WO2020177408A1 - 一种安保流程的触发系统、方法及装置 - Google Patents

一种安保流程的触发系统、方法及装置 Download PDF

Info

Publication number
WO2020177408A1
WO2020177408A1 PCT/CN2019/121189 CN2019121189W WO2020177408A1 WO 2020177408 A1 WO2020177408 A1 WO 2020177408A1 CN 2019121189 W CN2019121189 W CN 2019121189W WO 2020177408 A1 WO2020177408 A1 WO 2020177408A1
Authority
WO
WIPO (PCT)
Prior art keywords
security process
order
terminal
trigger condition
user
Prior art date
Application number
PCT/CN2019/121189
Other languages
English (en)
French (fr)
Inventor
苟艺
范莉莉
Original Assignee
北京三快在线科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京三快在线科技有限公司 filed Critical 北京三快在线科技有限公司
Publication of WO2020177408A1 publication Critical patent/WO2020177408A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry

Definitions

  • This application relates to the field of Internet technology, and in particular to a system, method and device for triggering a security process.
  • buttons such as "one-button alarm”, “contact emergency contact” and so on.
  • the embodiments of this specification provide a system, method and device for triggering a security process.
  • This specification provides a security process trigger system, wherein the server in the system, when the received order is allocated, determines multiple users related to the order, and obtains the order related to the order. At least one of the multiple users sets a security process trigger condition in advance, and sends the security process trigger condition to the terminal of a user other than the user among multiple users related to the order; in the system The terminal receives the security process trigger condition sent by the server, and in response to receiving the information satisfying the security process trigger condition, starts the security process, wherein the received security process trigger condition is related to The trigger conditions of the security process corresponding to other users related to the order are described.
  • the first method for triggering the security process includes: a server receives an order; if the order is allocated, the server determines multiple users related to the order; the server obtains information related to the order At least one user of the plurality of users set a security process trigger condition in advance, and the server sends the security process trigger condition to the multiple users related to the order other than the user Terminal, so that the terminal of the other user monitors whether the security process is triggered according to the security process trigger condition.
  • the second method for triggering the security process is applied to the terminal of at least one user related to the same order, and the terminal of the at least one user can perform the following operations: the terminal of the user receives the server sending The security process trigger condition, wherein the received security process trigger condition is a security process trigger condition corresponding to other users related to the order; in response to the user’s terminal receiving the security process trigger condition that meets the security process trigger condition Information, start the security process.
  • the first security process trigger device includes: a receiving module for receiving an order; a determining module for determining multiple users related to the order if the order is allocated; a sending module, Used to obtain a security process trigger condition preset by at least one user among the plurality of users related to the order, and send the security process trigger condition to the multiple users related to the order except this user Terminals of other users, so that the terminals of the other users monitor whether the security process is triggered according to the security process trigger condition.
  • the second type of triggering device for the security process is applied to the terminal of at least one user related to the same order.
  • the triggering device for the security process includes: a receiving module for receiving data sent by the server The security process trigger condition, wherein the received security process trigger condition is a security process trigger condition corresponding to other users related to the order; the monitoring module is configured to activate in response to receiving information satisfying the security process trigger condition The security process.
  • This specification provides a computer-readable storage medium that stores a computer program that, when executed by a processor, realizes the triggering method of the above-mentioned first security process, or realizes the above-mentioned second security process Trigger method.
  • An electronic device includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor.
  • the processor implements the triggering method of the first security process when the processor executes the program, Or implement the second method of triggering the security process described above.
  • FIG. 1 is a schematic diagram of a triggering system for a security process provided by an embodiment of this specification
  • Figure 2 is the triggering process of the first security process provided by the embodiment of this specification
  • FIG. 3 is a schematic diagram of a network architecture provided by an embodiment of this specification.
  • Figure 4 is the triggering process of the second security process provided by the embodiment of this specification.
  • FIG. 5 is a schematic structural diagram of a trigger device of the first security process provided by an embodiment of this specification.
  • FIG. 6 is a schematic structural diagram of a trigger device for a second security process provided by an embodiment of this specification
  • FIG. 7 is a schematic diagram of an electronic device corresponding to FIG. 2 or FIG. 4 provided by an embodiment of the specification.
  • FIG. 1 is a triggering system for a security process provided by an embodiment of this specification.
  • the system includes a server 600 and terminals 601 of several users.
  • the server 600 is a device that provides services to the terminal 601, so the server 600 can establish a communication connection with the terminal 601 to accept the service request sent by the terminal 601 or deliver service data to the terminal 601.
  • the server 600 can receive orders. And when the distribution of the received order is completed, determine the user related to the order, and obtain the determined trigger condition of the security process set by at least one user related to the order.
  • the acquired security process trigger conditions are sent to the terminals 601 of users other than the user among the determined users. For example, suppose that the uppermost terminal 601 on the left and the uppermost terminal 601 on the right in FIG. 1 correspond to an order. In this case, the terminals of users related to the order include the uppermost terminal 601 on the left and the right The terminal 601 on the top side, if the server 600 receives the security process trigger condition sent by the top terminal 601 on the left, it can then send the security process trigger condition to the top terminal 601 on the right.
  • the terminal 601 receives the security process trigger condition sent by the server 600, and starts the security process in response to receiving the information satisfying the security process trigger condition.
  • the security process trigger condition is a security process trigger condition corresponding to other users related to the order.
  • the terminal 601 of at least one user and the server 600 related to the same order can be used as devices in the system that trigger the security process.
  • the following is an example based on the system shown in FIG.
  • FIG. 2 is the triggering process of the first security process provided by the embodiment of this specification.
  • the triggering process of the security process may include the following steps S100-S104.
  • S100 The server receives the order.
  • FIG. 3 corresponds to the system architecture diagram shown in FIG. 1, and the service provider and service requester in FIG. 3 correspond to the terminal 601 of the user related to the order in FIG. 1.
  • the user who requests the service is called the service requester
  • the service provider the user who provides the service for the service requester
  • the server serves as the supporting platform for the entire service function.
  • the service requester can initiate an order through the application (APP), web page, short message, phone, etc. installed on the terminal corresponding to the server, and the order is sent to the server.
  • the server sends the order to some or all of the terminals used by the service provider according to the preset rules, and the service provider can accept the order or not accept the order according to its own needs, thereby realizing the distribution of the order.
  • the server can send the information of the service provider that completed the order to the service requester that initiated the order, and it can also send the information of the service requester that initiated the order to the service provider that accepted the order So that the service provider that accepts the order can provide services to the service requester who initiated the order online or offline, where the service requester who initiated the order and the service provider who received the order are both The user associated with this order.
  • the above-mentioned server is the server that provides the online car-hailing service, or the server corresponding to the online car-hailing service platform.
  • the above-mentioned order is the online car-hailing order, and the users related to the order are It is the passenger user who initiated the order and the driver user corresponding to the order.
  • terminals described in this specification include, but are not limited to, mobile phones, tablet computers, personal computers (Personal Computer, PC), etc.
  • the server receives the order initiated by the service requester and sends the order to some or all of the service providers, it can monitor whether the order is allocated, that is, whether the service provider accepts the order, and then determines the When the order is accepted, the service requester who initiated the order and the service provider who accepted the order are determined as multiple users related to the order.
  • S104 Acquire a security process trigger condition preset by at least one of the multiple users related to the order, and send the security process trigger condition to the multiple users related to the order except for the user Terminals of other users, so that the terminals of the other users monitor whether the security process is triggered according to the security process trigger condition.
  • the server after the server determines multiple users related to the order that is allocated through the above step S102, it can query the pre-saved user for at least one of the multiple users related to the order Corresponding security process trigger conditions, and send the queried security process trigger conditions to the terminal of the user other than the user among the multiple users related to the order, so that the terminal of the other user is based on the received terminal
  • the security process trigger condition monitors whether the security process is triggered.
  • the security process trigger conditions can be customized in advance, and the customized security process trigger conditions can be sent to the server for storage.
  • the server can query the customized security process trigger condition pre-saved by at least one of the multiple users related to the order, and send the security process trigger condition to the multiple users related to the order except the user
  • the terminals of other users that receive the security process trigger condition can monitor whether the security process is triggered according to the received security process trigger condition, and when the security process is monitored, the security process can be started.
  • both driver users and passenger users can pre-define their own security process trigger conditions, and send them to the server to save accordingly.
  • the server The passenger user-defined security process trigger conditions are sent to the terminal where the driver user is located. In this way, when the driver user violates the passenger user and controls the passenger user’s terminal, the driver user’s terminal can still be based on the received passenger user’s security
  • the process trigger condition triggers the security process.
  • the server will also send the driver user-defined security process trigger conditions to the passenger user to achieve the purpose of protecting the personal safety of the driver user.
  • this manual does not limit the number of users related to the above orders.
  • the above example only takes two users related to the online ride-hailing order as an example. In fact, there may be three or more users.
  • the server can send the security process trigger condition corresponding to the user to at least one of the multiple users related to the order to all or part of the users other than the user related to the order. The same effect.
  • the security process trigger condition received by the terminal is the security process trigger condition set by other users
  • the purpose of monitoring whether the security process is triggered according to the security process trigger conditions set by other users is to protect other users’
  • Personal safety is not the personal safety of the owner of the terminal itself. Therefore, after the terminal receives the security process trigger conditions corresponding to other users sent by the server, it can hide the received security process trigger conditions corresponding to other users, that is, no Provide the security process trigger conditions corresponding to other users received in any manner (such as display, play, broadcast, etc.) to prevent the owner of the terminal from taking precautions, thereby further ensuring the personal safety of other users.
  • the terminal itself can also save the user-defined security process trigger conditions. Therefore, The terminal can also monitor whether to trigger the security process according to the user-defined security process trigger conditions stored locally.
  • the server may send instruction information to the terminal, and the instruction information is used to indicate the order
  • At least one of the multiple related users deletes the security process trigger conditions corresponding to other users, and stops monitoring whether the security process is triggered according to the security process trigger conditions corresponding to other users.
  • the terminal may also actively delete the security process trigger conditions corresponding to other users when determining that the business corresponding to the aforementioned order has ended, and stop monitoring whether the security process is triggered according to the security process trigger conditions corresponding to other users.
  • the server can also monitor the location of the user terminal related to the order (ie, the current location of the terminal), and when the distance between the monitored user’s terminal and the destination location of the order is less than When the preset value is set, it is determined that the business corresponding to the order has ended, and then the instruction information is sent to the terminal.
  • the instruction information is used to instruct at least one of the multiple users related to the order to delete the security process trigger conditions corresponding to other users. Stop monitoring whether the security process is triggered according to the triggering conditions of the security process corresponding to other users.
  • the terminal can also actively delete the security process trigger conditions corresponding to other users when the distance between its own location and the destination location of the order is less than the preset value, and stop monitoring whether the security process is based on the security process trigger conditions corresponding to other users Is triggered.
  • the preset value can be set as required, and this manual does not limit it.
  • the security process includes, but is not limited to, recording audio/video and uploading it to the server, reporting the current location of the terminal itself to the server in real time, alarming, contacting preset emergency contacts, etc.
  • the methods for starting the security process include but are not limited to: start audio recording, upload the recorded audio data to the server; and/or start video recording, and transfer the recorded video
  • the data is uploaded to the server; and/or the current location information is determined, and the location information is uploaded to the server; and/or, the preset phone number (at least one of the alarm number or the emergency contact number) is dialed.
  • security procedures listed above are only exemplary.
  • the purpose of the security procedures is to protect the personal safety of users. Any security procedures used to protect the personal safety of users can be applied to the methods provided in this manual. , This does not constitute a limitation of this manual.
  • the security process triggering method may include voice trigger.
  • the security process trigger method at this time is: the terminal monitors and recognizes the voice data, if the voice data is recognized from the monitored voice data The keywords preset by the user are determined to trigger the security process.
  • the method for the terminal to monitor whether the security process is triggered is specifically: the terminal monitors and recognizes the voice data, determines whether the received keyword is recognized from the monitored voice data, if so, determines that the security process is triggered, otherwise, determines The security process was not triggered.
  • the victim can also make the aggressor’s mobile phone trigger the security process by talking, shouting, etc.
  • the trigger condition of the security process can be user-defined timbre data or pitch threshold. After monitoring and recognizing the voice data, the received timbre data or pitch value can be identified from the monitored voice data, and through the user-defined The timbre data matches or compares with the pitch threshold. If the match succeeds or exceeds the pitch threshold, it is determined to start the security process.
  • the way to trigger the above-mentioned security process in this manual may also be: when the terminal monitors that the time of long pressing any interface in the specified application exceeds the set time period, it is determined to trigger the security process.
  • the terminal can monitor whether the long-press time of any interface of the designated application installed by itself exceeds the set time, if so, it is determined that the security process is triggered, otherwise, it is determined that the security process is not triggered.
  • the above-mentioned designated application can be a car-hailing APP, and the terminal can monitor whether any position in any interface of the car-hailing APP installed by itself is long pressed for more than 2 seconds If yes, it is determined that the security process is triggered, otherwise, it is determined that the security process is not triggered. In this way, compared to the technical solution that determines whether the security process is triggered by clicking a button or icon or other precise operations, the security process provided by the embodiment of the present application is easier to be triggered, and the user's personal life can be more effectively protected. Safety.
  • the security process can be triggered as follows: when the terminal monitors that the volume exceeds the above-mentioned volume threshold for a time period exceeding the above-mentioned duration, it is determined that the security process is triggered.
  • the user can customize the terminal vibration amplitude threshold and duration as the trigger conditions for the security process, and the security process trigger method can be: when the terminal monitors that its own vibration amplitude exceeds the above-mentioned vibration amplitude threshold for longer than the above-mentioned duration, the security is determined The process is triggered. This manual will not list them one by one.
  • the terminal (or the APP installed in it) can provide users with access to custom security process trigger conditions, so that users can set the security process trigger conditions they need according to their own needs to meet the needs of different users. Diversified needs.
  • Figure 4 is the triggering process of the second security process provided by the embodiment of this specification. It is used for the terminals of each user related to the same order. For each user’s terminal, the triggering process of the security process may include the following steps 300-302 .
  • S300 The user's terminal receives a security process trigger condition sent by a server, where the received security process trigger condition is a security process trigger condition corresponding to other users related to the order.
  • the security process trigger condition may be sent by the server to the terminal according to the method shown in FIG. 2.
  • S302 In response to receiving the information satisfying the trigger condition of the security process, start the security process.
  • the terminal monitors whether the security process is triggered according to the received trigger condition of the security process, and if it monitors that the security process is triggered, it starts the security process.
  • the embodiment of this specification also provides a corresponding security process trigger device, as shown in Figures 5-6.
  • Fig. 5 is a schematic structural diagram of a trigger device for the first security process provided by an embodiment of this specification, including:
  • the receiving module 400 is used to receive orders
  • the determining module 402 is configured to determine multiple users related to the order if the distribution of the order is completed;
  • the sending module 404 is configured to obtain a security process trigger condition preset by at least one of the multiple users related to the order, and send the security process trigger condition to multiple users related to the order In addition to the user’s terminal, the terminal of the other user monitors whether the security process is triggered according to the security process trigger condition.
  • the device is a server that provides online car-hailing services
  • the order is an online car-hailing order
  • the determining module 402 is specifically configured to determine the passenger user who initiated the order and the driver user corresponding to the order.
  • the sending module 404 is specifically configured to obtain at least one user-preset keyword related to the order.
  • the sending module 404 is further configured to, if the order has ended, send instruction information to the terminal of at least one user related to the order, and the instruction information is used to instruct the terminal to delete non-self settings If the current location of at least one user’s terminal related to the order is less than a preset value from the destination of the order, send to the terminal of the at least one user related to the order Indication information, where the indication information is used to instruct the terminal to delete a security process trigger condition not set by itself.
  • Fig. 6 is a schematic structural diagram of a trigger device for a second security process provided by an embodiment of this specification, including:
  • the receiving module 500 is configured to receive a security process trigger condition sent by a server, where the received security process trigger condition is a security process trigger condition corresponding to other users related to the order;
  • the monitoring module 502 is configured to initiate the security process in response to receiving the information satisfying the trigger condition of the security process.
  • the receiving module 500 is specifically configured to receive keywords that are preset by the other users and sent by the server.
  • the monitoring module 502 is specifically configured to monitor and recognize voice data; if the keyword is recognized, the security process is started.
  • the monitoring module 502 is further configured to, if the order has ended, delete the security process trigger conditions not set by itself, or if the current location of the terminal is less than the preset destination of the order Value, delete the security process trigger conditions that are not set by itself.
  • the monitoring module 502 is specifically configured to start audio recording and upload the recorded audio data to the server; and/or start video recording and upload the recorded video data to the server; and/or confirm Upload the location information of the current location to the server; and/or dial a preset phone number.
  • the embodiment of this specification also provides a computer-readable storage medium, the storage medium stores a computer program, and the computer program can be used to execute the method for triggering the security process provided in FIG. 2 or FIG. 4 above.
  • the embodiment of this specification also proposes a schematic structural diagram of the electronic device shown in FIG. 7.
  • the electronic device includes a processor, an internal bus, a network interface, a memory, and a non-volatile memory.
  • the processor reads the corresponding computer program from the non-volatile memory into the memory and then runs it, so as to realize the triggering method of the security process described in FIG. 2 or FIG. 4.
  • this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, etc. That is to say, the execution body of the following processing flow is not limited to each logic unit, and can also be Hardware or logic device.
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller can be implemented in any suitable manner.
  • the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers.
  • controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as a part of the memory control logic.
  • controller in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers and embedded The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for implementing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • the embodiments of the present application can be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.
  • the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
  • processors CPU
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • This application can also be practiced in distributed computing environments. In these distributed computing environments, remote processing devices connected through a communication network perform tasks.
  • program modules can be located in local and remote computer storage media including storage devices.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本申请公开了一种安保流程的触发系统、方法及装置。在订单完成分配时,确定与所述订单相关的多个用户,针对与所述订单相关的多个用户中的至少一个用户预先设置的安保流程触发条件,将该用户对应的安保流程触发条件发送给与该订单相关的其他用户所在的终端,使其他用户所在的终端根据接收到的安保流程触发条件监控安保流程是否被触发。

Description

一种安保流程的触发系统、方法及装置
相关申请的交叉引用
本申请要求于2019年3月1日提交国家知识产权局、申请号为201910154584.0、发明名称为“一种安保流程的触发方法及装置”的发明专利申请的优先权,以及要求于2019年6月18日提交国家知识产权局、申请号为201910528665.2、发明名称为“一种安保流程的触发系统、方法及装置”的发明专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及互联网技术领域,尤其涉及一种安保流程的触发系统、方法及装置。
背景技术
随着互联网技术的发展,诸如网约车应用、外卖应用等致力于为用户提供生活服务的应用层出不穷,这些应用在给用户的生活带来了便利的同时,也给用户的人身安全带来了隐患。
以网约车为例进行说明。在网约车的实际应用场景中,司机和乘客双方在相对封闭的环境中相处时间较长,各类不确定因素影响相互叠加,安全风险较高。情节严重的安全场景如交通事故、违法行为(殴打谩骂、猥亵、抢劫)、失联、司机对抗执法等,均需要司机或乘客所使用的终端(如手机)以及提供网约车应用的平台在第一时间触发相应的安保流程,以保证司机和乘客的人身安全。
在触发安保流程的方法中,一般需要用户在终端上完成相对繁琐的操作,如解锁终端、启动相应的网约车应用、点击诸如“一键报警”、“联系紧急联系人”等触发按钮。
但是,用户在遇到危险情况时,操作终端的难度会增大,难以完成上述一系列的操作。更有可能的是,受害用户在受到施暴者侵害时,受害用户的终端甚至受害用户本身很有可能已经被施暴者控制,无法完成触发安保流程的操作,因此,在这种情况下,上述触发安保流程的方法无法保证安保流程的及时触发,也就无法保证用户的人身安全。
发明内容
有鉴于此,本说明书实施例提供一种安保流程的触发系统、方法及装置。
本说明书实施例采用下述技术方案:
本说明书提供的一种安保流程的触发系统,其中,所述系统中的服务器,在接收到的订单完成分配时,确定与所述订单相关的多个用户,获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端;所述系统中的终端,接收所述服务器发送的所述安保流程触发条件,响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程,其中,接收到的所述安保流程触发条件是与所述订单相关的其他用户对应的安保流程触发条件。
本说明书提供的第一种安保流程的触发方法,包括:服务器接收订单;若所述订单完成分配,则所述服务器确定与所述订单相关的多个用户;所述服务器获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并且所述服务器将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端,以使所述其他用户的终端根据所述安保流程触发条件监控安保流程是否被触发。
本说明书提供的第二种安保流程的触发方法,该第二种方法应用于与同一订单相关的至少一个用户的终端,所述至少一个用户的终端可执行以下操作:该用户的终端接收服务器发送的安保流程触发条件,其中,接收到的所述安保流程触发条件是与所述订单相关的其他用户对应的安保流程触发条件;响应于所述用户的终端接收到满足所述安保流程触发条件的信息,启动所述安保流程。
本说明书提供的第一种安保流程的触发装置,包括:接收模块,用于接收订单;确定模块,用于若所述订单完成分配,则确定与所述订单相关的多个用户;发送模块,用于获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端,以使所述其他用户的终端根据所述安保流程触发条件监控安保流程是否被触发。
本说明书提供的第二种安保流程的触发装置,该第二种装置应用于与同一订单相关的至少一个用户的终端,所述安保流程的触发装置,包括:接收模块,用于接收服务 器发送的安保流程触发条件,其中,接收到的所述安保流程触发条件是与订单相关的其他用户对应的安保流程触发条件;监控模块,用于响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程。
本说明书提供的一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述第一种安保流程的触发方法,或者实现上述第二种安保流程的触发方法。
本说明书提供的一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述第一种安保流程的触发方法,或者实现上述第二种安保流程的触发方法。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1为本说明书实施例提供的一种安保流程的触发系统的示意图;
图2为本说明书实施例提供的第一种安保流程的触发过程;
图3为本说明书实施例提供的一种网络架构示意图;
图4为本说明书实施例提供的第二种安保流程的触发过程;
图5为本说明书实施例提供的第一种安保流程的触发装置的结构示意图;
图6为本说明书实施例提供的第二种安保流程的触发装置的结构示意图;
图7为本说明书实施例提供的对应于图2或图4的电子设备示意图。
具体实施方式
为使本说明书的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本申请技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
以下结合附图,详细说明本申请各实施例提供的技术方案。
图1为本说明书实施例提供的一种安保流程的触发系统,该系统包括:服务器600 以及若干用户的终端601。其中,服务器600为向终端601提供服务的设备,因此服务器600可与终端601建立通信连接,以接受终端601发送的业务请求或向终端601下发业务数据。
该服务器600,可接收订单。并在接收到的订单完成分配时,确定与该订单相关的用户,获取确定出的与该订单相关的至少一个用户预先设置的安保流程触发条件。将获取的安保流程触发条件,发送给确定出的各用户中除该用户以外的其他用户的终端601。例如,假设图1中左侧最上方的终端601与右侧最上方的终端601对应的是一个订单,在该情况下,与该订单相关的用户的终端包括左侧最上方的终端601和右侧最上方的终端601,若服务器600在接收到左侧最上方的终端601发送的安保流程触发条件后,可将该安保流程触发条件随后发送给右侧最上方的终端601。
所述终端601,接收该服务器600发送的安保流程触发条件,响应于接收到满足该安保流程触发条件的信息,启动该安保流程。其中,该安保流程触发条件是与该订单相关的其他用户对应的安保流程触发条件。
也就是说在本说明书中,可将与同一个订单相关的至少一个用户的终端601以及该服务器600,作为该系统中的触发安保流程的各设备。下面基于图1所示的系统,分别从服务器600和用户的终端601执行安保流程的触发过程为例,进行说明。
图2为本说明书实施例提供的第一种安保流程的触发过程,该安保流程的触发过程可包括以下步骤S100-S104。
S100:服务器接收订单。
在本说明书中,示例性的网络架构如图3所示。图3与图1所示的系统架构图对应,图3中的服务提供方和服务请求方,对应于图1中的与订单相关的用户的终端601。请求获得服务的用户称为服务请求方,为服务请求方提供服务的用户称为服务提供方,服务器则作为整个服务功能的支撑平台。服务请求方可通过其终端上安装的与该服务器对应的应用(Application,APP)、网页、短信、电话等方式发起订单,则订单被发送到服务器上。服务器则根据预设的规则,将该订单发送给部分或全部的服务提供方所使用的终端,服务提供方则可根据自己的需求接受该订单或不接受该订单,由此实现订单的分配。
一旦订单完成分配,则服务器可将完成分配的该订单的服务提供方的信息发送给发起该订单的服务请求方,还可将发起该订单的服务请求方的信息发送给接受该订单的 服务提供方,以便由接受该订单的服务提供方通过线上或线下的方式为发起该订单的服务请求方提供服务,其中,发起该订单的服务请求方和接收该订单的服务提供方均是与该订单相关的用户。
以网约车服务为例进行说明,上述的服务器即为提供网约车服务的服务器,或者说网约车服务平台对应的服务器,上述的订单即为网约车订单,与订单相关的用户即为发起订单的乘客用户以及与该订单对应的司机用户。
需要说明的是,本说明书中所述的终端包括但不限于手机、平板电脑、个人计算机(Personal Computer,PC)等。
S102:若所述订单完成分配,则确定与所述订单相关的多个用户。
如上所述,服务器接收到服务请求方发起的订单,并将该订单发送给部分或全部的服务提供方后,可监控该订单是否完成分配,即是否有服务提供方接受该订单,在确定该订单被接受时,则确定发起该订单的服务请求方和接受该订单的服务提供方作为与该订单相关的多个用户。
S104:获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端,以使所述其他用户的终端根据所述安保流程触发条件监控安保流程是否被触发。
在本说明书中,服务器在通过上述步骤S102确定出与该完成分配的订单相关的多个用户之后,则可针对与所述订单相关的多个用户中的至少一个用户,查询预先保存的该用户对应的安保流程触发条件,并将查询到的安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户所在的终端,以使其他用户所在的终端根据接收到的安保流程触发条件监控安保流程是否被触发。
无论是作为服务请求方的用户还是作为服务提供方的用户,均可预先自定义安保流程触发条件,并将其自定义的安保流程触发条件发送给服务器保存。服务器可查询与所述订单相关的多个用户中的至少一个用户预先保存的自定义的安保流程触发条件,并将该安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的至少一个其他用户所在的终端。而接收到该安保流程触发条件的其他用户的终端可根据接收到的安保流程触发条件监控安保流程是否被触发,当监控到安保流程被触发时,即可启动安保流程。
例如,在网约车应用场景中,司机用户和乘客用户均可预先自定义自身的安保流程触发条件,并发送给服务器相应保存,当乘客用户发起的网约车订单被司机用户接受时,服务器将乘客用户自定义的安保流程触发条件发送给司机用户所在的终端,这样,当司机用户对乘客用户施暴并控制了乘客用户的终端时,司机用户的终端仍可根据接收到的乘客用户的安保流程触发条件触发安保流程。相反的,服务器也会将司机用户自定义的安保流程触发条件发送给乘客用户,以达到保护司机用户人身安全的目的。
另外,本说明书中对上述与订单相关的用户的数量并不做限制,上例只是以与网约车订单相关的用户有2个为例进行说明,实际上可能存在3个或3个以上。例如,在拼车服务中,相互不认识的乘客用户就可能存在2个以上,再加上司机用户,则与拼车订单相关的用户会存在3个以上。此时,服务器可针对与订单相关的多个用户中的至少一个用户,将该用户对应的安保流程触发条件发送给与订单相关的各用户中除该用户以外的全部或部分其他用户,可达到同样的效果。
可选地,在本说明书中,由于终端接收到的安保流程触发条件是其他用户设置的安保流程触发条件,根据其他用户设置的安保流程触发条件监控是否触发安保流程的目的是为了保护其他用户的人身安全,并不是该终端本身所有者的人身安全,因此,终端在接收到服务器发送的其他用户对应的安保流程触发条件后,可隐藏接收到的其他用户对应的安保流程触发条件,即,不以任何方式(如:显示、播放、播报等)提供接收到的其他用户对应的安保流程触发条件,以防止该终端的所有者有所防范,从而可进一步保证其他用户的人身安全。
当然,对于任一用户而言,其所在的终端除了根据接收到的其他用户的安保流程触发条件监控是否触发安保流程以外,该终端自身也可保存该用户自定义的安保流程触发条件,因此,该终端也可同时根据本地保存的该用户自定义的安保流程触发条件监控是否触发安保流程。
可选地,当服务器确定上述的订单对应的业务已经结束时(即,服务提供方已经完成向服务请求方提供服务),则服务器可向终端发送指示信息,该指示信息用于指示与该订单相关的多个用户中的至少一个用户删除其他用户对应的安保流程触发条件,停止根据其他用户对应的安保流程触发条件监控安保流程是否被触发。或者,终端也可在确定上述的订单对应的业务已经结束时,主动的删除其他用户对应的安保流程触发条件,停止根据其他用户对应的安保流程触发条件监控安保流程是否被触发。
可选地,考虑到用户可以随时在用户的终端上,通过操作终端向服务器发送订单 对应的业务已经结束的信息,因此存在用户违规操作,即在订单尚未完成时向服务器发送业务已经结束的信息,导致服务器误判订单对应的业务已经结束。于是,在本说明书中,服务器也可监测与该订单相关的用户终端的位置(即,该终端当前所在的位置),并当监测的用户的终端的位置与该订单的目的地位置的距离小于预设值时,确定该订单对应的业务已经结束,才向终端发送指示信息,该指示信息用于指示与该订单相关的多个用户中的至少一个用户删除其他用户对应的安保流程触发条件,停止根据其他用户对应的安保流程触发条件监控安保流程是否被触发。或者,终端也可在自身的位置与该订单的目的地位置的距离小于预设值时,主动的删除其他用户对应的安保流程触发条件,停止根据其他用户对应的安保流程触发条件监控安保流程是否被触发。其中,该预设值可根据需要设置,本说明书不做限定。
下面对本说明书中所述的安保流程和安保流程触发方式进行详细说明。
在本说明书中,所述的安保流程包括但不限于录制音/视频并上传给服务器、实时向服务器上报终端自身当前所在的位置、报警、联系预设的紧急联系人等。相应的,终端在监控到安保流程被触发时,启动安保流程的方法包括但不限于:启动音频的录制,将录制的音频数据上传给服务器;和/或,启动视频的录制,将录制的视频数据上传给服务器;和/或,确定当前的位置信息,将所述位置信息上传给服务器;和/或,拨打预设的电话号码(报警电话或紧急联系人电话中的至少一种)。
本领域技术人员应该可以理解,上述列举的安保流程只是示例性的,安保流程的目的是保障用户的人身安全,任何用于保障用户的人身安全的安保流程均可应用于本说明书提供的方法中,这并不构成对本说明书的限制。
本说明书中触发上述安保流程的安保流程触发方式可以有多种,由于当受害者被施暴者控制时,其可能很难用手操作终端,因此,在本说明书中,安保流程触发方式可包括语音触发。
具体的,用户可自定义若干个关键词,作为安保流程触发条件发送到服务器保存,则此时的安保流程触发方式为:终端监控并识别语音数据,若从监控到的语音数据中识别出该用户预设的关键词,则确定触发安保流程。
相应的,终端监控是否触发安保流程的方法具体为:终端监控并识别语音数据,判断是否从监控到的语音数据中识别出接收到的关键词,若是,则确定安保流程被触发,否则,确定安保流程未被触发。
这样,即使受害者被施暴者控制,很难用手操作手机,受害者也可通过说话、呼喊等方式使施暴者的手机触发安保流程。
安保流程的触发条件可以是用户自定义的音色数据或者音高阈值,在监控并识别语音数据后,从监控到的语音数据中识别出接收到的音色数据或者音高值,通过与用户自定义的音色数据匹配或者与音高阈值比较,若匹配成功或者超过音高阈值则确定启动安保流程。
本说明书中触发上述安保流程的方式还可以是:当终端监控到长按指定应用中任一界面的时间超过设定时长时,确定触发安保流程。终端可监控自身安装的指定应用的任一界面被长按的时间是否超过设定时长,若是,则确定安保流程被触发,否则,确定安保流程未被触发。
仍以网约车服务为例进行说明,上述的指定应用可以是网约车APP,终端可监控自身安装的网约车APP的任一界面中的任一位置被长按的时间是否超过2秒,若是,则确定安保流程被触发,否则,确定安保流程未被触发。这样,相对于通过点击某一按钮或图标等精确操作来确定安保流程是否被触发的技术方案来说,本申请实施例提供的安保流程更容易被触发,也就可更有效的保障用户的人身安全。
当然,除上述的语音触发和长按指定应用中任一界面来触发安保流程以外,还可以通过其他较为便捷的方式触发安保流程,如,用户可自定义音量阈值和持续时长作为安保流程触发条件,则安保流程触发方式可以为:当终端监控到音量超过上述音量阈值的时长超过上述持续时长时,确定安保流程被触发。或者,用户可自定义终端振动幅度阈值和持续时长作为安保流程触发条件,则安保流程触发方式可以为:当终端监控到自身的振动幅度超过上述振动幅度阈值的时长超过上述持续时长时,确定安保流程被触发。本说明书不再一一列举。
另外需要说明的是,终端(或其中安装的APP)可向用户提供自定义安保流程触发条件的入口,以便用户可根据自身的需要,设置其所需的安保流程触发条件,以满足不同用户的多样化需求。
图4为本说明书实施例提供的第二种安保流程的触发过程,用于与同一订单相关的各用户的终端,针对每个用户的终端,该安保流程的触发过程可包括以下步骤300-302。
S300:该用户的终端接收服务器发送的安保流程触发条件,其中,接收到的所述安保流程触发条件是与所述订单相关的其他用户对应的安保流程触发条件。
具体的,该安保流程触发条件可以是服务器根据如图2所示的方法向该终端发送的。
S302:响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程。
即,终端根据接收到的所述安保流程触发条件,监控安保流程是否被触发,若监控到所述安保流程被触发,则启动所述安保流程。
基于同样的思路,本说明书实施例还提供了相应的安保流程触发装置,如图5~6所示。
图5为本说明书实施例提供的第一种安保流程的触发装置的结构示意图,包括:
接收模块400,用于接收订单;
确定模块402,用于若所述订单完成分配,则确定与所述订单相关的多个用户;
发送模块404,用于获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端,以使所述其他用户的终端根据所述安保流程触发条件监控安保流程是否被触发。
可选地,所述装置为提供网约车服务的服务器;
所述订单为网约车订单;
所述确定模块402具体用于,确定发起所述订单的乘客用户以及与所述订单对应的司机用户。
可选地,所述发送模块404具体用于,获取与所述订单相关的至少一个用户预先设置的关键词。
可选地,所述发送模块404还用于,若所述订单已结束,则向与所述订单相关的至少一个用户的终端发送指示信息,所述指示信息用于指示该终端删除非自身设置的安保流程触发条件,或者若与所述订单相关的至少一个用户的终端的当前位置距离所述订单的目的地小于预设值,则向与所述订单相关的所述至少一个用户的终端发送指示信息,所述指示信息用于指示该终端删除非自身设置的安保流程触发条件。
图6为本说明书实施例提供的第二种安保流程的触发装置的结构示意图,包括:
接收模块500,用于接收服务器发送的安保流程触发条件,其中,接收到的所述安 保流程触发条件是与所述订单相关的其他用户对应的安保流程触发条件;
监控模块502,用于响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程。
可选地,所述接收模块500具体用于,接收服务器发送的所述其他用户预先设置的关键词。
可选地,所述监控模块502具体用于,监控并识别语音数据;若识别出所述关键词,则启动所述安保流程。
可选地,所述监控模块502还用于,若所述订单已结束,则删除非自身设置的安保流程触发条件,或者若所述终端当前所在的位置距离所述订单的目的地小于预设值,则删除非自身设置的安保流程触发条件。
可选地,所述监控模块502具体用于,启动音频的录制,将录制的音频数据上传给服务器;和/或,启动视频的录制,将录制的视频数据上传给服务器;和/或,确定当前所在位置的位置信息,将所述位置信息上传给服务器;和/或,拨打预设的电话号码。
本说明书实施例还提供了一种计算机可读存储介质,该存储介质存储有计算机程序,计算机程序可用于执行上述图2或者图4提供的安保流程的触发方法。
本说明书实施例还提出了图7所示的电子设备的示意结构图。如图7,在硬件层面,该电子设备包括处理器、内部总线、网络接口、内存以及非易失性存储器,当然还可能包括其他业务所需要的硬件。处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,以实现上述图2或者图4所述的安保流程的触发方法。当然,除了软件实现方式之外,本说明书并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件 编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、 只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (17)

  1. 一种安保流程的触发系统,其特征在于:
    所述系统中的服务器,
    在接收到的订单完成分配时,确定与所述订单相关的多个用户,
    获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并
    将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端;
    所述系统中的终端,
    接收所述服务器发送的所述安保流程触发条件,
    响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程,其中,接收到的所述安保流程触发条件是与所述订单相关的其他用户对应的安保流程触发条件。
  2. 如权利要求1所述的系统,其特征在于,
    所述服务器,获取与所述订单相关的至少一个用户预先设置的关键词,作为获取到的安保流程触发条件;
    所述终端,接收所述服务器发送的与所述订单相关的其他用户预先设置的关键词,作为接收到的安保流程触发条件。
  3. 如权利要求1或2任一项所述的系统,其特征在于,
    所述服务器,若所述订单已结束,或者与所述订单相关的至少一个用户的终端当前所在的位置距离所述订单的目的地小于预设值,则向与所述订单相关的至少一个用户的终端发送指示信息;
    所述终端,若接收到所述服务器发送的指示信息,则删除非自身设置的安保流程触发条件。
  4. 如权利要求2所述的系统,其特征在于,所述终端,监控并识别语音数据,若识别出所述关键词,则启动所述安保流程。
  5. 如权利要求1、2或4任一项所述的系统,其特征在于,所述终端,
    若所述订单已结束,则删除非自身设置的安保流程触发条件,或者
    若所述终端当前所在的位置距离所述订单的目的地小于预设值,则删除非自身设置的安保流程触发条件。
  6. 一种安保流程的触发方法,包括:
    服务器接收订单;
    若所述订单完成分配,则所述服务器确定与所述订单相关的多个用户;
    所述服务器获取与所述订单相关的所述多个用户中的至少一个用户预先设置的安保流程触发条件,并且
    所述服务器将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端,以使所述其他用户的终端根据所述安保流程触发条件监控安保流程是否被触发。
  7. 如权利要求6所述的方法,其特征在于,所述服务器为提供网约车服务的服务器;
    所述订单为网约车订单;
    确定与所述订单相关的多个用户,包括:
    所述服务器确定发起所述订单的乘客用户以及接收所述订单的司机用户。
  8. 如权利要求6所述的方法,其特征在于,获取与所述订单相关的至少一个用户预先设置的安保流程触发条件,包括:
    所述服务器获取与所述订单相关的至少一个用户预先设置的关键词。
  9. 如权利要求6-8任一项所述的方法,还包括:
    若所述订单已结束,则所述服务器向与所述订单相关的至少一个用户的终端发送指示信息,所述指示信息用于指示该终端删除非自身设置的安保流程触发条件;或者
    若与所述订单相关的至少一个用户的终端距离所述订单的目的地小于预设值,则所述服务器向所述至少一个用户的终端发送指示信息,所述指示信息用于指示该终端删除非自身设置的安保流程触发条件。
  10. 一种安保流程的触发方法,应用于与同一订单相关的至少一个用户的终端,所述方法包括:
    该终端接收服务器发送的安保流程触发条件,其中,接收到的所述安保流程触发条件是与所述订单相关的其他用户对应的安保流程触发条件;
    响应于接收到满足所述安保流程触发条件的信息,所述终端启动所述安保流程。
  11. 如权利要求10所述的方法,其特征在于,接收所述服务器发送的所述安保流程触发条件,包括:
    所述终端接收所述服务器发送的所述其他用户预先设置的关键词。
  12. 如权利要求11所述的方法,其特征在于,响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程,包括:
    所述终端监控并识别语音数据;
    若所述终端识别出所述关键词,则启动所述安保流程。
  13. 如权利要求10-12任一项所述的方法,还包括:
    若所述订单已结束,则所述终端删除非自身设置的安保流程触发条件;或者
    若该终端当前所在的位置距离所述订单的目的地小于预设值,则所述终端删除非自身设置的安保流程触发条件。
  14. 一种安保流程的触发装置,包括:
    接收模块,用于接收订单;
    确定模块,用于若所述订单完成分配,则确定与所述订单相关的多个用户;
    发送模块,用于获取与所述订单相关的所述多个用户中至少一个用户预先设置的安保流程触发条件,并将所述安保流程触发条件发送给与所述订单相关的多个用户中除该用户以外的其他用户的终端,以使所述其他用户的终端根据所述安保流程触发条件监控安保流程是否被触发。
  15. 一种安保流程的触发装置,包括:
    接收模块,用于接收服务器发送的安保流程触发条件,其中,接收到的所述安保流程触发条件是与订单相关的其他用户对应的安保流程触发条件;
    监控模块,用于响应于接收到满足所述安保流程触发条件的信息,启动所述安保流程。
  16. 一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述权利要求6-9或10-13任一所述的方法。
  17. 一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现上述权利要求6-9或10-13任一所述的方法。
PCT/CN2019/121189 2019-03-01 2019-11-27 一种安保流程的触发系统、方法及装置 WO2020177408A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201910154584.0A CN109934559A (zh) 2019-03-01 2019-03-01 一种安保流程的触发方法及装置
CN201910154584.0 2019-03-01
CN201910528665.2 2019-06-18
CN201910528665.2A CN110147989A (zh) 2019-03-01 2019-06-18 一种安保流程的触发系统、方法及装置

Publications (1)

Publication Number Publication Date
WO2020177408A1 true WO2020177408A1 (zh) 2020-09-10

Family

ID=66986227

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/121189 WO2020177408A1 (zh) 2019-03-01 2019-11-27 一种安保流程的触发系统、方法及装置

Country Status (2)

Country Link
CN (2) CN109934559A (zh)
WO (1) WO2020177408A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109934559A (zh) * 2019-03-01 2019-06-25 北京三快在线科技有限公司 一种安保流程的触发方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016006745A1 (ko) * 2014-07-11 2016-01-14 삼성전자주식회사 클라우드 서버, 제어 기기, 출력 기기, 이들을 포함하는 클라우드 시스템 및 기기 간 페어링 방법
CN106297268A (zh) * 2015-05-29 2017-01-04 鸿富锦精密工业(深圳)有限公司 互助乘车系统及互助乘车方法
CN107170230A (zh) * 2017-07-11 2017-09-15 杨益民 公路私车互助有偿搭乘系统及其方法
CN108810804A (zh) * 2018-06-13 2018-11-13 陈磊 一种基于网约车平台的智能防护方法及其系统
CN109242647A (zh) * 2018-10-23 2019-01-18 马伟超 一种基于物联网的共享汽车安全预警方法及系统
CN109934559A (zh) * 2019-03-01 2019-06-25 北京三快在线科技有限公司 一种安保流程的触发方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971334A (zh) * 2017-03-28 2017-07-21 北京小米移动软件有限公司 处理行程订单的方法及装置、电子设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016006745A1 (ko) * 2014-07-11 2016-01-14 삼성전자주식회사 클라우드 서버, 제어 기기, 출력 기기, 이들을 포함하는 클라우드 시스템 및 기기 간 페어링 방법
CN106297268A (zh) * 2015-05-29 2017-01-04 鸿富锦精密工业(深圳)有限公司 互助乘车系统及互助乘车方法
CN107170230A (zh) * 2017-07-11 2017-09-15 杨益民 公路私车互助有偿搭乘系统及其方法
CN108810804A (zh) * 2018-06-13 2018-11-13 陈磊 一种基于网约车平台的智能防护方法及其系统
CN109242647A (zh) * 2018-10-23 2019-01-18 马伟超 一种基于物联网的共享汽车安全预警方法及系统
CN109934559A (zh) * 2019-03-01 2019-06-25 北京三快在线科技有限公司 一种安保流程的触发方法及装置
CN110147989A (zh) * 2019-03-01 2019-08-20 北京三快在线科技有限公司 一种安保流程的触发系统、方法及装置

Also Published As

Publication number Publication date
CN109934559A (zh) 2019-06-25
CN110147989A (zh) 2019-08-20

Similar Documents

Publication Publication Date Title
EP3119070B1 (en) Method and device for determining a crank phone number
US9661126B2 (en) Driving distraction reduction system and method
CN107305569B (zh) 一种信息处理方法及装置
US10931755B2 (en) Method and apparatus for managing a shared storage system
CN106528735B (zh) 控制浏览器播放媒体资源的方法及装置
CN104751071B (zh) 一种信息处理方法及电子设备
CN106033397B (zh) 内存缓冲区调整方法、装置及终端
CN105260655B (zh) 一种应用程序启动保护的方法、装置及系统
EP3472699B1 (en) Method and electronic device for managing functionality of applications
WO2020248602A1 (zh) 基于区块链的关系绑定方法、装置及设备
CN110084035B (zh) 用于在发生拒绝时建议响应指南的电子设备和方法
WO2018049610A1 (zh) 权限控制方法及装置
WO2020177408A1 (zh) 一种安保流程的触发系统、方法及装置
WO2018049609A1 (zh) 权限控制方法及装置
WO2018072193A1 (zh) 控制应用自启动的方法及装置
CN110968523A (zh) 内存碎片整理的方法和装置
CN110825509A (zh) 应用管理方法、装置、设备及可读存储介质
CN108446226B (zh) 应用异常的处理方法
WO2023246390A1 (zh) 数据处理的方法及装置
CN115460180A (zh) 视频通话的处理方法和装置、电子设备
CN108683808A (zh) 一种终端控制方法、装置、终端、介质及系统
CN106020850A (zh) 在机器人操作系统中关闭应用的方法及装置
CN114237938B (zh) 车辆驾驶服务处理方法及装置
CN106168967B (zh) 网页信息收藏方法、网页信息保护方法、装置和移动终端
CN111625721B (zh) 内容推荐方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19918191

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19918191

Country of ref document: EP

Kind code of ref document: A1