WO2020216110A1 - 一种救援方法与设备 - Google Patents

一种救援方法与设备 Download PDF

Info

Publication number
WO2020216110A1
WO2020216110A1 PCT/CN2020/084886 CN2020084886W WO2020216110A1 WO 2020216110 A1 WO2020216110 A1 WO 2020216110A1 CN 2020084886 W CN2020084886 W CN 2020084886W WO 2020216110 A1 WO2020216110 A1 WO 2020216110A1
Authority
WO
WIPO (PCT)
Prior art keywords
rescue
information
electronic
lock
wearable
Prior art date
Application number
PCT/CN2020/084886
Other languages
English (en)
French (fr)
Inventor
陆乐
俸安琪
丘富铨
尤晓彤
田中秀治
喜熨斗智也
Original Assignee
上海救要救信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海救要救信息科技有限公司 filed Critical 上海救要救信息科技有限公司
Publication of WO2020216110A1 publication Critical patent/WO2020216110A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Definitions

  • This application relates to the field of rescue, in particular to a technology for rescue.
  • One purpose of this application is to provide a rescue method and equipment.
  • a rescue method at the network device side including:
  • the rescue verification information is used for the electronic rescue lock corresponding to the calling device to perform unlocking verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entry door after the verification is passed, thereby providing Rescue personnel corresponding to wearable rescue equipment provide rescue channels.
  • a rescue method at the end of a rescue device including:
  • the rescue call request includes rescue identification information of the rescue call device
  • the network device determines corresponding rescue verification information based on the rescue identification information, the rescue verification information is used to perform unlock verification on at least one wearable rescue device, and the electronic rescue lock corresponding to the call for help device is verified after the verification is passed. Unlock the corresponding entry door.
  • a rescue method at the end of a wearable rescue device wherein the method includes:
  • the electronic rescue lock unlocks the corresponding entrance door after the verification is passed, so as to provide rescue channels for rescuers corresponding to the wearable rescue equipment.
  • a rescue method at the end of an electronic rescue lock includes:
  • control the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock, thereby providing rescue channels for rescuers corresponding to the wearable rescue device.
  • a rescue method at the end of a network device includes:
  • the rescue authority information includes the right, send an unlocking instruction to the electronic rescue lock, so that the electronic rescue lock can unlock the corresponding entry door based on the unlocking instruction, so as to provide rescue services for the wearable rescue device.
  • Personnel provide rescue channels.
  • a rescue method at the end of an electronic rescue lock includes:
  • the actuator of the electronic rescue lock is controlled to unlock the entrance door corresponding to the electronic rescue lock, so as to provide rescue channels for rescuers corresponding to the wearable rescue device.
  • a rescue method at the network device side wherein the method includes:
  • an unlocking instruction is sent to the electronic rescue lock corresponding to the calling device, so that the electronic rescue lock unlocks the corresponding entry door based on the unlocking instruction.
  • a rescue method at the end of a wearable rescue device wherein the method includes:
  • an unlock request is sent to the network device based on the rescue instruction, and the unlock request is used for the electronic rescue lock corresponding to the rescue device to unlock the corresponding entrance door, thereby serving as the wearable Rescue personnel corresponding to rescue equipment provide rescue channels.
  • a rescue device which includes:
  • a thirteen module configured to send a rescue instruction to the at least one wearable rescue device, where the rescue instruction includes rescue verification information determined based on the rescue identification information;
  • the rescue verification information is used for the electronic rescue lock corresponding to the call for help device to perform unlock verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entrance door after the verification is passed.
  • a device for calling for help wherein the device includes:
  • the twenty-one module is configured to generate a corresponding rescue call request based on the detected rescue event, wherein the rescue call request includes the rescue identification information of the rescue call device;
  • the 22nd module is used to send a rescue call request to the network device corresponding to the rescue call device;
  • the network device determines corresponding rescue verification information based on the rescue identification information, the rescue verification information is used to perform unlock verification on at least one wearable rescue device, and the electronic rescue lock corresponding to the call for help device is verified after the verification is passed. Unlock the corresponding entry door.
  • a wearable rescue device wherein the device includes:
  • the three-one module is configured to receive rescue instructions sent by the network device corresponding to the wearable rescue device, where the rescue instructions include rescue verification information;
  • a 32 module configured to provide the rescue verification information to the electronic rescue lock corresponding to the wearable rescue device, so as to perform unlock verification through the electronic rescue lock corresponding to the wearable rescue device based on the rescue verification information;
  • the electronic rescue lock unlocks the corresponding entry door after the verification is passed.
  • an electronic rescue lock wherein the device includes:
  • the four-one module is used to obtain rescue verification information provided by the wearable rescue device corresponding to the electronic rescue lock;
  • the fourth and third module is used to control the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock if the verification is passed, so as to provide rescue channels for rescuers corresponding to the wearable rescue device.
  • a rescue device wherein the device includes:
  • a 51 module configured to receive a rescue call request sent by a rescue call device corresponding to the network device, where the rescue call request includes rescue identification information corresponding to the rescue call device;
  • the fifty-two module is used to match at least one rescue device and the identity feature information of the rescuer corresponding to each rescue device based on the rescue call request;
  • the fifty-three module is used to receive the information to be verified sent by the electronic rescue lock corresponding to the calling device, the information to be verified is collected on-site by the electronic rescue lock;
  • the May Fourth module is used to determine the rescue authority information of the on-site personnel corresponding to the electronic rescue lock based on the information to be verified and the identity characteristic information;
  • the fifty-five module is configured to send an unlocking instruction to the electronic rescue lock if the rescue information includes rights, so that the electronic rescue lock can unlock the corresponding entry door based on the unlocking instruction.
  • an electronic rescue lock wherein the device includes:
  • the six-one module is used to collect on-site information to be verified on site personnel;
  • the 62 module is used to send the information to be verified to the network device corresponding to the electronic rescue lock
  • the six-three module is used to control the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock based on the unlocking instruction sent by the network device, so as to be the rescuer corresponding to the wearable rescue device Provide rescue channels.
  • a network device wherein the device includes:
  • a seven-one module configured to receive a rescue call request sent by a rescue call device corresponding to the network device, the rescue call request including rescue identification information corresponding to the rescue call device;
  • the 72nd module is used to match at least one wearable rescue device based on the rescue call request;
  • the 73rd module is used to send rescue instructions to the at least one wearable rescue device
  • the 74th module is used to receive the unlock request sent by the at least one wearable rescue device based on the rescue instruction;
  • the seventy-five module is configured to send an unlocking instruction to the electronic rescue lock corresponding to the calling device based on the unlocking request, so that the electronic rescue lock unlocks the corresponding entry door based on the unlocking instruction.
  • a wearable rescue device wherein the device includes:
  • the Bayi module is used to receive rescue instructions sent by the network device corresponding to the wearable rescue device, where the rescue instruction is generated by the network device based on the rescue call request sent by the rescue call device corresponding to the network device Sent
  • the 82nd module is configured to send an unlocking request to the network device based on the rescue instruction if a response trigger event is detected, and the unlocking request is used for the electronic rescue lock corresponding to the calling device to unlock the corresponding entry door,
  • rescue channels are provided for rescuers corresponding to the wearable rescue equipment.
  • a rescue method which includes:
  • the rescue call device generates a corresponding rescue call request based on the detected rescue event, and sends a rescue call request to a network device corresponding to the rescue call device, wherein the rescue call request includes rescue identification information of the rescue call device;
  • the network device receives the rescue call request, matches at least one wearable rescue device based on the rescue call request, and sends a rescue instruction to the at least one wearable rescue device;
  • the wearable rescue device receives the rescue instruction, and provides the rescue verification information to the electronic rescue lock corresponding to the wearable rescue device, so that based on the rescue verification information, pass the Electronic rescue lock for unlocking verification;
  • the electronic rescue lock obtains the rescue verification information, and performs unlock verification based on the rescue verification information. If the verification is passed, the electronic rescue lock controls the actuator of the electronic rescue lock to unlock the corresponding access of the electronic rescue lock. Door, so as to provide rescue channels for rescuers corresponding to the wearable rescue equipment.
  • a rescue method which includes:
  • the rescue call device generates a corresponding rescue call request based on the detected rescue event, and sends a rescue call request to a network device corresponding to the rescue call device, wherein the rescue call request includes rescue identification information of the rescue call device;
  • the network device receives the rescue call request, and matches at least one rescue device and the identity feature information of the rescuer corresponding to each rescue device based on the rescue call request;
  • the electronic rescue lock collects information to be verified on the on-site personnel on site, and sends the information to be verified to the network device;
  • the network device receives the to-be-verified information, determines the rescue authority information of the on-site personnel corresponding to the electronic rescue lock based on the to-be-verified information and the identity characteristic information, and if the rescue authority information includes the right to The electronic rescue lock sends an unlock command;
  • the electronic rescue lock controls the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock based on the unlock instruction.
  • a rescue method which includes:
  • the rescue call device generates a corresponding rescue call request based on the detected rescue event, and sends a rescue call request to a network device corresponding to the rescue call device, wherein the rescue call request includes rescue identification information of the rescue call device;
  • the network device receives the rescue call request, matches at least one wearable rescue device based on the rescue call request, and sends a rescue instruction to the at least one wearable rescue device;
  • the wearable rescue device receives the rescue instruction, and if a response trigger event is detected, sends an unlock request to the network device based on the rescue instruction;
  • the network device receives the unlock request, and sends an unlock instruction to the electronic rescue lock corresponding to the rescue device based on the unlock request, so that the electronic rescue lock unlocks the corresponding entry door based on the unlock instruction.
  • a rescue device which includes:
  • a memory arranged to store computer-executable instructions that when executed causes the processor to perform the operations of any of the methods described above.
  • a computer-readable medium storing instructions, which when executed, cause the system to perform the operation of any of the methods described above.
  • this application matches at least one wearable rescue device according to the rescue call request sent by the rescue call device, and sends rescue instructions to the at least one wearable rescue device, thereby notifying the use of the wearable rescue device Rescue personnel to the rescue site to perform rescue; further, the rescue call request includes rescue identification information corresponding to the rescue equipment, and rescue verification information determined according to the rescue identification information, so as to support the provision based on the rescue verification information
  • the electronic rescue lock corresponding to the call for help device performs unlock verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entry door after the verification is passed, thereby providing rescue for the rescuer corresponding to the wearable rescue device aisle.
  • This application can avoid delays in rescue because rescuers cannot enter the home smoothly, thereby saving time for rescue and improving the success rate of rescue.
  • Fig. 1 shows a system topology diagram of a rescue method according to an embodiment of the present application
  • Fig. 2 shows a flowchart of a rescue method according to an embodiment of the present application
  • Figure 3 shows a system topology diagram of a rescue method according to another embodiment of the present application.
  • Fig. 4 shows a flowchart of a rescue method according to another embodiment of the present application.
  • Fig. 5 shows a system topology diagram of a rescue method according to another embodiment of the present application.
  • Fig. 6 shows a flowchart of a rescue method according to another embodiment of the present application.
  • FIG. 7 shows a method flowchart of a rescue method at the network device side according to an embodiment of the present application
  • Fig. 8 shows a method flowchart of a rescue method at the end of a call for help device according to an embodiment of the present application
  • FIG. 9 shows a method flowchart of a rescue method on a wearable rescue device according to an embodiment of the present application.
  • FIG. 10 shows a method flowchart of a rescue method at the end of an electronic rescue lock according to an embodiment of the present application
  • FIG. 11 shows a method flowchart of a rescue method at the network device side according to another embodiment of the present application.
  • FIG. 12 shows a method flowchart of a rescue method at the end of an electronic rescue lock according to another embodiment of the present application
  • Fig. 13 shows a method flowchart of a rescue method at the end of an electronic rescue lock according to another embodiment of the present application
  • FIG. 14 shows a method flowchart of a rescue method at the end of a wearable rescue device according to another embodiment of the present application
  • Fig. 15 shows a device module diagram of a network device according to an embodiment of the present application.
  • Fig. 16 shows a device module diagram of a distress call device according to an embodiment of the present application
  • Fig. 17 shows a device module diagram of a wearable rescue device according to an embodiment of the present application
  • Fig. 18 shows a device module diagram of an electronic rescue lock according to an embodiment of the present application
  • FIG. 19 shows a device module diagram of a network device according to another embodiment of the present application.
  • FIG. 20 shows a device module diagram of an electronic rescue lock according to another embodiment of the present application.
  • FIG. 21 shows a device module diagram of a network device according to another embodiment of the present application.
  • Fig. 22 shows a device module diagram of a wearable rescue device according to another embodiment of the present application.
  • Figure 23 shows an exemplary system that can be used to implement the various embodiments described in this application.
  • the terminal, the equipment of the service network, and the trusted party all include one or more processors (for example, a central processing unit (CPU)), input/output interfaces, network interfaces, and RAM.
  • processors for example, a central processing unit (CPU)
  • Memory may include non-permanent memory in computer-readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (Read Only Memory). Flash Memory). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • Flash Memory Flash Memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase-change memory (PCM), programmable random access memory (Programmable Random Access Memory, PRAM), and static random access memory (Static Random-Access Memory, SRAM), dynamic random access memory (Dynamic Random Access Memory, DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically-erasable programmable read-only memory (Electrically-Erasable Programmable Read -Only Memory, EEPROM), flash memory or other memory technology, CD-ROM (Compact Disc Read-Only Memory, CD-ROM), Digital Versatile Disc (DVD) or other optical storage , Magnetic cassettes, magnetic tape disk storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be
  • the equipment referred to in this application includes but is not limited to user equipment, network equipment, or equipment formed by the integration of user equipment and network equipment through a network.
  • the user equipment includes, but is not limited to, any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc., and the mobile electronic product can adopt any operation System, such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device that can automatically perform numerical calculation and information processing in accordance with pre-set or stored instructions, and its hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC) ), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), embedded devices, etc.
  • the network device includes, but is not limited to, a computer, a network host, a single network server, a set of multiple network servers, or a cloud composed of multiple servers; here, the cloud is composed of a large number of computers or network servers based on Cloud Computing, Among them, cloud computing is a type of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and a wireless ad hoc network (Ad Hoc network).
  • the device may also be a program running on the user equipment, network equipment, or user equipment and network equipment, network equipment, touch terminal, or a device formed by integrating network equipment and touch terminal through a network.
  • the wearable rescue device referred to in the embodiments of the present application is a hardware device, which may include but is not limited to a smart helmet, smart glasses or other hardware devices, which can be directly worn on the user's body or integrated into the user's clothes or other accessories , And optionally have the ability to communicate with other devices (for example, including but not limited to other user devices of the same user, or user devices of other users, network devices such as cloud servers, or smart door locks, etc.).
  • the other hardware devices described above include, but are not limited to, user devices held by rescuers, or fixed to the upper arms, torso, or other positions of rescuers through straps, brackets, or the like.
  • the user equipment includes but Not limited to mobile phones, tablets, PDAs, etc.
  • the system includes a network device, a rescue device, a wearable rescue device, and an electronic rescue lock.
  • a corresponding communication connection for example, a communication connection established in a wired or wireless manner.
  • the helper sends a rescue call request to the corresponding network device through the helper device; in some embodiments, the helper manually triggers the help button on the helper device to send the rescue call request to the corresponding network device; In some embodiments, the distress call device automatically sends a rescue call request to the corresponding network device.
  • the distress call device is a smart bracelet provided with a gravity sensor, an electronic gyroscope, etc. (the smart bracelet is provided with a communication module to communicate The network device sends information), the caller wears the smart bracelet, and if the smart bracelet detects through its sensor that the user wearing the smart bracelet suddenly faints, the smart bracelet sends a rescue call request to the corresponding network device.
  • the distress call equipment includes but is not limited to user equipment, smart monitoring equipment (for example, smart bracelets or other wearable electronic devices).
  • the user equipment includes, but is not limited to, mobile phones, tablets, laptops, etc. equipment.
  • the wearable rescue device includes, but is not limited to, smart glasses, smart helmets, etc., and the wearable rescue device optionally includes a Bluetooth positioning module, a network communication module, and the like.
  • the wearable rescue device is provided with a communication module for communicating with the network device.
  • the electronic rescue lock includes a communication module (used to receive information and instructions), an execution mechanism (used to perform corresponding operations based on the received information or instructions, such as unlocking or locking the electronic rescue lock installed. Entrance door, room door). When an emergency rescue situation occurs, but the caller cannot open the door for the rescuer in time, the electronic rescue lock performs the unlocking operation on the corresponding entrance door based on the received information or instruction, providing a clear rescue road for the rescuer and saving Rescue time.
  • the rescue method includes: the rescue call device generates a corresponding rescue call request based on the detected rescue event, and sends a rescue call request to a network device corresponding to the rescue call device, wherein the rescue call request includes the rescue call request
  • the rescue identification information of the device the network device receives the rescue call request, matches at least one wearable rescue device based on the rescue call request, and sends a rescue instruction to the at least one wearable rescue device; the wearable The rescue device receives the rescue instruction, and provides the rescue verification information to the electronic rescue lock corresponding to the wearable rescue device, so that based on the rescue verification information, proceed through the electronic rescue lock corresponding to the wearable rescue device Unlock verification; the electronic rescue lock obtains the rescue verification information, and performs unlock verification based on the rescue verification information.
  • the electronic rescue lock controls the actuator of the electronic rescue lock to unlock the electronic rescue lock
  • the corresponding entry door provides rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the rescue event is used to trigger the rescue method.
  • the rescue device includes a physical button that can be pressed when the user needs to call for rescue, and the rescue device detects the physical button. Whether the button is pressed or not is used to detect whether a rescue event occurs; for another example, the rescue device is provided with a gravity sensor, and the rescue event is an event in which the wearer falls down detected by the rescue device through the gravity sensor.
  • the rescue identification information is used to identify the corresponding rescue device to identify the identity information of the caller.
  • the rescue identification information includes but is not limited to device identification information.
  • the device identification information of multiple distress devices is pre-registered in the network equipment, and the device identification information of each distress device has a mapping relationship with the identity information of the registered user. Based on the mapping relationship, the corresponding device identification information can be used to determine the corresponding Identity information of the caller.
  • the rescue verification information includes but is not limited to a temporary password.
  • the rescue verification information is generated based on the rescue identification information of the calling device, for example, the rescue identification information is encrypted through an encryption algorithm.
  • the caller wears a call-for-help device with sensors such as a gravity sensor and an electronic gyroscope.
  • the call-for-help device detects the corresponding data information through these sensors, thereby detecting the corresponding rescue event.
  • the rescue call device automatically sends a rescue call request to the corresponding network device, where the rescue call request includes the rescue identification information of the rescue device (for example, the device identification number of the rescue device).
  • the rescue is identified
  • the information is used as rescue verification information; in other embodiments, the rescue identification information is encrypted to obtain corresponding rescue verification information.
  • the network device receives the rescue call request, and matches at least one wearable rescue device for the caller based on the rescue call request.
  • the network device finds at least one wearable nearby for the caller based on the location information of the caller Rescue equipment and send rescue instructions to the wearable rescue equipment, where the rescue instructions include rescue verification information.
  • the rescuer wears the wearable rescue device to reach the portal where the caller is located.
  • the electronic rescue lock used by the portal verifies the rescue verification information received by the wearable rescue device. If the verification is passed, the electronic rescue lock controls its actuator
  • the entrance door corresponding to the electronic rescue lock is unlocked, so as to provide rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the rescue method includes: the rescue call device generates a corresponding rescue call request based on the detected rescue event, and sends a rescue call request to a network device corresponding to the rescue call device, wherein the rescue call request includes the rescue call request
  • the rescue identification information of the device the network device receives the rescue call request, matches at least one wearable rescue device based on the rescue call request, and sends a rescue instruction to the at least one wearable rescue device; the wearable The rescue device receives the rescue instruction, and if a response trigger event is detected, sends an unlock request to the network device based on the rescue instruction; the network device receives the unlock request, and corresponds to the rescue device based on the unlock request
  • the electronic rescue lock sends an unlocking instruction for the electronic rescue lock to unlock the corresponding entry door based on the unlocking instruction.
  • Fig. 7 shows a rescue method at the network device side according to an aspect of the present application, wherein the method includes step S101, step S102, and step S103.
  • step S101 the network device receives a rescue call request sent by a rescue call device corresponding to the network device, the rescue call request includes rescue identification information corresponding to the rescue device; in step S102, the network device is based on the rescue call request.
  • the rescue call request matches at least one wearable rescue device; in step S103, the network device sends a rescue instruction to the at least one wearable rescue device, and the rescue instruction includes rescue verification information determined based on the rescue identification information
  • the rescue verification information is used for the electronic rescue lock corresponding to the rescue device to perform unlock verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entrance door after the verification is passed.
  • the wearable rescue device may include, but is not limited to, electronic products with Bluetooth positioning and network communication modules (for example, rescue helmets, smart glasses, etc.).
  • the wearable rescue device is used to receive rescue instructions sent by a network device to notify rescuers that a rescue event has occurred.
  • the network device receives a rescue call request sent by a rescue call device corresponding to the network device, where the rescue call request includes rescue identification information corresponding to the rescue call device.
  • the rescue identification information includes, but is not limited to, device identification information (for example, device serial number, MAC address of the device).
  • the rescue identification information is used to identify the rescue device, so as to determine the identity of the rescuer based on the rescue device.
  • the user pre-stores the rescue device used by the user in the network device through registration. The mapping relationship with the user.
  • the network device can query and obtain the user’s identity information, medical history information, allergy-related information and other relevant information based on the rescue call device.
  • the electronic rescue lock corresponding to the rescue device can be queried through the rescue identification information.
  • the registered rescue device is recorded in the network device (for example, the device that records the rescue device) Identification information) and the electronic rescue lock corresponding to the rescue device (for example, the device identification information of the electronic rescue lock), there is a mapping relationship between the rescue identification information of the rescue device and the electronic rescue lock, and the network device passes through the The rescue identification information can be queried to obtain the electronic rescue lock corresponding to the rescue device.
  • the network device matches at least one wearable rescue device based on the rescue call request.
  • the network device searches and matches at least one wearable rescue device located nearby for the rescuer corresponding to the rescue device based on the location information of the rescue device and the wearable rescue device.
  • step S103 the network device sends a rescue instruction to the at least one wearable rescue device, where the rescue instruction includes rescue verification information determined based on the rescue identification information; wherein the rescue verification information is used for the
  • the electronic rescue lock corresponding to the call for help device performs unlock verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entry door after the verification is passed.
  • the information to be verified is obtained based on the rescue identification information query.
  • the network device processes the rescue identification information corresponding to the rescue device (for example, The rescue identification information is converted into corresponding rescue verification information based on a certain algorithm), or the network device creates information to be verified for the rescue identification information corresponding to each rescue device, and when the rescue device sends a rescue call request to the network device, The network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue calling device, and sends the information to be verified to the wearable rescue device.
  • the rescue identification information is converted into corresponding rescue verification information based on a certain algorithm
  • the network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue calling device, and sends the information to be verified to the wearable rescue device.
  • the rescuer corresponding to the wearable rescue device sends the rescue verification information to the electronic rescue lock through operation or based on the communication connection between the wearable rescue device and the corresponding electronic rescue lock, to For the electronic rescue lock to verify the rescue verification information, for example, the electronic rescue lock also stores the same information as the above-mentioned information to be verified, and verifies the above-mentioned information to be verified in a comparison method. If the comparison is consistent, the verification is passed , The electronic rescue lock performs the unlocking operation.
  • the method further includes step S104 (not shown).
  • step S104 the network device sends a verification instruction to the electronic rescue lock corresponding to the rescue device, wherein the verification instruction includes The information to be verified determined by the identification information.
  • the network device triggers the electronic rescue lock to verify unlocking by sending a verification instruction to the electronic rescue lock corresponding to the calling device; accordingly, the electronic rescue lock is only Only after receiving the instruction will the verification and unlocking operation be performed, and will not respond to the verification request sent by the criminals to the electronic rescue lock when rescue is not needed, so as to enhance security.
  • the information to be verified is obtained based on the rescue identification information query.
  • the network device processes the rescue identification information corresponding to the rescue device (for example, The rescue identification information is converted into corresponding rescue verification information based on a certain algorithm), or the network device creates information to be verified for the rescue identification information corresponding to each rescue device, and when the rescue device sends a rescue call request to the network device, The network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue device, and sends the information to be verified to the electronic rescue lock corresponding to the rescue device.
  • the rescue identification information is converted into corresponding rescue verification information based on a certain algorithm
  • the network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue device, and sends the information to be verified to the electronic rescue lock corresponding to the rescue device.
  • the electronic rescue lock verifies the rescue verification information it receives based on the information to be verified, for example, the rescue verification information and the information to be verified sent by the network device to the wearable rescue device and the electronic rescue lock Similarly, the electronic rescue lock performs the rescue verification information based on the information to be verified. For example, the electronic rescue lock also stores the same information as the information to be verified, and verifies the information to be verified in a comparison method. If the verification is consistent, the electronic rescue lock performs the unlocking operation.
  • step S104 the network device generates corresponding information to be verified based on the rescue identification information, and sends a verification instruction to the electronic rescue lock corresponding to the rescue device, wherein the verification instruction includes the wait Verification information;
  • step S103 the network device generates corresponding rescue verification information based on the rescue identification information, and sends a rescue instruction to the at least one wearable rescue device, wherein the rescue instruction includes the rescue verification information.
  • the information to be verified and the rescue verification information are generated based on the same generation algorithm.
  • the information to be verified and the rescue verification information are respectively sent to the electronic rescue lock and the rescuer worn by the rescuer. Wear rescue equipment.
  • the information to be verified is determined by the network device based on the rescue identification information query; in other embodiments, the information to be verified is based on a preset algorithm (for example, an encryption algorithm).
  • Rescue identification information is processed. For example, the network device encrypts the rescue identification information in the call for help based on a certain algorithm to generate rescue verification information and information to be verified, and sends the rescue verification information to the wearable rescue device, and sends the information to be verified to The electronic rescue lock corresponding to the rescue device; after rescuers arrive at the scene, the wearable rescue device sends the rescue verification information to the electronic rescue lock for the electronic rescue lock to verify the rescue verification information based on the information to be verified For example, when the rescue verification information matches the to-be-verified information, the verification is passed, the electronic rescue lock unlocks the corresponding entrance door, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the algorithm includes, but is not limited to, encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm; in a typical scenario, the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm
  • the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • the algorithm operations described above are only
  • the rescue verification information includes target voice feature information
  • the target voice feature information is used to synthesize a target voice
  • the electronic rescue lock performs unlock verification on the wearable rescue device based on the target voice.
  • the rescue verification information includes target voice feature information
  • the target voice feature information includes, but is not limited to, voice feature information such as characteristic pitch, timbre, and voiceprint.
  • the network device synthesizes the target voice through the target characteristic voice information, and sends the target voice to the wearable rescue device for the wearable rescue device to play the target voice; the electronic rescue lock collects the target voice and recognizes the target
  • the voice feature information in the voice is then unlocked and verified based on the recognized voice feature information.
  • FIG. 8 shows a rescue method at the end of a call for help device according to another aspect of the present application, wherein the method includes step S201 and step S202.
  • the rescue call device generates a corresponding rescue call request based on the detected rescue event, wherein the rescue call request includes the rescue identification information of the rescue device;
  • the network device corresponding to the rescue device Send a rescue call request; wherein the network device determines the corresponding rescue verification information based on the rescue identification information, the rescue verification information is used for unlocking verification of at least one wearable rescue device, and the electronic rescue corresponding to the rescue device The lock unlocks the corresponding entry door after the verification is passed.
  • the distress call equipment includes, but is not limited to, mobile phones, smart monitoring devices (for example, smart bracelets equipped with various sensors, including but not limited to gravity sensors, electronic gyroscopes, heart rate monitoring modules, etc.).
  • the distress call device is a smart bracelet equipped with a gravity sensor.
  • the distress device detects corresponding data information through these sensors, thereby detecting the corresponding rescue event, and the distress device automatically reports The corresponding network device sends a rescue call request.
  • the rescue events mentioned above are only examples, and other existing or future rescue events that may be applicable to this application are also included in the scope of protection of this application, and are referred to as The way of reference is included here.
  • the rescue call device is a smart bracelet including a heart rate monitoring module.
  • the smart bracelet detects that the wearer's heart rate is in an abnormal range, it sends a rescue call request to the corresponding network device.
  • the distress call device includes a gravity sensor and a heart rate monitoring module. When the caller faints suddenly, the distress call device detects corresponding data information through these sensors, thereby detecting a corresponding rescue event. Automatically send a rescue call request to the corresponding network device.
  • the rescue verification information is used for the electronic rescue lock corresponding to the rescue device to perform unlock verification on at least one wearable rescue device.
  • the network device sends the rescue verification information to the wearable rescue device, and
  • the information to be verified is sent to the electronic rescue lock, where the rescue verification information and the information to be verified are generated based on the same generation algorithm.
  • the rescuer After the rescuer arrives at the rescue site, the rescuer will send it to the electronic rescue lock through the wearable rescue device worn by him
  • the rescue verification information the electronic rescue lock verifies the rescue verification information, if the rescue verification information is the same as the information to be verified received, the verification is passed; in other embodiments, the rescue verification information is used for the
  • the network device performs unlock verification on at least one wearable rescue device.
  • a rescuer After a rescuer arrives at the rescue site, he sends rescue verification information to the network device through the wearable rescue device he wears, and the network device receives and verifies the rescue verification information. If the rescue verification information is the same as the rescue verification information sent by the network device to the wearable rescue device, if the verification is passed, the network device sends an unlock command to the corresponding electronic rescue lock, and the electronic rescue lock unlocks the corresponding entry based on the unlock command. Household door.
  • the rescue identification information includes at least any one of the following:
  • the distress device identification information of the distress device includes the rescue equipment identification information of the rescue equipment.
  • the identification information of the distress call device includes but is not limited to the serial number of the device and the MAC address of the device.
  • the distress device sends its corresponding distress device identification information to the network device, so that the network device queries related information corresponding to the distress device based on the distress device identification information (for example, rescue verification information, identity information of the corresponding distress user, etc.).
  • Distress user identification information of the distress user corresponding to the distress device includes the distress user identification information of the distress user corresponding to the distress device.
  • the distress user identification information includes, but is not limited to, the name and ID number of the distress user, and the network device queries the corresponding distress device based on the distress user identification information.
  • the network device determines corresponding rescue verification information based on the rescue identification information, and the rescue verification information is used for the electronic rescue lock corresponding to the rescue device to unlock at least one wearable rescue device After verification, the electronic rescue lock unlocks the corresponding entrance door after the verification is passed, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the network device stores a plurality of rescue identification information and rescue verification information corresponding to each rescue identification information, and the network device queries the rescue verification information corresponding to the rescue identification information based on the rescue identification information corresponding to the rescue identification information.
  • the network device matches the rescuer closest to the rescuer based on the real-time location of the calling user, or matches the rescuer whose distance from the calling user is less than a certain distance threshold Several rescuers).
  • the rescue verification information is sent to the electronic rescue lock through the wearable rescue device.
  • the electronic rescue lock verifies the rescue verification information, and if the verification is passed, the corresponding entry door is unlocked and the door is opened for the rescuer.
  • Fig. 9 shows a rescue method on a wearable rescue device according to another aspect of the present application, wherein the method includes step S301 and step S302.
  • the wearable rescue device receives the rescue instruction sent by the network device corresponding to the wearable rescue device, the rescue instruction includes rescue verification information; in step S302, the wearable rescue device sends the rescue verification information Provide the electronic rescue lock corresponding to the wearable rescue device to perform unlock verification through the electronic rescue lock corresponding to the wearable rescue device based on the rescue verification information; wherein the electronic rescue lock unlocks the corresponding
  • the entrance door of the wearable rescue device provides rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the network device matches at least one wearable rescue device based on the received rescue call request (for example, the network device queries the at least one wearable rescue device currently in the vicinity of the rescue device based on the acquired current location of the rescue device).
  • Rescue equipment and send rescue instructions to the wearable rescue equipment to notify rescuers using the wearable rescue equipment that there is a rescue mission.
  • the rescue instruction includes rescue verification information.
  • the rescue verification information includes rescue identification information.
  • the rescuer inputs the rescue verification information on the corresponding electronic rescue lock, and the electronic rescue lock verifies the rescue verification information; in other implementations
  • the rescue verification information includes target voice feature information, for example, the wearable rescue device plays a voice to be verified containing the target voice feature information, and the electronic rescue lock recognizes and verifies the voice to be verified; in other embodiments
  • the wearable rescue device and the electronic rescue lock on the entrance door establish a communication connection (for example, Bluetooth connection) automatically or based on the operation of the rescuer.
  • the wearable rescue device sends the rescue verification information to the corresponding electronic rescue lock based on the communication connection, so that the electronic rescue lock can verify the rescue verification information.
  • the step 302 includes: the wearable rescue device establishes a communication connection between the electronic rescue lock corresponding to the wearable rescue device and the wearable rescue device; The verification information is sent to the electronic rescue lock corresponding to the wearable rescue device to perform unlock verification through the electronic rescue lock.
  • both the wearable rescue device and the electronic rescue lock are provided with a communication module (for example, a Bluetooth module, an NFC module).
  • the wearable rescue device and the electronic rescue lock automatically establish a communication connection; in other embodiments, the rescuer wears the wearable rescue device to arrive at the rescue site Afterwards, the wearable rescue device is used to manually send a communication connection request to the electronic rescue lock, and the electronic rescue lock establishes a communication connection with the wearable rescue device based on the communication connection request. The wearable rescue device sends rescue verification information to the electronic rescue lock through the communication connection, so that the electronic rescue lock can perform unlock verification.
  • the rescue verification information includes target voice feature information; the step 302 includes: the wearable rescue device responds to the play operation of the rescuer corresponding to the wearable rescue device based on the rescue verification information, The voice to be verified is played, so that the electronic rescue lock corresponding to the wearable rescue device performs unlock verification based on the voice to be verified.
  • the target voice characteristic information includes, but is not limited to, characteristic information such as timbre, pitch, and voiceprint.
  • the network device sends rescue verification information including the target voice feature information to the wearable rescue device.
  • the wearable rescue device will emit a prompt tone when receiving the rescue verification information to prompt the corresponding rescue.
  • the corresponding electronic rescue lock collects the voice to be verified and analyzes it. If the target voice feature information is recognized, it is unlocked so that the rescuer can smoothly enter the entrance door to rescue the caller.
  • rescuers After rescuers arrive at the rescue site, they operate the wearable rescue equipment they use to play the voice to be verified, and the corresponding electronic rescue lock collects the voice to be verified on site, which can ensure that the rescuer has arrived at the scene, not before the rescuer has arrived
  • the unlocking operation is performed at any time to improve the security of unlocking the entrance door.
  • the step 302 includes: in response to the play operation of the rescuer corresponding to the wearable rescue device, the wearable rescue device generates a voice to be verified based on the target voice feature information, and plays the voice to be verified Voice for the electronic rescue lock corresponding to the wearable rescue device to perform unlock verification based on the voice to be verified.
  • the rescuer performs a playback operation on the wearable rescue device, and the wearable rescue device generates a voice to be verified based on the target voice feature information it receives based on the playback operation.
  • the wearable rescue device has a built-in piece of audio.
  • the corresponding electronic rescue lock collects the to-be-verified voice played by the wearable rescue device based on the built-in microphone module, and detects and recognizes the to-be-verified information in the to-be-verified voice (that is, the voice feature information).
  • the network device has previously sent the target voice feature information to the electronic rescue lock for verification by the electronic rescue lock, if the voice to be verified played by the wearable rescue device contains the target voice feature If the information is verified, the electronic rescue lock is unlocked so that rescuers can enter the portal in time for rescue.
  • the wearable rescue device generates a voice to be verified containing the target's voice feature information on site, which can ensure the rescue identity of the person who arrives at the rescue site. For example, only rescuers wearing the wearable rescue device can perform voice unlocking. Improve the security of unlocking.
  • the step 302 includes step S3021 (not shown), step S3022, and step S3023.
  • step S3021 the wearable rescue device collects the real-time voice of the corresponding rescuer; in step S3022, the wearable rescue device performs a conversion operation on the real-time voice based on the target voice feature information to generate the voice to be verified; In step S3023, the wearable rescue device plays the voice to be verified in response to the playback operation of the rescuer, so that the electronic rescue lock corresponding to the wearable rescue device performs unlock verification based on the voice to be verified.
  • the wearable rescue device has a built-in audio that is used to synthesize a voice to be verified including the target voice feature information according to the target voice feature information received on the wearable rescue device; in other embodiments, the The wearable rescue device generates a voice to be verified containing the target voice feature information by collecting the real-time voice of the rescuer on the spot.
  • the wearable rescue device has a built-in voice conversion module, and after receiving the target voice feature information (for example, characteristic timbre) Or feature voiceprint) and after collecting the real-time voice of the rescuer, the voice conversion module synthesizes the voice to be verified containing the target voice feature information based on the real-time voice by adjusting the specific frequency spectrum feature, and a wearable rescue device plays the voice to be verified. Verify voice.
  • the corresponding electronic rescue lock detects and recognizes the to-be-verified information played by the wearable rescue device based on the built-in voice recognition module.
  • the network device sends the target voice feature information to the electronic rescue lock for voice verification by the electronic rescue lock, if the voice to be verified played by the wearable rescue device contains the target voice feature information , The verification is passed, and the electronic rescue lock is unlocked so that rescuers can enter the portal in time for rescue.
  • the wearable rescue device collects the rescuer's real-time voice on site, and combines the real-time voice to generate a voice to be verified containing the target's voice feature information, which can ensure that the rescuer has arrived at the scene to a certain extent, and the identity of the rescuer is guaranteed , Which further increases the safety of unlocking.
  • the target voice feature information includes at least any one of the following: pitch information, timbre information, and voiceprint information.
  • the target voice feature information includes pitch information.
  • the target voice feature information includes one or more pitch information arranged in a certain order (for example, the pitch of the pitch). Whether the individual tone information and the sequence of multiple tone information are correctly arranged to determine the target voice feature information; in some embodiments, the target voice feature information includes timbre information, where timbre refers to the frequency performance of different sounds There are always distinctive characteristics in terms of waveforms, for example, different objects have different characteristics.
  • preset target voice feature information in a certain timbre combination and identify the target voice feature information by recognizing the timbre combination; in some embodiments, the target voice feature information includes voiceprint information, where the voiceprint is used
  • voiceprint information The sound spectrum that carries verbal information displayed by an electroacoustic instrument.
  • the target voice feature information is a sound wave spectrum carrying voice information, and the unlock is verified by identifying the target voice feature information; in other embodiments, the target voice feature information includes pitch information, timbre information, and voiceprint A combination of two or three types of information, for example, the target voice feature information contains multiple sub-target voice feature information in sequence, wherein each target voice feature information contains its own pitch information and timbre information, and each Each of the tone information corresponds to different tone color information, thereby reducing the risk of malicious deciphering of target voice feature information. By presetting the target voice feature information, the security of verifying unlocking is further increased.
  • a rescue method at the end of an electronic rescue lock is also provided, wherein the method includes step S401, step S402, and step S403.
  • the electronic rescue lock obtains rescue verification information provided by the wearable rescue device corresponding to the electronic rescue lock; in step S402, the electronic rescue lock performs unlock verification based on the rescue verification information; in step S403, if After the verification is passed, the electronic rescue lock controls the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the network device matches at least one wearable rescue device based on the received rescue call request (for example, the network device queries the at least one wearable rescue device currently in the vicinity of the rescue device based on the acquired current location of the rescue device).
  • Rescue equipment and send rescue instructions to the wearable rescue equipment to notify rescuers using the wearable rescue equipment that there is a rescue mission.
  • the rescue instruction includes rescue verification information.
  • the rescue verification information includes rescue identification information. For example, the rescuer inputs the rescue verification information on the corresponding electronic rescue lock, and the electronic rescue lock verifies the rescue verification information; in other implementations
  • the rescue verification information includes target voice feature information.
  • the wearable rescue device plays a voice to be verified containing the target voice feature information, and the electronic rescue lock recognizes and verifies the voice to be verified.
  • the actuator of the electronic rescue lock includes a motor and a corresponding mechanical structure, and the motor is used to drive the corresponding mechanical structure (for example, the lock tongue of the entrance door or cooperate with the lock hole to lock the door body The lock hook) to unlock the entry door corresponding to the electronic rescue lock (for example, the lock tongue is driven by a motor to retract the door body, or the lock hook is driven to rotate and disengage from the lock hole), so as to provide the wearable rescue Rescue personnel corresponding to the equipment provide rescue channels.
  • the method further includes step S404 (not shown).
  • step S404 the electronic rescue lock receives a verification instruction sent by a network device corresponding to the electronic rescue lock, wherein the verification instruction includes waiting Verification information;
  • the step S402 includes: the electronic rescue lock performs unlock verification on the rescue verification information based on the information to be verified; wherein the information to be verified and the rescue verification information are generated based on the same generation algorithm.
  • the information to be verified and the rescue verification information are respectively sent to the electronic rescue lock and the wearable rescue device worn by the rescuer.
  • the information to be verified is determined by the network device based on the rescue identification information query; in other embodiments, the information to be verified is based on a preset algorithm (for example, an encryption algorithm).
  • Rescue identification information is processed. For example, the network device encrypts the rescue identification information in the call for help based on a certain algorithm to generate rescue verification information and information to be verified, and sends the rescue verification information to the wearable rescue device, and sends the information to be verified to The electronic rescue lock corresponding to the rescue device; after rescuers arrive at the scene, the wearable rescue device sends the rescue verification information to the electronic rescue lock for the electronic rescue lock to verify the rescue verification information based on the information to be verified For example, when the rescue verification information matches the to-be-verified information, the verification is passed, the electronic rescue lock unlocks the corresponding entrance door, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the algorithm includes, but is not limited to, encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm; in a typical scenario, the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm
  • the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • the algorithm operations described above are only
  • the rescue verification information includes a voice to be verified, and the information to be verified includes target voice feature information; the step S402 includes: combining the voice feature information to be verified corresponding to the voice to be verified with the target voice feature The information is compared for unlock verification.
  • the rescue verification information includes target voice feature information, and the target voice feature information includes, but is not limited to, voice feature information such as characteristic pitch, timbre, and voiceprint.
  • the network device synthesizes the target voice through the target characteristic voice information, and sends the target voice to the wearable rescue device for the wearable rescue device to play the target voice; the electronic rescue lock collects the target voice and recognizes the target The voice feature information in the voice is then unlocked and verified based on the recognized voice feature information.
  • a system for implementing a rescue method includes a network device, a rescue device, and an electronic rescue lock.
  • the rescue device and the network device, and the network device and the electronic rescue lock are connected through corresponding communication (for example, wired or Communication connection established by means of wireless, etc.) to transfer information, instructions, etc.
  • the rescue method includes: the rescue call device generates a corresponding rescue call request based on the detected rescue event, and sends a rescue call request to a network device corresponding to the rescue call device, wherein the rescue call request includes the rescue call request
  • the rescue identification information of the device the network device receives the rescue call request, matches at least one rescue device and the identity feature information of the rescuer corresponding to each rescue device based on the rescue call request; the electronic rescue lock collects information on the spot
  • the information to be verified by the on-site personnel sends the information to be verified to the network device; the network device receives the information to be verified, and determines that the electronic rescue lock corresponds based on the information to be verified and the identity characteristic information
  • the rescue authority information includes the authority, send an unlocking instruction to the electronic rescue lock; based on the unlocking instruction, the rescue electronic lock controls the actuator of the electronic rescue lock to unlock the location
  • the entry door corresponding to the electronic rescue lock is
  • step S501 the network device receives a rescue call request sent by a corresponding rescue device, the rescue call request includes rescue identification information corresponding to the rescue device; in step S502, the network device is based on the rescue call request Match at least one rescue device and the identity feature information of the rescuer corresponding to each rescue device; in step S503, the network device receives the information to be verified sent by the electronic rescue lock corresponding to the rescue device, and the information to be verified is Collected on-site by the electronic rescue lock; in step S504, the network device determines the rescue authority information of the on-site personnel corresponding to the electronic rescue lock based on the information to be verified and the identity characteristic information; in step S505, if The rescue information includes the right to send an unlocking instruction to the electronic rescue lock by the network device, so that the electronic rescue lock can unlock the corresponding
  • the rescue device may include, but is not limited to, a wearable rescue device or other user equipment (for example, a computing device such as a mobile phone, a tablet, or a laptop).
  • the distress call device includes, but is not limited to, user equipment, smart monitoring equipment (for example, a smart bracelet provided with a gravity sensor or a heart rate monitoring module).
  • the user equipment includes but not Limited to computing devices such as mobile phones, tablets, and laptops.
  • the network device receives a rescue call request sent by a corresponding rescue call device, where the rescue call request includes rescue identification information corresponding to the rescue call device.
  • the rescue identification information includes, but is not limited to, device identification information (for example, device serial number, MAC address of the device).
  • the rescue identification information is used to identify the rescue device, so as to determine the identity of the rescuer based on the rescue device.
  • the user pre-stores the rescue device used by the user in the network device through registration. The mapping relationship with the user.
  • the network device can query and obtain the user’s identity information, medical history information, allergy-related information and other relevant information based on the rescue call device.
  • the electronic rescue lock corresponding to the rescue device can be queried through the rescue identification information.
  • the network device stores the rescue device and the electronic rescue lock corresponding to the rescue device.
  • the network device matches at least one rescue device and the identity feature information of the rescuer corresponding to each rescue device based on the rescue call request.
  • the identity characteristic information includes, but is not limited to, the facial characteristic information of the corresponding rescuer, the fingerprint characteristic information of the corresponding rescuer, and the voiceprint characteristic information of the corresponding rescuer.
  • the identity feature information is used to identify and determine the identity information of the corresponding rescuer.
  • the electronic rescue lock collects the facial portrait of the on-site personnel who arrives at the rescue site through the face collection device, and sends the facial portrait to The network device, the network device compares the facial portrait with the facial feature information, and if the similarity between the two is greater than or equal to the preset similarity pre-threshold, it is determined that the on-site personnel is the rescuer corresponding to the rescue equipment Further, the network device sends an unlocking instruction to the corresponding electronic rescue lock, thereby improving the security of unlocking. In some embodiments, the network device searches and matches at least one rescue device located nearby for the rescuer corresponding to the rescue device based on the rescue device and the location information of the rescue device.
  • the network device receives the information to be verified sent by the electronic rescue lock corresponding to the calling device, and the information to be verified is collected on-site by the electronic rescue lock.
  • the information to be verified includes, but is not limited to, facial images of field personnel, fingerprint information of field personnel, and audio information of field personnel.
  • the electronic rescue lock is provided with an information collection device to be verified (for example, a face collection device, a fingerprint collection device, or a voice collection device), and the information collection device to be verified collects information about on-site personnel arriving at the rescue site.
  • the information to be verified is sent to the network device, and the network device performs verification.
  • the network device determines the rescue authority information of the on-site personnel corresponding to the electronic rescue lock based on the information to be verified and the identity characteristic information.
  • a plurality of rescue devices for example, the MAC address of the rescue device, the device serial number
  • the identity feature information of the rescuer corresponding to each rescue device are stored in the network device.
  • the electronic rescue lock collects the to-be-verified information about the on-site personnel arriving at the rescue site through the to-be-verified information collection device, and sends the collected and to-be-verified information to the network device. Further, in some embodiments, the network device queries whether there is identity feature information matching the information to be verified according to the information to be verified, and if it exists, it is determined that the on-site personnel has rescue authority.
  • step S505 if the rescue authority information includes the right, the network device sends an unlocking instruction to the electronic rescue lock, so that the electronic rescue lock can unlock the corresponding entry door based on the unlocking instruction, thereby providing The rescuers corresponding to the wearable rescue equipment provide rescue channels.
  • the rescue permission information includes right and no right. If the network device verifies that the rescue authority information is authorized, the network device sends an unlocking instruction to the corresponding electronic rescue lock. The electronic rescue lock receives the unlocking instruction, and unlocks the corresponding entry door based on the unlocking instruction, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the step S504 includes: the network device determines the rescue of the on-site personnel corresponding to the electronic rescue lock based on the information to be verified, the geographic location information of the at least one rescue device, and the identity feature information Permission information. In some embodiments, in order to further improve the security of unlocking, the network device determines the rescue authority information of the on-site personnel in combination with the geographic location information of the at least one rescue device.
  • the network device obtains the geographic location information of the at least one rescue device (for example, based on GPS positioning technology, the rescue device provides its current geographic location information to the network device), if the geographic location information is rescued on site If the covered or the distance to the rescue site is less than a certain distance threshold, it means that the corresponding on-site personnel is at the rescue site, and the on-site personnel can be determined to have rescue authority information; if the geographic location information is not covered by the rescue site or is related to the rescue The scene example is greater than the above-mentioned distance threshold, it means that the corresponding on-site personnel is not at the rescue site.
  • the identity feature information includes at least any one of the following: facial feature information of the corresponding rescuer, wherein the information to be verified includes the facial image of the on-site personnel corresponding to the electronic rescue lock; the corresponding rescuer Fingerprint feature information, wherein the to-be-verified information includes the fingerprint information of the on-site personnel corresponding to the electronic rescue lock; the voiceprint feature information of the corresponding rescue personnel, wherein the to-be-verified information includes the on-site personnel corresponding to the electronic rescue lock Audio information.
  • the identity feature information is pre-stored in the network device, and the network device compares the information to be verified about the on-site personnel sent by the electronic rescue lock with the identity feature information to determine the rescue authority information of the on-site personnel.
  • the rescue authority information of the on-site personnel is determined by means of face recognition.
  • the identity feature information includes the facial feature information of the corresponding rescuer, and the facial feature information is compared with the waiting information sent by the electronic rescue lock.
  • the facial image in the verification information if the similarity between the facial feature information and the facial image is greater than or equal to the similarity threshold, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, through fingerprints
  • the identification method determines the rescue authority information of the on-site personnel.
  • the identity feature information includes the fingerprint feature information of the corresponding rescuer, based on the fingerprint feature information matching the fingerprint information in the information to be verified sent by the electronic rescue lock, if it matches If successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, the rescue authority information of the on-site personnel is determined by means of voice recognition, for example, the identity feature information includes the voiceprint of the corresponding rescuer The characteristic information is based on the voiceprint characteristic information matching the audio information in the information to be verified sent by the electronic rescue lock. If the matching is successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information. In some embodiments, the audio information is audio information of on-site personnel collected by the electronic rescue lock.
  • step S601 the electronic rescue lock collects on-site information to be verified about on-site personnel; in step S602, the electronic rescue lock sends the to-be-verified information to the network device corresponding to the electronic rescue lock; in step S603 , The electronic rescue lock is based on the unlocking instruction sent by the network device, and controls the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock, thereby providing rescue personnel corresponding to the wearable rescue device Rescue channel.
  • the electronic rescue lock collects on-site information to be verified on site personnel.
  • the information to be verified includes, but is not limited to, facial images of field personnel, fingerprint information of field personnel, and audio information of field personnel.
  • the electronic rescue lock is provided with an information collecting device to be verified (for example, a camera device for collecting facial photos, a fingerprint collecting device, or a microphone module for collecting voice), and the information collecting device to be verified Collect the to-be-verified information about the on-site personnel arriving at the rescue site, and send the to-be-verified information to the network device, and the network device will verify it.
  • step S602 the electronic rescue lock sends the information to be verified to the network device corresponding to the electronic rescue lock.
  • the electronic rescue lock collects the to-be-verified information about the on-site personnel
  • the to-be-verified information is sent to the corresponding network device for verification by the network device. Further, in the case that the network device passes the verification, the network device sends an unlocking instruction to the electronic rescue lock.
  • the electronic rescue lock controls the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock based on the unlocking instruction sent by the network device, thereby corresponding to the wearable rescue device Of rescuers provide rescue channels.
  • the actuator of the electronic rescue lock includes a motor and a corresponding mechanical structure, and the motor is used to drive the corresponding mechanical structure (for example, the bolt of the entrance door) to unlock the electronic rescue lock
  • the corresponding entrance door provides rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the information to be verified includes at least any one of the following: facial images of field personnel; fingerprint information of field personnel; and audio information of field personnel.
  • the network device has pre-stored information about the identity characteristics of the rescuer, and the electronic rescue lock sends the information to be verified about the on-site personnel to the network device for verification by the network device.
  • the rescue authority information of the on-site personnel is determined by means of face recognition.
  • the identity feature information includes the facial feature information of the corresponding rescuer, and the facial feature information is compared with the waiting information sent by the electronic rescue lock.
  • the similarity between the facial feature information and the facial image is greater than or equal to the similarity threshold, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, through fingerprints
  • the identification method determines the rescue authority information of the on-site personnel.
  • the identity feature information includes the fingerprint feature information of the corresponding rescuer, based on the fingerprint feature information matching the fingerprint information in the information to be verified sent by the electronic rescue lock, if it matches If successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, the rescue authority information of the on-site personnel is determined by means of voice recognition, for example, the identity feature information includes the voiceprint of the corresponding rescuer The characteristic information is based on the voiceprint characteristic information matching the audio information in the information to be verified sent by the electronic rescue lock. If the matching is successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information. In some embodiments, the audio information is audio information of on-site personnel collected by the electronic rescue lock.
  • the system includes a network device, a rescue device, a wearable rescue device, and an electronic rescue lock.
  • a corresponding communication connection for example, a communication connection established in a wired or wireless manner.
  • the helper sends a rescue call request to the corresponding network device through the helper device; in some embodiments, the helper manually triggers the help button on the helper device to send the rescue call request to the corresponding network device; In some embodiments, the distress call device automatically sends a rescue call request to the corresponding network device.
  • the distress call device is a smart bracelet provided with a gravity sensor (the smart bracelet is provided with a communication module to send information to the network device) , The caller wears the smart bracelet, and if the gravity sensor on the smart bracelet receives the data information of sudden pressure increase (for example, when the caller faints suddenly), the smart bracelet sends a rescue call to the corresponding network device request.
  • the distress call device includes, but is not limited to, user equipment and smart monitoring devices (for example, smart bracelets).
  • the user equipment includes, but is not limited to, computing devices such as mobile phones, tablets, and laptops.
  • the wearable rescue device includes but is not limited to smart glasses, smart helmets, etc.; in other embodiments, the wearable rescue device includes an electronic device with a Bluetooth positioning module and a network communication module.
  • the wearable rescue device is provided with a communication module for communicating with the network device.
  • the electronic rescue lock includes a communication module (used to receive information and instructions), and an execution mechanism (used to execute corresponding operations based on the received information or instructions). When an emergency rescue situation occurs, but the caller cannot open the door for the rescuer in time, the electronic rescue lock performs the unlocking operation on the corresponding entrance door based on the received information or instruction, providing a clear rescue road for the rescuer and saving Rescue time.
  • the specific implementation of sending a rescue call request to the corresponding network device through a rescue call device is the same or basically the same as the specific implementation of sending a rescue call request described above, and will not be repeated, and is included here by reference;
  • the rescue lock executes the corresponding unlocking operation based on the unlocking instruction sent by the network device received by the network device to unlock the entrance door where the electronic rescue lock is installed, thereby providing rescue channels for rescuers. It will not be repeated and included in the way of reference. this.
  • Fig. 13 shows a rescue method at the network device side according to another embodiment of the present application, wherein the method includes step S701, step S702, step S703, step S704, and step S705.
  • the network device receives a rescue call request sent by a rescue call device corresponding to the network device, where the rescue call request includes rescue identification information corresponding to the rescue device; in step S702, the network device is based on the rescue call request.
  • the rescue call request matches at least one wearable rescue device; in step S703, the network device sends a rescue instruction to the at least one wearable rescue device; in step S704, the network device receives the at least one wearable rescue device The unlocking request sent by the device based on the rescue instruction; in step S705, the network device sends an unlocking instruction to the electronic rescue lock corresponding to the rescue device based on the unlocking request, so that the electronic rescue lock is based on the unlocking instruction Unlock the corresponding entry door.
  • the network device receives a rescue call request sent by a rescue call device corresponding to the network device, where the rescue call request includes rescue identification information corresponding to the rescue call device.
  • the rescue identification information includes, but is not limited to, device identification information (for example, device serial number, MAC address of the device).
  • the rescue identification information is used for the network device to identify the rescue device, and to determine the identity of the caller based on the rescue device. For example, the user pre-stores the user's use in the network device through registration. The mapping relationship between the rescue device and the user.
  • the network device can query and obtain the user’s identity information, medical history information, allergy related information, etc. based on the rescue device Related information provides reference for rescue; in other embodiments, the rescue identification information can be used to query the electronic rescue lock corresponding to the rescue device, for example, the rescue device and the electronic rescue lock corresponding to the rescue device are stored in the network device There is a mapping relationship between the rescue identification information of the distress call device and the electronic rescue lock, and the network device can query and obtain the electronic rescue lock corresponding to the distress device based on the rescue identification information of the distress device and the mapping relationship.
  • step S702 at least one wearable rescue device is matched based on the rescue call request.
  • the network device searches and matches at least one wearable rescue device located nearby for the rescuer corresponding to the rescue device based on the location information of the rescue device and the wearable rescue device.
  • a rescue instruction is sent to the at least one wearable rescue device.
  • the network device sends a rescue instruction to the wearable rescue device to notify the rescuer corresponding to the wearable rescue device that there is an emergency that requires rescue.
  • step S704 a lock unlock request sent by the at least one wearable rescue device based on the rescue instruction is received.
  • the wearable rescue device receiving the rescue instruction requests the network device to control the corresponding electronic rescue lock to unlock the entrance door of the caller by sending an unlock request to the network device.
  • step S705 an unlocking instruction is sent to the electronic rescue lock corresponding to the calling device based on the unlocking request, so that the electronic rescue lock can unlock the corresponding entry door based on the unlocking instruction, for example, the network device is receiving After the unlock request sent by the wearable rescue device, the unlock instruction is sent to the corresponding electronic rescue lock.
  • the rescue instruction includes target location information corresponding to the rescue device, and the unlock request includes geographic location information of the wearable rescue device; the method further includes: based on the target location information and The geographic location information verifies the unlocking request; the step S705 includes: if the unlocking request is verified, based on the unlocking request, sending an unlocking instruction to the electronic rescue lock corresponding to the distress call device for the electronic rescue The lock unlocks the corresponding entry door based on the unlocking instruction, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the target location information is used to determine the current location of a rescue device
  • the geographic location information is used to determine the current location of a wearable rescue device, so that the network device can use the target location information and the The geographic location information determines whether the rescuer using the wearable rescue device has arrived at the rescue scene where the rescue device is located.
  • the network device determines that the target location information covers the geographic location information or the distance between the geographic location information and the target location information is less than a certain distance threshold, the network device passes the verification and sends an unlocking instruction to the corresponding electronic rescue lock To unlock the rescuer.
  • Fig. 14 shows a rescue method at the end of a wearable rescue device according to another embodiment of the present application, wherein the method includes step S801 and step S802.
  • the wearable rescue device receives the rescue instruction sent by the network device corresponding to the wearable rescue device, wherein the rescue instruction is the rescue instruction sent by the network device based on the rescue device corresponding to the network device
  • the wearable rescue device sends an unlock request to the network device based on the rescue instruction, and the unlock request is used for the electronic device corresponding to the rescue device.
  • the rescue lock unlocks the corresponding entrance door, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the wearable rescue device receives a rescue instruction sent by a network device corresponding to the wearable rescue device, where the rescue instruction is based on the network device's call for help device corresponding to the network device Sent to the rescue call request.
  • the network device matches at least one wearable rescue device based on the received rescue call request (for example, the network device queries the at least one wearable rescue device currently in the vicinity of the rescue device based on the acquired current location of the rescue device).
  • Rescue equipment and send rescue instructions to the wearable rescue equipment to notify rescuers using the wearable rescue equipment that there is a rescue mission.
  • step S802 if a response trigger event is detected, the wearable rescue device sends an unlock request to the network device based on the rescue instruction, and the unlock request is used for unlocking the corresponding access of the electronic rescue lock corresponding to the rescue device. Door, so as to provide rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the response trigger event includes, but is not limited to, the relevant operation of the corresponding rescuer (for example, pressing a certain button), the arrival of the wearable rescue device at a certain place (for example, the wearable rescue device and the target location The distance of the information is less than the preset distance threshold). Further, the wearable rescue device sends an unlock request to the corresponding network device based on the received rescue instruction.
  • the unlock request includes geographic location information of the wearable rescue device. In some embodiments, the unlock request includes the geographic location information of the wearable rescue device. For example, the wearable rescue device obtains its current geographic location information based on GPS positioning, and sends the geographic location information to the corresponding The network device for the corresponding network device to determine based on the geographic location information that the rescuer corresponding to the wearable rescue device has arrived at the rescue site; in the case of determining that the rescuer has arrived at the rescue site, the network device sends the corresponding request based on the unlock request The electronic rescue lock sends an unlocking instruction for the electronic rescue lock to unlock the corresponding entry door based on the unlocking instruction, thereby providing rescue channels for rescuers.
  • Figure 15 shows a network device according to one aspect of the present application, wherein the device includes a one-to-one module, one-two modules, and one-three modules, wherein the one-to-one module is used to receive the call for help corresponding to the network device
  • a rescue call request sent by a device where the rescue call request includes rescue identification information corresponding to the rescue call device; a second module for matching at least one wearable rescue device based on the rescue call request; a third module , Used to send a rescue instruction to the at least one wearable rescue device, the rescue instruction includes rescue verification information determined based on the rescue identification information; wherein the rescue verification information is used for the rescue device corresponding to
  • the electronic rescue lock performs unlock verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entry door after the verification is passed, thereby providing rescue channels for rescuers corresponding to the wearable rescue device.
  • the wearable rescue device may include, but is not limited to, electronic products with Bluetooth positioning and network communication modules (for example, rescue helmets, smart glasses, etc.).
  • the wearable rescue device is used to receive rescue instructions sent by a network device to notify rescuers that a rescue event has occurred.
  • a module for receiving a rescue call request sent by a rescue call device corresponding to the network device where the rescue call request includes rescue identification information corresponding to the rescue call device.
  • the rescue identification information includes, but is not limited to, device identification information (for example, device serial number, MAC address of the device).
  • the rescue identification information is used to identify the rescue device, so as to determine the identity of the rescuer based on the rescue device. For example, the user pre-stores the rescue device used by the user in the network device through registration. The mapping relationship with the user.
  • the network device can query and obtain the user’s identity information, medical history information, allergy-related information and other relevant information based on the rescue call device.
  • the electronic rescue lock corresponding to the rescue device can be queried through the rescue identification information.
  • the registered rescue device is recorded in the network device (for example, the device that records the rescue device) Identification information) and the electronic rescue lock corresponding to the rescue device (for example, the device identification information of the electronic rescue lock), there is a mapping relationship between the rescue identification information of the rescue device and the electronic rescue lock, and the network device passes through the The rescue identification information can be queried to obtain the electronic rescue lock corresponding to the rescue device.
  • the one-two module is used to match at least one wearable rescue device based on the rescue call request.
  • the network device searches and matches at least one wearable rescue device located nearby for the rescuer corresponding to the rescue device based on the location information of the rescue device and the wearable rescue device.
  • the 13th module is used to send rescue instructions to the at least one wearable rescue device, where the rescue instructions include rescue verification information determined based on the rescue identification information; wherein the rescue verification information is used for the call for help
  • the electronic rescue lock corresponding to the device performs unlock verification on the wearable rescue device, and the electronic rescue lock unlocks the corresponding entry door after the verification is passed, thereby providing rescue channels for rescuers corresponding to the wearable rescue device.
  • the information to be verified is obtained based on the rescue identification information query.
  • the network device processes the rescue identification information corresponding to the rescue device (for example, The rescue identification information is converted into corresponding rescue verification information based on a certain algorithm), or the network device creates information to be verified for the rescue identification information corresponding to each rescue device, and when the rescue device sends a rescue call request to the network device, The network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue calling device, and sends the information to be verified to the wearable rescue device.
  • the rescue identification information is converted into corresponding rescue verification information based on a certain algorithm
  • the network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue calling device, and sends the information to be verified to the wearable rescue device.
  • the rescuer corresponding to the wearable rescue device sends the rescue verification information to the electronic rescue lock through operation or based on the communication connection between the wearable rescue device and the corresponding electronic rescue lock, to For the electronic rescue lock to verify the rescue verification information, for example, the electronic rescue lock also stores the same information as the above-mentioned information to be verified, and verifies the above-mentioned information to be verified in a comparison method. If the comparison is consistent, the verification is passed , The electronic rescue lock performs the unlocking operation.
  • the device further includes a four-module (not shown), a four-module for sending a verification instruction to the electronic rescue lock corresponding to the rescue device, wherein the verification instruction includes The information to be verified determined by the identification information.
  • the network device triggers the electronic rescue lock to verify unlocking by sending a verification instruction to the electronic rescue lock corresponding to the calling device; accordingly, the electronic rescue lock is only Only after receiving the instruction will the verification and unlocking operation be performed, and will not respond to the verification request sent by the criminals to the electronic rescue lock when rescue is not needed, so as to enhance security.
  • the information to be verified is obtained based on the rescue identification information query.
  • the network device processes the rescue identification information corresponding to the rescue device (for example, The rescue identification information is converted into corresponding rescue verification information based on a certain algorithm), or the network device creates information to be verified for the rescue identification information corresponding to each rescue device, and when the rescue device sends a rescue call request to the network device, The network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue device, and sends the information to be verified to the electronic rescue lock corresponding to the rescue device.
  • the rescue identification information is converted into corresponding rescue verification information based on a certain algorithm
  • the network device queries the corresponding information to be verified based on the rescue identification information corresponding to the rescue device, and sends the information to be verified to the electronic rescue lock corresponding to the rescue device.
  • the electronic rescue lock verifies the rescue verification information it receives based on the information to be verified, for example, the rescue verification information and the information to be verified sent by the network device to the wearable rescue device and the electronic rescue lock Similarly, the electronic rescue lock performs the rescue verification information based on the information to be verified. For example, the electronic rescue lock also stores the same information as the information to be verified, and verifies the information to be verified in a comparison method. If the verification is consistent, the electronic rescue lock performs the unlocking operation.
  • the one-fourth module is used to: generate corresponding information to be verified based on the rescue identification information; send a verification instruction to the electronic rescue lock corresponding to the rescue device, wherein the verification instruction includes the wait Verification information; the one-three modules are used to: generate corresponding rescue verification information based on the rescue identification information; send a rescue instruction to the at least one wearable rescue device, wherein the rescue instruction includes the rescue verification information; Wherein, the information to be verified and the rescue verification information are generated based on the same generation algorithm. In some embodiments, the information to be verified and the rescue verification information are respectively sent to the electronic rescue lock and the wearable rescue device worn by the rescuer.
  • the information to be verified is determined by the network device based on the rescue identification information query; in other embodiments, the information to be verified is based on a preset algorithm (for example, an encryption algorithm).
  • Rescue identification information is processed. For example, the network device encrypts the rescue identification information in the call for help based on a certain algorithm to generate rescue verification information and information to be verified, and sends the rescue verification information to the wearable rescue device, and sends the information to be verified to The electronic rescue lock corresponding to the rescue device; after rescuers arrive at the scene, the wearable rescue device sends the rescue verification information to the electronic rescue lock for the electronic rescue lock to verify the rescue verification information based on the information to be verified For example, when the rescue verification information matches the to-be-verified information, the verification is passed, the electronic rescue lock unlocks the corresponding entrance door, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the algorithm includes, but is not limited to, encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm; in a typical scenario, the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm
  • the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • the algorithm operations described above are only
  • the rescue verification information includes target voice feature information
  • the target voice feature information is used to synthesize a target voice
  • the electronic rescue lock performs unlock verification on the wearable rescue device based on the target voice.
  • the rescue verification information includes target voice feature information
  • the target voice feature information includes, but is not limited to, voice feature information such as characteristic pitch, timbre, and voiceprint.
  • the network device synthesizes the target voice through the target characteristic voice information, and sends the target voice to the wearable rescue device for the wearable rescue device to play the target voice; the electronic rescue lock collects the target voice and recognizes the target
  • the voice feature information in the voice is then unlocked and verified based on the recognized voice feature information.
  • FIG. 16 shows a rescue call device according to another aspect of the present application, wherein the device includes a two-one module and a two-two module.
  • the two-two module is used to generate a corresponding rescue call request based on a detected rescue event,
  • the rescue call request includes the rescue identification information of the rescue call device;
  • the second module is used to send the rescue call request to the network device corresponding to the rescue call device; wherein the network device determines the corresponding rescue call based on the rescue identification information
  • Rescue verification information the rescue verification information is used to perform unlock verification on at least one wearable rescue device, and the electronic rescue lock corresponding to the rescue device unlocks the corresponding entrance door after the verification is passed.
  • the distress call equipment includes, but is not limited to, mobile phones, smart monitoring devices (for example, smart bracelets equipped with various sensors, including but not limited to gravity sensors, electronic gyroscopes, heart rate monitoring modules, etc.).
  • the distress call device is a smart bracelet equipped with a gravity sensor.
  • the distress device detects corresponding data information through these sensors, thereby detecting the corresponding rescue event, and the distress device automatically reports The corresponding network device sends a rescue call request.
  • the rescue events mentioned above are only examples, and other existing or future rescue events that may be applicable to this application are also included in the scope of protection of this application, and are referred to as The way of reference is included here.
  • the rescue call device is a smart bracelet including a heart rate monitoring module.
  • the smart bracelet detects that the wearer's heart rate is in an abnormal range, it sends a rescue call request to the corresponding network device.
  • the distress call device includes a gravity sensor and a heart rate monitoring module. When the caller faints suddenly, the distress call device detects corresponding data information through these sensors, thereby detecting a corresponding rescue event. Automatically send a rescue call request to the corresponding network device.
  • the rescue verification information is used for the electronic rescue lock corresponding to the rescue device to perform unlock verification on at least one wearable rescue device.
  • the network device sends the rescue verification information to the wearable rescue device, and
  • the information to be verified is sent to the electronic rescue lock, where the rescue verification information and the information to be verified are generated based on the same generation algorithm.
  • the rescuer After the rescuer arrives at the rescue site, the rescuer will send it to the electronic rescue lock through the wearable rescue device worn by him
  • the rescue verification information the electronic rescue lock verifies the rescue verification information, if the rescue verification information is the same as the information to be verified received, the verification is passed; in other embodiments, the rescue verification information is used for the
  • the network device performs unlock verification on at least one wearable rescue device.
  • a rescuer After a rescuer arrives at the rescue site, he sends rescue verification information to the network device through the wearable rescue device he wears, and the network device receives and verifies the rescue verification information. If the rescue verification information is the same as the rescue verification information sent by the network device to the wearable rescue device, if the verification is passed, the network device sends an unlock command to the corresponding electronic rescue lock, and the electronic rescue lock unlocks the corresponding entry based on the unlock command. Household door.
  • the rescue identification information includes at least any one of the following:
  • the distress device identification information of the distress device includes the rescue equipment identification information of the rescue equipment.
  • the identification information of the distress call device includes but is not limited to the serial number of the device and the MAC address of the device.
  • the distress device sends its corresponding distress device identification information to the network device, so that the network device queries related information corresponding to the distress device based on the distress device identification information (for example, rescue verification information, identity information of the corresponding distress user, etc.).
  • Distress user identification information of the distress user corresponding to the distress device includes the distress user identification information of the distress user corresponding to the distress device.
  • the identification information of the calling user includes but is not limited to the name, ID number, etc. of the calling user, and the network device queries the corresponding calling device based on the calling user identification information.
  • the network device determines corresponding rescue verification information based on the rescue identification information, and the rescue verification information is used for the electronic rescue lock corresponding to the rescue device to unlock at least one wearable rescue device After verification, the electronic rescue lock unlocks the corresponding entrance door after the verification is passed, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the network device stores a plurality of rescue identification information and rescue verification information corresponding to each rescue identification information, and the network device queries the rescue verification information corresponding to the rescue identification information based on the rescue identification information corresponding to the rescue identification information.
  • the network device matches the rescuer closest to the rescuer based on the real-time location of the calling user, or matches the rescuer whose distance from the calling user is less than a certain distance threshold Several rescuers).
  • the rescue verification information is sent to the electronic rescue lock through the wearable rescue device.
  • the electronic rescue lock verifies the rescue verification information, and if the verification is passed, the corresponding entry door is unlocked and the door is opened for the rescuer.
  • Figure 17 shows a wearable rescue device according to another aspect of the present application, wherein the device includes a three-one module, a three-two module, and a three-one module for receiving the network device corresponding to the wearable rescue device
  • the sent rescue instruction, the rescue instruction includes rescue verification information; the 32 module is used to provide the rescue verification information to the electronic rescue lock corresponding to the wearable rescue device to pass the rescue verification information based on the rescue verification information
  • the electronic rescue lock corresponding to the wearable rescue device performs unlock verification; wherein the electronic rescue lock unlocks the corresponding entrance door after the verification is passed, so as to provide rescue channels for rescuers corresponding to the wearable rescue device.
  • the network device matches at least one wearable rescue device based on the received rescue call request (for example, the network device queries the at least one wearable rescue device currently in the vicinity of the rescue device based on the acquired current location of the rescue device).
  • Rescue equipment and send rescue instructions to the wearable rescue equipment to notify rescuers using the wearable rescue equipment that there is a rescue mission.
  • the rescue instruction includes rescue verification information.
  • the rescue verification information includes rescue identification information.
  • the rescuer inputs the rescue verification information on the corresponding electronic rescue lock, and the electronic rescue lock verifies the rescue verification information; in other implementations
  • the rescue verification information includes target voice feature information, for example, the wearable rescue device plays a voice to be verified containing the target voice feature information, and the electronic rescue lock recognizes and verifies the voice to be verified; in other embodiments
  • the wearable rescue device and the electronic rescue lock on the entrance door establish a communication connection (for example, Bluetooth connection) automatically or based on the operation of the rescuer.
  • the wearable rescue device sends the rescue verification information to the corresponding electronic rescue lock based on the communication connection, so that the electronic rescue lock can verify the rescue verification information.
  • the 32nd module is used to: establish a communication connection between the electronic rescue lock corresponding to the wearable rescue device and the wearable rescue device; and transmit the rescue verification information through the communication connection Send to the electronic rescue lock corresponding to the wearable rescue device to perform unlock verification through the electronic rescue lock.
  • both the wearable rescue device and the electronic rescue lock are provided with a communication module (for example, a Bluetooth module, an NFC module).
  • the wearable rescue device and the electronic rescue lock automatically establish a communication connection; in other embodiments, the rescuer wears the wearable rescue device to arrive at the rescue site Afterwards, the wearable rescue device is used to manually send a communication connection request to the electronic rescue lock, and the electronic rescue lock establishes a communication connection with the wearable rescue device based on the communication connection request. The wearable rescue device sends rescue verification information to the electronic rescue lock through the communication connection, so that the electronic rescue lock can perform unlock verification.
  • the rescue verification information includes target voice feature information; the 32 module is configured to: based on the rescue verification information, in response to the play operation of the rescuer corresponding to the wearable rescue device, play the waiting
  • the verification voice is used for the electronic rescue lock corresponding to the wearable rescue device to perform unlock verification based on the voice to be verified.
  • the target voice characteristic information includes, but is not limited to, characteristic information such as timbre, pitch, and voiceprint.
  • the network device sends rescue verification information including the target voice feature information to the wearable rescue device.
  • the wearable rescue device will emit a prompt tone when receiving the rescue verification information to prompt the corresponding rescue.
  • the corresponding electronic rescue lock collects the voice to be verified and analyzes it. If the target voice feature information is recognized, it is unlocked so that the rescuer can smoothly enter the entrance door to rescue the caller.
  • rescuers After rescuers arrive at the rescue site, they operate the wearable rescue equipment they use to play the voice to be verified, and the corresponding electronic rescue lock collects the voice to be verified on site, which can ensure that the rescuer has arrived at the scene, not before the rescuer has arrived
  • the unlocking operation is performed at any time to improve the security of unlocking the entrance door.
  • the three-two module is configured to generate a voice to be verified based on the target voice feature information in response to a playback operation of the rescuer corresponding to the wearable rescue device, and to play the voice to be verified , So that the electronic rescue lock corresponding to the wearable rescue device performs unlock verification based on the voice to be verified.
  • the rescuer performs a playback operation on the wearable rescue device, and the wearable rescue device generates a voice to be verified based on the target voice feature information it receives based on the playback operation.
  • the wearable rescue device has a built-in piece of audio.
  • the corresponding electronic rescue lock collects the to-be-verified voice played by the wearable rescue device based on the built-in microphone module, and detects and recognizes the to-be-verified information in the to-be-verified voice (that is, the voice feature information).
  • the network device has previously sent the target voice feature information to the electronic rescue lock for verification by the electronic rescue lock, if the voice to be verified played by the wearable rescue device contains the target voice feature If the information is verified, the electronic rescue lock is unlocked so that rescuers can enter the portal in time for rescue.
  • the wearable rescue device generates a voice to be verified containing the target's voice feature information on site, which can ensure the rescue identity of the person who arrives at the rescue site. For example, only rescuers wearing the wearable rescue device can perform voice unlocking. Improve the security of unlocking.
  • the three-two module includes a three-two-one module (not shown), a three-two-two module, and a three-two-three module.
  • the three-two-one module is used to collect rescuers corresponding to the wearable rescue device.
  • the three-two-two module is used to perform a conversion operation on the real-time voice based on the target voice feature information to generate the voice to be verified; the three-two-three module is used to respond to the playback operation of the rescuer,
  • the voice to be verified is played, so that the electronic rescue lock corresponding to the wearable rescue device performs unlock verification based on the voice to be verified.
  • the wearable rescue device has a built-in audio that is used to synthesize a voice to be verified including the target voice feature information according to the target voice feature information received on the wearable rescue device; in other embodiments, the The wearable rescue device generates a voice to be verified containing the target voice feature information by collecting the real-time voice of the rescuer on the spot.
  • the wearable rescue device has a built-in voice conversion module, and after receiving the target voice feature information (for example, characteristic timbre) Or feature voiceprint) and after collecting the real-time voice of the rescuer, the voice conversion module synthesizes the voice to be verified containing the target voice feature information based on the real-time voice by adjusting the specific frequency spectrum feature, and a wearable rescue device plays the voice to be verified. Verify voice.
  • the corresponding electronic rescue lock detects and recognizes the to-be-verified information played by the wearable rescue device based on the built-in voice recognition module.
  • the network device sends the target voice feature information to the electronic rescue lock for voice verification by the electronic rescue lock, if the voice to be verified played by the wearable rescue device contains the target voice feature information , The verification is passed, and the electronic rescue lock is unlocked so that rescuers can enter the portal in time for rescue.
  • the wearable rescue device collects the rescuer's real-time voice on site, and combines the real-time voice to generate a voice to be verified containing the target's voice feature information, which can ensure that the rescuer has arrived at the scene to a certain extent, and the identity of the rescuer , Which further increases the safety of unlocking.
  • the target voice feature information includes at least any one of the following: pitch information, timbre information, and voiceprint information.
  • the target voice feature information includes pitch information.
  • the target voice feature information includes one or more pitch information arranged in a certain order (for example, the pitch of the pitch). Whether the individual tone information and the sequence of multiple tone information are correctly arranged to determine the target voice feature information; in some embodiments, the target voice feature information includes timbre information, where timbre refers to the frequency performance of different sounds There are always distinctive characteristics in terms of waveforms, for example, different objects have different characteristics.
  • preset target voice feature information in a certain timbre combination and identify the target voice feature information by recognizing the timbre combination; in some embodiments, the target voice feature information includes voiceprint information, where the voiceprint is used
  • voiceprint information The sound spectrum that carries verbal information displayed by an electroacoustic instrument.
  • the target voice feature information is a sound wave spectrum carrying voice information, and the unlock is verified by identifying the target voice feature information; in other embodiments, the target voice feature information includes pitch information, timbre information, and voiceprint A combination of two or three types of information, for example, the target voice feature information contains multiple sub-target voice feature information in sequence, wherein each target voice feature information contains its own pitch information and timbre information, and each Each of the tone information corresponds to different tone color information, thereby reducing the risk of malicious deciphering of target voice feature information. By presetting the target voice feature information, the security of verifying unlocking is further increased.
  • an electronic rescue lock wherein the device includes a four-one module, a four-two module, and a four-three module.
  • the four-one module is used to obtain information provided by the wearable rescue device corresponding to the electronic rescue lock.
  • Rescue verification information a four-two module for unlocking verification based on the rescue verification information
  • a four-three module for controlling the actuator of the electronic rescue lock to unlock the entry door corresponding to the electronic rescue lock if the verification is passed , So as to provide rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the network device matches at least one wearable rescue device based on the received rescue call request (for example, the network device queries the at least one wearable rescue device currently in the vicinity of the rescue device based on the acquired current location of the rescue device).
  • Rescue equipment and send rescue instructions to the wearable rescue equipment to notify rescuers using the wearable rescue equipment that there is a rescue mission.
  • the rescue instruction includes rescue verification information.
  • the rescue verification information includes rescue identification information. For example, the rescuer inputs the rescue verification information on the corresponding electronic rescue lock, and the electronic rescue lock verifies the rescue verification information; in other implementations
  • the rescue verification information includes target voice feature information.
  • the wearable rescue device plays a voice to be verified containing the target voice feature information, and the electronic rescue lock recognizes and verifies the voice to be verified.
  • the actuator of the electronic rescue lock includes a motor and a corresponding mechanical structure, and the motor is used to drive the corresponding mechanical structure (for example, the lock tongue of the entrance door or cooperate with the lock hole to lock the door body The lock hook) to unlock the entry door corresponding to the electronic rescue lock (for example, the lock tongue is driven by a motor to retract the door body, or the lock hook is driven to rotate and disengage from the lock hole), so as to provide the wearable rescue Rescue personnel corresponding to the equipment provide rescue channels.
  • the method further includes a four-four module (not shown), the four-four module is used to receive a verification instruction sent by a network device corresponding to the electronic rescue lock, wherein the verification instruction includes the verification instruction Information;
  • the four-two module is used to: unlock and verify the rescue verification information based on the information to be verified; wherein the information to be verified and the rescue verification information are generated based on the same generation algorithm.
  • the information to be verified and the rescue verification information are respectively sent to the electronic rescue lock and the wearable rescue device worn by the rescuer.
  • the information to be verified is determined by the network device based on the rescue identification information query; in other embodiments, the information to be verified is based on a preset algorithm (for example, an encryption algorithm).
  • the network device encrypts the rescue identification information in the call for help based on a certain algorithm to generate rescue verification information and information to be verified, and sends the rescue verification information to the wearable rescue device, and sends the information to be verified to
  • the electronic rescue lock corresponding to the rescue device after rescuers arrive at the scene, the wearable rescue device sends the rescue verification information to the electronic rescue lock for the electronic rescue lock to verify the rescue verification information based on the information to be verified
  • the electronic rescue lock unlocks the corresponding entrance door, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the algorithm includes, but is not limited to, encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm; in a typical scenario, the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • encryption algorithms such as DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm
  • the algorithm is used to call for help based on the identification information of the user's call for help or the call for help.
  • the above-mentioned information to be verified and rescue verification information are generated from the identity information, so that the electronic rescue lock can verify the legitimacy of the wearable rescue equipment and rescue personnel based on the information to be verified and the rescue verification information, and open the door when the verification passes.
  • the algorithm operations described above are only
  • the rescue verification information includes a voice to be verified, and the information to be verified includes target voice feature information; and the 42-module is configured to: combine the voice feature information to be verified corresponding to the voice to be verified with the target The voice feature information is compared for unlocking verification.
  • the rescue verification information includes target voice feature information, and the target voice feature information includes, but is not limited to, voice feature information such as characteristic pitch, timbre, and voice print.
  • the network device synthesizes the target voice through the target characteristic voice information, and sends the target voice to the wearable rescue device for the wearable rescue device to play the target voice; the electronic rescue lock collects the target voice and recognizes the target The voice feature information in the voice is then unlocked and verified based on the recognized voice feature information.
  • a network device As shown in FIG. 19, a network device according to another embodiment of the present application is shown, wherein the device includes a 51 module, a 52 module, a 55 module, a 54 module, and a 55 module.
  • the electronic rescue lock is collected on-site; the 54th module is used to determine the rescue authority information of the on-site personnel corresponding to the electronic rescue lock based on the information to be verified and the identity characteristic information; the 55th module is used for The rescue authority information includes the right to send an unlock command to the electronic rescue lock so that the electronic rescue lock unlocks the
  • the rescue device may include, but is not limited to, a wearable rescue device or other user equipment (for example, a computing device such as a mobile phone, a tablet, or a laptop).
  • the distress call device includes, but is not limited to, user equipment, smart monitoring equipment (for example, a smart bracelet provided with a gravity sensor or a heart rate monitoring module).
  • the user equipment includes but not Limited to computing devices such as mobile phones, tablets, and laptops.
  • the 51 module is configured to receive a rescue call request sent by a rescue call device corresponding to the network device, where the rescue call request includes rescue identification information corresponding to the rescue call device.
  • the rescue identification information includes, but is not limited to, device identification information (for example, device serial number, MAC address of the device).
  • the rescue identification information is used to identify the rescue device, so as to determine the identity of the rescuer based on the rescue device. For example, the user pre-stores the rescue device used by the user in the network device through registration. The mapping relationship with the user.
  • the network device can query and obtain the user’s identity information, medical history information, allergy-related information and other relevant information based on the rescue call device.
  • the electronic rescue lock corresponding to the rescue device can be queried through the rescue identification information.
  • the network device stores the rescue device and the electronic rescue lock corresponding to the rescue device.
  • the fifty-two module is used to match at least one rescue device and the identity feature information of the rescuer corresponding to each rescue device based on the rescue call request.
  • the identity characteristic information includes, but is not limited to, the facial characteristic information of the corresponding rescuer, the fingerprint characteristic information of the corresponding rescuer, and the voiceprint characteristic information of the corresponding rescuer.
  • the identity feature information is used to identify and determine the identity information of the corresponding rescuer.
  • the electronic rescue lock collects the facial portrait of the on-site personnel who arrives at the rescue site through the face collection device, and sends the facial portrait to The network device, the network device compares the facial portrait with the facial feature information, and if the similarity between the two is greater than or equal to the preset similarity pre-threshold, it is determined that the on-site personnel is the rescuer corresponding to the rescue equipment Further, the network device sends an unlocking instruction to the corresponding electronic rescue lock, thereby improving the unlocking security. In some embodiments, the network device searches and matches at least one rescue device located nearby for the rescuer corresponding to the rescue device based on the rescue device and the location information of the rescue device.
  • the fifty-three module is used to receive the information to be verified sent by the electronic rescue lock corresponding to the calling device, and the information to be verified is collected on the spot by the electronic rescue lock.
  • the information to be verified includes, but is not limited to, facial images of field personnel, fingerprint information of field personnel, and audio information of field personnel.
  • the electronic rescue lock is provided with an information collection device to be verified (for example, a face collection device, a fingerprint collection device, or a voice collection device), and the information collection device to be verified collects information about on-site personnel arriving at the rescue site.
  • the information to be verified is sent to the network device, and the network device performs verification.
  • the May 4th module is used to determine the rescue authority information of the on-site personnel corresponding to the electronic rescue lock based on the information to be verified and the identity characteristic information.
  • a plurality of rescue devices for example, the MAC address of the rescue device, the device serial number
  • the identity feature information of the rescuer corresponding to each rescue device are stored in the network device.
  • the electronic rescue lock collects the to-be-verified information about the on-site personnel arriving at the rescue site through the to-be-verified information collection device, and sends the collected and to-be-verified information to the network device. Further, in some embodiments, the network device queries whether there is identity feature information matching the information to be verified according to the information to be verified, and if it exists, it is determined that the on-site personnel has rescue authority.
  • the fifty-five module is configured to send an unlocking instruction to the electronic rescue lock if the rescue authority information includes the right, so that the electronic rescue lock can unlock the corresponding entry door based on the unlocking instruction, thereby providing the permission Provide rescue channels for rescuers wearing rescue equipment.
  • the rescue permission information includes right and no right. If the network device verifies that the rescue authority information is authorized, the network device sends an unlocking instruction to the corresponding electronic rescue lock. The electronic rescue lock receives the unlocking instruction, and unlocks the corresponding entry door based on the unlocking instruction, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the May 4th module is used to determine the rescue of on-site personnel corresponding to the electronic rescue lock based on the information to be verified, the geographic location information of the at least one rescue device, and the identity feature information Permission information.
  • the network device determines the rescue authority information of the on-site personnel in combination with the geographic location information of the at least one rescue device.
  • the network device obtains the geographic location information of the at least one rescue device (for example, based on GPS positioning technology, the rescue device provides its current geographic location information to the network device), if the geographic location information is rescued on site If the covered or the distance to the rescue site is less than a certain distance threshold, it means that the corresponding on-site personnel is at the rescue site, and the on-site personnel can be determined to have rescue authority information; if the geographic location information is not covered by the rescue site or is related to the rescue The scene example is greater than the above-mentioned distance threshold, it means that the corresponding on-site personnel is not at the rescue site.
  • the identity feature information includes at least any one of the following: facial feature information of the corresponding rescuer, wherein the information to be verified includes the facial image of the on-site personnel corresponding to the electronic rescue lock; the corresponding rescuer Fingerprint feature information, wherein the to-be-verified information includes the fingerprint information of the on-site personnel corresponding to the electronic rescue lock; the voiceprint feature information of the corresponding rescue personnel, wherein the to-be-verified information includes the on-site personnel corresponding to the electronic rescue lock Audio information.
  • the identity feature information is pre-stored in the network device, and the network device compares the information to be verified about the on-site personnel sent by the electronic rescue lock with the identity feature information to determine the rescue authority information of the on-site personnel.
  • the rescue authority information of the on-site personnel is determined by means of face recognition.
  • the identity feature information includes the facial feature information of the corresponding rescuer, and the facial feature information is compared with the waiting information sent by the electronic rescue lock.
  • the facial image in the verification information if the similarity between the facial feature information and the facial image is greater than or equal to the similarity threshold, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, through fingerprints
  • the identification method determines the rescue authority information of the on-site personnel.
  • the identity feature information includes the fingerprint feature information of the corresponding rescuer, based on the fingerprint feature information matching the fingerprint information in the information to be verified sent by the electronic rescue lock, if it matches If successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, the rescue authority information of the on-site personnel is determined by means of voice recognition, for example, the identity feature information includes the voiceprint of the corresponding rescuer The characteristic information is based on the voiceprint characteristic information matching the audio information in the information to be verified sent by the electronic rescue lock. If the matching is successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information. In some embodiments, the audio information is audio information of on-site personnel collected by the electronic rescue lock.
  • an electronic rescue lock according to another embodiment of the present application is shown, wherein the device includes a six-one module, six-two module, and six-three module.
  • the actuator of the electronic rescue lock unlocks the entrance door corresponding to the electronic rescue lock, thereby providing rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the six-one module is used to collect on-site information to be verified on site personnel.
  • the information to be verified includes, but is not limited to, facial images of field personnel, fingerprint information of field personnel, and audio information of field personnel.
  • the electronic rescue lock is provided with an information collecting device to be verified (for example, a camera device for collecting facial photos, a fingerprint collecting device, or a microphone module for collecting voice), and the information collecting device to be verified Collect the to-be-verified information about the on-site personnel arriving at the rescue site, and send the to-be-verified information to the network device, and the network device will verify it.
  • the 62nd module is used to send the information to be verified to the network device corresponding to the electronic rescue lock.
  • the electronic rescue lock collects the to-be-verified information about the on-site personnel
  • the to-be-verified information is sent to the corresponding network device for verification by the network device. Further, in the case that the network device passes the verification, the network device sends an unlocking instruction to the electronic rescue lock.
  • the six-three module is used to control the actuator of the electronic rescue lock to unlock the entrance door corresponding to the electronic rescue lock based on the unlocking instruction sent by the network device, so as to be the rescuer corresponding to the wearable rescue device Provide rescue channels.
  • the actuator of the electronic rescue lock includes a motor and a corresponding mechanical structure, and the motor is used to drive the corresponding mechanical structure (for example, the bolt of the entrance door) to unlock the electronic rescue lock
  • the corresponding entrance door provides rescue channels for rescuers corresponding to the wearable rescue equipment.
  • the information to be verified includes at least any one of the following: facial images of field personnel; fingerprint information of field personnel; and audio information of field personnel.
  • the network device has pre-stored information about the identity characteristics of the rescuer, and the electronic rescue lock sends the information to be verified about the on-site personnel to the network device for verification by the network device.
  • the rescue authority information of the on-site personnel is determined by means of face recognition.
  • the identity feature information includes the facial feature information of the corresponding rescuer, and the facial feature information is compared with the waiting information sent by the electronic rescue lock.
  • the similarity between the facial feature information and the facial image is greater than or equal to the similarity threshold, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, through fingerprints
  • the identification method determines the rescue authority information of the on-site personnel.
  • the identity feature information includes the fingerprint feature information of the corresponding rescuer, based on the fingerprint feature information matching the fingerprint information in the information to be verified sent by the electronic rescue lock, if it matches If successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information; in some embodiments, the rescue authority information of the on-site personnel is determined by means of voice recognition, for example, the identity feature information includes the voiceprint of the corresponding rescuer The characteristic information is based on the voiceprint characteristic information matching the audio information in the information to be verified sent by the electronic rescue lock. If the matching is successful, it is determined that the on-site personnel corresponding to the information to be verified has rescue authority information. In some embodiments, the audio information is audio information of on-site personnel collected by the electronic rescue lock.
  • Figure 21 shows a network device according to another embodiment of the present application, wherein the device includes a seven-one module, a seven-two module, a seven-three module, a seven-four module, and a seven-five module.
  • Receive a rescue call request sent by a rescue call device corresponding to the network device where the rescue call request includes rescue identification information corresponding to the rescue call device;
  • the 72nd module is used to match at least one device based on the rescue call request Wearable rescue equipment;
  • the 73rd module used to send rescue instructions to the at least one wearable rescue device;
  • the 74th module used to receive unlocking sent by the at least one wearable rescue device based on the rescue instructions Request;
  • Seventh-five module for sending an unlocking instruction to the electronic rescue lock corresponding to the rescue device based on the unlocking request, so that the electronic rescue lock unlocks the corresponding entry door based on the unlocking instruction.
  • the seven-one module is configured to receive a rescue call request sent by a rescue call device corresponding to the network device, and the rescue call request includes rescue identification information corresponding to the rescue call device.
  • the rescue identification information includes, but is not limited to, device identification information (for example, device serial number, MAC address of the device).
  • the rescue identification information is used for the network device to identify the rescue device, and to determine the identity of the caller based on the rescue device. For example, the user pre-stores the user's use in the network device through registration. The mapping relationship between the rescue device and the user.
  • the network device can query and obtain the user’s identity information, medical history information, allergy related information, etc. based on the rescue device Related information provides reference for rescue; in other embodiments, the rescue identification information can be used to query the electronic rescue lock corresponding to the rescue device, for example, the rescue device and the electronic rescue lock corresponding to the rescue device are stored in the network device There is a mapping relationship between the rescue identification information of the distress call device and the electronic rescue lock, and the network device can query and obtain the electronic rescue lock corresponding to the distress device based on the rescue identification information of the distress device and the mapping relationship.
  • the 72 module is used to match at least one wearable rescue device based on the rescue call request.
  • the network device searches and matches at least one wearable rescue device located nearby for the rescuer corresponding to the rescue device based on the location information of the rescue device and the wearable rescue device.
  • the 73 module is used to send rescue instructions to the at least one wearable rescue device.
  • the network device notifies the rescuer corresponding to the wearable rescue device that there is an emergency that requires rescue by sending a rescue instruction to the wearable rescue device.
  • the 74th module is used to receive the unlock request sent by the at least one wearable rescue device based on the rescue instruction.
  • the wearable rescue device receiving the rescue instruction requests the network device to control the corresponding electronic rescue lock to unlock the entrance door of the caller by sending an unlock request to the network device.
  • the seventy-five module is configured to send an unlocking instruction to the electronic rescue lock corresponding to the calling device based on the unlocking request, so that the electronic rescue lock can unlock the corresponding entry door based on the unlocking instruction, for example, the network device is receiving After the unlock request sent by the wearable rescue device, the unlock instruction is sent to the corresponding electronic rescue lock.
  • the rescue instruction includes target location information corresponding to the rescue device, and the unlock request includes geographic location information of the wearable rescue device; the device further includes a seven-six module (not shown) , The seventy-six module is used to verify the unlock request based on the target location information and the geographic location information; the seventy-five module is used to: if the unlock request is verified, call the unlock request for help
  • the electronic rescue lock corresponding to the device sends an unlocking instruction for the electronic rescue lock to unlock the corresponding entry door based on the unlocking instruction, thereby providing a rescue channel for rescuers corresponding to the wearable rescue device.
  • the target location information is used to determine the current location of a rescue device
  • the geographic location information is used to determine the current location of a wearable rescue device, so that the network device can use the target location information and the The geographic location information determines whether the rescuer using the wearable rescue device has arrived at the rescue scene where the rescue device is located.
  • the network device determines that the target location information covers the geographic location information or the distance between the geographic location information and the target location information is less than a certain distance threshold, the network device passes the verification and sends an unlocking instruction to the corresponding electronic rescue lock To unlock the rescuer.
  • FIG. 22 shows a wearable rescue device terminal according to another embodiment of the present application, wherein the device includes an Bayi module and an Bayi module, and the Bayi module is used to receive corresponding information from the wearable rescue device.
  • a rescue instruction sent by a network device where the rescue instruction is sent by the network device based on a rescue call request sent by a rescue call device corresponding to the network device; the 82 module is used to detect a response trigger event Send an unlock request to the network device based on the rescue instruction, and the unlock request is used for the electronic rescue lock corresponding to the call for help device to unlock the corresponding entrance door, thereby providing the rescuer corresponding to the wearable rescue device Provide rescue channels.
  • the Bayi module is used to receive rescue instructions sent by the network device corresponding to the wearable rescue device, wherein the rescue instruction is sent by the network device based on the rescue device corresponding to the network device Sent for rescue calls.
  • the network device matches at least one wearable rescue device based on the received rescue call request (for example, the network device queries the at least one wearable rescue device currently in the vicinity of the rescue device based on the acquired current location of the rescue device). Rescue equipment), and send rescue instructions to the wearable rescue equipment to notify rescuers using the wearable rescue equipment that there is a rescue mission.
  • the 82nd module is configured to send an unlocking request to the network device based on the rescue instruction if a response trigger event is detected, and the unlocking request is used for the electronic rescue lock corresponding to the calling device to unlock the corresponding entry door,
  • rescue channels are provided for rescuers corresponding to the wearable rescue equipment.
  • the response trigger event includes, but is not limited to, the relevant operation of the corresponding rescuer (for example, pressing a certain button), the arrival of the wearable rescue device at a certain place (for example, the wearable rescue device and the target location The distance of the information is less than the preset distance threshold). Further, the wearable rescue device sends an unlock request to the corresponding network device based on the received rescue instruction.
  • the unlock request includes geographic location information of the wearable rescue device. In some embodiments, the unlock request includes the geographic location information of the wearable rescue device. For example, the wearable rescue device obtains its current geographic location information based on GPS positioning, and sends the geographic location information to the corresponding The network device for the corresponding network device to determine based on the geographic location information that the rescuer corresponding to the wearable rescue device has arrived at the rescue site; in the case of determining that the rescuer has arrived at the rescue site, the network device sends the corresponding request based on the unlock request The electronic rescue lock sends an unlocking instruction for the electronic rescue lock to unlock the corresponding entry door based on the unlocking instruction, thereby providing rescue channels for rescuers.
  • the present application also provides a computer-readable storage medium that stores computer code, and when the computer code is executed, the method described in any of the preceding items is executed.
  • the present application also provides a computer program product.
  • the computer program product is executed by a computer device, the method described in any of the preceding items is executed.
  • This application also provides a computer device, which includes:
  • One or more processors are One or more processors;
  • Memory used to store one or more computer programs
  • the one or more processors When the one or more computer programs are executed by the one or more processors, the one or more processors are caused to implement the method as described in any one of the preceding items.
  • Figure 23 shows an exemplary system that can be used to implement the various embodiments described in this application.
  • the system 1000 can be used as any network device, wearable detection device or wearable rescue device in each of the described embodiments.
  • the system 1000 may include one or more computer-readable media with instructions (for example, system memory or NVM/storage device 1020) and be coupled with the one or more computer-readable media and configured to execute
  • the instructions are one or more processors (for example, the processor(s) 1005) that implement modules to perform the actions described in this application.
  • system control module 1010 may include any suitable interface controller to provide at least one of the processor(s) 1005 and/or any suitable device or component in communication with the system control module 1010 Any appropriate interface.
  • the system control module 1010 may include a memory controller module 1030 to provide an interface to the system memory 1015.
  • the memory controller module 1030 may be a hardware module, a software module, and/or a firmware module.
  • the system memory 1015 may be used to load and store data and/or instructions for the system 1000, for example.
  • the system memory 1015 may include any suitable volatile memory, such as a suitable DRAM.
  • the system memory 1015 may include a double data rate type quad synchronous dynamic random access memory (DDR4 SDRAM).
  • DDR4 SDRAM double data rate type quad synchronous dynamic random access memory
  • system control module 1010 may include one or more input/output (I/O) controllers to provide interfaces to the NVM/storage device 1020 and the communication interface(s) 1025.
  • I/O input/output
  • NVM/storage device 1020 may be used to store data and/or instructions.
  • NVM/storage device 1020 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard drives ( Hard Disk, HDD), one or more compact disc (CD) drives and/or one or more digital versatile disc (DVD) drives).
  • suitable non-volatile memory e.g., flash memory
  • suitable non-volatile storage device(s) e.g., one or more hard drives ( Hard Disk, HDD), one or more compact disc (CD) drives and/or one or more digital versatile disc (DVD) drives).
  • the NVM/storage device 1020 may include storage resources that are physically part of the device on which the system 1000 is installed, or it may be accessed by the device without necessarily being part of the device.
  • the NVM/storage device 1020 can be accessed via the communication interface(s) 1025 through the network.
  • the communication interface(s) 1025 may provide an interface for the system 1000 to communicate through one or more networks and/or with any other suitable devices.
  • the system 1000 can wirelessly communicate with one or more components of the wireless network according to any of one or more wireless network standards and/or protocols.
  • At least one of the processor(s) 1005 may be packaged with the logic of one or more controllers of the system control module 1010 (eg, the memory controller module 1030). For one embodiment, at least one of the processor(s) 1005 may be packaged with the logic of one or more controllers of the system control module 1010 to form a system in package (SiP). For one embodiment, at least one of the processor(s) 1005 may be integrated with the logic of one or more controllers of the system control module 1010 on the same mold. For one embodiment, at least one of the processor(s) 1005 may be integrated with the logic of one or more controllers of the system control module 1010 on the same mold to form a system on chip (SoC).
  • SoC system on chip
  • the system 1000 may be, but is not limited to, a server, a workstation, a desktop computing device, or a mobile computing device (for example, a laptop computing device, a handheld computing device, a tablet computer, a netbook, etc.).
  • the system 1000 may have more or fewer components and/or different architectures.
  • the system 1000 includes one or more cameras, keyboards, liquid crystal display (LCD) screens (including touchscreen displays), non-volatile memory ports, multiple antennas, graphics chips, application specific integrated circuits ( ASIC) and speakers.
  • LCD liquid crystal display
  • ASIC application specific integrated circuits
  • this application can be implemented in software and/or a combination of software and hardware, for example, it can be implemented by an application specific integrated circuit (ASIC), a general purpose computer or any other similar hardware device.
  • the software program of the present application may be executed by a processor to realize the steps or functions described above.
  • the software program (including related data structure) of the present application can be stored in a computer-readable recording medium, such as RAM memory, magnetic or optical drive or floppy disk and similar devices.
  • some steps or functions of the present application may be implemented by hardware, for example, as a circuit that cooperates with a processor to execute each step or function.
  • the computer program instructions in the computer-readable medium include but are not limited to source files, executable files, installation package files, etc.
  • the manner in which computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction before executing the corresponding post-installation program.
  • the computer-readable medium may be any available computer-readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media by which communication signals containing, for example, computer-readable instructions, data structures, program modules, or other data are transmitted from one system to another system.
  • Communication media can include conductive transmission media (such as cables and wires (for example, optical fiber, coaxial, etc.)) and wireless (unguided transmission) media that can propagate energy waves, such as sound, electromagnetic, RF, microwave, and infrared .
  • Computer readable instructions, data structures, program modules or other data may be embodied as, for example, a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology.
  • modulated data signal refers to a signal whose one or more characteristics have been altered or set in such a way as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • a computer-readable storage medium may include volatile, non-volatile, nonvolatile, and nonvolatile, and may be implemented in any method or technology for storing information such as computer-readable instructions, data structures, program modules, or other data. Removable and non-removable media.
  • computer-readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and non-volatile memory, such as flash memory, various read-only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or future developments that can be stored for computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM
  • non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or future developments that can be stored for computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM,
  • an embodiment according to the present application includes a device including a memory for storing computer program instructions and a processor for executing the program instructions, wherein, when the computer program instructions are executed by the processor, trigger
  • the operation of the device is based on the aforementioned methods and/or technical solutions according to multiple embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)

Abstract

一种救援方法与设备,方法包括:网络设备接收网络设备对应的呼救设备所发送的救援呼叫请求,救援呼叫请求包括与呼救设备相对应的救援识别信息(S101);网络设备基于救援呼叫请求匹配至少一台可穿戴救援设备(S102);网络设备向至少一台可穿戴救援设备发送救援指令,救援指令包括基于救援识别信息确定的救援验证信息(S103)。通过救援方法可避免因救援人员无法顺利入户而耽误救援的情况,从而为救援节约时间,提高救援的成功率。

Description

一种救援方法与设备 技术领域
本申请涉及救援领域,尤其涉及一种用于救援的技术。
背景技术
在现代生活中,独居人口越来越多,其中,独居人口不只包括老人,还有很多年轻人也是独居人口。当一个人在家时,一旦发生身体突发不适或者其他意外突发情况,很可能会因为来不及开门而耽误救援人员入户实施救援,从而影响到救援的成功率。
发明内容
本申请的一个目的是提供一种救援方法与设备。
根据本申请的一个方面,提供了一种在网络设备端的救援方法,该方法包括:
接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
基于所述救援呼叫请求匹配至少一台可穿戴救援设备;
向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;
其中,所述救援验证信息用于供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的另一个方面,提供了一种在呼救设备端的救援方法,该方法包括:
基于检测到的救援事件生成相应的救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
向所述呼救设备对应的网络设备发送救援呼叫请求;
其中所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信 息用于对至少一台可穿戴救援设备进行开锁验证,所述呼救设备对应的电子救援锁在验证通过后解锁相应的进户门。
根据本申请的又一个方面,提供了一种在可穿戴救援设备端的救援方法,其中,该方法包括:
接收所述可穿戴救援设备对应的网络设备所发送的救援指令,所述救援指令包括救援验证信息;
将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;
其中所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的又一个方面,提供了一种在电子救援锁端的救援方法,其中,该方法包括:
获取所述电子救援锁对应的可穿戴救援设备提供的救援验证信息;
基于所述救援验证信息进行开锁验证;
若验证通过,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的又一个方面,提供了一种在网络设备端的救援方法,其中,该方法包括:
接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;
接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的;
基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息;
若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的又一个方面,提供了一种在电子救援锁端的救援方法,其中,该方法包括:
现场采集关于现场人员的待验证信息;
将所述待验证信息发送至所述电子救援锁对应的网络设备;
基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的又一个方面,提供了一种在网络设备端的救援方法,其中,所述方法包括:
接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
基于所述救援呼叫请求匹配至少一台可穿戴救援设备;
向所述至少一台可穿戴救援设备发送救援指令;
接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求;
基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
根据本申请的又一个方面,提供了一种在可穿戴救援设备端的救援方法,其中,所述方法包括:
接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的;
若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的一个方面,提供了一种救援设备,该设备包括:
一一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
一二模块,用于基于所述救援呼叫请求匹配至少一台可穿戴救援设备;
一三模块,用于向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;
其中,所述救援验证信息用于供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门。
根据本申请的另一个方面,提供了一种呼救设备,其中,该设备包括:
二一模块,用于基于检测到的救援事件生成相应的救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
二二模块,用于向所述呼救设备对应的网络设备发送救援呼叫请求;
其中所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于对至少一台可穿戴救援设备进行开锁验证,所述呼救设备对应的电子救援锁在验证通过后解锁相应的进户门。
根据本申请的又一个方面,提供了一种可穿戴救援设备,其中,该设备包括:
三一模块,用于接收所述可穿戴救援设备对应的网络设备所发送的救援指令,所述救援指令包括救援验证信息;
三二模块,用于将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;
其中所述电子救援锁在验证通过后解锁相应的进户门。
根据本申请的又一个方面,提供了一种电子救援锁,其中,该设备包括:
四一模块,用于获取所述电子救援锁对应的可穿戴救援设备提供的救援验证信息;
四二模块,用于基于所述救援验证信息进行开锁验证;
四三模块,用于若验证通过,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的又一个方面,提供了一种救援设备,其中,该设备包括:
五一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
五二模块,用于基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;
五三模块,用于接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的;
五四模块,用于基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应 的现场人员的救援权限信息;
五五模块,用于若所述救援信息包括有权,向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
根据本申请的又一个方面,提供了一种电子救援锁,其中,该设备包括:
六一模块,用于现场采集关于现场人员的待验证信息;
六二模块,用于将所述待验证信息发送至所述电子救援锁对应的网络设备;
六三模块,用于基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的又一个方面,提供了一种网络设备,其中,所述设备包括:
七一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
七二模块,用于基于所述救援呼叫请求匹配至少一台可穿戴救援设备;
七三模块,用于向所述至少一台可穿戴救援设备发送救援指令;
七四模块,用于接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求;
七五模块,用于基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
根据本申请的又一个方面,提供了一种可穿戴救援设备,其中,所述设备包括:
八一模块,用于接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的;
八二模块,用于若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的一个方面,提供了一种救援方法,该方法包括:
呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令;
所述可穿戴救援设备接收所述救援指令,并将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;
所述电子救援锁获取所述救援验证信息,并基于所述救援验证信息进行开锁验证,若验证通过,所述电子救援锁控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
根据本申请的另一个方面,提供了一种救援方法,该方法包括:
呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;
电子救援锁现场采集关于现场人员的待验证信息,将所述待验证信息发送至所述网络设备;
所述网络设备接收所述待验证信息,基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息,若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令;
所述救援电子锁基于所述开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门。
根据本申请的又一个方面,提供了一种救援方法,该方法包括:
呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令;
所述可穿戴救援设备接收所述救援指令,若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求;
所述网络设备接收所述开锁请求,基于所述开锁请求向所述呼救设备对应的电子救援 锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
根据本申请的一个方面,提供了一种救援设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述任一方法的操作。
根据本申请的另一个方面,提供了存储指令的计算机可读介质,所述指令在被执行时使得系统进行如上所述任一方法的操作。
与现有技术相比,本申请通过根据呼救设备所发送的救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令,从而通知使用该可穿戴救援设备的救援人员到救援现场实施救援;进一步地,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息,根据该救援识别信息确定的救援验证信息,从而支持基于该救援验证信息,供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。本申请能避免因救援人员无法顺利入户而耽误救援,从而为救援节约时间,提高救援的成功率。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种救援方法的系统拓扑图;
图2示出根据本申请一个实施例的一种救援方法的流程图;
图3示出根据本申请另一个实施例的一种救援方法的系统拓扑图;
图4示出根据本申请另一个实施例的一种救援方法的流程图;
图5示出根据本申请又一个实施例的一种救援方法的系统拓扑图;
图6示出根据本申请又一个实施例的一种救援方法的流程图;
图7示出根据本申请一个实施例的一种在网络设备端的救援方法的方法流程图;
图8示出根据本申请一个实施例的一种在呼救设备端的救援方法的方法流程图;
图9示出根据本申请一个实施例的一种在可穿戴救援设备端的救援方法的方法流程图;
图10示出根据本申请一个实施例的一种在电子救援锁端的救援方法的方法流程图;
图11示出根据本申请另一个实施例的一种在网络设备端的救援方法的方法流程图;
图12示出根据本申请另一个实施例的一种在电子救援锁端的救援方法的方法流程图;
图13示出根据本申请又一个实施例的一种在电子救援锁端的救援方法的方法流程图;
图14示出根据本申请又一个实施例的一种在可穿戴救援设备端的救援方法的方法流程图;
图15示出根据本申请一个实施例的一种网络设备的设备模块图;
图16示出根据本申请一个实施例的一种呼救设备的设备模块图;
图17示出根据本申请一个实施例的一种可穿戴救援设备的设备模块图;
图18示出根据本申请一个实施例的一种电子救援锁的设备模块图;
图19示出根据本申请另一个实施例的一种网络设备的设备模块图;
图20示出根据本申请另一个实施例的一种电子救援锁的设备模块图;
图21示出根据本申请又一个实施例的一种网络设备的设备模块图;
图22示出根据本申请又一个实施例的一种可穿戴救援设备的设备模块图;
图23示出可被用于实施本申请中所述的各个实施例的示例性系统。
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(例如,中央处理器(Central Processing Unit,CPU))、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(Random Access Memory,RAM)和/或非易失性内存等形式,如只读存储器(Read Only Memory,ROM)或闪存(Flash Memory)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(Phase-Change Memory,PCM)、可编程随机存取存储器(Programmable Random Access Memory,PRAM)、静态随机存取存储器(Static Random-Access Memory,SRAM)、动态随机存取存储器(Dynamic Random Access Memory,DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能光盘(Digital Versatile Disc,DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件(Programmable Logic Device,PLD)、现场可编程门阵列(Field Programmable Gate Array,FPGA)、数字信号处理器(Digital Signal Processor,DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过 网络相集成所构成的设备上的程序。
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。
本申请各实施例所指的可穿戴救援设备为一种硬件设备,可为包括但不限于智能头盔、智能眼镜或其他硬件设备,其可直接穿戴于用户身上或整合于用户的衣服或其他配件中,并可选地具备与其他设备(例如,包括但不限于同一用户的其他用户设备,或其他用户的用户设备、云端服务器等网络设备,或智能门锁,等)进行通信的能力。在一些实施例中,以上所述的其他硬件设备,包括但不限于救援人员手持的、或者通过绑带、支架等固定于救援人员的上臂、躯干或其他位置的用户设备,该用户设备包括但不限于手机、平板电脑、PDA等。事实上,本申请的各实施例基于上述可穿戴救援设备实施,但本申请并不限于此。本领域技术人员应能理解,具有通信模块并能够与其他设备(例如云端服务器等网络设备)通信的智能电子通信设备均可用于实施本申请,在此以引用的方式包含于此。
根据本申请的一个方面,提供了一种用于实施救援方法的系统。参考图1,该系统包括网络设备、呼救设备、可穿戴救援设备以及电子救援锁,在一些实施例中,呼救设备与网络设备之间、可穿戴救援设备与网络设备之间、可穿戴救援设备与电子救援锁之间通过相应的通信连接(例如,以有线或者无线等的方式建立的通信连接)进行信息、指令等的传递。在一些实施例中,呼救者通过呼救设备向对应的网络设备发送救援呼叫请求;在一些实施例中,呼救者手动触发该呼救设备上的呼救按钮向对应的网络设备发送救援呼叫请求;在另一些实施例中,该呼救设备自动向对应的网络设备发送救援呼叫请求,例如,该呼救设备为设置有重力传感器、电子陀螺仪等的智能手环(该智能手环设置有通信模块,以向网络设备发送信息),呼救者佩戴该智能手环,若该智能手环通过其传感器检测到佩戴该智能手环的用户突然晕倒,则该智能手环向对应的网络设备发送救援呼叫请求。所述呼救设备包括但不限于用户设备、智能监测设备(例如,智能手环或其他可穿戴电子设备),在一些实施例中,所述用户设备包括但不限于手机、平板、笔记本电脑等计算设备。在一些实施例中,所述可穿戴救援设备包括但不限于智能眼镜、智能头盔等,所述可穿戴救援设备可选地包括蓝牙定位模块、 网络通信模块等。所述可穿戴救援设备设置有通信模块,用于与所述网络设备间进行通信连接。在一些实施例中,所述电子救援锁包括通信模块(用于接收信息、指令)、执行机构(用于基于接收到的信息或者指令执行对应的操作,例如解锁或锁定安装有该电子救援锁的进户门、房间门)。当有紧急救援情况发生,但是呼救者不能及时地为救援人员开门时,该电子救援锁基于接收到的信息或者指令对相应的进户门执行解锁操作,为救援人员提供畅通的救援道路,节省救援时间。
在一些实施例中,基于上述系统,本申请还公开了一种救援方法。参考图2,所述救援方法包括:呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令;所述可穿戴救援设备接收所述救援指令,并将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;所述电子救援锁获取所述救援验证信息,并基于所述救援验证信息进行开锁验证,若验证通过,所述电子救援锁控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述救援事件用于触发所述救援方法,例如,所述呼救设备包括一物理按钮,该物理按钮供用户在需要呼叫救援时按下,而该呼救设备通过检测该物理按钮是否按下,以检测是否发生救援事件;又例如,该呼救设备设有重力传感器,所述救援事件为该呼救设备通过该重力传感器监测到的佩戴者跌倒的事件。在一些实施例中,所述救援识别信息用于识别对应的呼救设备,以识别呼救者的身份信息,所述救援识别信息在一些实施例中包括但不限于设备标识信息。例如,网络设备中预注册有多个呼救设备的设备标识信息,每个呼救设备的设备标识信息与注册用户的身份信息存在映射关系,基于该映射关系,通过该设备标识信息即可确定对应的呼救者的身份信息。在一些实施例中,所述救援验证信息包括但不限于临时密码。在一些实施例中,所述救援验证信息是基于呼救设备的救援识别信息生成的,例如,通过加密算法将该救援识别信息进行加密处理。例如,呼救者佩戴有带有重力传感器、电子陀螺仪等传感器的呼救设备,在该呼救者突然晕倒时,呼救设备通过这些传感器检测到相应的数据信息,从而检测到相应的救援事件,该呼救设备自动向对应的网络设备发送救援呼叫 请求,其中,该救援呼叫请求中包括该呼救设备的救援识别信息(例如,该救援设备的设备标识号),在一些实施例中,将该救援识别信息作为救援验证信息;在另一些实施例中,将该救援识别信息经过加密处理后得到相应的救援验证信息。该网络设备接收该救援呼叫请求,并基于该救援呼叫请求为该呼救者匹配至少一台可穿戴救援设备,例如,网络设备根据呼救者的位置信息为该呼救者查找附近的至少一台可穿戴救援设备,并向该可穿戴救援设备发送救援指令,其中,该救援指令中包括救援验证信息。救援者佩戴该可穿戴救援设备到达呼救者所在的门户,该门户所使用的电子救援锁对该可穿戴救援设备接收到的救援验证信息进行验证,若验证通过,则电子救援锁控制其执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在呼救者没有办法或者来不及为前来救援的救援人员开门的情况下,也可以顺利的为救援人员开门,不会耽误救援时间,提高了救援效率。
在一些实施例中,基于上述系统,本申请还公开了一种救援方法。参考图6,所述救援方法包括:呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令;所述可穿戴救援设备接收所述救援指令,若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求;所述网络设备接收所述开锁请求,基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
以下分别从上述网络设备、呼救设备、可穿戴救援设备以及电子救援锁四个方面,详细描述以上所述方法的具体实施方式。
图7示出了根据本申请一个方面的一种在网络设备端的救援方法,其中,所述方法包括步骤S101、步骤S102以及步骤S103。在步骤S101中,网络设备接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;在步骤S102中,网络设备基于所述救援呼叫请求匹配至少一台可穿戴救援设备;在步骤S103中,网络设备向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;其中,所述救援验证信息用于供 所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门。所述可穿戴救援设备可为包括但不限于带有蓝牙定位以及网络通信模块的电子产品(例如,救援头盔、智能眼镜等)。在一些实施例中,所述可穿戴救援设备用于接收网络设备发送的救援指令,以通知救援人员当前有救援事件发生。
具体而言,在步骤S101中,网络设备接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息。在一些实施例中,所述救援识别信息包括但不限于设备标识信息(例如,设备序列号、设备的MAC地址)。在一些实施例中,所述救援识别信息用于识别所述呼救设备,从而基于该呼救设备确定呼救者的身份,例如,用户通过注册的方式在网络设备中预先存储该用户所使用的呼救设备与该用户间的映射关系,当该用户通过该呼救设备向网络设备发送救援呼叫请求时,网络设备基于该呼救设备即可查询获得该用户的身份信息、病史信息、过敏相关信息等相关信息,为救援提供参考;在另一些实施例中,通过该救援识别信息可查询到该呼救设备对应的电子救援锁,例如,网络设备中记录有已注册的呼救设备(例如,记录该呼救设备的设备标识信息)以及该呼救设备对应的电子救援锁(例如,该电子救援锁的设备标识信息),该呼救设备的救援识别信息与该电子救援锁之间存在映射关系,网络设备通过该呼救设备的救援标识信息可查询获得该呼救设备对应的电子救援锁。
在步骤S102中,网络设备基于所述救援呼叫请求匹配至少一台可穿戴救援设备。在一些实施例中,网络设备基于呼救设备以及可穿戴救援设备的位置信息,为该呼救设备对应的呼救者查询匹配位于其附近的至少一台可穿戴救援设备。
在步骤S103中,网络设备向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;其中,所述救援验证信息用于供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门。在一些实施例中,所述待验证信息是基于该救援识别信息查询获得的,例如,用户在对呼救设备进行注册时,网络设备即对该呼救设备对应的救援识别信息进行了处理(例如,基于一定的算法将该救援识别信息转换成对应的救援验证信息),或者网络设备为每个呼救设备对应的救援识别信息创建待验证信息,当该呼救设备向该网络设备发送救援呼叫请求时,该网络设备基于该呼救设备对应的救援识别信息查询对应的待验证信息,并将该待验证信息发送给该可穿戴救援设备。进一步地,在一些实施例中, 该可穿戴救援设备对应的救援人员通过操作或者基于该可穿戴救援设备与对应的电子救援锁间的通讯连接将该救援验证信息发送给该电子救援锁,以供该电子救援锁对该救援验证信息进行验证,例如电子救援锁也存储有与上述待验证信息相同的信息,并以比对的方式对上述待验证信息进行验证,若比对一致则验证通过,电子救援锁执行开锁操作。
在一些实施例中,所述方法还包括步骤S104(未示出),在步骤S104中,网络设备向所述呼救设备对应的电子救援锁发送验证指令,其中所述验证指令包括基于所述救援识别信息确定的待验证信息。在一些实施例中,为了进一步增加验证开锁的安全性,网络设备通过向该呼救设备对应的电子救援锁发送验证指令来触发该电子救援锁进行验证开锁的工作;相应地,电子救援锁仅在收到该指令后才会对执行验证开锁的操作,而不会在无需救援时响应不法分子发送至电子救援锁的验证请求,以增强安全性。在一些实施例中,所述待验证信息是基于该救援识别信息查询获得的,例如,用户在对呼救设备进行注册时,网络设备即对该呼救设备对应的救援识别信息进行了处理(例如,基于一定的算法将该救援识别信息转换成对应的救援验证信息),或者网络设备为每个呼救设备对应的救援识别信息创建待验证信息,当该呼救设备向该网络设备发送救援呼叫请求时,该网络设备基于该呼救设备对应的救援识别信息查询对应的待验证信息,并将该待验证信息发送给该呼救设备对应的电子救援锁。在一些实施例中,该电子救援锁基于该待验证信息对其接收的救援验证信息进行验证,例如,该网络设备向该可穿戴救援设备以及该电子救援锁发送的救援验证信息以及待验证信息相同,该电子救援锁基于该待验证信息对该救援验证信息进行,例如电子救援锁也存储有与上述待验证信息相同的信息,并以比对的方式对上述待验证信息进行验证,若比对一致则验证通过,电子救援锁执行开锁操作。
在一些实施例中,在步骤S104中,网络设备基于所述救援识别信息生成对应的待验证信息,并向所述呼救设备对应的电子救援锁发送验证指令,其中所述验证指令包括所述待验证信息;在所述步骤S103中,网络设备基于所述救援识别信息生成对应的救援验证信息,并向所述至少一台可穿戴救援设备发送救援指令,其中所述救援指令包括所述救援验证信息。其中,所述待验证信息和所述救援验证信息基于同一生成算法生成,在一些实施例中,所述待验证信息和所述救援验证信息分别被发送至电子救援锁和救援人员所佩戴的可穿戴救援设备。在一些实施例中,所述待验证信息是网络设备基于救援识别信息查询确定所得的;在另一些实施例中,所述待验证信息是基于预设的算法(例如,加密算法) 对所述救援识别信息进行处理得到的。例如,网络设备基于一定的算法对呼救请求中的救援识别信息进行加密处理,以生成救援验证信息和待验证信息,并将该救援验证信息发送给可穿戴救援设备,将该待验证信息发送给该呼救设备对应的电子救援锁;在救援人员到达现场后,该可穿戴救援设备向该电子救援锁发送该救援验证信息,以供该电子救援锁基于该待验证信息对该救援验证信息进行验证,例如当该救援验证信息与该待验证信息相匹配时验证通过,该电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述算法包括但不限于DES加密算法、AES加密算法、RSA加密算法等加密算法;在一个典型场景下,该算法用于根据呼救用户的呼救设备的标识信息或者呼救用户的身份信息生成上述待验证信息和救援验证信息,以供电子救援锁基于该待验证信息和救援验证信息对可穿戴救援设备及救援人员进行合法性验证,并在验证通过时开门。当然,本领域技术人员应能理解,以上所述算法操作仅为举例且不限于加密算法,其他现有的或今后可能出现的算法操作如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。
在一些实施例中,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息用于合成目标语音,所述电子救援锁基于所述目标语音对所述可穿戴救援设备进行开锁验证。在一些实施例中,为了进一步增加验证开锁的安全性,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息包括但不限于特征音调、音色、声纹等语音特征信息。该网络设备通过所述目标特征语音信息合成目标语音,并将该目标语音发送给可穿戴救援设备,以供该可穿戴救援设备播放该目标语音;该电子救援锁采集该目标语音并识别该目标语音中的语音特征信息,再基于识别出的语音特征信息进行开锁验证。
图8示出了根据本申请另一个方面的一种在呼救设备端的救援方法,其中,所述方法包括步骤S201以及步骤S202。在步骤S201中,呼救设备基于检测到的救援事件生成相应的救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;在步骤S202中,向所述呼救设备对应的网络设备发送救援呼叫请求;其中所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于对至少一台可穿戴救援设备进行开锁验证,所述呼救设备对应的电子救援锁在验证通过后解锁相应的进户门。所述呼救设备包括但不限于手机、智能监测设备(例如,设置有各类传感器,包括但不限于重力传感器、电子陀螺仪、心率监测模块等,的智能手环)等。例如,所述呼救设备 为设置有重力传感器的智能手环,在该呼救者突然晕倒时,呼救设备通过这些传感器检测到相应的数据信息,从而检测到相应的救援事件,该呼救设备自动向对应的网络设备发送救援呼叫请求。当然,本领域技术人员应能理解,以上所述的救援事件仅为举例,其他现有的或今后可能出现的救援事件如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。例如,所述呼救设备为包括心率监测模块的智能手环,当该智能手环检测到佩戴者的心率处于非正常范围时,则向对应的网络设备发送救援呼叫请求。在一些实施例中,所述呼救设备包括重力传感器以及心率监测模块,在该呼救者突然晕倒时,呼救设备通过这些传感器检测到相应的数据信息,从而检测到相应的救援事件,该呼救设备自动向对应的网络设备发送救援呼叫请求。在一些实施例中,所述救援验证信息用于所述呼救设备对应的电子救援锁对至少一台可穿戴救援设备进行开锁验证,例如,网络设备将救援验证信息发送给可穿戴救援设备,将待验证信息发送给电子救援锁,其中,所述救援验证信息和所述待验证信息是基于同一生成算法生成的,救援人员到达救援现场后,通过其佩戴的可穿戴救援设备向电子救援锁发送该救援验证信息,该电子救援锁对该救援验证信息进行验证,若该救援验证信息与其接收的待验证信息相同,则验证通过;在另一些实施例中,所述救援验证信息用于所述网络设备对至少一台可穿戴救援设备进行开锁验证,例如,救援人员到达救援现场后,通过其佩戴的可穿戴救援设备向网络设备发送救援验证信息,网络设备接收并验证该救援验证信息,若该救援验证信息与该网络设备发送给该可穿戴救援设备的救援验证信息相同,则验证通过,该网络设备向对应的电子救援锁发送开锁指令,该电子救援锁基于该开锁指令解锁相应的进户门。
在一些实施例中,所述救援识别信息包括以下至少任一项:
所述呼救设备的呼救设备标识信息。例如,所述救援识别信息包括所述呼救设备的呼救设备标识信息。在一些实施例中,所述呼救设备标识信息包括但不限于设备序列号、设备的MAC地址。呼救设备将其对应的呼救设备标识信息发送给网络设备,以便该网络设备基于该呼救设备标识信息查询该呼救设备对应的相关信息(例如,救援验证信息、对应的呼救用户的身份信息等)。
所述呼救设备对应的呼救用户的呼救用户标识信息。例如,所述救援识别信息包括所述呼救设备对应的呼救用户的呼救用户标识信息。在一些实施例中,所述呼救用户标识信 息包括但不限于呼救用户的姓名、身份证号等,网络设备基于该呼救用户标识信息查询对应的呼救设备。
当然,本领域技术人员应能理解,以上所述的救援识别信息仅为举例,其他现有的或今后可能出现的救援识别信息如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。
在一些实施例中,所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于供所述呼救设备对应的电子救援锁对至少一台可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述网络设备中存储有多个救援识别信息以及每个救援识别信息对应的救援验证信息,网络设备基于呼救设备对应的救援识别信息查询该救援识别信息对应的救援验证信息,并将该救援验证信息发送给匹配出的至少一个可穿戴救援设备(例如网络设备根据呼救用户的实时位置,匹配与其距离最近的救援人员,或者匹配与呼救用户的距离小于某个距离阈值的若干个救援人员)。救援人员佩戴该可穿戴救援设备到达救援现场后,通过该可穿戴救援设备向电子救援锁发送该救援验证信息。该电子救援锁对该救援验证信息进行验证,若验证通过,则解锁相应的进户门,为该救援人员开门。
图9示出了根据本申请另一个方面的一种在可穿戴救援设备端的救援方法,其中,所述方法包括步骤S301以及步骤S302。在步骤S301中,可穿戴救援设备接收所述可穿戴救援设备对应的网络设备所发送的救援指令,所述救援指令包括救援验证信息;在步骤S302中,可穿戴救援设备将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;其中所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,网络设备基于接收到的救援呼叫请求匹配至少一台可穿戴救援设备(例如,网络设备基于获取到的呼救设备的当前位置查询当前处于该呼救设备附近的至少一台可穿戴救援设备),并向该可穿戴救援设备发送救援指令,以通知使用该可穿戴救援设备的救援人员当前有救援任务。在一些实施例中,所述救援指令包括救援验证信息。在一些实施例中,所述救援验证信息包括救援识别信息,例如,该救援人员在对应的电子救援锁上输入该救援验证信息,该电子救援锁对该救援验证信息进 行验证;在另一些实施例中,所述救援验证信息包括目标语音特征信息,例如,该可穿戴救援设备播放包含该目标语音特征信息的待验证语音,该电子救援锁识别并验证该待验证语音;在另一些实施例中,救援人员佩戴该可穿戴救援设备到达进户门前,该可穿戴救援设备与该进户门上的电子救援锁自动或者基于该救援人员的操作建立通信连接(例如,蓝牙连接),所述可穿戴救援设备基于该通信连接向对应的电子救援锁发送该救援验证信息,以供电子救援锁对该救援验证信息进行验证。
在一些实施例中,所述步骤302包括:可穿戴救援设备建立所述可穿戴救援设备对应的电子救援锁与所述可穿戴救援设备之间的通信连接;通过所述通信连接将所述救援验证信息发送至所述可穿戴救援设备对应的电子救援锁,以通过所述电子救援锁进行开锁验证。在一些实施例中,可穿戴救援设备与电子救援锁均设置有通信模块(例如,蓝牙模块、NFC模块)。在一些实施例中,救援人员佩戴可穿戴救援设备到达救援现场后,该可穿戴救援设备与该电子救援锁自动建立通信连接;在另一些实施例中,救援人员佩戴可穿戴救援设备到达救援现场后,通过手动操作用该可穿戴救援设备向该电子救援锁发送通信连接请求,该电子救援锁基于该通信连接请求与该可穿戴救援设备建立通信连接。该可穿戴救援设备通过该通信连接将救援验证信息发送给该电子救援锁,以供该电子救援锁进行开锁验证。
在一些实施例中,所述救援验证信息包括目标语音特征信息;所述步骤302包括:可穿戴救援设备基于所述救援验证信息,响应于所述可穿戴救援设备对应的救援人员的播放操作,播放待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。在一些实施例中,所述目标语音特征信息包括但不限于音色、音调、声纹等特征信息。网络设备将包括该目标语音特征信息的救援验证信息发送给该可穿戴救援设备,在一些实施例中,该可穿戴救援设备在接收到该救援验证信息时会发出提示音,以提示对应的救援人员“已收到救援验证信息,当前可进行验证”,该救援人员对该可穿戴救援设备进行播放操作;该可穿戴救援设备基于该播放操作生成对应的待验证语音,并播放该待验证语音,以供对应的电子救援锁进行语音验证。对应的电子救援锁采集该待验证语音后对其进行解析处理,若识别到目标语音特征信息,则解锁以便救援人员顺利进入进户门对呼救者实施救援。救援人员到达救援现场后,操作其所使用的可穿戴救援设备播放待验证语音,对应的电子救援锁现场采集该待验证语音,可保证救援人员已经到达现场,而不是在救援人员还没有到达现场时就进行开锁操作,以提高解锁进户门的安全性。
在一些实施例中,所述步骤302包括:可穿戴救援设备响应于所述可穿戴救援设备对应的救援人员的播放操作,基于所述目标语音特征信息生成待验证语音,并播放所述待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。在一些实施例中,救援人员对可穿戴救援设备进行播放操作,该可穿戴救援设备基于该播放操作将其接收到的目标语音特征信息生成待验证语音。例如,该可穿戴救援设备内置一段音频,在接收到目标语音特征信息(例如,特征音色或者特征声纹)后,通过特定的频谱特征调整而基于该音频合成含有该目标语音特征信息的待验证语音,并播放该待验证语音。在一些实施例中,对应的电子救援锁基于内置的麦克风模块采集该可穿戴救援设备播放的待验证语音,并检测识别待验证语音中的待验证信息(即上述语音特征信息)。在一些实施例中,网络设备事先已将该目标语音特征信息发送给该电子救援锁,以供该电子救援锁进行验证,若该可穿戴救援设备播放的该待验证语音中含有该目标语音特征信息,则验证通过,该电子救援锁进行解锁操作,以便救援人员及时进入门户实施救援。通过该可穿戴救援设备现场生成含有该目标语音特征信息的待验证语音,可保证到达救援现场的人员的救援身份,例如,只有佩戴了该可穿戴救援设备的救援人员才能进行语音解锁,进一步增加了开锁的安全性。
在一些实施例中,所述步骤302包括步骤S3021(未示出)、步骤S3022以及步骤S3023。在步骤S3021中,可穿戴救援设备采集对应的救援人员的实时语音;在步骤S3022中,可穿戴救援设备基于所述目标语音特征信息,对所述实时语音执行转换操作以生成待验证语音;在步骤S3023中,可穿戴救援设备响应于所述救援人员的播放操作,播放所述待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。在一些实施例中,可穿戴救援设备内置一段音频,该音频用于根据可穿戴救援设备现场接收到的目标语音特征信息合成包含目标语音特征信息的待验证语音;在另一些实施例中,该可穿戴救援设备通过现场采集救援人员的实时语音来生成包含该目标语音特征信息的待验证语音,例如,该可穿戴救援设备中内置语音转换模块,在接收到目标语音特征信息(例如,特征音色或者特征声纹)以及采集到救援人员的实时语音后,语音转换模块通过调整特定的频谱特征而基于该实时语音合成含有该目标语音特征信息的待验证语音,并有可穿戴救援设备播放该待验证语音。在一些实施例中,对应的电子救援锁基于内置的语音识别模块检测识别该可穿戴救援设备播放的待验证信息。在一些实施例中,网络设备将该目标 语音特征信息发送给该电子救援锁,以供该电子救援锁进行语音验证,若该可穿戴救援设备播放的该待验证语音中含有该目标语音特征信息,则验证通过,该电子救援锁进行解锁操作,以便救援人员及时进入门户实施救援。通过该可穿戴救援设备现场采集救援人员的实时语音,以结合该实时语音生成含有该目标语音特征信息的待验证语音,可在一定程度上保证救援人员已到达现场,并保证了救援人员的身份,进一步增加了开锁的安全性。
在一些实施例中,所述目标语音特征信息包括以下至少任一项:音调信息、音色信息、声纹信息。在一些实施例中,所述目标语音特征信息包括音调信息,例如,该目标语音特征信息包括一个或多个按一定顺序排列组成的音调信息(例如,音调的高低),通过识别该一个或多个音调信息以及多个音调信息间的顺序排列是否正确来确定识别该目标语音特征信息;在一些实施例中,所述目标语音特征信息包括音色信息,其中,音色是指不同的声音的频率表现在波形方面总是有与众不同的特性,例如,不同的物体振动都有不同的特点。例如,预设一定音色组合形式的目标语音特征信息,通过识别该音色组合确定识别该目标语音特征信息;在一些实施例中,所述目标语音特征信息包括声纹信息,其中,声纹是用电声学仪器显示的携带言语信息的声波频谱。例如,所述目标语音特征信息为一段携带语音信息的声波频谱,通过识别该目标语音特征信息进行验证开锁;在另一些实施例中,所述目标语音特征信息包括音调信息、音色信息以及声纹信息中的两种或者三种的组合,例如,该目标语音特征信息按顺序含有多个子目标语音特征信息,其中,所述每个目标语音特征信息含有自己的音调信息、音色信息,并且,每个所述音调信息对应有不同的音色信息,从而降低目标语音特征信息被恶意破解的风险。通过预设该目标语音特征信息,来进一步增加验证开锁的安全性。
如图10所示,根据本申请的一个方面,还提供了一种在电子救援锁端的救援方法,其中,所述方法包括步骤S401、步骤S402以及步骤S403。在步骤S401中,电子救援锁获取所述电子救援锁对应的可穿戴救援设备提供的救援验证信息;在步骤S402中,电子救援锁基于所述救援验证信息进行开锁验证;在步骤S403中,若验证通过,电子救援锁控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,网络设备基于接收到的救援呼叫请求匹配至少一台可穿戴救援设备(例如,网络设备基于获取到的呼救设备的当前位置查询当前处于该呼救设备附近的至少一台可穿戴救援设备),并向该可穿戴救援设备发送救 援指令,以通知使用该可穿戴救援设备的救援人员当前有救援任务。在一些实施例中,所述救援指令包括救援验证信息。在一些实施例中,所述救援验证信息包括救援识别信息,例如,该救援人员在对应的电子救援锁上输入该救援验证信息,该电子救援锁对该救援验证信息进行验证;在另一些实施例中,所述救援验证信息包括目标语音特征信息,例如,该可穿戴救援设备播放包含该目标语音特征信息的待验证语音,该电子救援锁识别并验证该待验证语音。在一些实施例中,所述电子救援锁的执行机构包括电动机和相应的机械结构,该电动机用来驱动相应的机械结构(例如,进户门的锁舌或与锁孔配合以锁止门体的锁钩),以进行解锁所述电子救援锁对应的进户门(例如通过电动机驱动锁舌缩入门体内,或驱动锁钩旋转并从锁孔中脱开),从而为所述可穿戴救援设备对应的救援人员提供救援通道。
在一些实施例中,所述方法还包括步骤S404(未示出),在步骤S404中,电子救援锁接收所述电子救援锁对应的网络设备所发送的验证指令,其中所述验证指令包括待验证信息;所述步骤S402包括:电子救援锁基于所述待验证信息,对所述救援验证信息进行开锁验证;其中,所述待验证信息和所述救援验证信息基于同一生成算法生成。在一些实施例中,所述待验证信息和所述救援验证信息分别被发送至电子救援锁和救援人员所佩戴的可穿戴救援设备。在一些实施例中,所述待验证信息是网络设备基于救援识别信息查询确定所得的;在另一些实施例中,所述待验证信息是基于预设的算法(例如,加密算法)对所述救援识别信息进行处理得到的。例如,网络设备基于一定的算法对呼救请求中的救援识别信息进行加密处理,以生成救援验证信息和待验证信息,并将该救援验证信息发送给可穿戴救援设备,将该待验证信息发送给该呼救设备对应的电子救援锁;在救援人员到达现场后,该可穿戴救援设备向该电子救援锁发送该救援验证信息,以供该电子救援锁基于该待验证信息对该救援验证信息进行验证,例如当该救援验证信息与该待验证信息相匹配时验证通过,该电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述算法包括但不限于DES加密算法、AES加密算法、RSA加密算法等加密算法;在一个典型场景下,该算法用于根据呼救用户的呼救设备的标识信息或者呼救用户的身份信息生成上述待验证信息和救援验证信息,以供电子救援锁基于该待验证信息和救援验证信息对可穿戴救援设备及救援人员进行合法性验证,并在验证通过时开门。当然,本领域技术人员应能理解,以上所述算法操作仅为举例且不限于 加密算法,其他现有的或今后可能出现的算法操作如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。
在一些实施例中,所述救援验证信息包括待验证语音,所述待验证信息包括目标语音特征信息;所述步骤S402包括:将所述待验证语音对应的待验证语音特征信息与目标语音特征信息进行比对以进行开锁验证。在一些实施例中,为了进一步增加验证开锁的安全性,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息包括但不限于特征音调、音色、声纹等语音特征信息。该网络设备通过所述目标特征语音信息合成目标语音,并将该目标语音发送给可穿戴救援设备,以供该可穿戴救援设备播放该目标语音;该电子救援锁采集该目标语音并识别该目标语音中的语音特征信息,再基于识别出的语音特征信息进行开锁验证。
根据本申请的另一个方面,提供了一种用于实施救援方法的系统。参考图3,该系统包括网络设备、呼救设备以及电子救援锁,在一些实施例中,呼救设备与网络设备之间、网络设备与电子救援锁之间通过相应的通信连接(例如,以有线或者无线等的方式建立的通信连接)进行信息、指令等的传递。
在一些实施例中,基于上述系统,本申请还公开了一种救援方法。参考图4,所述救援方法包括:呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;电子救援锁现场采集关于现场人员的待验证信息,将所述待验证信息发送至所述网络设备;所述网络设备接收所述待验证信息,基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息,若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令;所述救援电子锁基于所述开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门。
以下分别从网络设备和电子救援锁的角度详细描述以上所述方法的具体实施方式。其中,通过呼救设备向对应的网络设备发送救援呼叫请求的具体实施方式与以上所述的发送救援呼叫请求的具体实施方式相同或基本相同,不予赘述,并以引用的方式包含于此。
如图11所示,示出了根据本申请另一方面的一种在网络设备端的救援方法,其中, 所述方法包括步骤S501、步骤S502、步骤S503/步骤S504以及步骤S505。在步骤S501中,网络设备接收对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;在步骤S502中,网络设备基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;在步骤S503中,网络设备接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的;在步骤S504中,网络设备基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息;在步骤S505中,若所述救援信息包括有权,网络设备向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述救援设备可为包括但不限于可穿戴救援设备或其他用户设备(例如手机、平板、笔记本电脑等计算设备)。在一些实施例中,所述呼救设备包括但不限于用户设备、智能监测设备(例如,设置有重力传感器或者心率监测模块的智能手环),在一些实施例中,所述用户设备包括但不限于手机、平板、笔记本电脑等计算设备。
具体而言,在步骤S501中,网络设备接收对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息。在一些实施例中,所述救援识别信息包括但不限于设备标识信息(例如,设备序列号、设备的MAC地址)。在一些实施例中,所述救援识别信息用于识别所述呼救设备,从而基于该呼救设备确定呼救者的身份,例如,用户通过注册的方式在网络设备中预先存储该用户所使用的呼救设备与该用户间的映射关系,当该用户通过该呼救设备向网络设备发送救援呼叫请求时,网络设备基于该呼救设备即可查询获得该用户的身份信息、病史信息、过敏相关信息等相关信息,为救援提供参考;在另一些实施例中,通过该救援识别信息可查询到该呼救设备对应的电子救援锁,例如,网络设备中存储有呼救设备以及该呼救设备对应的电子救援锁,该呼救设备的救援识别信息与该电子救援锁之间存在映射关系,网络设备通过该呼救设备的救援标识信息可查询获得该呼救设备对应的电子救援锁。
在步骤S502中,网络设备基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息。在一些实施例中,所述身份特征信息包括但不限于相应救援人员的人脸特征信息、相应救援人员的指纹特征信息、相应救援人员的声纹特征信息。在一些实施例中,所述身份特征信息用于识别确定对应救援人员的身份信息, 例如,电子救援锁通过人脸采集装置采集到达救援现场的现场人员的面部画像,并将该面部画像发送给该网络设备,该网络设备将该面部画像与该人脸特征信息进行对比,若两者的相似度大于或等于预设的相似度预阈值,则确定该现场人员是该救援设备对应的救援人员,进一步地,该网络设备向对应的电子救援锁发送开锁指令,从而提高开锁安全性。在一些实施例中,网络设备基于呼救设备以及救援设备的位置信息,为该呼救设备对应的呼救者查询匹配位于其附近的至少一台救援设备。
在步骤S503中,网络设备接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的。在一些实施例中,所述待验证信息包括但不限于现场人员的面部图像、现场人员的指纹信息、现场人员的音频信息。在一些实施例中,所述电子救援锁设置有待验证信息采集装置(例如,人脸采集装置、指纹采集装置或者语音采集装置),通过该待验证信息采集装置采集关于到达救援现场的现场人员的待验证信息,并将该待验证信息发送给该网络设备,由该网络设备进行验证。
在步骤S504中,网络设备基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息。在一些实施例中,网络设备中存储有多个救援设备(例如,救援设备的MAC地址、设备序列号)以及每个所述救援设备对应的救援人员的身份特征信息。电子救援锁通过待验证信息采集装置采集关于到达救援现场的现场人员的待验证信息,并将其采集的待验证信息发送给该网络设备。进一步地,在一些实施例中,该网络设备根据该待验证信息查询是否有与该待验证信息相匹配的身份特征信息,若存在,则确定该现场人员具有救援权限。
在步骤S505中,若所述救援权限信息包括有权,网络设备向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述救援权限信息包括有权、无权。若网络设备验证该救援权限信息为有权,则该网络设备向对应的电子救援锁发送开锁指令。该电子救援锁接收该开锁指令,并基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
在一些实施例中,所述步骤S504包括:网络设备基于所述待验证信息、所述至少一台救援设备的地理位置信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息。在一些实施例中,为了进一步提高开锁的安全性,网络设备结合所述至 少一台救援设备的地理位置信息确定现场人员的救援权限信息。例如,网络设备获取所述至少一台救援设备的地理位置信息(例如,基于GPS定位技术,所述救援设备将其当前的地理位置信息提供给该网络设备),若该地理位置信息被救援现场所覆盖或与救援现场的距离小于某个距离阈值,则说明对应的现场人员在该救援现场,则可确定该现场人员具有救援权限信息;若该地理位置信息未被救援现场所覆盖或与救援现场的举例大于上述距离阈值,则说明对应的现场人员不在救援现场,则即使该现场人员的待验证信息与救援人员的身份特征信息相匹配,也确定该现场人员不具有救援权限信息,从而保证为当前位于救援现场的救援人员开门,保证呼救者的人身以及财产安全。
在一些实施例中,所述身份特征信息包括以下至少任一项:相应救援人员的人脸特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的面部图像;相应救援人员的指纹特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的指纹信息;相应救援人员的声纹特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的音频信息。在一些实施例中,所述身份特征信息预存在网络设备中,网络设备将电子救援锁发送的关于现场人员的待验证信息与该身份特征信息进行对比,以确定该现场人员的救援权限信息。在一些实施例中,通过人脸识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的人脸特征信息,基于该人脸特征信息对比电子救援锁发送的待验证信息中的面部图像,若该人脸特征信息与该面部图像的相似度大于或等于相似度阈值,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过指纹识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的指纹特征信息,基于该指纹特征信息与电子救援锁发送的待验证信息中的指纹信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过语音识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的声纹特征信息,基于该声纹特征信息与电子救援锁发送的待验证信息中的音频信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息。在一些实施例中,所述音频信息是该电子救援锁采集的现场人员的音频信息。
如图12所示,示出了根据本申请另一个实施例的一种在电子救援锁端的救援方法,其中,所述方法包括步骤S601、步骤S602以及步骤S603。在步骤S601中,该电子救援锁现场采集关于现场人员的待验证信息;在步骤S602中,该电子救援锁将所述待验证信 息发送至所述电子救援锁对应的网络设备;在步骤S603中,该电子救援锁基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
具体而言,在步骤S601中,该电子救援锁现场采集关于现场人员的待验证信息。在一些实施例中,所述待验证信息包括但不限于现场人员的面部图像、现场人员的指纹信息、现场人员的音频信息。在一些实施例中,所述电子救援锁设置有待验证信息采集装置(例如,用于采集人脸照片的摄像装置、指纹采集装置或者用于采集语音的麦克风模块),通过该待验证信息采集装置采集关于到达救援现场的现场人员的待验证信息,并将该待验证信息发送给该网络设备,由该网络设备进行验证。
在步骤S602中,该电子救援锁将所述待验证信息发送至所述电子救援锁对应的网络设备。在一些实施例中,该电子救援锁在采集到关于现场人员的待验证信息后,将该待验证信息发送给对应的网络设备,以供该网络设备进行验证。进一步地,在网络设备验证通过的情况下,由该网络设备向该电子救援锁发送开锁指令。
在步骤S603中,该电子救援锁基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述电子救援锁的执行机构包括电动机和相应的机械结构,该电动机用来驱动相应的机械结构(例如,进户门的锁舌),以进行解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
在一些实施例中,所述待验证信息包括以下至少任一项:现场人员的面部图像;现场人员的指纹信息;现场人员的音频信息。在一些实施例中,网络设备中预存有关于救援人员的身份特征信息,电子救援锁向该网络设备发送的关于现场人员的待验证信息,以供该网络设备进行验证。在一些实施例中,通过人脸识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的人脸特征信息,基于该人脸特征信息对比电子救援锁发送的待验证信息中的面部图像,若该人脸特征信息与该面部图像的相似度大于或等于相似度阈值,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过指纹识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的指纹特征信息,基于该指纹特征信息与电子救援锁发送的待验证信息中的指纹信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息; 在一些实施例中,通过语音识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的声纹特征信息,基于该声纹特征信息与电子救援锁发送的待验证信息中的音频信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息。在一些实施例中,所述音频信息是该电子救援锁采集的现场人员的音频信息。
根据本申请的另一个方面,提供了一种用于实施救援方法的系统。参考图5,该系统包括网络设备、呼救设备、可穿戴救援设备以及电子救援锁,在一些实施例中,呼救设备与网络设备之间、可穿戴救援设备与网络设备之间、可穿戴救援设备与电子救援锁之间通过相应的通信连接(例如,以有线或者无线等的方式建立的通信连接)进行信息、指令等的传递。在一些实施例中,呼救者通过呼救设备向对应的网络设备发送救援呼叫请求;在一些实施例中,呼救者手动触发该呼救设备上的呼救按钮向对应的网络设备发送救援呼叫请求;在另一些实施例中,该呼救设备自动向对应的网络设备发送救援呼叫请求,例如,该呼救设备为设置有重力传感器的智能手环(该智能手环设置有通信模块,以向网络设备发送信息),呼救者佩戴该智能手环,若该智能手环上的重力传感器接收到压力骤增的数据信息(例如,呼救者突然晕倒时),则该智能手环向对应的网络设备发送救援呼叫请求。所述呼救设备包括但不限于用户设备、智能监测设备(例如,智能手环),在一些实施例中,所述用户设备包括但不限于手机、平板、笔记本电脑等计算设备。在一些实施例中,所述可穿戴救援设备包括但不限于智能眼镜、智能头盔等;在另一些实施例中,所述可穿戴救援设备包括带有蓝牙定位模块、网络通信模块的电子设备。所述可穿戴救援设备设置有通信模块,用于与所述网络设备间进行通信连接。在一些实施例中,所述电子救援锁包括通信模块(用于接收信息、指令)、执行机构(用于基于接收到的信息或者指令执行对应的操作)。当有紧急救援情况发生,但是呼救者不能及时的为救援人员开门时,该电子救援锁基于接收到的信息或者指令对相应的进户门执行解锁操作,为救援人员提供畅通的救援道路,节省救援时间。
以下分别从网络设备和可穿戴救援设备的角度,详细描述以上所述方法的具体实施方式。其中,通过呼救设备向对应的网络设备发送救援呼叫请求的具体实施方式与以上所述的发送救援呼叫请求的具体实施方式相同或基本相同,不予赘述,并以引用的方式包含于此;电子救援锁基于网络设备接收网络设备所发送的开锁指令执行相应的开锁操作,以解 锁安装该电子救援锁的进户门,从而为救援人员提供救援通道,亦不予赘述并以引用的方式包含于此。
图13示出了根据本申请另一个实施例的一种在网络设备端的救援方法,其中,所述方法包括步骤S701、步骤S702、步骤S703、步骤S704以及步骤S705。在步骤S701中,网络设备接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;在步骤S702中,网络设备基于所述救援呼叫请求匹配至少一台可穿戴救援设备;在步骤S703中,网络设备向所述至少一台可穿戴救援设备发送救援指令;在步骤S704中,网络设备接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求;在步骤S705中,网络设备基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
具体而言,在步骤S701中,网络设备接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息。在一些实施例中,所述救援识别信息包括但不限于设备标识信息(例如,设备序列号、设备的MAC地址)。在一些实施例中,所述救援识别信息用于供网络设备识别所述呼救设备,并基于该呼救设备确定呼救者的身份,例如,用户通过注册的方式在网络设备中预先存储该用户所使用的呼救设备与该用户间的映射关系,当该用户通过该呼救设备向网络设备发送救援呼叫请求时,网络设备基于该呼救设备即可查询获得该用户的身份信息、病史信息、过敏相关信息等相关信息,为救援提供参考;在另一些实施例中,通过该救援识别信息可查询到该呼救设备对应的电子救援锁,例如,网络设备中存储有呼救设备以及该呼救设备对应的电子救援锁,该呼救设备的救援识别信息与该电子救援锁之间存在映射关系,网络设备基于该呼救设备的救援标识信息以及该映射关系可查询获得该呼救设备对应的电子救援锁。
在步骤S702中,基于所述救援呼叫请求匹配至少一台可穿戴救援设备。在一些实施例中,网络设备基于呼救设备以及可穿戴救援设备的位置信息,为该呼救设备对应的呼救者查询匹配位于其附近的至少一台可穿戴救援设备。
在步骤S703中,向所述至少一台可穿戴救援设备发送救援指令。在一些实施例中,网络设备通过向该可穿戴救援设备发送救援指令来通知该可穿戴救援设备对应的救援人 员当前有需要救援的紧急情况。
在步骤S704中,接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求。在一些实施例中,接收救援指令的可穿戴救援设备通过向该网络设备发送开锁请求的方式请求该网络设备控制对应的电子救援锁进解锁呼救者的进户门。
在步骤S705中,基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,例如该网络设备在接收到该可穿戴救援设备发送的开锁请求后,向对应的电子救援锁发送所述开锁指令。
在一些实施例中,所述救援指令包括所述呼救设备对应的目标位置信息,所述开锁请求包括所述可穿戴救援设备的地理位置信息;所述方法还包括:基于所述目标位置信息及所述地理位置信息验证所述开锁请求;所述步骤S705包括:若所述开锁请求通过验证,基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述目标位置信息用于确定呼救设备的当前位置,所述地理位置信息用于确定可穿戴救援设备的当前位置,以供所述网络设备基于所述目标位置信息以及所述地理位置信息确定使用该可穿戴救援设备的救援人员是否已到达该呼救设备所处的救援现场。当网络设备确定该目标位置信息已覆盖该地理位置信息或者所述地理位置信息与目标位置信息之间的距离小于某个距离阈值时,网络设备验证通过,并向对应的电子救援锁发送开锁指令,为该救援人员开锁。
图14示出了根据本申请另一个实施例的一种在可穿戴救援设备端的救援方法,其中,所述方法包括步骤S801、步骤S802。在步骤S801中,可穿戴救援设备接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的;在步骤S802中,若检测到响应触发事件,可穿戴救援设备基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
具体而言,在步骤S801中,可穿戴救援设备接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的。在一些实施例中,网络设备基于接收到的救援呼叫 请求匹配至少一台可穿戴救援设备(例如,网络设备基于获取到的呼救设备的当前位置查询当前处于该呼救设备附近的至少一台可穿戴救援设备),并向该可穿戴救援设备发送救援指令,以通知使用该可穿戴救援设备的救援人员当前有救援任务。
在步骤S802中,若检测到响应触发事件,可穿戴救援设备基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述响应触发事件包括但不限于对应的救援人员的相关操作(例如按下某个按钮)、该可穿戴救援设备到达某一地点(例如可穿戴救援设备与该目标位置信息的距离小于预设的距离阈值)。进一步地,该可穿戴救援设备基于接收的救援指令向对应的网络设备发送开锁请求。
在一些实施例中,所述开锁请求包括所述可穿戴救援设备的地理位置信息。在一些实施例中,所述开锁请求包括所述可穿戴救援设备的地理位置信息,例如,该可穿戴救援设备基于GPS定位获取其当前所在的地理位置信息,并将该地理位置信息发送给对应的网络设备,以供对应的网络设备基于该地理位置信息确定该可穿戴救援设备对应的救援人员已到达救援现场;在判定救援人员已到达救援现场的情况下,网络设备基于该开锁请求向相应的电子救援锁发送开锁指令,以供该电子救援锁基于该开锁指令解锁相应的进户门,从而为救援人员提供救援通道。
图15示出了根据本申请一个方面的一种网络设备,其中,所述设备包括一一模块、一二模块以及一三模块,其中,一一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;一二模块,用于基于所述救援呼叫请求匹配至少一台可穿戴救援设备;一三模块,用于向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;其中,所述救援验证信息用于供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。所述可穿戴救援设备可为包括但不限于带有蓝牙定位以及网络通信模块的电子产品(例如,救援头盔、智能眼镜等)。在一些实施例中,所述可穿戴救援设备用于接收网络设备发送的救援指令,以通知救援人员当前有救援事件发生。
具体而言,一一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息。在一些实施例中,所述救援识别信息包括但不限于设备标识信息(例如,设备序列号、设备的MAC地址)。在一些实施例中,所述救援识别信息用于识别所述呼救设备,从而基于该呼救设备确定呼救者的身份,例如,用户通过注册的方式在网络设备中预先存储该用户所使用的呼救设备与该用户间的映射关系,当该用户通过该呼救设备向网络设备发送救援呼叫请求时,网络设备基于该呼救设备即可查询获得该用户的身份信息、病史信息、过敏相关信息等相关信息,为救援提供参考;在另一些实施例中,通过该救援识别信息可查询到该呼救设备对应的电子救援锁,例如,网络设备中记录有已注册的呼救设备(例如,记录该呼救设备的设备标识信息)以及该呼救设备对应的电子救援锁(例如,该电子救援锁的设备标识信息),该呼救设备的救援识别信息与该电子救援锁之间存在映射关系,网络设备通过该呼救设备的救援标识信息可查询获得该呼救设备对应的电子救援锁。
一二模块,用于基于所述救援呼叫请求匹配至少一台可穿戴救援设备。在一些实施例中,网络设备基于呼救设备以及可穿戴救援设备的位置信息,为该呼救设备对应的呼救者查询匹配位于其附近的至少一台可穿戴救援设备。
一三模块,用于向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;其中,所述救援验证信息用于供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述待验证信息是基于该救援识别信息查询获得的,例如,用户在对呼救设备进行注册时,网络设备即对该呼救设备对应的救援识别信息进行了处理(例如,基于一定的算法将该救援识别信息转换成对应的救援验证信息),或者网络设备为每个呼救设备对应的救援识别信息创建待验证信息,当该呼救设备向该网络设备发送救援呼叫请求时,该网络设备基于该呼救设备对应的救援识别信息查询对应的待验证信息,并将该待验证信息发送给该可穿戴救援设备。进一步地,在一些实施例中,该可穿戴救援设备对应的救援人员通过操作或者基于该可穿戴救援设备与对应的电子救援锁间的通讯连接将该救援验证信息发送给该电子救援锁,以供该电子救援锁对该救援验证信息进行验证,例如电子救援锁也存储有与上述待验证信息相同的信息,并以比对的方式对上述待验证信息进行验证,若比 对一致则验证通过,电子救援锁执行开锁操作。
在一些实施例中,所述设备还包括一四模块(未示出),一四模块,用于向所述呼救设备对应的电子救援锁发送验证指令,其中所述验证指令包括基于所述救援识别信息确定的待验证信息。在一些实施例中,为了进一步增加验证开锁的安全性,网络设备通过向该呼救设备对应的电子救援锁发送验证指令来触发该电子救援锁进行验证开锁的工作;相应地,电子救援锁仅在收到该指令后才会对执行验证开锁的操作,而不会在无需救援时响应不法分子发送至电子救援锁的验证请求,以增强安全性。在一些实施例中,所述待验证信息是基于该救援识别信息查询获得的,例如,用户在对呼救设备进行注册时,网络设备即对该呼救设备对应的救援识别信息进行了处理(例如,基于一定的算法将该救援识别信息转换成对应的救援验证信息),或者网络设备为每个呼救设备对应的救援识别信息创建待验证信息,当该呼救设备向该网络设备发送救援呼叫请求时,该网络设备基于该呼救设备对应的救援识别信息查询对应的待验证信息,并将该待验证信息发送给该呼救设备对应的电子救援锁。在一些实施例中,该电子救援锁基于该待验证信息对其接收的救援验证信息进行验证,例如,该网络设备向该可穿戴救援设备以及该电子救援锁发送的救援验证信息以及待验证信息相同,该电子救援锁基于该待验证信息对该救援验证信息进行,例如电子救援锁也存储有与上述待验证信息相同的信息,并以比对的方式对上述待验证信息进行验证,若比对一致则验证通过,电子救援锁执行开锁操作。
在一些实施例中,所述一四模块用于:基于所述救援识别信息生成对应的待验证信息;向所述呼救设备对应的电子救援锁发送验证指令,其中所述验证指令包括所述待验证信息;所述一三模块用于:基于所述救援识别信息生成对应的救援验证信息;向所述至少一台可穿戴救援设备发送救援指令,其中所述救援指令包括所述救援验证信息;其中,所述待验证信息和所述救援验证信息基于同一生成算法生成。在一些实施例中,所述待验证信息和所述救援验证信息分别被发送至电子救援锁和救援人员所佩戴的可穿戴救援设备。在一些实施例中,所述待验证信息是网络设备基于救援识别信息查询确定所得的;在另一些实施例中,所述待验证信息是基于预设的算法(例如,加密算法)对所述救援识别信息进行处理得到的。例如,网络设备基于一定的算法对呼救请求中的救援识别信息进行加密处理,以生成救援验证信息和待验证信息,并将该救援验证信息发送给可穿戴救援设备,将该待验证信息发送给该呼救设备对应的电子救援锁;在救援人员到达现场后,该可穿戴救援设 备向该电子救援锁发送该救援验证信息,以供该电子救援锁基于该待验证信息对该救援验证信息进行验证,例如当该救援验证信息与该待验证信息相匹配时验证通过,该电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述算法包括但不限于DES加密算法、AES加密算法、RSA加密算法等加密算法;在一个典型场景下,该算法用于根据呼救用户的呼救设备的标识信息或者呼救用户的身份信息生成上述待验证信息和救援验证信息,以供电子救援锁基于该待验证信息和救援验证信息对可穿戴救援设备及救援人员进行合法性验证,并在验证通过时开门。当然,本领域技术人员应能理解,以上所述算法操作仅为举例且不限于加密算法,其他现有的或今后可能出现的算法操作如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。
在一些实施例中,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息用于合成目标语音,所述电子救援锁基于所述目标语音对所述可穿戴救援设备进行开锁验证。在一些实施例中,为了进一步增加验证开锁的安全性,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息包括但不限于特征音调、音色、声纹等语音特征信息。该网络设备通过所述目标特征语音信息合成目标语音,并将该目标语音发送给可穿戴救援设备,以供该可穿戴救援设备播放该目标语音;该电子救援锁采集该目标语音并识别该目标语音中的语音特征信息,再基于识别出的语音特征信息进行开锁验证。
图16示出了根据本申请另一个方面的一种呼救设备,其中,所述设备包括二一模块以及二二模块,二二模块,用于基于检测到的救援事件生成相应的救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;二二模块,用于向所述呼救设备对应的网络设备发送救援呼叫请求;其中所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于对至少一台可穿戴救援设备进行开锁验证,所述呼救设备对应的电子救援锁在验证通过后解锁相应的进户门。所述呼救设备包括但不限于手机、智能监测设备(例如,设置有各类传感器,包括但不限于重力传感器、电子陀螺仪、心率监测模块等,的智能手环)等。例如,所述呼救设备为设置有重力传感器的智能手环,在该呼救者突然晕倒时,呼救设备通过这些传感器检测到相应的数据信息,从而检测到相应的救援事件,该呼救设备自动向对应的网络设备发送救援呼叫请求。当然,本领域技术人员应能理解,以上所述的救援事件仅为举例,其他现有的或今后可能出现的 救援事件如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。例如,所述呼救设备为包括心率监测模块的智能手环,当该智能手环检测到佩戴者的心率处于非正常范围时,则向对应的网络设备发送救援呼叫请求。在一些实施例中,所述呼救设备包括重力传感器以及心率监测模块,在该呼救者突然晕倒时,呼救设备通过这些传感器检测到相应的数据信息,从而检测到相应的救援事件,该呼救设备自动向对应的网络设备发送救援呼叫请求。在一些实施例中,所述救援验证信息用于所述呼救设备对应的电子救援锁对至少一台可穿戴救援设备进行开锁验证,例如,网络设备将救援验证信息发送给可穿戴救援设备,将待验证信息发送给电子救援锁,其中,所述救援验证信息和所述待验证信息是基于同一生成算法生成的,救援人员到达救援现场后,通过其佩戴的可穿戴救援设备向电子救援锁发送该救援验证信息,该电子救援锁对该救援验证信息进行验证,若该救援验证信息与其接收的待验证信息相同,则验证通过;在另一些实施例中,所述救援验证信息用于所述网络设备对至少一台可穿戴救援设备进行开锁验证,例如,救援人员到达救援现场后,通过其佩戴的可穿戴救援设备向网络设备发送救援验证信息,网络设备接收并验证该救援验证信息,若该救援验证信息与该网络设备发送给该可穿戴救援设备的救援验证信息相同,则验证通过,该网络设备向对应的电子救援锁发送开锁指令,该电子救援锁基于该开锁指令解锁相应的进户门。
在一些实施例中,所述救援识别信息包括以下至少任一项:
所述呼救设备的呼救设备标识信息。例如,所述救援识别信息包括所述呼救设备的呼救设备标识信息。在一些实施例中,所述呼救设备标识信息包括但不限于设备序列号、设备的MAC地址。呼救设备将其对应的呼救设备标识信息发送给网络设备,以便该网络设备基于该呼救设备标识信息查询该呼救设备对应的相关信息(例如,救援验证信息、对应的呼救用户的身份信息等)。
所述呼救设备对应的呼救用户的呼救用户标识信息。例如,所述救援识别信息包括所述呼救设备对应的呼救用户的呼救用户标识信息。在一些实施例中,所述呼救用户标识信息包括但不限于呼救用户的姓名、身份证号等,网络设备基于该呼救用户标识信息查询对应的呼救设备。
当然,本领域技术人员应能理解,以上所述的救援识别信息仅为举例,其他现有的或 今后可能出现的救援识别信息如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。
在一些实施例中,所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于供所述呼救设备对应的电子救援锁对至少一台可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述网络设备中存储有多个救援识别信息以及每个救援识别信息对应的救援验证信息,网络设备基于呼救设备对应的救援识别信息查询该救援识别信息对应的救援验证信息,并将该救援验证信息发送给匹配出的至少一个可穿戴救援设备(例如网络设备根据呼救用户的实时位置,匹配与其距离最近的救援人员,或者匹配与呼救用户的距离小于某个距离阈值的若干个救援人员)。救援人员佩戴该可穿戴救援设备到达救援现场后,通过该可穿戴救援设备向电子救援锁发送该救援验证信息。该电子救援锁对该救援验证信息进行验证,若验证通过,则解锁相应的进户门,为该救援人员开门。
图17示出了根据本申请另一个方面的一种可穿戴救援设备,其中,所述设备包括三一模块、三二模块,三一模块,用于接收所述可穿戴救援设备对应的网络设备所发送的救援指令,所述救援指令包括救援验证信息;三二模块,用于将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;其中所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,网络设备基于接收到的救援呼叫请求匹配至少一台可穿戴救援设备(例如,网络设备基于获取到的呼救设备的当前位置查询当前处于该呼救设备附近的至少一台可穿戴救援设备),并向该可穿戴救援设备发送救援指令,以通知使用该可穿戴救援设备的救援人员当前有救援任务。在一些实施例中,所述救援指令包括救援验证信息。在一些实施例中,所述救援验证信息包括救援识别信息,例如,该救援人员在对应的电子救援锁上输入该救援验证信息,该电子救援锁对该救援验证信息进行验证;在另一些实施例中,所述救援验证信息包括目标语音特征信息,例如,该可穿戴救援设备播放包含该目标语音特征信息的待验证语音,该电子救援锁识别并验证该待验证语音;在另一些实施例中,救援人员佩戴该可穿戴救援设备到达进户门前,该可穿戴救援设备与该进户门上的电子救援锁自动或者基于该救援人员的 操作建立通信连接(例如,蓝牙连接),所述可穿戴救援设备基于该通信连接向对应的电子救援锁发送该救援验证信息,以供电子救援锁对该救援验证信息进行验证。
在一些实施例中,所述三二模块用于:建立所述可穿戴救援设备对应的电子救援锁与所述可穿戴救援设备之间的通信连接;通过所述通信连接将所述救援验证信息发送至所述可穿戴救援设备对应的电子救援锁,以通过所述电子救援锁进行开锁验证。在一些实施例中,可穿戴救援设备与电子救援锁均设置有通信模块(例如,蓝牙模块、NFC模块)。在一些实施例中,救援人员佩戴可穿戴救援设备到达救援现场后,该可穿戴救援设备与该电子救援锁自动建立通信连接;在另一些实施例中,救援人员佩戴可穿戴救援设备到达救援现场后,通过手动操作用该可穿戴救援设备向该电子救援锁发送通信连接请求,该电子救援锁基于该通信连接请求与该可穿戴救援设备建立通信连接。该可穿戴救援设备通过该通信连接将救援验证信息发送给该电子救援锁,以供该电子救援锁进行开锁验证。
在一些实施例中,所述救援验证信息包括目标语音特征信息;所述三二模块用于:基于所述救援验证信息,响应于所述可穿戴救援设备对应的救援人员的播放操作,播放待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。在一些实施例中,所述目标语音特征信息包括但不限于音色、音调、声纹等特征信息。网络设备将包括该目标语音特征信息的救援验证信息发送给该可穿戴救援设备,在一些实施例中,该可穿戴救援设备在接收到该救援验证信息时会发出提示音,以提示对应的救援人员“已收到救援验证信息,当前可进行验证”,该救援人员对该可穿戴救援设备进行播放操作;该可穿戴救援设备基于该播放操作生成对应的待验证语音,并播放该待验证语音,以供对应的电子救援锁进行语音验证。对应的电子救援锁采集该待验证语音后对其进行解析处理,若识别到目标语音特征信息,则解锁以便救援人员顺利进入进户门对呼救者实施救援。救援人员到达救援现场后,操作其所使用的可穿戴救援设备播放待验证语音,对应的电子救援锁现场采集该待验证语音,可保证救援人员已经到达现场,而不是在救援人员还没有到达现场时就进行开锁操作,以提高解锁进户门的安全性。
在一些实施例中,所述三二模块,用于:响应于所述可穿戴救援设备对应的救援人员的播放操作,基于所述目标语音特征信息生成待验证语音,并播放所述待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。在一些实施例中,救援人员对可穿戴救援设备进行播放操作,该可穿戴救援设备基于该播放操作将其接 收到的目标语音特征信息生成待验证语音。例如,该可穿戴救援设备内置一段音频,在接收到目标语音特征信息(例如,特征音色或者特征声纹)后,通过特定的频谱特征调整而基于该音频合成含有该目标语音特征信息的待验证语音,并播放该待验证语音。在一些实施例中,对应的电子救援锁基于内置的麦克风模块采集该可穿戴救援设备播放的待验证语音,并检测识别待验证语音中的待验证信息(即上述语音特征信息)。在一些实施例中,网络设备事先已将该目标语音特征信息发送给该电子救援锁,以供该电子救援锁进行验证,若该可穿戴救援设备播放的该待验证语音中含有该目标语音特征信息,则验证通过,该电子救援锁进行解锁操作,以便救援人员及时进入门户实施救援。通过该可穿戴救援设备现场生成含有该目标语音特征信息的待验证语音,可保证到达救援现场的人员的救援身份,例如,只有佩戴了该可穿戴救援设备的救援人员才能进行语音解锁,进一步增加了开锁的安全性。
在一些实施例中,所述三二模块包括三二一模块(未示出)、三二二模块以及三二三模块,三二一模块,用于采集所述可穿戴救援设备对应的救援人员的实时语音;三二二模块,用于基于所述目标语音特征信息,对所述实时语音执行转换操作以生成待验证语音;三二三模块,用于响应于所述救援人员的播放操作,播放所述待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。在一些实施例中,可穿戴救援设备内置一段音频,该音频用于根据可穿戴救援设备现场接收到的目标语音特征信息合成包含目标语音特征信息的待验证语音;在另一些实施例中,该可穿戴救援设备通过现场采集救援人员的实时语音来生成包含该目标语音特征信息的待验证语音,例如,该可穿戴救援设备中内置语音转换模块,在接收到目标语音特征信息(例如,特征音色或者特征声纹)以及采集到救援人员的实时语音后,语音转换模块通过调整特定的频谱特征而基于该实时语音合成含有该目标语音特征信息的待验证语音,并有可穿戴救援设备播放该待验证语音。在一些实施例中,对应的电子救援锁基于内置的语音识别模块检测识别该可穿戴救援设备播放的待验证信息。在一些实施例中,网络设备将该目标语音特征信息发送给该电子救援锁,以供该电子救援锁进行语音验证,若该可穿戴救援设备播放的该待验证语音中含有该目标语音特征信息,则验证通过,该电子救援锁进行解锁操作,以便救援人员及时进入门户实施救援。通过该可穿戴救援设备现场采集救援人员的实时语音,以结合该实时语音生成含有该目标语音特征信息的待验证语音,可在一定程度上保证救援人员已到 达现场,并保证了救援人员的身份,进一步增加了开锁的安全性。
在一些实施例中,所述目标语音特征信息包括以下至少任一项:音调信息、音色信息、声纹信息。在一些实施例中,所述目标语音特征信息包括音调信息,例如,该目标语音特征信息包括一个或多个按一定顺序排列组成的音调信息(例如,音调的高低),通过识别该一个或多个音调信息以及多个音调信息间的顺序排列是否正确来确定识别该目标语音特征信息;在一些实施例中,所述目标语音特征信息包括音色信息,其中,音色是指不同的声音的频率表现在波形方面总是有与众不同的特性,例如,不同的物体振动都有不同的特点。例如,预设一定音色组合形式的目标语音特征信息,通过识别该音色组合确定识别该目标语音特征信息;在一些实施例中,所述目标语音特征信息包括声纹信息,其中,声纹是用电声学仪器显示的携带言语信息的声波频谱。例如,所述目标语音特征信息为一段携带语音信息的声波频谱,通过识别该目标语音特征信息进行验证开锁;在另一些实施例中,所述目标语音特征信息包括音调信息、音色信息以及声纹信息中的两种或者三种的组合,例如,该目标语音特征信息按顺序含有多个子目标语音特征信息,其中,所述每个目标语音特征信息含有自己的音调信息、音色信息,并且,每个所述音调信息对应有不同的音色信息,从而降低目标语音特征信息被恶意破解的风险。通过预设该目标语音特征信息,来进一步增加验证开锁的安全性。
如图18所示,一种电子救援锁,其中,所述设备包括四一模块、四二模块以及四三模块,四一模块,用于获取所述电子救援锁对应的可穿戴救援设备提供的救援验证信息;四二模块,用于基于所述救援验证信息进行开锁验证;四三模块,用于若验证通过,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,网络设备基于接收到的救援呼叫请求匹配至少一台可穿戴救援设备(例如,网络设备基于获取到的呼救设备的当前位置查询当前处于该呼救设备附近的至少一台可穿戴救援设备),并向该可穿戴救援设备发送救援指令,以通知使用该可穿戴救援设备的救援人员当前有救援任务。在一些实施例中,所述救援指令包括救援验证信息。在一些实施例中,所述救援验证信息包括救援识别信息,例如,该救援人员在对应的电子救援锁上输入该救援验证信息,该电子救援锁对该救援验证信息进行验证;在另一些实施例中,所述救援验证信息包括目标语音特征信息,例如,该可穿戴救援设备播放包含该目标语音特征信息的待验证语音,该电子救援锁识别并验证该待验 证语音。在一些实施例中,所述电子救援锁的执行机构包括电动机和相应的机械结构,该电动机用来驱动相应的机械结构(例如,进户门的锁舌或与锁孔配合以锁止门体的锁钩),以进行解锁所述电子救援锁对应的进户门(例如通过电动机驱动锁舌缩入门体内,或驱动锁钩旋转并从锁孔中脱开),从而为所述可穿戴救援设备对应的救援人员提供救援通道。
在一些实施例中,所述方法还包括四四模块(未示出),四四模块,用于接收所述电子救援锁对应的网络设备所发送的验证指令,其中所述验证指令包括待验证信息;所述四二模块用于:基于所述待验证信息,对所述救援验证信息进行开锁验证;其中,所述待验证信息和所述救援验证信息基于同一生成算法生成。在一些实施例中,所述待验证信息和所述救援验证信息分别被发送至电子救援锁和救援人员所佩戴的可穿戴救援设备。在一些实施例中,所述待验证信息是网络设备基于救援识别信息查询确定所得的;在另一些实施例中,所述待验证信息是基于预设的算法(例如,加密算法)对所述救援识别信息进行处理得到的。例如,网络设备基于一定的算法对呼救请求中的救援识别信息进行加密处理,以生成救援验证信息和待验证信息,并将该救援验证信息发送给可穿戴救援设备,将该待验证信息发送给该呼救设备对应的电子救援锁;在救援人员到达现场后,该可穿戴救援设备向该电子救援锁发送该救援验证信息,以供该电子救援锁基于该待验证信息对该救援验证信息进行验证,例如当该救援验证信息与该待验证信息相匹配时验证通过,该电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述算法包括但不限于DES加密算法、AES加密算法、RSA加密算法等加密算法;在一个典型场景下,该算法用于根据呼救用户的呼救设备的标识信息或者呼救用户的身份信息生成上述待验证信息和救援验证信息,以供电子救援锁基于该待验证信息和救援验证信息对可穿戴救援设备及救援人员进行合法性验证,并在验证通过时开门。当然,本领域技术人员应能理解,以上所述算法操作仅为举例且不限于加密算法,其他现有的或今后可能出现的算法操作如能适用于本申请,也包含在本申请的保护范围内,并以引用的方式包含于此。
在一些实施例中,所述救援验证信息包括待验证语音,所述待验证信息包括目标语音特征信息;所述四二模块用于:将所述待验证语音对应的待验证语音特征信息与目标语音特征信息进行比对以进行开锁验证。在一些实施例中,为了进一步增加验证开锁的安全性,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息包括但不限于特征音调、 音色、声纹等语音特征信息。该网络设备通过所述目标特征语音信息合成目标语音,并将该目标语音发送给可穿戴救援设备,以供该可穿戴救援设备播放该目标语音;该电子救援锁采集该目标语音并识别该目标语音中的语音特征信息,再基于识别出的语音特征信息进行开锁验证。
如图19所示,示出了根据本申请另一个实施例的一种网络设备,其中,所述设备包括五一模块、五二模块、五三模块、五四模块以及五五模块,五一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;五二模块,用于基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;五三模块,用于接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的;五四模块,用于基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息;五五模块,用于若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述救援设备可为包括但不限于可穿戴救援设备或其他用户设备(例如手机、平板、笔记本电脑等计算设备)。在一些实施例中,所述呼救设备包括但不限于用户设备、智能监测设备(例如,设置有重力传感器或者心率监测模块的智能手环),在一些实施例中,所述用户设备包括但不限于手机、平板、笔记本电脑等计算设备。
具体而言,五一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息。在一些实施例中,所述救援识别信息包括但不限于设备标识信息(例如,设备序列号、设备的MAC地址)。在一些实施例中,所述救援识别信息用于识别所述呼救设备,从而基于该呼救设备确定呼救者的身份,例如,用户通过注册的方式在网络设备中预先存储该用户所使用的呼救设备与该用户间的映射关系,当该用户通过该呼救设备向网络设备发送救援呼叫请求时,网络设备基于该呼救设备即可查询获得该用户的身份信息、病史信息、过敏相关信息等相关信息,为救援提供参考;在另一些实施例中,通过该救援识别信息可查询到该呼救设备对应的电子救援锁,例如,网络设备中存储有呼救设备以及该呼救设备对应的电子救援锁,该呼救设备的救援识别信息与该电子救援锁之间存在映射关系,网络设备通过该呼救设备的救援 标识信息可查询获得该呼救设备对应的电子救援锁。
五二模块,用于基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息。在一些实施例中,所述身份特征信息包括但不限于相应救援人员的人脸特征信息、相应救援人员的指纹特征信息、相应救援人员的声纹特征信息。在一些实施例中,所述身份特征信息用于识别确定对应救援人员的身份信息,例如,电子救援锁通过人脸采集装置采集到达救援现场的现场人员的面部画像,并将该面部画像发送给该网络设备,该网络设备将该面部画像与该人脸特征信息进行对比,若两者的相似度大于或等于预设的相似度预阈值,则确定该现场人员是该救援设备对应的救援人员,进一步地,该网络设备向对应的电子救援锁发送开锁指令,从而提高开锁安全性。在一些实施例中,网络设备基于呼救设备以及救援设备的位置信息,为该呼救设备对应的呼救者查询匹配位于其附近的至少一台救援设备。
五三模块,用于接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的。在一些实施例中,所述待验证信息包括但不限于现场人员的面部图像、现场人员的指纹信息、现场人员的音频信息。在一些实施例中,所述电子救援锁设置有待验证信息采集装置(例如,人脸采集装置、指纹采集装置或者语音采集装置),通过该待验证信息采集装置采集关于到达救援现场的现场人员的待验证信息,并将该待验证信息发送给该网络设备,由该网络设备进行验证。
五四模块,用于基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息。在一些实施例中,网络设备中存储有多个救援设备(例如,救援设备的MAC地址、设备序列号)以及每个所述救援设备对应的救援人员的身份特征信息。电子救援锁通过待验证信息采集装置采集关于到达救援现场的现场人员的待验证信息,并将其采集的待验证信息发送给该网络设备。进一步地,在一些实施例中,该网络设备根据该待验证信息查询是否有与该待验证信息相匹配的身份特征信息,若存在,则确定该现场人员具有救援权限。
五五模块,用于若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述救援权限信息包括有权、无权。若网络设备验证该救援权限信息为有权,则该网络设备向对应的电子救援锁发送开锁指令。该 电子救援锁接收该开锁指令,并基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
在一些实施例中,所述五四模块用于:基于所述待验证信息、所述至少一台救援设备的地理位置信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息。在一些实施例中,为了进一步提高开锁的安全性,网络设备结合所述至少一台救援设备的地理位置信息确定现场人员的救援权限信息。例如,网络设备获取所述至少一台救援设备的地理位置信息(例如,基于GPS定位技术,所述救援设备将其当前的地理位置信息提供给该网络设备),若该地理位置信息被救援现场所覆盖或与救援现场的距离小于某个距离阈值,则说明对应的现场人员在该救援现场,则可确定该现场人员具有救援权限信息;若该地理位置信息未被救援现场所覆盖或与救援现场的举例大于上述距离阈值,则说明对应的现场人员不在救援现场,则即使该现场人员的待验证信息与救援人员的身份特征信息相匹配,也确定该现场人员不具有救援权限信息,从而保证为当前位于救援现场的救援人员开门,保证呼救者的人身以及财产安全。
在一些实施例中,所述身份特征信息包括以下至少任一项:相应救援人员的人脸特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的面部图像;相应救援人员的指纹特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的指纹信息;相应救援人员的声纹特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的音频信息。在一些实施例中,所述身份特征信息预存在网络设备中,网络设备将电子救援锁发送的关于现场人员的待验证信息与该身份特征信息进行对比,以确定该现场人员的救援权限信息。在一些实施例中,通过人脸识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的人脸特征信息,基于该人脸特征信息对比电子救援锁发送的待验证信息中的面部图像,若该人脸特征信息与该面部图像的相似度大于或等于相似度阈值,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过指纹识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的指纹特征信息,基于该指纹特征信息与电子救援锁发送的待验证信息中的指纹信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过语音识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的声纹特征信息,基于该声纹特征信息与电子救援锁发送的待验证 信息中的音频信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息。在一些实施例中,所述音频信息是该电子救援锁采集的现场人员的音频信息。
如图20所示,示出了根据本申请另一个实施例的一种电子救援锁,其中,所述设备包括六一模块、六二模块以及六三模块,六一模块,用于现场采集关于现场人员的待验证信息;六二模块,用于将所述待验证信息发送至所述电子救援锁对应的网络设备;六三模块,用于基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
具体而言,六一模块,用于现场采集关于现场人员的待验证信息。在一些实施例中,所述待验证信息包括但不限于现场人员的面部图像、现场人员的指纹信息、现场人员的音频信息。在一些实施例中,所述电子救援锁设置有待验证信息采集装置(例如,用于采集人脸照片的摄像装置、指纹采集装置或者用于采集语音的麦克风模块),通过该待验证信息采集装置采集关于到达救援现场的现场人员的待验证信息,并将该待验证信息发送给该网络设备,由该网络设备进行验证。
六二模块,用于将所述待验证信息发送至所述电子救援锁对应的网络设备。在一些实施例中,该电子救援锁在采集到关于现场人员的待验证信息后,将该待验证信息发送给对应的网络设备,以供该网络设备进行验证。进一步地,在网络设备验证通过的情况下,由该网络设备向该电子救援锁发送开锁指令。
六三模块,用于基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述电子救援锁的执行机构包括电动机和相应的机械结构,该电动机用来驱动相应的机械结构(例如,进户门的锁舌),以进行解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
在一些实施例中,所述待验证信息包括以下至少任一项:现场人员的面部图像;现场人员的指纹信息;现场人员的音频信息。在一些实施例中,网络设备中预存有关于救援人员的身份特征信息,电子救援锁向该网络设备发送的关于现场人员的待验证信息,以供该网络设备进行验证。在一些实施例中,通过人脸识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的人脸特征信息,基于该人脸特征信息对比电子救援锁发送的待验证信息中的面部图像,若该人脸特征信息与该面部图像的相似度大于 或等于相似度阈值,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过指纹识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的指纹特征信息,基于该指纹特征信息与电子救援锁发送的待验证信息中的指纹信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息;在一些实施例中,通过语音识别的方式确定现场人员的救援权限信息,例如,所述身份特征信息包括相应救援人员的声纹特征信息,基于该声纹特征信息与电子救援锁发送的待验证信息中的音频信息相匹配,若匹配成功,则确定该待验证信息对应的现场人员具有救援权限信息。在一些实施例中,所述音频信息是该电子救援锁采集的现场人员的音频信息。
图21示出了根据本申请另一个实施例的一种网络设备,其中,所述设备包括七一模块、七二模块、七三模块、七四模块以及七五模块,七一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;七二模块,用于基于所述救援呼叫请求匹配至少一台可穿戴救援设备;七三模块,用于向所述至少一台可穿戴救援设备发送救援指令;七四模块,用于接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求;七五模块,用于基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
具体而言,七一模块,用于接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息。在一些实施例中,所述救援识别信息包括但不限于设备标识信息(例如,设备序列号、设备的MAC地址)。在一些实施例中,所述救援识别信息用于供网络设备识别所述呼救设备,并基于该呼救设备确定呼救者的身份,例如,用户通过注册的方式在网络设备中预先存储该用户所使用的呼救设备与该用户间的映射关系,当该用户通过该呼救设备向网络设备发送救援呼叫请求时,网络设备基于该呼救设备即可查询获得该用户的身份信息、病史信息、过敏相关信息等相关信息,为救援提供参考;在另一些实施例中,通过该救援识别信息可查询到该呼救设备对应的电子救援锁,例如,网络设备中存储有呼救设备以及该呼救设备对应的电子救援锁,该呼救设备的救援识别信息与该电子救援锁之间存在映射关系,网络设备基于该呼救设备的救援标识信息以及该映射关系可查询获得该呼救设备对应的电子救援锁。
七二模块,用于基于所述救援呼叫请求匹配至少一台可穿戴救援设备。在一些实施例 中,网络设备基于呼救设备以及可穿戴救援设备的位置信息,为该呼救设备对应的呼救者查询匹配位于其附近的至少一台可穿戴救援设备。
七三模块,用于向所述至少一台可穿戴救援设备发送救援指令。在一些实施例中,网络设备通过向该可穿戴救援设备发送救援指令来通知该可穿戴救援设备对应的救援人员当前有需要救援的紧急情况。
七四模块,用于接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求。在一些实施例中,接收救援指令的可穿戴救援设备通过向该网络设备发送开锁请求的方式请求该网络设备控制对应的电子救援锁进解锁呼救者的进户门。
七五模块,用于基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,例如该网络设备在接收到该可穿戴救援设备发送的开锁请求后,向对应的电子救援锁发送所述开锁指令。
在一些实施例中,所述救援指令包括所述呼救设备对应的目标位置信息,所述开锁请求包括所述可穿戴救援设备的地理位置信息;所述设备还包括七六模块(未示出),七六模块,用于基于所述目标位置信息及所述地理位置信息验证所述开锁请求;所述七五模块用于:若所述开锁请求通过验证,基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述目标位置信息用于确定呼救设备的当前位置,所述地理位置信息用于确定可穿戴救援设备的当前位置,以供所述网络设备基于所述目标位置信息以及所述地理位置信息确定使用该可穿戴救援设备的救援人员是否已到达该呼救设备所处的救援现场。当网络设备确定该目标位置信息已覆盖该地理位置信息或者所述地理位置信息与目标位置信息之间的距离小于某个距离阈值时,网络设备验证通过,并向对应的电子救援锁发送开锁指令,为该救援人员开锁。
图22示出了根据本申请另一个实施例的一种可穿戴救援设备端,其中,所述设备包括八一模块以及八二模块,八一模块,用于接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的;八二模块,用于若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
具体而言,八一模块,用于接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的。在一些实施例中,网络设备基于接收到的救援呼叫请求匹配至少一台可穿戴救援设备(例如,网络设备基于获取到的呼救设备的当前位置查询当前处于该呼救设备附近的至少一台可穿戴救援设备),并向该可穿戴救援设备发送救援指令,以通知使用该可穿戴救援设备的救援人员当前有救援任务。
八二模块,用于若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。在一些实施例中,所述响应触发事件包括但不限于对应的救援人员的相关操作(例如按下某个按钮)、该可穿戴救援设备到达某一地点(例如可穿戴救援设备与该目标位置信息的距离小于预设的距离阈值)。进一步地,该可穿戴救援设备基于接收的救援指令向对应的网络设备发送开锁请求。
在一些实施例中,所述开锁请求包括所述可穿戴救援设备的地理位置信息。在一些实施例中,所述开锁请求包括所述可穿戴救援设备的地理位置信息,例如,该可穿戴救援设备基于GPS定位获取其当前所在的地理位置信息,并将该地理位置信息发送给对应的网络设备,以供对应的网络设备基于该地理位置信息确定该可穿戴救援设备对应的救援人员已到达救援现场;在判定救援人员已到达救援现场的情况下,网络设备基于该开锁请求向相应的电子救援锁发送开锁指令,以供该电子救援锁基于该开锁指令解锁相应的进户门,从而为救援人员提供救援通道。
本申请还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机代码,当所述计算机代码被执行时,如前任一项所述的方法被执行。
本申请还提供了一种计算机程序产品,当所述计算机程序产品被计算机设备执行时,如前任一项所述的方法被执行。
本申请还提供了一种计算机设备,所述计算机设备包括:
一个或多个处理器;
存储器,用于存储一个或多个计算机程序;
当所述一个或多个计算机程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如前任一项所述的方法。
图23示出了可被用于实施本申请中所述的各个实施例的示例性系统。
如图23所示,在一些实施例中,系统1000能够作为各所述实施例中的任意一个网络设备、可穿戴检测设备或可穿戴救援设备。在一些实施例中,系统1000可包括具有指令的一个或多个计算机可读介质(例如,系统存储器或NVM/存储设备1020)以及与该一个或多个计算机可读介质耦合并被配置为执行指令以实现模块从而执行本申请中所述的动作的一个或多个处理器(例如,(一个或多个)处理器1005)。
对于一个实施例,系统控制模块1010可包括任意适当的接口控制器,以向(一个或多个)处理器1005中的至少一个和/或与系统控制模块1010通信的任意适当的设备或组件提供任意适当的接口。
系统控制模块1010可包括存储器控制器模块1030,以向系统存储器1015提供接口。存储器控制器模块1030可以是硬件模块、软件模块和/或固件模块。
系统存储器1015可被用于例如为系统1000加载和存储数据和/或指令。对于一个实施例,系统存储器1015可包括任意适当的易失性存储器,例如,适当的DRAM。在一些实施例中,系统存储器1015可包括双倍数据速率类型四同步动态随机存取存储器(DDR4SDRAM)。
对于一个实施例,系统控制模块1010可包括一个或多个输入/输出(I/O)控制器,以向NVM/存储设备1020及(一个或多个)通信接口1025提供接口。
例如,NVM/存储设备1020可被用于存储数据和/或指令。NVM/存储设备1020可包括任意适当的非易失性存储器(例如,闪存)和/或可包括任意适当的(一个或多个)非易失性存储设备(例如,一个或多个硬盘驱动器(Hard Disk,HDD)、一个或多个光盘(CD)驱动器和/或一个或多个数字通用光盘(DVD)驱动器)。
NVM/存储设备1020可包括在物理上作为系统1000被安装在其上的设备的一部分的存储资源,或者其可被该设备访问而不必作为该设备的一部分。例如,NVM/存储设备1020可通过网络经由(一个或多个)通信接口1025进行访问。
(一个或多个)通信接口1025可为系统1000提供接口以通过一个或多个网络和/或与任意其他适当的设备通信。系统1000可根据一个或多个无线网络标准和/或协议中的任意标准和/或协议来与无线网络的一个或多个组件进行无线通信。
对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010 的一个或多个控制器(例如,存储器控制器模块1030)的逻辑封装在一起。对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010的一个或多个控制器的逻辑封装在一起以形成系统级封装(SiP)。对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010的一个或多个控制器的逻辑集成在同一模具上。对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010的一个或多个控制器的逻辑集成在同一模具上以形成片上系统(SoC)。
在各个实施例中,系统1000可以但不限于是:服务器、工作站、台式计算设备或移动计算设备(例如,膝上型计算设备、手持计算设备、平板电脑、上网本等)。在各个实施例中,系统1000可具有更多或更少的组件和/或不同的架构。例如,在一些实施例中,系统1000包括一个或多个摄像机、键盘、液晶显示器(LCD)屏幕(包括触屏显示器)、非易失性存储器端口、多个天线、图形芯片、专用集成电路(ASIC)和扬声器。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声 音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (30)

  1. 一种在网络设备端的救援方法,其中,所述方法包括:
    接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
    基于所述救援呼叫请求匹配至少一台可穿戴救援设备;
    向所述至少一台可穿戴救援设备发送救援指令,所述救援指令包括基于所述救援识别信息确定的救援验证信息;
    其中,所述救援验证信息用于供所述呼救设备对应的电子救援锁对所述可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    向所述呼救设备对应的电子救援锁发送验证指令,其中所述验证指令包括基于所述救援识别信息确定的待验证信息。
  3. 根据权利要求2所述的方法,其中,所述向所述呼救设备对应的电子救援锁发送验证指令,包括:
    基于所述救援识别信息生成对应的待验证信息;
    向所述呼救设备对应的电子救援锁发送验证指令,其中所述验证指令包括所述待验证信息;
    所述向所述至少一台可穿戴救援设备发送救援指令,包括:
    基于所述救援识别信息生成对应的救援验证信息;
    向所述至少一台可穿戴救援设备发送救援指令,其中所述救援指令包括所述救援验证信息;
    其中,所述待验证信息和所述救援验证信息基于同一生成算法生成。
  4. 根据权利要求1所述的方法,其中,所述救援验证信息包括目标语音特征信息,所述目标语音特征信息用于合成目标语音,所述电子救援锁基于所述目标语音对所述可穿戴救援设备进行开锁验证。
  5. 一种在呼救设备端的救援方法,其中,所述方法包括:
    基于检测到的救援事件生成相应的救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
    向所述呼救设备对应的网络设备发送救援呼叫请求;
    其中所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于对至少一台可穿戴救援设备进行开锁验证,所述呼救设备对应的电子救援锁在验证通过后解锁相应的进户门。
  6. 根据权利要求5所述的方法,其中,所述救援识别信息包括以下至少任一项:
    所述呼救设备的呼救设备标识信息;
    所述呼救设备对应的呼救用户的呼救用户标识信息。
  7. 根据权利要求5所述的方法,其中,所述网络设备基于所述救援识别信息确定相应的救援验证信息,所述救援验证信息用于供所述呼救设备对应的电子救援锁对至少一台可穿戴救援设备进行开锁验证,所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  8. 一种在可穿戴救援设备端的救援方法,其中,所述方法包括:
    接收所述可穿戴救援设备对应的网络设备所发送的救援指令,所述救援指令包括救援验证信息;
    将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;
    其中所述电子救援锁在验证通过后解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  9. 根据权利要求8所述的方法,其中,所述将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证,包括:
    建立所述可穿戴救援设备对应的电子救援锁与所述可穿戴救援设备之间的通信连接;
    通过所述通信连接将所述救援验证信息发送至所述可穿戴救援设备对应的电子救援锁,以通过所述电子救援锁进行开锁验证。
  10. 根据权利要求8所述的方法,其中,所述救援验证信息包括目标语音特征信息;
    所述将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述 救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证,包括:
    基于所述救援验证信息,响应于所述可穿戴救援设备对应的救援人员的播放操作,播放待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。
  11. 根据权利要求10所述的方法,其中,所述基于所述救援验证信息,响应于所述可穿戴救援设备对应的救援人员的播放操作,播放待验证语音,包括:
    响应于所述可穿戴救援设备对应的救援人员的播放操作,基于所述目标语音特征信息生成待验证语音,并播放所述待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。
  12. 根据权利要求10所述的方法,其中,所述基于所述救援验证信息,响应于所述可穿戴救援设备对应的救援人员的播放操作,播放待验证语音,包括:
    采集所述可穿戴救援设备对应的救援人员的实时语音;
    基于所述目标语音特征信息,对所述实时语音执行转换操作以生成待验证语音;
    响应于所述救援人员的播放操作,播放所述待验证语音,以供所述可穿戴救援设备对应的电子救援锁基于所述待验证语音进行开锁验证。
  13. 根据权利要求11或12所述的方法,其中,所述目标语音特征信息包括以下至少任一项:
    音调信息;
    音色信息;
    声纹信息。
  14. 一种在电子救援锁端的救援方法,其中,所述方法包括:
    获取所述电子救援锁对应的可穿戴救援设备提供的救援验证信息;
    基于所述救援验证信息进行开锁验证;
    若验证通过,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  15. 根据权利要求14所述的方法,其中,所述方法还包括:
    接收所述电子救援锁对应的网络设备所发送的验证指令,其中所述验证指令包括待验证信息;
    所述基于所述救援验证信息进行开锁验证,包括:
    基于所述待验证信息,对所述救援验证信息进行开锁验证;
    其中,所述待验证信息和所述救援验证信息基于同一生成算法生成。
  16. 根据权利要求14所述的方法,其中,所述救援验证信息包括待验证语音,所述待验证信息包括目标语音特征信息;
    所述基于所述救援验证信息进行开锁验证,包括:
    将所述待验证语音对应的待验证语音特征信息与目标语音特征信息进行比对以进行开锁验证。
  17. 一种在网络设备端的救援方法,其中,所述方法包括:
    接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
    基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;
    接收所述呼救设备对应的电子救援锁发送的待验证信息,所述待验证信息是由所述电子救援锁现场采集的;
    基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息;
    若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  18. 根据权利要求17所述的方法,其中,所述基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息,包括:
    基于所述待验证信息、所述至少一台救援设备的地理位置信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息。
  19. 根据权利要求17或18所述的方法,其中,所述身份特征信息包括以下至少任一项:
    相应救援人员的人脸特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的面部图像;
    相应救援人员的指纹特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的指纹信息;
    相应救援人员的声纹特征信息,其中所述待验证信息包括所述电子救援锁对应的现场人员的音频信息。
  20. 一种在电子救援锁端的救援方法,其中,所述方法包括:
    现场采集关于现场人员的待验证信息;
    将所述待验证信息发送至所述电子救援锁对应的网络设备;
    基于所述网络设备所发送的开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  21. 根据权利要求20所述的方法,其中,所述待验证信息包括以下至少任一项:
    现场人员的面部图像;
    现场人员的指纹信息;
    现场人员的音频信息。
  22. 一种在网络设备端的救援方法,其中,所述方法包括:
    接收所述网络设备对应的呼救设备所发送的救援呼叫请求,所述救援呼叫请求包括与所述呼救设备相对应的救援识别信息;
    基于所述救援呼叫请求匹配至少一台可穿戴救援设备;
    向所述至少一台可穿戴救援设备发送救援指令;
    接收所述至少一台可穿戴救援设备基于所述救援指令所发送的开锁请求;
    基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
  23. 根据权利要求22所述的方法,其中,所述救援指令包括所述呼救设备对应的目标位置信息,所述开锁请求包括所述可穿戴救援设备的地理位置信息;
    所述方法还包括:
    基于所述目标位置信息及所述地理位置信息验证所述开锁请求;
    所述基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,包括:
    若所述开锁请求通过验证,基于所述开锁请求向所述呼救设备对应的电子救援锁发送 开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  24. 一种在可穿戴救援设备端的救援方法,其中,所述方法包括:
    接收所述可穿戴救援设备对应的网络设备所发送的救援指令,其中所述救援指令是由所述网络设备基于所述网络设备对应的呼救设备所发送的救援呼叫请求而发送的;
    若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求,所述开锁请求用于供所述呼救设备对应的电子救援锁解锁相应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  25. 根据权利要求24所述的方法,其中,所述开锁请求包括所述可穿戴救援设备的地理位置信息。
  26. 一种救援方法,其中,所述方法包括:
    呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
    所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令;
    所述可穿戴救援设备接收所述救援指令,并将所述救援验证信息提供至所述可穿戴救援设备对应的电子救援锁,以基于所述救援验证信息,通过所述可穿戴救援设备对应的电子救援锁进行开锁验证;
    所述电子救援锁获取所述救援验证信息,并基于所述救援验证信息进行开锁验证,若验证通过,所述电子救援锁控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门,从而为所述可穿戴救援设备对应的救援人员提供救援通道。
  27. 一种救援方法,其中,所述方法包括:
    呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
    所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台救援设备以及每台救援设备所对应的救援人员的身份特征信息;
    电子救援锁现场采集关于现场人员的待验证信息,将所述待验证信息发送至所述网络设备;
    所述网络设备接收所述待验证信息,基于所述待验证信息以及所述身份特征信息确定所述电子救援锁对应的现场人员的救援权限信息,若所述救援权限信息包括有权,向所述电子救援锁发送开锁指令;
    所述救援电子锁基于所述开锁指令,控制所述电子救援锁的执行机构解锁所述电子救援锁对应的进户门。
  28. 一种救援方法,其中,所述方法包括:
    呼救设备基于检测到的救援事件生成相应的救援呼叫请求,并向所述呼救设备对应的网络设备发送救援呼叫请求,其中所述救援呼叫请求包括所述呼救设备的救援识别信息;
    所述网络设备接收所述救援呼叫请求,基于所述救援呼叫请求匹配至少一台可穿戴救援设备,向所述至少一台可穿戴救援设备发送救援指令;
    所述可穿戴救援设备接收所述救援指令,若检测到响应触发事件,基于所述救援指令向所述网络设备发送开锁请求;
    所述网络设备接收所述开锁请求,基于所述开锁请求向所述呼救设备对应的电子救援锁发送开锁指令,以供所述电子救援锁基于所述开锁指令解锁对应的进户门。
  29. 一种救援设备,其中,所述设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求1至25中任一项方法所述的操作。
  30. 一种存储指令的计算机可读介质,所述指令在被执行时使得系统进行如权利要求1至25中任一项方法所述的操作。
PCT/CN2020/084886 2019-04-23 2020-04-15 一种救援方法与设备 WO2020216110A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910328789.6A CN110084932B (zh) 2019-04-23 2019-04-23 一种救援方法与设备
CN201910328789.6 2019-04-23

Publications (1)

Publication Number Publication Date
WO2020216110A1 true WO2020216110A1 (zh) 2020-10-29

Family

ID=67416280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/084886 WO2020216110A1 (zh) 2019-04-23 2020-04-15 一种救援方法与设备

Country Status (2)

Country Link
CN (1) CN110084932B (zh)
WO (1) WO2020216110A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084932B (zh) * 2019-04-23 2022-03-18 上海救要救信息科技有限公司 一种救援方法与设备
CN110660204A (zh) * 2019-10-16 2020-01-07 珠海格力电器股份有限公司 适于智能门锁的紧急救援方法及智能门锁
CN111899479A (zh) * 2020-07-16 2020-11-06 深圳鞠慈云科技有限公司 意外事故监测系统
CN116543485A (zh) * 2023-06-15 2023-08-04 智慧云联信息技术(北京)有限公司 紧急求救方法、系统、电子设备及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427413A (zh) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 智能开锁方法和智能锁具
CN106343982A (zh) * 2016-11-04 2017-01-25 陕西科技大学 一种居家老人的健康监护远程救助装置及方法
CN106377235A (zh) * 2016-10-17 2017-02-08 杨雪涵 老年人救援用可穿戴设备及系统
US20170061763A1 (en) * 2011-04-04 2017-03-02 Alarm.Com Incorporated Fall detection and reporting technology
CN106539574A (zh) * 2017-01-03 2017-03-29 浙江物云科技有限公司 一种应急联动健康监测系统及方法
CN206390900U (zh) * 2016-10-17 2017-08-11 杨雪涵 老年人救援用可穿戴设备及系统
CN110084932A (zh) * 2019-04-23 2019-08-02 上海救要救信息科技有限公司 一种救援方法与设备

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE0400425L (sv) * 2004-02-24 2004-11-30 Tagmaster Ab Förfarande för behörighetsgivande
CN104616370A (zh) * 2013-11-04 2015-05-13 岳路阳 一种定时开关wifi智能锁具及软件控制系统
CN106297219B (zh) * 2015-05-19 2019-01-01 广州洁全医疗科技有限公司 一种院前应急救援方法
CN205577651U (zh) * 2016-04-26 2016-09-14 深圳市友利联合电子有限公司 一种卫浴报警门锁
CN206039815U (zh) * 2016-08-31 2017-03-22 陈昊兴 独居老人求救远程遥控开门锁装置
CN107610414A (zh) * 2017-08-28 2018-01-19 杜学超 一种紧急报警求助系统及方法
CN107978118A (zh) * 2017-11-24 2018-05-01 广州市天河区保安服务公司 防盗防火方法及系统
CN207924885U (zh) * 2017-12-04 2018-09-28 上海救要救信息科技有限公司 安全应急响应系统
CN108198310B (zh) * 2018-01-22 2021-01-29 宁波白金汉爵酒店投资有限公司 酒店房间状态关联门禁控制方法、装置及系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170061763A1 (en) * 2011-04-04 2017-03-02 Alarm.Com Incorporated Fall detection and reporting technology
CN105427413A (zh) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 智能开锁方法和智能锁具
CN106377235A (zh) * 2016-10-17 2017-02-08 杨雪涵 老年人救援用可穿戴设备及系统
CN206390900U (zh) * 2016-10-17 2017-08-11 杨雪涵 老年人救援用可穿戴设备及系统
CN106343982A (zh) * 2016-11-04 2017-01-25 陕西科技大学 一种居家老人的健康监护远程救助装置及方法
CN106539574A (zh) * 2017-01-03 2017-03-29 浙江物云科技有限公司 一种应急联动健康监测系统及方法
CN110084932A (zh) * 2019-04-23 2019-08-02 上海救要救信息科技有限公司 一种救援方法与设备

Also Published As

Publication number Publication date
CN110084932B (zh) 2022-03-18
CN110084932A (zh) 2019-08-02

Similar Documents

Publication Publication Date Title
WO2020216110A1 (zh) 一种救援方法与设备
US11468720B2 (en) Wearable misplacement
US11361636B2 (en) Gunshot detection system anti-tampering protection
US10134396B2 (en) Preventing of audio attacks
US10524123B2 (en) Establishing secure communication at an emergency care scene
US10242673B2 (en) Preventing of audio attacks using an input and an output hotword detection model
US20020095586A1 (en) Technique for continuous user authentication
CA3124635C (en) Audio-based access control
WO2020182039A1 (zh) 一种救援方法与设备
TW201235881A (en) Secure and private location
KR101768213B1 (ko) 생체정보를 이용한 인증 방법 및 장치
US10447334B2 (en) Methods and systems for comprehensive security-lockdown
JP3455971B2 (ja) 通信回線を用いた情報供給システム
WO2020211805A1 (zh) 一种用于获取被救援者的基础参数的方法与设备
US20210351920A1 (en) Secure communication method and smart lock system based thereof
Fomichev et al. Perils of zero-interaction security in the internet of things
US20200044682A1 (en) Methods and Systems for Comprehensive Security-Lockdown
KR20170107409A (ko) 생체정보를 이용한 인증 방법 및 장치
WO2020156524A1 (zh) 一种用于确定救援小组信息的方法与设备
WO2020173274A1 (zh) 一种存储、调用区块链账户私钥的方法及装置
Meng et al. Literature Review of Security in Smart Home Network
Xu et al. VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers
US20240031663A1 (en) Integrated surveillance system and methods for capturing sensor data controlled by security gateway
Ajay et al. Privacy and Security in Internet of Medical Things
WO2022003964A1 (ja) データ収集システム、端末、データ収集方法、及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20794062

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20794062

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM1205A DATED 23/02/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20794062

Country of ref document: EP

Kind code of ref document: A1