones, tablet computers, notebook computers, desktop computers, portable digital players, smart bracelets, smart watches, etc.
- the existing online car-hailing system is a random matching mode, that is, the driver and passengers are randomly matched to achieve a joint trip of a journey. Due to the characteristics of random matching, drivers and passengers do not know each other's situation, so incidents of infringements on personal safety and property occur from time to time. This kind of random matching brings certain safety risks to both the driver and the passenger. However, because the existing alarm mechanism only waits for the victim or relatives of the victim to call the police, the timeliness of the call is poor, and at the same time, the occurrence of violations cannot be effectively avoided.
- This application proposes a trip safety alarm method based on data analysis, which automatically analyzes the safety level of the trip during the trip by monitoring the driver, passengers, driving location, speed, acceleration and other data during the trip, and proposes an early warning, And when certain conditions are met, the blockchain smart contract is automatically triggered to notify relevant personnel, thereby improving the safety of the trip.
- a security monitoring platform is established using blockchain technology; drivers and passengers use their own electronic equipment to register on the security monitoring platform to obtain their respective registration identities. Then both the driver and passengers upload their emergency contact information to the aforementioned safety monitoring platform. Finally, when the passengers take the online car-hailing, when the above-mentioned safety monitoring platform monitors that the passenger or the driver in the online car-hailing may be in danger, the smart contract is triggered to send an alarm message to the driver or the emergency contact of the passenger according to the specific dangerous event .
- the above-mentioned security monitoring platform runs on each node of the blockchain network, and is used to automatically obtain the passenger's itinerary order when the passenger takes the online car-hailing, and then automatically based on the itinerary order Generate smart contracts; obtain real-time travel data of the vehicle during the passenger boarding process, analyze the travel data, and determine whether to send a security event that triggers the smart contract. If a security event occurs, Then the smart contract is triggered to execute the pre-warning operation preset in the smart contract; thus, when the passenger or the driver may be in danger during the ride of the online car-hailing process, the early warning can be given in time to avoid tragedy as much as possible.
- FIG. 1 is a schematic flowchart of a data analysis method provided by an embodiment of the present application. As shown in FIG. 1, the method may include:
- the security monitoring platform obtains a travel order, and generates a smart contract based on the foregoing travel order.
- the aforementioned itinerary order may include driver information, passenger information, vehicle information, departure and destination, preset navigation routes, estimated travel time, and the like.
- the above-mentioned security monitoring platform can not only obtain the itinerary order through the order transaction information of the driver and passenger on the blockchain network, but also accept the driver or passenger to actively report the itinerary through their own electronic devices.
- the security monitoring system when the passenger’s online car booking is monitored, the security monitoring system automatically obtains the passenger’s itinerary order based on the order transaction uploaded on the blockchain network, or the security monitoring system accepts the driver Or passengers actively upload the itinerary order through their own electronic equipment; then the above-mentioned security monitoring platform automatically generates a smart contract according to the above-mentioned itinerary order; the smart contract is used to obtain the vehicle's itinerary data in real time during the passenger's boarding process. When an event occurs, the smart contract is triggered to execute the pre-warning operation preset in the smart contract.
- the above-mentioned smart contract may include two parts, the first part is the operation event description code to be executed by the smart contract.
- the above operation event may be sending a monitoring instruction to the on-board equipment of the online car-hailing where the passenger is located to obtain monitoring information in the car; the above operation event may also be the automatic release of the private information (such as driver information, passenger information) in the above itinerary order , Emergency contact information of the driver and/or passenger, etc.), and send itinerary information to the police platform.
- the second part is the description code of the trigger event of the smart contract, that is, the trigger condition that triggers the execution of the first part of the operation event.
- the above-mentioned trigger event may be that the deviation between the actual driving route and the preset navigation route is greater than a threshold; it may also be that preset hazard information is detected in the monitoring information in the vehicle; it may also be that the acceleration of the vehicle is detected within a preset time.
- the absolute value of the change is greater than the threshold, etc.
- the security monitoring platform After the security monitoring platform obtains the travel order, it automatically generates the operation event description code and the trigger event description code according to the travel order, and then assembles the operation event description code and the trigger event description code into the foregoing Smart contract.
- the smart contract When the smart contract is generated, the above The smart contract is sent to the corresponding participant, and then the participant's signature on the smart contract is obtained. Then broadcast the above-mentioned smart contract and the participant's signature to the smart contract on the entire network. After the nodes in the blockchain network reach a consensus on the verification of the smart contract, the smart contract and the signature of the participant to the smart contract are written into the blockchain.
- Participants of the aforementioned smart contract include drivers, passengers, and corresponding vehicle-mounted devices.
- the security monitoring platform obtains travel data uploaded by the vehicle-mounted device.
- the security monitoring platform after the security monitoring platform generates a smart contract according to the travel order, it obtains the travel data of the vehicle where the passenger is located through the on-board equipment of the vehicle, so that the security monitoring platform can analyze the travel data. Determine whether the start event in the above smart contract occurs. If it is judged to be yes, go to step 103; if judged to be otherwise, it ends.
- the aforementioned itinerary data may include data such as the travel path, vehicle speed, and acceleration of the vehicle where the passenger is.
- the vehicle-mounted device After the vehicle-mounted device detects that the passenger gets on the vehicle and the vehicle is started, the vehicle-mounted device acquires the driving data of the vehicle, and then uploads the acquired form data to the safety monitoring platform.
- the above-mentioned in-vehicle device may periodically upload the current travel data of the vehicle according to a preset duration. For example, it is possible to upload data such as the driving path, speed, and acceleration of the vehicle at the current moment every minute.
- the security monitoring platform triggers the smart contract based on the travel data and the travel order, and executes the early warning operation corresponding to the smart contract.
- the safety monitoring platform After the safety monitoring platform obtains the travel data, it combines the travel order to analyze the travel data to determine whether the corresponding trigger event in the smart contract has occurred. If the above starting event is triggered, the above smart contract is triggered, and the operation event corresponding to the above trigger event in the above smart contract is executed.
- the operation event is an early warning operation performed when the safety monitoring platform determines that the vehicle where the passenger is located may have dangerous information.
- the early warning operation can be to send a monitoring instruction to the vehicle-mounted device, which is used to activate the monitoring device in the vehicle; or it can be to release the privacy information contained in the travel order, and upload the privacy information and travel data to the police Platform, the above-mentioned private information includes driver information, passenger information, and emergency contact information; it may also send an alarm activation instruction to the above-mentioned vehicle-mounted device, and the above-mentioned alarm instruction is used to make the vehicle
- the onboard equipment sends warning messages to surrounding vehicles.
- the foregoing data analysis method further includes: the foregoing security monitoring platform receives the actual driver image information sent by the foregoing in-vehicle device; and then determining whether the foregoing actual driver image information is consistent with The pre-stored driver image information is consistent, where the above-mentioned pre-stored driver image information is the pre-stored driver image corresponding to the driver information included in the above itinerary order; Finally, it is judged whether the above-mentioned actual driver image information is consistent with the above-mentioned pre-stored actual image information; if not, it will correspond to the passenger The electronic device sends prompt information; if they are consistent, perform step 103.
- the embodiment of the application generates a smart contract for automatic warning through the passenger's itinerary order, and then obtains the vehicle's itinerary data in real time, and determines whether the above-mentioned smart contract is triggered according to the real-time itinerary data and the itinerary order. Event (that is, when there may be a potential safety hazard), if it is, the above-mentioned smart contract is triggered to execute the corresponding early warning operation, so as to effectively reduce the safety hazard of passengers or drivers on the online car-hailing car in time.
- Event that is, when there may be a potential safety hazard
- FIG. 2 is a schematic flowchart of another data analysis method provided by an embodiment of the present application. As shown in FIG. 2, the method may include:
- the security monitoring platform obtains a travel order, and generates a smart contract based on the foregoing travel order.
- the security monitoring platform obtains travel data uploaded by the vehicle-mounted device.
- the safety monitoring platform determines whether the deviation between the driving path and the preset navigation route included in the travel order exceeds a first threshold based on the travel data.
- the travel order is combined with the travel order to analyze the travel data to determine the deviation of the travel path from the preset navigation route included in the travel order Whether it exceeds the first threshold. If yes, proceed to step 204; if otherwise, return to step 202; until the above-mentioned travel order is completed.
- the preset navigation route includes at least one driving route from the departure place to the destination in the travel order.
- the aforementioned itinerary data all include the location information, the driving direction, the speed and acceleration of the vehicle and other information.
- the safety monitoring platform obtains the travel data, it periodically determines whether the vehicle's location is on the preset navigation route, and if so, waits for the next cycle of detection; if not, the acquisition starts to deviate from the preset navigation
- the included preset navigation route deviation when the deviation distance is greater than the set first threshold, for example, the threshold can be set to 500 meters, then go to step 204; if the deviation distance is not greater than the first threshold, go back to step 202 . It is understandable that, when the vehicle deviates from the first route in the preset navigation route to the second route in the preset navigation route, it is
- the vehicle starts to deviate from the preset navigation route at position A of the preset navigation route, it starts from leaving the position A, and whenever the travel data of the vehicle is obtained, it is judged whether the current location B of the vehicle is in the preset position. If it is not on the navigation route, calculate the route distance between position A and position B. When the route distance between position A and position B is greater than 500 meters, proceed to step 204; if position A and position B are different If the distance between the route is not greater than 500 meters, return to step 202 to continue to obtain the travel data of the vehicle.
- the security monitoring platform triggers the above-mentioned smart contract and sends a monitoring instruction to the above-mentioned in-vehicle device, and the above-mentioned monitoring instruction is used to activate the monitoring device in the vehicle.
- the security monitoring platform when it is determined that the deviation between the driving path and the preset navigation route exceeds a first threshold, the security monitoring platform triggers the smart contract to send a monitoring instruction to the vehicle-mounted device, and the monitoring instruction is used To activate the monitoring equipment in the vehicle.
- the aforementioned monitoring device includes a voice monitoring device and/or a video monitoring device.
- the security monitoring platform receives the monitoring information sent by the vehicle-mounted device.
- the monitoring equipment in the vehicle is activated to obtain the monitoring information in the vehicle. Then upload the obtained monitoring information to the aforementioned security monitoring platform.
- the aforementioned monitoring information may include voice information and/or video information.
- Private information includes driver information, passenger information, and emergency contact information
- the security monitoring platform receives the monitoring information
- the content of the monitoring information is analyzed to determine whether the content of the monitoring information contains dangerous information. If there is dangerous information, the aforementioned smart contract is triggered to release the private information contained in the aforementioned itinerary order.
- the above-mentioned private information includes driver information, driver’s emergency contact information, passenger information, and corresponding emergency contact information. If there is no danger information, return to step 205 until the above-mentioned itinerary order is completed.
- the aforementioned monitoring information may include in-vehicle video information, picture information and/or voice information.
- the foregoing monitoring information may include in-vehicle video or picture information.
- the safety monitoring platform After the above-mentioned safety monitoring platform obtains the above-mentioned in-vehicle video or picture information, it will identify the driver and/or passenger in the above-mentioned in-vehicle video or picture, and obtain the facial expressions, body movements, and driver and/or passenger’s facial expressions and body movements. / Or the location of the passenger in the car.
- the facial expressions of the driver and/or passenger are hideous, frightened, or angry, etc., and the physical actions are attacking, defensive, or surrendering, and the position of the driver and/or passenger deviates from the preset position ( For example, if the driver's position deviates from the driver's cab or the passenger's position is close to the driver's cab, etc.), it is determined that the content of the above monitoring information contains dangerous information.
- the monitoring information is voice information
- semantic analysis is performed on the voice information to obtain text information of the voice information, and then it is judged whether a preset dangerous key appears in the text information Words, such as "shameless”, "help”, etc., if dangerous keywords appear, it is determined that dangerous information appears in the above monitoring information.
- the safety monitoring platform judges whether the absolute value of the acceleration in the driving data is greater than the second threshold when there is dangerous information in the monitoring information.
- the safety monitoring platform when the safety monitoring platform analyzes the monitoring information and determines that there is dangerous information in the monitoring information, it is determined whether the absolute value of the acceleration in the driving data is greater than the second threshold. If yes, go to step 208. If not, return to step 205 until the above-mentioned itinerary order is completed.
- judging whether the absolute value of the acceleration in the above-mentioned driving data is greater than the second threshold is used to judge the sudden acceleration of the vehicle during driving, or sudden braking caused by sudden acceleration.
- the driver and passengers may cause the driver to brake suddenly and cause the vehicle to decelerate suddenly, or step on the accelerator while braking and cause the vehicle to suddenly accelerate; therefore, it has been judged in the foregoing.
- the security monitoring platform triggers the smart contract and sends an alarm activation instruction to the vehicle-mounted device, and the alarm instruction is used to cause the vehicle-mounted device to send alarm information to surrounding vehicles.
- the safety monitoring platform determines that there is dangerous information in the monitoring information, and it is determined that the absolute value of the acceleration in the driving data is greater than the second threshold, the smart contract is triggered to send to the vehicle-mounted device An alarm activation instruction is sent, and the alarm instruction is used to cause the on-vehicle device to send alarm and help information to surrounding vehicles.
- the passengers may have quarrels or aggressive actions with the driver, resulting in The driver stepped on the brakes urgently; at this time, the absolute value of the acceleration of the vehicle obtained by the safety monitoring platform from the uploaded travel data will exceed the second threshold; when it is determined that the absolute value of the acceleration in the above driving data is greater than the second threshold, then The above smart contract is triggered to send an alarm start instruction to the above vehicle equipment.
- the on-board equipment of the above-mentioned vehicle receives an alarm start instruction, it sends an alarm and help message to surrounding vehicles.
- the alarm and help message can be a text or voice message "XXX vehicle is in danger and needs your help".
- the embodiment of the present application generates a smart contract for automatic warning through the passenger’s itinerary order, and then obtains the vehicle’s itinerary data in real time, and determines whether the above-mentioned smart contract is triggered according to the real-time itinerary data and the itinerary order. Event (that is, when there may be a potential safety hazard), if it is, the above-mentioned smart contract is triggered to execute the corresponding early warning operation, so as to effectively reduce the safety hazard of passengers or drivers on the online car-hailing car in time.
- Event that is, when there may be a potential safety hazard
- FIG. 3 is a schematic block diagram of an electronic device according to an embodiment of the present application.
- the electronic device in this embodiment includes: a generating unit 310, an obtaining unit 320, and an executing unit 330
- the generating unit 310 is configured to obtain an itinerary order, and generate a smart contract based on the foregoing itinerary order;
- the obtaining unit 320 is configured to obtain travel data uploaded by the vehicle-mounted device
- the execution unit 330 is configured to trigger the smart contract based on the travel data and the travel order, and execute an early warning operation corresponding to the smart contract.
- the foregoing execution unit includes:
- the judging subunit is configured to judge whether the deviation between the driving path and the preset navigation route included in the travel order exceeds a first threshold based on the travel data; [0108]
- the sending subunit is configured to, if it is determined that the deviation between the driving path and the preset navigation route exceeds a threshold, trigger the smart contract to send a monitoring instruction to the vehicle-mounted device, and the monitoring instruction is used to activate the monitoring device in the vehicle.
- the foregoing execution unit further includes:
- the receiving subunit is used to receive the monitoring information sent by the above-mentioned vehicle-mounted device;
- the release subunit is configured to trigger the smart contract and release the travel order when there is dangerous information in the monitoring information
- the sending subunit is also used to trigger the smart contract to upload the itinerary order and the itinerary data to the police platform when there is dangerous information in the monitoring information.
- the above-mentioned judging subunit is further configured to judge whether the absolute value of the acceleration in the above-mentioned driving data is greater than a second threshold value in the case that there is dangerous information in the above-mentioned monitoring information;
- the sending subunit is further configured to trigger the smart contract when the absolute value of the acceleration in the driving data is greater than a second threshold, and send an alarm activation instruction to the vehicle-mounted device, and the alarm instruction is used to enable the vehicle
- the device sends warning messages to surrounding vehicles.
- the above electronic device further includes:
- the receiving unit is configured to receive the actual driver image information sent by the vehicle-mounted device
- the embodiment of the application generates a smart contract for automatic warning through the passenger’s itinerary order, and then obtains the vehicle’s itinerary data in real time, and determines whether the above-mentioned smart contract is triggered according to the real-time itinerary data and the itinerary order. Event (that is, when there may be a potential safety hazard), if it is, the above-mentioned smart contract is triggered to execute the corresponding early warning operation, so as to effectively reduce the safety hazard of passengers or drivers on the online car-hailing car in time.
- Event that is, when there may be a potential safety hazard
- FIG. 4 is a device provided by an embodiment of the present application.
- the device may be an electronic device.
- the device includes: one or more processors 401; one or more input devices 402.
- the device 404 is connected via a bus 405.
- the memory 402 is used to store instructions, and the processor 401
- the processor 401 is configured to: obtain an itinerary order, and generate a smart contract based on the above-mentioned itinerary order; obtain the itinerary data uploaded by the vehicle-mounted device; and trigger based on the itinerary data and the above-mentioned itinerary order
- the above smart contract executes the early warning operation corresponding to the above smart contract.
- the so-called processor 401 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors or digital signal processors (Digital Signal Processors). , DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the input device 402 may include a touch panel, a fingerprint sensor (used to collect user fingerprint information and fingerprint direction information), a microphone, etc.
- the output device 403 may include a display (LCD, etc.), a speaker, and the like.
- the memory 404 may include a read-only memory and a random access memory, and provides instructions and data to the processor 401.
- a part of the memory 404 may also include a non-volatile random access memory.
- the memory 404 may also store device type information.
- the processor 401, input device 402, and output device 403 described in the embodiment of the present application can execute the implementation described in the first embodiment of a data analysis method provided in the embodiment of the present application.
- the implementation manners, the implementation manners in the second embodiment row, and the third embodiment can also implement the implementation manners of the electronic device described in the embodiments of the present application, and details are not described herein again.
- a computer-readable storage medium stores a computer program, and the computer program is executed by a processor to realize:
- the foregoing computer-readable storage medium may be the internal storage unit of the foregoing terminal in any of the foregoing embodiments, For example, the hard disk or memory of the terminal.
- the computer-readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, and a flash memory card equipped on the terminal. (Flash Card) etc.
- the aforementioned computer-readable storage medium may also include both an internal storage unit of the aforementioned terminal and an external storage device.
- the aforementioned computer-readable storage medium is used to store the aforementioned computer program and other programs and data required by the aforementioned terminal.
- the aforementioned computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
- the disclosed system, electronic device, and method may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the above-mentioned units is only a logical function division.
- there may be other division methods for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
- the units described above as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. on. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present application.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or Therefore, each unit physically exists alone, or two or more units are integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the above integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of this application is essentially or a part that contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium.
- several instructions are included to enable a computer device (which may be a personal computer, an electronic device, or a network device, etc.) to perform all or part of the steps of the foregoing methods of the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Automation & Control Theory (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Mechanical Engineering (AREA)
- Transportation (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Educational Administration (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Power Engineering (AREA)
- Mathematical Physics (AREA)
- Game Theory and Decision Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Technology Law (AREA)
- Traffic Control Systems (AREA)
- Emergency Alarm Devices (AREA)
Abstract
一种数据分析方法、电子设备及计算机可读介质,其中方法包括:安全监控平台获取行程订单,基于所述行程订单生成智能合约(101);安全监控平台获取车载设备上传的行程数据(102);安全监控平台基于所行程数据和所述行程订单触发所述智能合约,执行所述智能合约对应的预警操作(103)。通过乘客的行程订单生成自动预警的智能合约,然后实时获取车辆的行程数据,并根据实时行程数据和行程订单来确定是否发生触发上述智能合约的事件(即可能存在安全隐患时),若是,则触发上述智能合约执行对应的预警操作,从而可以及时有效的降低网约车上乘客或司机的安全隐患。
Description
一种数据分析方法、 电子设备及计算机可读介质
[0001] 本申请要求于 2019年 2月 27日提交中国专利局、 申请号为 201910147946. 3、 申 请名称为“一种数据分析方法、 电子设备及计算机可读介质” 的中国专利申请 的优先权, 其全部内容通过引用结合在本申请中。
[0002] 技术领域
[0003] 本申请涉及区块链技术领域, 尤其涉及一种数据分析方法、 电子设备及计算机 可读介质。
[0004] 背景技术
[0005] 在现有的出行场景中, 出租车和网约车是系统随机匹配模式, 即在司机和乘客 是通过随机匹配来实现一段行程的共行。 由于随机匹配的特点, 司机和乘客相 互之间都不了解对方的情况, 因此侵害司机或乘客的人身安全和财产事件时有 发生。 这种随机匹配为司机乘客双方都带来了一定的安全风险, 但由于现有的 报警机制只有等待受害人或者受害人亲属报警, 导致报警的时效性差, 同时也 无法有效避免侵害事件的发生。
[0006] 发明内容
[0007] 本申请实施例提供一种数据分析方法, 可及时有效的降低网约车出行时, 司机 或乘客的安全风险。
[0008] 第一方面, 本申请实施例提供了一种数据分析方法, 该方法包括:
[0009] 获取行程订单, 基于所述行程订单生成智能合约;
[0010] 获取车载设备上传的行程数据;
[0011] 基于所行程数据和所述行程订单触发所述智能合约, 执行所述智能合约对应的 预警操作。
[0012] 可选的, 所述基于所行程数据和所述行程订单触发所述智能合约, 执行所述智 能合约对应的预警操作, 包括:
[0013] 基于所述行程数据判断行驶路径与所述行程订单中包括的预设导航路线偏差是 否超过第一阈值;
[0014] 若确定所述行驶路径与所述预设导航路线偏差超过阈值, 则触发所述智能合约 , 向所述车载设备发送监控指令, 所述监控指令用于启动车辆内的监控设备。
[0015] 可选的, 在所述向车载设备发送监控指令之后, 所述方法还包括:
[0016] 接收所述车载设备发送的监控信息;
[0017] 在所述监控信息中存在危险信息的情况下, 触发所述智能合约, 释放所述行程 订单中包含的隐私信息, 将上述隐私信息和所述行程数据上传至警务平台, 所 述隐私信息包括司机信息和乘客信息以及紧急联系人信息。
[0018] 可选的, 在所述监控信息中存在危险信息的情况下, 判断所述行驶数据中的加 速度的绝对值是否大于第二阈值;
[0019] 若是, 则触发所述智能合约, 向所述车载设备发送报警启动指令, 所述报警指 令用于使所述车载设备向周边的车辆发送警报信息。
[0020] 可选的, 在所述获取行程订单之后, 所述方法还包括:
[0021] 接收所述车载设备发送的实际司机图像信息;
[0022] 判断所述实际司机图像信息是否与预存司机图像信息一致, 所述预存司机图像 信息为所述行程订单中包括的司机信息对应的预存司机图像;
[0023] 在所述实际司机图像信息与所述预存实际图像信息不一致的情况下, 向乘客对 应的电子设备发送提示信息。
[0024] 第二方面, 本申请实施例提供了一种电子设备, 该电子设备包括:
[0025] 生成单元, 用于获取行程订单, 基于所述行程订单生成智能合约;
[0026] 获取单元, 用于获取车载设备上传的行程数据;
[0027] 执行单元, 用于基于所行程数据和所述行程订单触发所述智能合约, 执行所述 智能合约对应的预警操作。
[0028] 可选的, 所述执行单元包括:
[0029] 判断子单元, 用于基于所述行程数据判断行驶路径与所述行程订单中包括的预 设导航路线偏差是否超过第一阈值;
[0030] 发送子单元, 用于若确定所述行驶路径与所述预设导航路线偏差超过阈值, 则 触发所述智能合约, 向所述车载设备发送监控指令, 所述监控指令用于启动车 辆内的监控设备。
[0031] 可选的, 所述执行单元还包括:
[0032] 接收子单元, 用于接收所述车载设备发送的监控信息;
[0033] 释放子单元, 用于在所述监控信息中存在危险信息的情况下, 触发所述智能合 约, 释放所述行程订单;
[0034] 所述发送子单元, 还用于在所述监控信息中存在危险信息的情况下, 触发所述 智能合约, 将上述行程订单和所述行程数据上传至警务平台。
[0035] 可选的, 所述判断子单元, 还用于在所述监控信息中存在危险信息的情况下, 判断所述行驶数据中的加速度的绝对值是否大于第二阈值;
[0036] 所述发送子单元, 还用于在所述行驶数据中的加速度的绝对值大于第二阈值时 , 则触发所述智能合约, 向所述车载设备发送报警启动指令, 所述报警指令用 于使所述车载设备向周边的车辆发送警报信息。
[0037] 可选的, 所述电子设备还包括,
[0038] 接收单元, 用于接收所述车载设备发送的实际司机图像信息;
[0039] 判断单元, 用于判断所述实际司机图像信息是否与预存司机图像信息一致, 所 述预存司机图像信息为所述行程订单中包括的司机信息对应的预存司机图像; [0040] 发送单元, 用于在所述实际司机图像信息与所述预存实际图像信息不一致的情 况下, 向乘客对应的电子设备发送提示信息。
[0041] 第三方面, 本申请实施例提供了另一电子设备, 包括处理器、 存储器和通信模 块, 其中, 所述存储器用于存储程序代码, 所述处理器用于调用所述程序代码 来执行上述第一方面及其任一种可选方式的方法。
[0042] 第四方面, 本申请实施例提供了一种计算机可读存储介质, 所述计算机存储介 质存储有计算机程序, 所述计算机程序包括程序指令, 所述程序指令当被处理 器执行时使所述处理器执行上述第一方面及其任一种可选方式的方法。
[0043] 可以看出, 在本申请实施例中, 通过获取行程订单, 并基于所述行程订单生成 智能合约; 然后获取车载设备上传的行程数据; 最后基于所行程数据和所述行 程订单触发所述智能合约, 执行所述智能合约对应的预警操作。 本申请实施例 通过乘客的行程订单生成自动预警的智能合约, 然后实时获取车辆的行程数据 , 并根据实时行程数据和行程订单来确定是否发生触发上述智能合约的事件 (
即可能存在安全隐患时) , 若是, 则触发上述智能合约执行对应的预警操作, 从而可以及时有效的降低网约车上乘客或司机的安全隐患。
[0044] 附图说明
[0045] 图 1是本申请实施例提供的一种数据分析方法的示意流程图;
[0046] 图 2是本申请实施例提供的另一种数据分析方法的示意流程图;
[0047] 图 3是本申请实施例提供的一种电子设备的示意框图;
[0048] 图 4是本申请实施例提供的一种设备示意图。
[0049] 具体实施方式
[0050] 下面将结合本申请实施例中的附图, 对本申请实施例中的技术方案进行清楚、 完整地描述。
[0051] 应当理解, 当在本说明书和所附权利要求书中使用时, 术语“包括”和 “包 含”指示所描述特征、 整体、 步骤、 操作、 元素和 /或组件的存在, 但并不排除 一个或多个其它特征、 整体、 步骤、 操作、 元素、 组件和 /或其集合的存在或添 加。
[0052] 还应当理解, 在此本申请说明书中所使用的术语仅仅是出于描述特定实施例的 目的而并不意在限制本申请。 如在本申请说明书和所附权利要求书中所使用的 那样, 除非上下文清楚地指明其它情况, 否则单数形式的“一” 、 “一个”及 “该”意在包括复数形式。
[0053] 还应当进一步理解, 在本申请说明书和所附权利要求书中使用的术语“和 / 或 ”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合, 并且包 括这些组合。
[0054] 如在本说明书和所附权利要求书中所使用的那样, 术语“如果”可以依据上下 文被解释为 “当 . . . 时”或“一旦”或“响应于确定”或“响应于检测到” 。 类似地, 短语“如果确定”或“如果检测到[所描述条件或事件]”可以依据上 下文被解释为意指“一旦确定”或“响应于确定”或“一旦检测到[所描述条件 或事件]”或“响应于检测到[所描述条件或事件]” 。
[0055] 区块链是一种按照时间顺序将数据区块相连的一种链式数据结构, 并以密码学 方式保证的不可篡改和不可伪造的分布式账本。
[0056] 区块链的特性有开放、 共识、 去中心、 去信任、 透明、 双方匿名、 不可篡改以 及可追溯等。 其中, 开放与透明意为任何人都可以参与到区块链网络, 每一台 设备都能作为一个节点, 每个节点都允许获得一份完整的数据库拷贝。 节点基 于一套共识机制, 通过竞争计算共同维护整个区块链。 任一节点失效, 其余节 点仍能正常工作。 其中, 去中心化与去信任意为区块链由众多节点共同组成一 个端到端的网络, 不存在中心化的设备和管理机构。 节点之间数据交换通过数 字签名技术进行验证, 无需互相信任, 只要按照系统既定的规则进行, 节点之 间不能也无法欺骗其他节点。 其中, 透明与双方匿名意为区块链的运行规则是 公开的, 所有的数据信息也是公开的, 因此每一笔交易都对所有节点可见。 由 于节点与节点之间是去信任的, 因此节点之间无需公开身份, 每个参与的节点 都是匿名的。 其中, 不可篡改和可追溯意为每个甚至多个节点对数据库的修改 无法影响其他节点的数据库, 除非能控制整个网络中超过 50%的节点同时修改, 这是几乎不可能发生的。 区块链中的, 每一笔交易都通过密码学方法与相邻两 个区块串联, 因此可以追溯到任何一笔交易记录。
[0057] 具体的, 区块链可以利用块链式数据结构来验证与存储数据、 利用分布式节点 共识算法来生成和更新数据、 利用密码学的方式保证数据传输和访问的安全、 利用由自动化脚本代码组成的智能合约来编程和操作数据的一种全新的分布式 基础架构与计算方式。 因此, 区块链技术不可篡改的特性从根本上改变了中心 化的信用创建方式, 有效提高了数据的不可更改性以及安全性。 其中, 由于智 能合约使得所有的条款编写为程序, 这些条款可在区块链上自动执行, 保证了 当存在触发智能合约的条件时, 区块链能强制根据智能合约中的内容执行, 且 不受任何外力阻挡, 从而保证了合约的有效性和执行力, 不仅能够大大降低成 本, 也能提高效率。 区块链上的各个节点都有相同的账本, 能够确保账本记录 过程是公开透明的。 区块链技术可以实现了一种点对点的、 公开透明的直接交 互, 使得高效率、 大规模、 无中心化代理的信息交互方式成为了现实。
[0058] 本申请实施例主要应用于区块链节点电子设备, 而作为区块链节点电子设备的 类型有很多, 可以是传统电子设备、 大型存储系统、 台式电脑、 笔记本电脑、 平板电脑、 掌上电脑、 智能手机、 便携式数字播放器、 智能手表以及智能手环
等等。 其中, 区块链节点电子设备为根据共识机制确定的区块链网络中的其中 一个电子设备。 应理解, 由于区块链是一个去中心化的分布式数据库, 所以每 次处理数据都需要选出区块链网络中的其中一个电子设备作为执行者来处理数 据。 而每次选取电子设备的规则便是共识机制, 本申请实施例中共识机制可以 是工作量证明机制 (Proof of Work, POW) 、 股权证明机制 (Proof of Stake , POS) 、 瑞波共识机制 (Ripple
Consensus) 以及授权股权证明机制 (Delegated Proof of Stake, DPOS) 等, 在此不作限定。 本申请实施例中, 终端包括但不限于带通讯功能的设备、 智能 手机、 平板电脑、 笔记本电脑、 台式电脑、 便携式数字播放器、 智能手环以及 智能手表等。
[0059] 现有的网约车是系统随机匹配模式, 即在司机和乘客是通过随机匹配来实现一 段行程的共行。 由于随机匹配的特点, 司机和乘客相互之间都不了解对方的情 况, 因此侵害人身安全和财产事件时有发生。 这种随机匹配为司机乘客双方都 带来了一定的安全风险, 但由于现有的报警机制只有等待受害人或者受害人亲 属报警, 导致报警的时效性差, 同时也无法有效避免侵害事件的发生。
[0060] 本申请提出了一种基于数据分析的行程安全报警方法, 通过监测行程过程中的 驾驶员、 乘客、 行驶地点、 速度、 加速度等数据, 自动分析该段行程的安全等 级, 提出预警, 且达到某种条件时, 自动触发区块链智能合约, 通知相关人员 , 从而提高行程安全性。
[0061] 首先, 使用区块链技术建立安全监控平台; 司机和乘客通过自己的电子设备在 上述安全监控平台上进行注册, 获得各自的注册身份。 然后司机和乘客均将各 自的紧急联系人信息上传至上述安全监控平台。 最后, 在乘客乘坐网约车, 当 上述安全监控平台监控到网约车上的乘客或司机可能遇到危险时, 触发智能合 约, 根据具体危险事件来向司机或乘客的紧急联系人发出报警信息。
[0062] 在本申请实施例中, 上述安全监控平台是在区块链网络的各个节点上运行的, 用于在乘客乘坐网约车时, 自动获取乘客的行程订单, 然后基于该行程订单自 动生成智能合约; 在乘客乘车的过程中实时的获取车辆的行程数据, 对行程数 据进行分析, 判断是否发送触发上述智能合约的安全事件, 若发生安全事件,
则触发智能合约, 执行智能合约中预设的预警操作; 从而能够在乘客乘坐网约 车的过程中, 当乘客或司机可能发生危险时, 能及时的进行预警, 来尽量的避 免悲剧的发生。
[0063] 参见图 1, 图 1是本申请实施例提供的一种数据分析方法的示意流程图, 如图 1 所示该方法可包括:
[0064] 101: 安全监控平台获取行程订单, 基于上述行程订单生成智能合约。
[0065] 其中, 上述行程订单可以包括司机信息、 乘客信息、 车辆信息、 出发地与目的 地、 预设导航路线、 预计行驶时间等。 上述安全监控平台既可以通过司机和乘 客在区块链网络上的订单交易信息获取行程订单, 也可以接受司机或者乘客通 过自己的电子设备主动进行行程上报。
[0066] 在本申请实施例中, 当监测到乘客的预约网约车时, 上述安全监控系统自动根 据在区块链网络中上传的订单交易获取乘客的行程订单, 或者上述安全监控系 统接受司机或者乘客通过自己的电子设备主动上传的行程订单; 然后上述安全 监控平台自动根据上述行程订单生成智能合约; 该智能合约用于在乘客乘车的 过程中实时的获取车辆的行程数据, 当发生安全事件时, 触发智能合约, 执行 智能合约中预设的预警操作。
[0067] 其中, 上述智能合约中可以包括两部分, 第一部分为智能合约将要执行的操作 事件描述代码。 上述操作事件可以为向乘客所在的网约车的车载设备发送监控 指令, 用于获取车内的监控信息; 上述操作事件还可以为自动释放上述行程订 单中的隐私信息 (例如司机信息、 乘客信息、 司机和 /或乘客的紧急联系人信息 等) , 并向警务平台发送行程信息。 第二部分为智能合约的触发事件描述代码 , 即触发执行上述第一部分操作事件的触发条件。 上述触发事件可以为实际行 驶路线与预设的导航路线的偏差大于阈值; 也可以是检测到车内的监控信息中 存在预设的危险信息; 还可以是检测到车辆的加速度在预设时间内变化的绝对 值大于阈值等。
[0068] 具体的, 当上述安全监控平台获取到上述行程订单之后, 自动根据上述行程订 单生成上述操作事件描述代码和触发事件描述代码, 然后将上述操作事件描述 代码和触发事件描述代码组装成上述智能合约。 当生成智能合约之后, 将上述
智能合约发送给对应的参与者, 然后获得参与者对智能合约的签名。 接着将上 述智能合约和参与者对智能合约的签名在全网进行广播。 当区块链网络中的节 点对上述智能合约验证达成共识后将上述智能合约以及参与者对智能合约的签 名写入到区块链中。
[0069] 其中, 上述智能合约的参与者包括司机、 乘客以及对应的车辆的车载设备。
[0070] 102: 安全监控平台获取车载设备上传的行程数据。
[0071] 在本申请实施例中, 当上述安全监控平台根据上述行程订单生成智能合约之后 , 便通过车辆的车载设备获取乘客所在车辆的行程数据, 以便上述安全监控平 台对上述行程数据进行分析, 判断是否发生上述智能合约中的出发事件。 若判 断为是则执行步骤 103; 若判断为否则结束。
[0072] 其中, 上述行程数据可以包括上述乘客所在车辆的行驶路径、 车速、 加速度等 数据。
[0073] 具体的, 在上述车载设备检测到乘客上车, 且车辆启动之后, 上述车载设备获 取上述车辆的行驶数据, 然后将获取到的形式数据上传至上述安全监控平台。
[0074] 可选的, 上述车载设备可以按照预设时长, 周期性的上传车辆当前的行程数据 。 例如可以每个一分钟上传一次当前时刻车辆的行驶路径、 车速以及车辆的加 速度等数据。
[0075] 103: 安全监控平台基于所行程数据和上述行程订单触发上述智能合约, 执行 上述智能合约对应的预警操作。
[0076] 在本申请实施例中, 当上述安全监控平台获取到上述行程数据之后, 便结合上 述行程订单, 对上述行程数据进行分析, 判断是否发生了上述智能合约中对应 的触发事件, 若发生了上述出发事件, 则触发上述智能合约, 并执行上述触发 事件在上述智能合约中对应的操作事件。 该操作事件为当上述安全监控平台判 断上述乘客所在车辆可能存在危险信息时, 进行的预警操作。 该预警操作可以 是向上述车载设备发送监控指令, 上述监控指令用于启动车辆内的监控设备; 也可以是释放上述行程订单中包含的隐私信息, 将上述隐私信息和上述行程数 据上传至警务平台, 上述隐私信息包括司机信息和乘客信息以及紧急联系人信 息; 还可以是向上述车载设备发送报警启动指令, 上述报警指令用于使上述车
载设备向周边的车辆发送警报信息。
[0077] 作为一种可选的实施方式, 在上述获取行程订单之后, 上述数据分析方法还包 括: 上述安全监控平台接收上述车载设备发送的实际司机图像信息; 然后判断 上述实际司机图像信息是否与预存司机图像信息一致, 其中上述预存司机图像 信息为上述行程订单中包括的司机信息对应的预存司机图像; 最后判断上述实 际司机图像信息与上述预存实际图像信息是否一致; 若不一致, 则向乘客对应 的电子设备发送提示信息; 若一致, 则执行步骤 103。
[0078] 可以看出, 本申请实施例通过乘客的行程订单生成用于自动预警的智能合约, 然后实时获取车辆的行程数据, 并根据实时行程数据和行程订单来确定是否发 生触发上述智能合约的事件 (即可能存在安全隐患时) , 若是, 则触发上述智 能合约执行对应的预警操作, 从而可以及时有效的降低网约车上乘客或司机的 安全隐患。
[0079] 与上述图 1所示的实施例一致的, 参见图 2, 图 2是本申请实施例提供的另一种 数据分析方法的示意流程图, 如图 2所示该方法可包括:
[0080] 201: 安全监控平台获取行程订单, 基于上述行程订单生成智能合约。
[0081] 202 : 安全监控平台获取车载设备上传的行程数据。
[0082] 203: 安全监控平台基于上述行程数据判断行驶路径与上述行程订单中包括的 预设导航路线偏差是否超过第一阈值。
[0083] 在本申请实施例中, 当上述安全监控平台获取到上述行程数据之后, 便结合上 述行程订单, 对上述行程数据进行分析, 判断行驶路径与上述行程订单中包括 的预设导航路线偏差是否超过第一阈值。 若是则执行步骤 204; 若否则返回步骤 202; 直到上述行程订单完成为止。
[0084] 具体的, 上述预设导航路线包括至少一条从上述行程订单中的出发地到目的地 的行驶路线。 上述行程数据中都包括上述车辆所在的位置信息、 行驶方向、 车 辆的车速和加速度等信息。 当上述安全监控平台获取到上述行程数据之后, 周 期性的判断车辆所在的位置是否是在上述预设导航路线上, 若是, 则等待下一 个周期的检测; 若不是, 则获取开始偏离预设导航路线的第一位置, 并计算第 一位置与当前位置的偏差距离, 该偏差距离为上述行驶路径与上述行程订单中
包括的预设导航路线偏差, 当该偏差距离大于设定的第一阈值时, 例如该阈值 可以设为 500米, 则执行步骤 204; 若该偏差距离不大于第一阈值, 则返回步骤 2 02。 可以理解的是, 当车辆偏离预设导航路线中的第一路线行驶到预设导航路 线中的第二路线的情况视为, 车辆所在的位置在预设导航路线上。
[0085] 例如, 车辆在预设导航路线的 A位置开始偏离预设导航路线行驶, 则从离开 A位 置开始, 每当获取到车辆的行程数据时, 就判断车辆当前所在的位置 B是否在预 设的导航路线上, 若不是, 则计算 A位置与 B位置之间的路线距离, 当 A位置与 B 位置之间的路线距离大于 500米时, 则执行步骤 204; 若 A位置与 B位置之间的路 线距离不大于 500米, 则返回步骤 202继续获取车辆的行程数据。
[0086] 204: 安全监控平台则触发上述智能合约, 向上述车载设备发送监控指令, 上 述监控指令用于启动车辆内的监控设备。
[0087] 在本申请实施例中, 当确定上述行驶路径与上述预设导航路线偏差超过第一阈 值, 则上述安全监控平台则触发上述智能合约, 向上述车载设备发送监控指令 , 上述监控指令用于启动车辆内的监控设备。
[0088] 在本申请实施例中, 上述监控设备包括语音监听设备和 /或视频监控设备。
[0089] 205: 安全监控平台接收上述车载设备发送的监控信息。
[0090] 在本申请实施例中, 当上述乘客所在的车辆的车载设备接收到上述监控指令后 , 则启动上述车辆内的监控设备, 以获取车内的监控信息。 然后将获取到的监 控信息上传至上述安全监控平台。 其中, 上述监控信息可以包括语音信息和 /或 视频信息。
[0091] 206: 安全监控平台在上述监控信息中存在危险信息的情况下, 触发上述智能 合约, 释放上述行程订单中包含的隐私信息, 将上述隐私信息和上述行程数据 上传至警务平台, 上述隐私信息包括司机信息和乘客信息以及紧急联系人信息
[0092] 在本申请实施例中, 当上述安全监控平台接收到上述监控信息后, 对上述监控 信息的内容进行分析, 判断上述监控信息的内容是否存在危险信息。 若存在危 险信息, 则触发上述智能合约, 释放上述行程订单中包含的隐私信息。 其中上 述隐私信息包括司机信息、 司机的紧急联系人信息和乘客信息以及对应的紧急
联系人信息。 若不在危险信息, 则返回步骤 205, 直到上述行程订单完成为止。 其中上述监控信息可以包括车内视频信息、 图片信息和 /或语音信息。
[0093] 作为一种可选的实施方式, 上述监控信息可以包括车内视频或图片信息。 当上 述安全监控平台获取到上述车内视频或图片信息之后, 则对上述车内视频或图 片中的司机和 /或乘客进行识别, 并获取司机和 /或乘客的面部表情、 肢体动作 以及司机和 /或乘客在车内的位置。 当检测到司机和 /或乘客的面部表情为狰狞 的、 惊恐的或愤怒的等, 且肢体动作为攻击动作、 防卫动作或投降动作等, 以 及司机和 /或乘客的位置偏离预设的位置 (例如, 司机的位置偏离驾驶室或乘客 的位置靠近驾驶室等) 则确定上述监控信息的内容存在危险信息。
[0094] 作为另一种可选的实施方式, 当上述监控信息为语音信息时, 则对上述语音信 息进行语义解析, 得到语音信息的文本信息, 然后判断文本信息中是否出现预 设的危险关键词, 例如“无耻” “救命”等, 若出现危险关键词, 则确定上述 监控信息中出现危险信息。
[0095] 207: 安全监控平台在上述监控信息中存在危险信息的情况下, 判断上述行驶 数据中的加速度的绝对值是否大于第二阈值。
[0096] 在本申请实施例中, 当上述安全监控平台对上述监控信息进行分析, 确定上述 监控信息中存在危险信息时, 判断上述行驶数据中的加速度的绝对值是否大于 第二阈值。 若是, 则执行步骤 208。 若否, 则返回步骤 205, 直到上述行程订单 完成为止。
[0097] 在本申请实施例中, 判断上述行驶数据中的加速度的绝对值是否大于第二阈值 , 是用于判断车辆在行驶过程中的突然加速, 或突然刹车导致加速度突变。 在 一些场景下, 在车辆的行驶过程中, 当司机和乘客发生矛盾或争执时, 可能会 导致司机紧急刹车导致车辆突然减速, 或刹车时踩到油门导致车辆突然加速; 因此, 在前述已经判断车辆内可能出现危险的情况下, 可以通过判断车辆的加 速度是否超过阈值, 来进一步确定车辆内乘客和司机之间是否发生矛盾或争执
[0098] 208: 安全监控平台触发上述智能合约, 向上述车载设备发送报警启动指令, 上述报警指令用于使上述车载设备向周边的车辆发送警报信息。
[0099] 在本申请实施例中, 当上述安全监控平台确定上述监控信息中存在危险信息, 且确定上述行驶数据中的加速度的绝对值大于第二阈值时, 触发上述智能合约 , 向上述车载设备发送报警启动指令, 上述报警指令用于使上述车载设备向周 边的车辆发送警报求助信息。
[0100] 在一些可能的场景下, 例如, 当乘客发现车辆的行驶路线已经远远的偏离导航 路线, 即发现可能出现危险时, 乘客可能会与司机发生争吵或攻击类的动作等 , 从而导致司机紧急踩刹车; 此时, 安全监控平台从上传的行程数据中获取到 车辆的加速度的绝对值则会超过第二阈值; 当确定上述行驶数据中的加速度的 绝对值大于第二阈值时, 则触发上述智能合约, 向上述车载设备发送报警启动 指令。 当上述车辆的车载设备接收到报警启动指令后, 则向周边车辆发送报警 求助信息, 例如该报警求助信息可以为文本或语音信息“XXX车辆发生危险, 需 要您的帮助”等。
[0101] 可以看出, 本申请实施例通过乘客的行程订单生成用于自动预警的智能合约, 然后实时获取车辆的行程数据, 并根据实时行程数据和行程订单来确定是否发 生触发上述智能合约的事件 (即可能存在安全隐患时) , 若是, 则触发上述智 能合约执行对应的预警操作, 从而可以及时有效的降低网约车上乘客或司机的 安全隐患。
[0102] 本申请实施例还提供一种电子设备, 该电子设备用于执行前述任一项上述的方 法的单元。 具体地, 参见图 3, 图 3是本申请实施例提供的一种电子设备的示意 框图。 本实施例的电子设备包括: 生成单元 310、 获取单元 320以及执行单元 330
[0103] 生成单元 310, 用于获取行程订单, 基于上述行程订单生成智能合约;
[0104] 获取单元 320, 用于获取车载设备上传的行程数据;
[0105] 执行单元 330, 用于基于所行程数据和上述行程订单触发上述智能合约, 执行 上述智能合约对应的预警操作。
[0106] 可选的, 上述执行单元包括:
[0107] 判断子单元, 用于基于上述行程数据判断行驶路径与上述行程订单中包括的预 设导航路线偏差是否超过第一阈值;
[0108] 发送子单元, 用于若确定上述行驶路径与上述预设导航路线偏差超过阈值, 则 触发上述智能合约, 向上述车载设备发送监控指令, 上述监控指令用于启动车 辆内的监控设备。
[0109] 可选的, 上述执行单元还包括:
[0110] 接收子单元, 用于接收上述车载设备发送的监控信息;
[0111] 释放子单元, 用于在上述监控信息中存在危险信息的情况下, 触发上述智能合 约, 释放上述行程订单;
[0112] 上述发送子单元, 还用于在上述监控信息中存在危险信息的情况下, 触发上述 智能合约, 将上述行程订单和上述行程数据上传至警务平台。
[0113] 可选的, 上述判断子单元, 还用于在上述监控信息中存在危险信息的情况下, 判断上述行驶数据中的加速度的绝对值是否大于第二阈值;
[0114] 上述发送子单元, 还用于在上述行驶数据中的加速度的绝对值大于第二阈值时 , 则触发上述智能合约, 向上述车载设备发送报警启动指令, 上述报警指令用 于使上述车载设备向周边的车辆发送警报信息。
[0115] 可选的, 上述电子设备还包括,
[0116] 接收单元, 用于接收上述车载设备发送的实际司机图像信息;
[0117] 判断单元, 用于判断上述实际司机图像信息是否与预存司机图像信息一致, 上 述预存司机图像信息为上述行程订单中包括的司机信息对应的预存司机图像; [0118] 发送单元, 用于在上述实际司机图像信息与上述预存实际图像信息不一致的情 况下, 向乘客对应的电子设备发送提示信息。
[0119] 可以看出, 本申请实施例通过乘客的行程订单生成用于自动预警的智能合约, 然后实时获取车辆的行程数据, 并根据实时行程数据和行程订单来确定是否发 生触发上述智能合约的事件 (即可能存在安全隐患时) , 若是, 则触发上述智 能合约执行对应的预警操作, 从而可以及时有效的降低网约车上乘客或司机的 安全隐患。
[0120] 参见图 4, 图 4是本申请实施例提供的一种设备, 该设备可以为电子设备, 如图 4所示设备包括: 一个或多个处理器 401 ; —个或多个输入设备 402, 一个或多个 输出设备 403和存储器 404。 上述处理器 401、 输入设备 402、 输出设备 403和存储
器 404通过总线 405连接。 存储器 402用于存储指令, 处理器 401
用于执行存储器 402存储的指令。
[0121] 其中, 该设备作为电子设备使用的情况下, 处理器 401用于: 获取行程订单, 基于上述行程订单生成智能合约; 获取车载设备上传的行程数据; 基于所行程 数据和上述行程订单触发上述智能合约, 执行上述智能合约对应的预警操作。
[0122] 应当理解, 在本申请实施例中, 所称处理器 401可以是中央处理单元 (Central Processing Unit, CPU), 该处理器还可以是其他通用处理器、 数字信号处理器 (Digital Signal Processor, DSP)、 专用集成电路 (Application Specific Integrated Circuit, ASIC)、 现成可编程门阵列 (Field-Programmable Gate Array, FPGA) 或者其他可编程逻辑器件、 分立门或者晶体管逻辑器件、 分立硬 件组件等。 通用处理器可以是微处理器或者该处理器也可以是任何常规的处理 器等。
[0123] 输入设备 402可以包括触控板、 指纹采传感器 (用于采集用户的指纹信息和指 纹的方向信息) 、 麦克风等, 输出设备 403可以包括显示器 (IXD等) 、 扬声器 等。
[0124] 该存储器 404可以包括只读存储器和随机存取存储器, 并向处理器 401 提供指 令和数据。 存储器 404的一部分还可以包括非易失性随机存取存储器。 例如, 存 储器 404还可以存储设备类型的信息。
[0125] 具体实现中, 本申请实施例中所描述的处理器 401、 输入设备 402、 输出设备 40 3可执行本申请实施例提供的一种数据分析方法的第一实施例中所描述的实现方 式、 第二实施列以及第三实施例中的实现方式, 也可执行本申请实施例所描述 的电子设备的实现方式, 在此不再赘述。
[0126] 在本申请的另一实施例中提供一种计算机可读存储介质, 上述计算机可读存储 介质存储有计算机程序, 上述计算机程序被处理器执行时实现:
[0127] 获取行程订单, 基于上述行程订单生成智能合约; 获取车载设备上传的行程数 据; 基于所行程数据和上述行程订单触发上述智能合约, 执行上述智能合约对 应的预警操作。
[0128] 上述计算机可读存储介质可以是前述任一实施例上述的终端的内部存储单元,
例如终端的硬盘或内存。 上述计算机可读存储介质也可以是上述终端的外部存 储设备, 例如上述终端上配备的插接式硬盘, 智能存储卡 ( Smart Media Card, SMC) , 安全数字 ( Secure Digital, SD) 卡, 闪存卡 (Flash Card) 等。 进一 步地, 上述计算机可读存储介质还可以既包括上述终端的内部存储单元也包括 外部存储设备。 上述计算机可读存储介质用于存储上述计算机程序以及上述终 端所需的其他程序和数据。 上述计算机可读存储介质还可以用于暂时地存储已 经输出或者将要输出的数据。
[0129] 本领域普通技术人员可以意识到, 结合本文中所公开的实施例描述的各示例的 单元及算法步骤, 能够以电子硬件、 计算机软件或者二者的结合来实现, 为了 清楚地说明硬件和软件的可互换性, 在上述说明中已经按照功能一般性地描述 了各示例的组成及步骤。 这些功能究竟以硬件还是软件方式来执行, 取决于技 术方案的特定应用和设计约束条件。 专业技术人员可以对每个特定的应用来使 用不同方法来实现所描述的功能, 但是这种实现不应认为超出本申请的范围。
[0130] 所属领域的技术人员可以清楚地了解到, 为了描述的方便和简洁, 上述描述的 系统、 电子设备和单元的具体工作过程, 可以参考前述方法实施例中的对应过 程, 在此不再赘述。
[0131] 在本申请所提供的几个实施例中, 应该理解到, 所揭露的系统、 电子设备和方 法, 可以通过其它的方式实现。 例如, 以上所描述的装置实施例仅仅是示意性 的, 例如, 上述单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可以有另 外的划分方式, 例如多个单元或组件可以结合或者可以集成到另一个系统, 或 一些特征可以忽略, 或不执行。 另外, 所显示或讨论的相互之间的耦合或直接 耦合或通信连接可以是通过一些接口、 装置或单元的间接耦合或通信连接, 也 可以是电的, 机械的或其它的形式连接。
[0132] 上述作为分离部件说明的单元可以是或者也可以不是物理上分开的, 作为单元 显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可 以分布到多个网络单元上。 可以根据实际的需要选择其中的部分或者全部单元 来实现本申请实施例方案的目的。
[0133] 另外, 在本申请各个实施例中的各功能单元可以集成在一个处理单元中, 也可
以是各个单元单独物理存在, 也可以是两个或两个以上单元集成在一个单元中 。 上述集成的单元既可以采用硬件的形式实现, 也可以采用软件功能单元的形 式实现。
[0134] 上述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用 时, 可以存储在一个计算机可读取存储介质中。 基于这样的理解, 本申请的技 术方案本质上或者说对现有技术做出贡献的部分, 或者该技术方案的全部或部 分可以以软件产品的形式体现出来, 该计算机软件产品存储在一个存储介质中 , 包括若干指令用以使得一台计算机设备 ( 可以是个人计算机, 电子设备, 或 者网络设备等 ) 执行本申请各个实施例上述方法的全部或部分步骤。 而前述的 存储介质包括: U盘、 移动硬盘、 只读存储器 (ROM, Read-Only Memory)、 随 机存取存储器 (RAM, Random Access Memory)、 磁碟或者光盘等各种可以存储 程序代码的介质。
[0135] 以上所述, 仅为本申请的具体实施方式, 但本申请的保护范围并不局限于此, 任何熟悉本技术领域的技术人员在本申请揭露的技术范围内, 可轻易想到各种 等效的修改或替换, 这些修改或替换都应涵盖在本申请的保护范围之内。 因此 , 本申请的保护范围应以权利要求的保护范围为准。
发明概述
技术问题
问题的解决方案
发明的有益效果
Claims
[权利要求 1] 一种数据分析方法, 其特征在于, 包括:
获取行程订单, 基于所述行程订单生成智能合约; 获取车载设备上传的行程数据;
基于所行程数据和所述行程订单触发所述智能合约, 执行所述智能合 约对应的预警操作。
[权利要求 2] 根据权利要求 1所述的方法, 其特征在于, 所述基于所行程数据和所 述行程订单触发所述智能合约, 执行所述智能合约对应的预警操作, 包括:
基于所述行程数据判断行驶路径与所述行程订单中包括的预设导航路 线偏差是否超过第一阈值;
若确定所述行驶路径与所述预设导航路线偏差超过第一阈值, 则触发 所述智能合约, 向所述车载设备发送监控指令, 所述监控指令用于启 动车辆内的监控设备。
[权利要求 3] 根据权利要求 2所述的方法, 其特征在于, 在所述向车载设备发送监 控指令之后, 所述方法还包括:
接收所述车载设备发送的监控信息;
在所述监控信息中存在危险信息的情况下, 触发所述智能合约, 释放 所述行程订单中包含的隐私信息, 将上述隐私信息和所述行程数据上 传至警务平台, 所述隐私信息包括司机信息和乘客信息以及紧急联系 人信息。
[权利要求 4] 根据权利要求 3所述的方法, 其特征在于, 在所述监控信息中存在危 险信息的情况下, 判断所述行驶数据中的加速度的绝对值是否大于第 二阈值;
若是, 则触发所述智能合约, 向所述车载设备发送报警启动指令, 所
述报警指令用于使所述车载设备向周边的车辆发送警报信息。
[权利要求 5] 根据权利要求 1-4任一项所述的方法, 其特征在于, 在所述获取行程 订单之后, 所述方法还包括:
接收所述车载设备发送的实际司机图像信息;
判断所述实际司机图像信息是否与预存司机图像信息一致, 所述预存 司机图像信息为所述行程订单中包括的司机信息对应的预存司机图像 在所述实际司机图像信息与所述预存实际图像信息不一致的情况下, 向乘客对应的电子设备发送提示信息。
[权利要求 6] 一种电子设备, 其特征在于, 所述电子设备包括:
生成单元, 用于获取行程订单, 基于所述行程订单生成智能合约; 获取单元, 用于获取车载设备上传的行程数据; 执行单元, 用于基于所行程数据和所述行程订单触发所述智能合约, 执行所述智能合约对应的预警操作。
[权利要求 7] 根据权利要求 6所述的电子设备, 其特征在于, 所述执行单元包括: 判断子单元, 用于基于所述行程数据判断行驶路径与所述行程订单中 包括的预设导航路线偏差是否超过第一阈值;
发送子单元, 用于若确定所述行驶路径与所述预设导航路线偏差超过 阈值, 则触发所述智能合约, 向所述车载设备发送监控指令, 所述监 控指令用于启动车辆内的监控设备。
[权利要求 8] 根据权利要求 7所述的电子设备, 其特征在于, 所述执行单元还包括 接收子单元, 用于接收所述车载设备发送的监控信息;
释放子单元, 用于在所述监控信息中存在危险信息的情况下, 触发所
述智能合约, 释放所述行程订单;
所述发送子单元, 还用于在所述监控信息中存在危险信息的情况下, 触发所述智能合约, 将上述行程订单和所述行程数据上传至警务平台
[权利要求 9] 一种电子设备, 其特征在于, 所述电子设备包括处理器、 存储器和通 信模块, 其中, 所述存储器用于存储程序代码, 所述处理器用于调用 所述程序代码来执行如权利要求 1-5任一项所述的方法。
[权利要求 10] 一种计算机可读存储介质, 其特征在于, 所述计算机存储介质存储有 计算机程序, 所述计算机程序包括程序指令, 所述程序指令当被处理 器执行时使所述处理器执行如权利要求 1-5任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20763210.0A EP3764292A4 (en) | 2019-02-27 | 2020-02-26 | DATA ANALYSIS PROCESS, ELECTRONIC DEVICE AND COMPUTER READABLE MEDIA |
US17/044,588 US11945457B2 (en) | 2019-02-27 | 2020-02-26 | Method for data analysis, electronic device, and computer readable medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910147946.3A CN109993330A (zh) | 2019-02-27 | 2019-02-27 | 一种数据分析方法、电子设备及计算机可读介质 |
CN201910147946.3 | 2019-02-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020173458A1 true WO2020173458A1 (zh) | 2020-09-03 |
Family
ID=67130401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/076759 WO2020173458A1 (zh) | 2019-02-27 | 2020-02-26 | 一种数据分析方法、电子设备及计算机可读介质 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11945457B2 (zh) |
EP (1) | EP3764292A4 (zh) |
CN (1) | CN109993330A (zh) |
WO (1) | WO2020173458A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113822213A (zh) * | 2021-09-28 | 2021-12-21 | 深圳市卡联科技股份有限公司 | 一种行车安全监控方法及系统 |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109993330A (zh) * | 2019-02-27 | 2019-07-09 | 深圳市元征科技股份有限公司 | 一种数据分析方法、电子设备及计算机可读介质 |
CN110889525B (zh) * | 2019-11-26 | 2023-09-26 | 腾讯科技(深圳)有限公司 | 订单路线偏离事件管理方法及装置、服务器、存储介质 |
CN111145759B (zh) * | 2019-12-27 | 2020-10-02 | 周洋 | 一种出行业用基于声纹特征识别的语音报警系统 |
CN111986470B (zh) * | 2020-07-20 | 2022-11-29 | 汉海信息技术(上海)有限公司 | 网约车安全监控方法、装置、电子设备及存储介质 |
CN112819580A (zh) * | 2021-01-29 | 2021-05-18 | 北京瞰瞰科技有限公司 | 智能化订单生成方法、服务器、乘客端及存储介质 |
US20220281452A1 (en) * | 2021-03-05 | 2022-09-08 | Toyota Motor North America, Inc. | Tracking driver behavior |
CN113432613B (zh) * | 2021-07-07 | 2024-09-03 | 深圳市伴行旅游科技有限公司 | 旅游行程导航方法、智能设备及存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488376A (zh) * | 2015-12-01 | 2016-04-13 | 北京中微锐芯科技有限公司 | 确定身份的方法及装置 |
CN105721695A (zh) * | 2016-02-01 | 2016-06-29 | 广东欧珀移动通信有限公司 | 基于移动终端的紧急求助方法、装置和移动终端 |
US20180061237A1 (en) * | 2016-08-30 | 2018-03-01 | International Business Machines Corporation | Modifying Behavior of Autonomous Vehicle Based on Advanced Predicted Behavior Analysis of Nearby Drivers |
CN108765930A (zh) * | 2018-06-26 | 2018-11-06 | 上海掌门科技有限公司 | 行车监控方法及设备 |
CN109087409A (zh) * | 2018-07-13 | 2018-12-25 | 网云区块链(深圳)有限公司 | 一种数据处理、信息获取方法、电子设备及存储介质 |
CN109637082A (zh) * | 2018-12-24 | 2019-04-16 | 航天信息股份有限公司 | 网约车监管装置和方法 |
CN109993330A (zh) * | 2019-02-27 | 2019-07-09 | 深圳市元征科技股份有限公司 | 一种数据分析方法、电子设备及计算机可读介质 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105243838B (zh) * | 2015-11-09 | 2018-05-04 | 北京奇虎科技有限公司 | 车辆行驶安全监控方法和装置、系统 |
CN112135254B (zh) * | 2016-01-26 | 2023-04-25 | 北京嘀嘀无限科技发展有限公司 | 监控在途中的交通工具的系统和方法 |
EP3453005A1 (en) | 2016-05-06 | 2019-03-13 | Innogy Innovation GmbH | Traffic system |
CN106056839B (zh) * | 2016-06-30 | 2018-12-25 | 武汉斑马快跑科技有限公司 | 网约车安全监测系统及方法 |
CN106373331A (zh) * | 2016-09-28 | 2017-02-01 | 百度在线网络技术(北京)有限公司 | 乘车预警方法和装置 |
US10783600B2 (en) * | 2017-05-25 | 2020-09-22 | GM Global Technology Operations LLC | Method and system using a blockchain database for data exchange between vehicles and entities |
EP3418998A1 (en) * | 2017-06-22 | 2018-12-26 | Nokia Technologies Oy | Road traffic management |
DE102018203994A1 (de) * | 2018-03-15 | 2019-09-19 | Robert Bosch Gmbh | System und Verfahren zum dezentralen Durchführen von Transaktionen |
CN109255252B (zh) * | 2018-07-19 | 2022-04-01 | 广州柿子信息技术有限公司 | 一种基于区块链的人员管理方法及系统 |
CN109194710B (zh) * | 2018-07-19 | 2021-08-17 | 广州华创物联科技股份有限公司 | 一种基于区块链和智能合约的特定人员行为监管系统及方法 |
-
2019
- 2019-02-27 CN CN201910147946.3A patent/CN109993330A/zh active Pending
-
2020
- 2020-02-26 WO PCT/CN2020/076759 patent/WO2020173458A1/zh active Application Filing
- 2020-02-26 US US17/044,588 patent/US11945457B2/en active Active
- 2020-02-26 EP EP20763210.0A patent/EP3764292A4/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488376A (zh) * | 2015-12-01 | 2016-04-13 | 北京中微锐芯科技有限公司 | 确定身份的方法及装置 |
CN105721695A (zh) * | 2016-02-01 | 2016-06-29 | 广东欧珀移动通信有限公司 | 基于移动终端的紧急求助方法、装置和移动终端 |
US20180061237A1 (en) * | 2016-08-30 | 2018-03-01 | International Business Machines Corporation | Modifying Behavior of Autonomous Vehicle Based on Advanced Predicted Behavior Analysis of Nearby Drivers |
CN108765930A (zh) * | 2018-06-26 | 2018-11-06 | 上海掌门科技有限公司 | 行车监控方法及设备 |
CN109087409A (zh) * | 2018-07-13 | 2018-12-25 | 网云区块链(深圳)有限公司 | 一种数据处理、信息获取方法、电子设备及存储介质 |
CN109637082A (zh) * | 2018-12-24 | 2019-04-16 | 航天信息股份有限公司 | 网约车监管装置和方法 |
CN109993330A (zh) * | 2019-02-27 | 2019-07-09 | 深圳市元征科技股份有限公司 | 一种数据分析方法、电子设备及计算机可读介质 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3764292A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113822213A (zh) * | 2021-09-28 | 2021-12-21 | 深圳市卡联科技股份有限公司 | 一种行车安全监控方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN109993330A (zh) | 2019-07-09 |
US11945457B2 (en) | 2024-04-02 |
EP3764292A1 (en) | 2021-01-13 |
US20210024080A1 (en) | 2021-01-28 |
EP3764292A4 (en) | 2021-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020173458A1 (zh) | 一种数据分析方法、电子设备及计算机可读介质 | |
US11042619B2 (en) | Vehicle occupant tracking and trust | |
US11710406B2 (en) | Vehicle-to-vehicle sensor data sharing | |
WO2020103515A1 (zh) | 用于控制无人驾驶车辆的方法和装置 | |
TW202107400A (zh) | 基於區塊鏈的違規事件處理方法及系統 | |
US20200394915A1 (en) | Vehicle-to-vehicle sensor data sharing | |
JP6827712B2 (ja) | 制御装置、車載装置、映像配信方法、及びプログラム | |
US10832699B1 (en) | Impact media sharing | |
CN112009494B (zh) | 一种车辆异常处理方法、装置、控制设备及存储介质 | |
CN112016520B (zh) | 基于ai的交通违法凭证生成方法、装置、终端及存储介质 | |
US20240274011A1 (en) | Transport dangerous driving reporting | |
US12010744B2 (en) | Occupant condition detection and response | |
JP7354888B2 (ja) | 情報処理装置、プログラム、及び、情報処理方法 | |
CN113240920A (zh) | 车辆通行方法及装置、认证服务器和紧急救援系统 | |
JP2021163498A (ja) | 交通マネージャ輸送手段 | |
JP2018081425A (ja) | 車両の問診システム | |
KR20200107022A (ko) | 실시간 사고 감지 및 사고를 자동으로 전파하는 장치 및 방법 | |
CN111861051A (zh) | 用于处理交通事故的方法和装置 | |
KR102178822B1 (ko) | 위치 정보 기반의 실시간 사고감지와 사고정보를 전파하는 장치 및 방법 | |
CN111600839B (zh) | 一种交通事故处理方法、设备及存储介质 | |
CN116601619A (zh) | 安全控制器区域网络(can)收发器 | |
WO2020019500A1 (zh) | 车辆、车险防欺诈预警及存储介质 | |
JP7431893B2 (ja) | 事故情報表示装置、事故情報表示方法及びプログラム | |
JP7451821B2 (ja) | 動的に適応させる運転モードセキュリティ制御 | |
US20230048305A1 (en) | Transport-related contact notification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 20763210.0 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2020763210 Country of ref document: EP Effective date: 20201005 |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20763210 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |