WO2021077843A1 - 协同呼救方法、装置、可穿戴设备和存储介质 - Google Patents
协同呼救方法、装置、可穿戴设备和存储介质 Download PDFInfo
- Publication number
- WO2021077843A1 WO2021077843A1 PCT/CN2020/105906 CN2020105906W WO2021077843A1 WO 2021077843 A1 WO2021077843 A1 WO 2021077843A1 CN 2020105906 W CN2020105906 W CN 2020105906W WO 2021077843 A1 WO2021077843 A1 WO 2021077843A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vehicle
- user
- rescue request
- information
- danger
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0205—Specific application combined with child monitoring using a transmitter-receiver system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0269—System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- This application relates to the field of communication technology, and in particular to a method, device, wearable device, and storage medium for collaborative calling for help.
- the embodiments of the present application provide a collaborative calling for help method, device, wearable device, and storage medium to solve the problem that it is currently difficult for users to achieve safe and convenient calling for help when a dangerous situation occurs when a user is riding or driving. problem.
- an embodiment of the present application provides a collaborative calling for help method, including:
- V2X information Collect V2X information, and determine the vehicle identification of the vehicle where the user is located through the V2X information
- a rescue request is initiated, where the rescue request includes the vehicle information and call information.
- the V2X information includes GPS data, the collecting V2X information, and determining the vehicle identification of the vehicle where the user is based on the V2X information includes:
- the vehicle identifier of the vehicle where the user is located is determined according to the vehicle where the user is located.
- the sensor data includes angular velocity, acceleration, and heart rate, the sensor data is collected, and whether the user is in danger is detected according to the sensor data ,include:
- Detect whether the user is in danger according to whether the angular velocity, the acceleration, and the heart rate meet preset risk determination conditions, wherein, when the angular velocity, the acceleration, and the heart rate meet the preset risk determination conditions, it is determined The user is in danger.
- initiating a rescue request includes:
- the rescue request is initiated according to different emergency levels, where the emergency levels are divided according to time.
- initiating the rescue request according to different emergency levels includes:
- initiating the rescue request according to different emergency levels includes:
- initiating the rescue request according to different emergency levels includes:
- the rescue request is initiated to the roadside unit, so that the roadside unit responds to the traffic after receiving the rescue request. Instruct the device to control.
- an implementation manner is further provided.
- the rescue request is initiated in a point-to-point communication manner, wherein the communication process adopts the V2X communication protocol.
- the data segment transmitted by the V2X communication protocol includes a user field, and the user field includes a sender device ID, a receiver device ID, The public key of the sender and the encryption flag indicating whether the data segment is encrypted.
- an embodiment of the present application provides a cooperative distress call device, including:
- the first collection module is configured to collect V2X information, and determine the vehicle identification of the vehicle where the user is located by using the V2X information;
- a vehicle information acquisition module configured to acquire vehicle information of the vehicle where the user is located according to the vehicle identification of the vehicle where the user is located;
- the third collection module is used to collect sensor data and detect whether the user is in danger according to the sensor data;
- the rescue request module is used to initiate a rescue request if it is determined that the user is in danger, wherein the rescue request includes the vehicle information and call information.
- V2X information includes GPS data
- the first collection module is specifically configured to:
- the vehicle identifier of the vehicle where the user is located is determined according to the vehicle where the user is located.
- the sensor data includes angular velocity, acceleration, and heart rate
- the third collection module is specifically used for:
- Detect whether the user is in danger according to whether the angular velocity, the acceleration, and the heart rate meet preset risk determination conditions, wherein, when the angular velocity, the acceleration, and the heart rate meet the preset risk determination conditions, it is determined The user is in danger.
- rescue request module is specifically used for:
- the rescue request is initiated according to different emergency levels, where the emergency levels are divided according to time.
- rescue request module is also specifically used for:
- rescue request module is also specifically used for:
- rescue request module is also specifically used for:
- the rescue request is initiated to the roadside unit, so that the roadside unit responds to the traffic after receiving the rescue request. Instruct the device to control.
- the rescue request is initiated by means of point-to-point communication, wherein the communication process adopts the V2X communication protocol.
- the data segment transmitted by the V2X communication protocol includes a user field, and the user field includes a sender device ID, a receiver device ID, a sender public key, and an encryption flag indicating whether the data segment is encrypted.
- a wearable device in a third aspect, includes a memory, a processor, and a computer program that is stored in the memory and can run on the processor, and the processor implements the first aspect when the computer program is executed The steps of the method.
- an embodiment of the present application provides a computer-readable storage medium, including a computer program, which, when executed by a processor, implements the steps of the method described in the first aspect.
- the vehicle identification of the vehicle where the user is located is determined through the collected V2X information, and the vehicle that the user is riding in can be quickly confirmed based on the V2X communication method, and based on the vehicle identification of the vehicle where the user is located, the user can be in many vehicles
- the vehicle information of the vehicle where the user is located can be obtained in the process; through the collection of sensor data, the user can be detected whether the user is in danger based on the sensor data.
- the rescue request including the vehicle information and call information can be sent to Receiving equipment.
- the rescue request can be automatically sent, without the user's initiative to trigger, without relying on the taxi application, and can achieve safe and convenient calling for help.
- Fig. 1 is a flowchart of a collaborative calling for help method in an embodiment of the present application
- FIG. 2 is a schematic diagram of an application scenario of the collaborative calling for help method in an embodiment of the present application
- FIG. 3 is another flowchart of the collaborative calling for help method in an embodiment of the present application
- FIG. 4 is a schematic diagram of the data structure of a data segment transmitted in an embodiment of the present application.
- Fig. 5 is a functional block diagram of a cooperative distress call device in an embodiment of the present application.
- Fig. 6 is a schematic diagram of a wearable device in an embodiment of the present application.
- the principle of the current common passenger protection scheme is to use the networking function of mobile phones and tablets to send alarm messages through the base station 2G/3G/4G/5G network, or dial the phone to call 110 to call the police for help, or send it through the taxi application Alarm message.
- the taxi application Take the taxi application as an example. Passengers can call for help by clicking on the safety center-one-key alarm-video alarm / call 110 on the taxi application.
- this passenger protection scheme has the following obvious shortcomings:
- This method of calling for help requires passengers to perform multiple steps on the taxi-hailing application to call the police. This situation is easy to be discovered by criminals and cause further conflicts; even if the criminals did not find them when calling the police, the police obtained the user's geographic location information through inquiry It also takes a long time to track and locate the gangster. At this time, passengers will still be in danger for a long time; if the passenger is hijacked from the beginning, it will be difficult for the passenger to carry out operations and even the alarm cannot be done.
- Fig. 1 shows a flow chart of the collaborative calling for help method in this embodiment.
- the collaborative calling for help method can be applied to a wearable device, and can provide a safe and convenient calling for help function when a user (wearable device) is in danger when riding or driving.
- the wearable device includes, but is not limited to, wearable devices such as smart bracelets, smart watches, smart rings, and smart necklaces.
- the collaborative calling for help method includes:
- S10 Collect V2X information, and determine the vehicle identification of the vehicle where the user is located through the V2X information.
- V2X Vehicle to everything
- LTE Long Term Evolution
- Vehicle Vehicle to everything
- DSRC Dedicated Short Range Communications, dedicated short-range communication technology
- the wearable device collects V2X information through V2X communication, where the V2X information includes BSM (Basic safety Message), and the basic safety message is the information broadcast by the vehicle during V2X communication, including the vehicle VIN (Vehicle Identification Number) code, vehicle speed, formal heading, geographic location, acceleration, predicted path, historical path, vehicle type, etc. Understandably, when a user is driving or riding in a vehicle, V2X information can be collected through a wearable device on the body to establish a communication interconnection between the user's wearable device, the user's vehicle, and other vehicles within the communication range.
- BSM Basic safety Message
- the vehicle identification refers to an identification that can uniquely identify a vehicle.
- the vehicle VIN code in the V2X information can be specifically used as the vehicle identification.
- the vehicle VIN code is a set of seventeen alphanumeric numbers, which is a unique set of numbers used on cars, which can identify the car's manufacturer, engine, chassis number, and other performance information.
- the embodiments of the present application can quickly confirm the vehicle identification of the vehicle where the user is located based on the V2X communication mode.
- the V2X information includes GPS data
- the vehicle identification of the vehicle where the user is located is determined through the V2X information, which specifically includes:
- S11 Calculate the distance between the user and the surrounding vehicles according to the GPS data, where the vehicles within the preset geographic range are the surrounding vehicles.
- a vehicle within a radius of 150 m with the geographic location of the user as the center may be used as the surrounding vehicle.
- the V2X information includes GPS (Global Positioning System) data, that is, data on the geographic location of the vehicle, and the user can determine the vehicle identification of the vehicle where the user is located through the GPS data of the vehicle.
- GPS Global Positioning System
- the distance between the user and the surrounding vehicles will be calculated according to the GPS data in the basic safety message, so as to compare the distance between the user and the surrounding vehicles. Analyze the distance of surrounding vehicles to determine the vehicle where the user is.
- S12 Within a preset time period, determine surrounding vehicles that are continuously within 1.5 meters of the user as the user's vehicle.
- the safe distance between the front and rear cars should be more than 10 meters in the driving state, so the distance between the user and the front and rear cars under normal vehicle driving is basically impossible to be within 1.5 meters; and for the left and right vehicle distances, the average safe driving distance The distance between the left and right vehicles is 1.2 meters, and the body width is more than 1.5 meters. Therefore, it is basically impossible for the user to get on the vehicle and start from a standstill until the user encounters danger. There will always be vehicles driving in parallel with the vehicle, which makes the distance between people and vehicles within 1.5 meters.
- the surrounding vehicles are determined as the user’s vehicle. If the user is in danger, the user’s vehicle can be marked It is a dangerous vehicle and generates call for help information, where the call for help information includes VRUCW (Vulnerable Road User Collision warning, vulnerable traffic participant collision warning) user data: including the user's use status as "SOS for help", including the user's personal health status, etc. .
- the call information can be sent to recipients such as other vehicles or roadside units in time when the user encounters danger, so that the user's distress situation can be quickly learned.
- S13 Determine the vehicle identification of the vehicle where the user is located according to the vehicle where the user is located.
- a uniquely identifiable identifier may be selected as the vehicle identifier.
- the vehicle VIN code of the vehicle where the user is located can be used as the vehicle identification, which facilitates subsequent wearable devices to collect V2X information sent by the vehicle of the user through the broadcast according to the vehicle VIN code of the vehicle.
- steps S11-S13 a specific implementation manner for determining the vehicle identification of the vehicle where the user is located is provided through V2X information. By using the distance between the user and surrounding vehicles, the vehicle identification of the vehicle where the user is located can be determined.
- S20 Acquire the vehicle information of the vehicle where the user is located according to the vehicle identification of the vehicle where the user is located.
- the vehicle information of the vehicle where the user is located refers to the V2X information collected from the vehicle that the user is riding in or driving, including the basic safety information of the vehicle where the user is located.
- the vehicle information of the user's vehicle needs to be sent when calling for help, so that the rescuer can quickly determine the geographic location of the user for rescue.
- the vehicle information of the user's vehicle can be obtained from the V2X information collected by many vehicles in step S10 according to the vehicle VIN code, or the communication data module of the wearable device can be used according to the vehicle identification, such as supporting LTE -V communication data RFIC (Radio Frequency Integrated Circuit), receives the broadcast information sent by the vehicle's V2X communication module, and collects the vehicle information of the vehicle where the user is located.
- the user can obtain the vehicle information of the vehicle where the user is located from among a large number of vehicles, so that when the user is in danger, the vehicle information of the vehicle where the user is located can be quickly sent to the recipient such as other vehicles or roadside units in a timely manner. This enables rescuers to quickly and accurately determine the user’s current geographic location and other information.
- S30 Collect sensor data, and detect whether the user is in danger based on the sensor data.
- the wearable device includes a variety of sensors, and the sensor data collected by the sensors can reflect the user's personal health, such as whether the user is frightened, feared and other bad mental states; such as whether the user's physical state is abnormal, such as body movement Abnormal situations such as the amplitude of the speed change and whether the flipping amplitude is too large, etc., can be detected whether the user is in danger through these sensor data.
- the sensor data includes angular velocity, acceleration, and heart rate, collecting sensor data, and detecting whether the user is in danger according to the sensor data, including:
- S31 Collect angular velocity, acceleration and heart rate.
- the wearable device includes sensors such as a gyroscope sensor, an acceleration sensor, and a heart rate sensor, and can detect the user's personal health status based on data such as angular velocity, acceleration, and heart rate collected by sensors such as the gyroscope sensor, acceleration sensor, and heart rate sensor. , Which helps to determine whether the user is in danger.
- S32 Detect whether the user is in danger according to whether the angular velocity, acceleration, and heart rate meet the preset risk determination conditions, wherein when the angular velocity, acceleration, and heart rate meet the preset risk determination conditions, it is determined that the user is in danger.
- the angular velocity, acceleration, and heart rate meet the preset risk determination conditions, such as satisfying that the average value of the angular velocity is greater than the first preset threshold value and the average value of the acceleration is greater than the second preset threshold value at the same time in the first time interval. If the threshold is set, the user is considered to be in danger; or, when the average value of the heart rate in the second time interval is greater than the third preset threshold, the user is considered to be in danger.
- steps S31-S32 a specific implementation method for detecting whether the user is in danger based on sensor data is provided, and the angular velocity, acceleration, and heart rate are used to quickly determine whether the user is in danger, so as to achieve the purpose of sending rescue requests in time.
- the call for help information includes the user's use status, specifically the "SOS for help" status, and includes the user's personal health status and other information.
- the call information can be sent to other vehicles or roadside units in time when the user encounters danger, so that the user's distress situation can be quickly learned.
- vehicle information of the vehicle where the user is located including vehicle speed, form and heading, geographic location, acceleration, predicted path and historical path, vehicle type, etc. Security message.
- the current situation of the user can be sent out in time through the vehicle information and call information, and the rescue efficiency can be improved.
- step S40 if it is determined that the user is in danger, initiating a rescue request, including:
- S400 If it is determined that the user is in danger, initiate a rescue request according to different emergency levels, where the emergency levels are divided according to time.
- the urgency of the rescue request may be specifically divided according to time. Rescue requests initiated according to different levels of urgency are more targeted, and can make more reasonable use of surrounding resources to call for help, and improve rescue efficiency and rescue success rate.
- step S400 if it is determined that the user is in danger, the rescue request is initiated according to different emergency levels, where the emergency levels are divided according to time, which specifically includes:
- S411 In the first preset time period, obtain emergency vehicle reminder data according to the V2X information.
- emergency vehicle warning (Emergency Vehicle Warning, EVW) is a type identifier for identifying emergency vehicles.
- the V2X information includes the vehicle type, and the collected V2X information can be filtered according to the vehicle type. In one embodiment, within 30 seconds before the user is in danger, the priority is to find emergency vehicles as the target, where emergency vehicles include police cars, ambulances, and fire trucks.
- S412 Search for whether there is an emergency vehicle in the first preset search range according to the emergency vehicle reminder data.
- the emergency vehicle will be searched in the first preset search range, for example, the GPS positioning of the car is taken as the center, and the search is performed within a radius of 150 m with the center as the center.
- a rescue request may be initiated to the emergency vehicle every five seconds to attract the attention of the emergency vehicle, so that the emergency vehicle can discover that the user is in danger in time .
- the police car when there are police cars, ambulances, and fire trucks in the first preset search range, the police car will be given priority to initiate rescue requests; when there are both ambulances and fire trucks in the first preset search range, Priority will be given to rescue requests for ambulances. Understandably, emergency vehicles have different levels of relevance to the rescue and warning that users can provide.
- the rescue request can be initiated in the priority order of police car-ambulance-fire truck, so that when multiple types of emergency vehicles are searched at the same time, the user can send rescue alarms to emergency vehicles with a higher degree of relevance. Initiate a rescue request to achieve a better rescue effect.
- steps S411-S413 a specific implementation method for initiating rescue requests according to different emergency levels is provided.
- V2X information By collecting V2X information to find emergency vehicles, it can initiate rescue requests in a targeted manner, allowing emergency vehicles to more quickly find users in danger .
- This method of finding emergency vehicles based on V2X information and initiating rescue requests can realize communication interaction without relying on service providers such as taxi applications and taxi service platforms. It can automatically initiate rescue requests without the user's active triggering, and the efficiency of calling for help is higher. .
- step S400 if it is determined that the user is in danger, the rescue request is initiated according to different emergency levels, where the emergency levels are divided according to time, which specifically includes:
- the personnel on the emergency vehicle learn that the user has initiated a rescue request, they will quickly arrange for the rescue.
- the user's vehicle may not be able to search for an emergency vehicle smoothly. Therefore, within the second preset time period, if the emergency vehicle cannot be searched within 30 seconds, a rescue request will be initiated to the vehicle within the second preset search range, where ,
- the first preset search range and the second preset search range may be the same.
- step S400 if it is determined that the user is in danger, the rescue request is initiated according to different emergency levels, which specifically includes:
- a rescue request is initiated to the roadside unit, so that the roadside unit can control the traffic indicating device after receiving the rescue request.
- the Road Side Unit refers to electronic equipment installed on the roadside and capable of communicating with the communication module of the vehicle to realize vehicle identification, electronic deduction, road speed limit, obstacle warning and other functions.
- the rescue request may also be initiated to the roadside unit.
- the roadside unit can send the rescue request to the police station system to achieve rapid alarm, and can also control the traffic indicating device according to the vehicle information included in the rescue request, such as switching the light to red before the vehicle reaches the traffic light.
- the rescue request is initiated by means of point-to-point communication, wherein the communication process adopts the V2X communication protocol.
- the rescue request is initiated by means of point-to-point communication, which can realize one-to-one communication between the vehicle where the user is located and other vehicles, thereby improving the security of communication.
- the V2X communication protocol is used in the communication process. The V2X communication method can realize communication interaction without relying on service providers such as taxi applications and taxi service platforms, and can automatically initiate rescue requests without the user's initiative to trigger.
- a user field can be added to the data segment transmitted by the V2X communication protocol.
- the user field includes the sender device ID, the receiver device ID, and the sender device ID.
- the public key of the party and the data segment are encrypted or not.
- Figure 2 shows a schematic diagram of an application scenario of an embodiment of the present application, in which a crying face represents a user in danger.
- the user can be a passenger or a driver, equipped with a wearable device, and the wearable device is equipped with V2X. Communication function.
- the user’s vehicle is equipped with a V2X communication module, and the user can collect V2X information on the user’s vehicle through a wearable device to obtain the vehicle information of the user’s vehicle; as shown in Figure 2, the upper right car in the figure is a police car, belonging to For emergency vehicles, the vehicle type in the V2X message broadcasted is an emergency vehicle.
- the lower right car in the picture is an ordinary vehicle, a non-emergency vehicle.
- the equipment on the road on the left is a roadside unit.
- the roadside unit is connected to the traffic management bureau, police station system, payment system, etc. through underground cables, and can complete functions such as near-field payment, road data early warning, and receiving alarm cases. Passengers communicate with roadside units through wearable devices with V2X communication function, which can automatically send rescue requests and quickly convey rescue requests.
- FIG. 3 shows another flowchart of an embodiment of the present application, in which a user equipped with a wearable device specifically refers to a passenger in this embodiment.
- Step 1 Passengers set the wearable device to enter the ride mode.
- Step 2 The wearable device collects V2X information, determines the vehicle identification of the vehicle where the user is located by distance, and collects the vehicle information of the vehicle where the user is located according to the vehicle identification.
- Step 3 The wearable device detects that the user is in danger by analyzing the sensor data.
- Step 4 Perform rescue requests periodically according to different rescue levels until the rescue request is stopped.
- Step 5 The wearable device finds whether there is a police car nearby by the type of vehicle.
- Step 6 If the police car is found within 30 seconds, skip to step 9; if the police car is not found within 30 seconds, proceed to step 7.
- Step 7 If an ordinary vehicle is found within 30 seconds, skip to step 11; if an ordinary vehicle is not found within 30 seconds, proceed to step 8.
- Step 8 The wearable device initiates a rescue request to the roadside unit, and requests the next traffic light to be a red light.
- Step 9 The wearable device sends a rescue request to the police car.
- Step 10 The police car launches rescue.
- Step 11 The wearable device sends a rescue request to the ordinary vehicle.
- Step 12 The car machine of the ordinary vehicle displays the information related to the rescue request, and the car owner assists in calling the police.
- the wearable device when passengers board the vehicle, set the wearable device to the riding mode, where the wearable device includes an RFIC (integrated circuit) supporting LTE-V communication data, a GPS positioning chip, a gyroscope sensor, an acceleration sensor, and a heart rate sensor .
- the wearable device uses the V2X communication module (based on the RFIC supporting LTE-V communication data) to receive the broadcast message of the vehicle, determines the vehicle identification of the user's vehicle based on the distance, and collects the vehicle identification of the user according to the vehicle identification Vehicle information.
- the wearable device detects that the user is in danger by analyzing the sensor data, it will enter the alarm level 1.
- the emergency vehicle reminder data in the basic safety message By analyzing the emergency vehicle reminder data in the basic safety message, it can identify whether there are police cars nearby. Once a police car is found, it will immediately and periodically initiate a rescue request to the police car; if no emergency vehicle is found for 30 seconds, it will enter the second alarm level. Alarm level two increases the search for surrounding ordinary vehicles. The priority of the search process is sorted by the distance between people and vehicles. If there is no ordinary vehicle that can receive rescue requests near the user's vehicle after 30 seconds, the rescue request can also be initiated to the roadside unit. The roadside unit can send the rescue request to the police station system to achieve rapid alarm, and can also make decisions based on the vehicle information included in the rescue request and control the traffic indicating device. For example, switch the road indicator to red before the vehicle reaches the traffic light. Above, the rescue request will continue to be executed before the user stops calling for help.
- Figure 4 shows a schematic diagram of the data structure of a transmitted data segment.
- a user field can be added to the V2X communication protocol.
- the user field includes the sender device ID, the receiver device ID, An encryption flag indicating whether the sender's public key and data segment are encrypted.
- the sender's public key is specifically an asymmetric encryption public key.
- an identification should be added to indicate which encryption algorithm is used to determine the length of the public key and the encryption algorithm used.
- the vehicle identification of the vehicle where the user is located is determined through the collected V2X information, which can quickly confirm the vehicle the user is riding in based on the V2X communication method, and based on the vehicle identification of the vehicle where the user is located, the user can be in many vehicles Obtain the vehicle information of the vehicle where the user is located; through the collection of sensor data, it can detect whether the user is in danger based on the sensor data.
- the rescue request including vehicle information and call information can be sent to the receiver in time equipment.
- the rescue request can be automatically sent, without the user's initiative to trigger, without relying on the taxi application, and can achieve safe and convenient calling for help.
- the embodiments of the present application further provide device embodiments that implement the steps and methods in the foregoing method embodiments.
- Fig. 5 shows a functional block diagram of a cooperative distress call device corresponding to the cooperative distress call method in the embodiment one-to-one.
- the cooperative calling for help device includes a first collection module 10, a vehicle information acquisition module 20, a third collection module 30 and a rescue request module 40.
- the implementation functions of the first acquisition module 10, the vehicle information acquisition module 20, the third acquisition module 30, and the rescue request module 40 correspond to the corresponding steps of the cooperative call for help method in the embodiment one by one. In order to avoid repetition, this embodiment is different.
- the first collection module 10 is used to collect V2X information, and determine the vehicle identification of the vehicle where the user is located through the V2X information.
- V2X Vehicle to everything
- LTE Long Term Evolution
- Vehicle Vehicle to everything
- DSRC Dedicated Short Range Communications, dedicated short-range communication technology
- the wearable device collects V2X information through V2X communication, where the V2X information includes BSM (Basic safety Message), and the basic safety message is the information broadcast by the vehicle during V2X communication, including the vehicle VIN (Vehicle Identification Number) code, vehicle speed, form heading, geographic location, acceleration, predicted path, historical path, vehicle type, etc. Understandably, when a user is driving or riding in a vehicle, V2X information can be collected through a wearable device on the body to establish a communication interconnection between the user's wearable device, the user's vehicle, and other vehicles within the communication range.
- BSM Basic safety Message
- the vehicle identification refers to the identification that can uniquely identify the vehicle.
- the vehicle VIN code in the V2X information can be used as the vehicle identification.
- the vehicle VIN code is a set of seventeen alphanumeric numbers, which is a unique set of numbers used on cars, which can identify the car's manufacturer, engine, chassis number, and other performance information.
- the embodiments of the present application can quickly confirm the vehicle identification of the vehicle where the user is located based on the V2X communication mode.
- the vehicle information acquisition module 20 is used to acquire the vehicle information of the vehicle where the user is located according to the vehicle identification of the vehicle where the user is located.
- the vehicle information of the vehicle where the user is located refers to the V2X information collected from the vehicle that the user is riding in or driving, including basic safety messages of the vehicle where the user is located.
- the vehicle information of the user's vehicle needs to be sent when calling for help, so that the rescuer can quickly determine the geographic location of the user for rescue.
- the vehicle information of the user's vehicle can be obtained from the V2X information collected by many vehicles according to the vehicle VIN code, or the communication data module of the wearable device can be used according to the vehicle identification, such as supporting LTE-V communication
- the RFIC (Radio Frequency Integrated Circuit) of the data receives the broadcast information sent by the V2X communication module of the vehicle, and collects the vehicle information of the vehicle where the user is located.
- the user can obtain the vehicle information of the vehicle where the user is located in many vehicles, so that when the user is in danger, the vehicle information of the vehicle where the user is located can be quickly sent to other vehicles or roadside units in time, so that rescuers can It can quickly and accurately determine the user's current geographic location and other information.
- the third collection module 30 is used to collect sensor data and detect whether the user is in danger according to the sensor data.
- the wearable device includes a variety of sensors, and the sensor data collected by the sensors can reflect the user's personal health, such as whether the user is frightened, feared and other bad mental states; such as whether the user's physical state is abnormal, such as body movement Abnormal situations such as the amplitude of the speed change and whether the flipping amplitude is too large, etc., can be detected whether the user is in danger through these sensor data.
- the rescue request module 40 is configured to initiate a rescue request if it is determined that the user is in danger, where the rescue request includes vehicle information and call information.
- the call for help information includes the user's use status, specifically the "SOS for help" status, as well as personal health status and other information.
- the call information can be sent to other vehicles or roadside units in time when the user encounters danger, so that the user's distress situation can be quickly learned.
- vehicle information of the vehicle where the user is located including vehicle speed, form and heading, geographic location, acceleration, predicted path and historical path, vehicle type, etc. Security message.
- the current situation of the user can be sent out in time through the vehicle information and call information, and the rescue efficiency can be improved.
- the V2X information includes GPS data.
- the first collection module 10 is specifically used for:
- the surrounding vehicles whose distance from the user is within 1.5 meters are determined as the vehicle where the user is.
- a vehicle within a radius of 150 m with the geographic location of the user as the center may be used as the surrounding vehicle.
- the V2X information includes GPS (Global Positioning System) data, that is, data on the geographic location of the vehicle, and the user can determine the vehicle identification of the vehicle where the user is located through the GPS data of the vehicle.
- GPS Global Positioning System
- the distance between the user and the surrounding vehicles will be calculated according to the GPS data in the basic safety message, so as to compare the distance between the user and the surrounding vehicles. Analyze the distance of surrounding vehicles to determine the vehicle where the user is.
- the safe distance between the front and rear cars should be more than 10 meters in the driving state. Therefore, the distance between the user and the front and rear cars under normal driving conditions cannot always be within 1.5 meters; for the left and right vehicle distances, the average safe driving distance is left and right.
- the vehicle distance is 1.2 meters, and the body width is more than 1.5 meters. Therefore, it is basically impossible for the user to get on the vehicle from a standstill until the user encounters danger. There will always be vehicles driving in parallel with the vehicle and the distance between people and vehicles within 1.5 meters is basically impossible.
- the surrounding vehicles are determined as the user’s vehicle. If the user is in danger, the user’s vehicle can be marked It is a dangerous vehicle and generates call for help information, where the call for help information includes VRUCW (Vulnerable Road User Collision warning, collision warning for vulnerable traffic participants) user data: including the user's use status as "SOS for help", including personal health status.
- the call information can be sent to other vehicles or roadside units in time when the user encounters danger, so that the user's distress situation can be quickly learned.
- a uniquely identifiable identifier may be selected as the vehicle identifier.
- the vehicle VIN code of the vehicle where the user is located can be used as the vehicle identification, which facilitates subsequent wearable devices to collect V2X information sent by the vehicle of the user through the broadcast according to the vehicle VIN code of the vehicle.
- the sensor data includes angular velocity, acceleration, and heart rate.
- the third collection module 30 is specifically used for:
- Detect whether the user is in danger according to whether the angular velocity, acceleration, and heart rate meet the preset risk determination conditions, wherein when the angular velocity, acceleration, and heart rate meet the preset risk determination conditions, it is determined that the user is in danger.
- the wearable device includes sensors such as a gyroscope sensor, an acceleration sensor, and a heart rate sensor, and can detect the user's personal health status based on data such as angular velocity, acceleration, and heart rate collected by sensors such as the gyroscope sensor, acceleration sensor, and heart rate sensor. , Which helps to determine whether the user is in danger.
- the average value of the angular velocity is greater than the first preset threshold and the average value of the acceleration is greater than the second preset. Threshold, it is considered that the user is in danger; or, when the average value of the heart rate in the second time interval is greater than the third preset threshold, it is considered that the user is in danger.
- the rescue request module 40 is specifically used for:
- a rescue request is initiated according to different emergency levels, where the emergency levels are divided according to time.
- the urgency of the rescue request may be specifically divided according to time. Rescue requests initiated according to different levels of urgency are more targeted, and can make more reasonable use of surrounding resources to call for help, and improve rescue efficiency and success rate.
- the rescue request module 40 is also specifically used for:
- the emergency vehicle reminder data is obtained according to the V2X information.
- emergency vehicle warning (Emergency Vehicle Warning, EVW) is a type identifier for identifying emergency vehicles.
- the V2X information includes the vehicle type, and the collected V2X information can be filtered according to the vehicle type. In one embodiment, within 30 seconds before the user is in danger, the priority is to find emergency vehicles as the target, where emergency vehicles include police cars, ambulances, and fire trucks.
- the emergency vehicle will be searched in the first preset search range, for example, the GPS positioning of the car is taken as the center, and the search is performed within a radius of 150 m with the center as the center.
- a rescue request may be initiated to the emergency vehicle every five seconds to attract the attention of the emergency vehicle, so that the emergency vehicle can discover that the user is in danger in time .
- the police car when there are police cars, ambulances, and fire trucks in the first preset search range, the police car will be given priority to initiate rescue requests; when there are both ambulances and fire trucks in the first preset search range, Priority will be given to rescue requests for ambulances. Understandably, emergency vehicles have different levels of relevance to the rescue and warning that users can provide.
- the rescue request can be initiated in the priority order of police car-ambulance-fire truck, so that when multiple types of emergency vehicles are searched at the same time, the user can send rescue alarms to emergency vehicles with a higher degree of relevance. Initiate a rescue request to achieve a better rescue effect.
- the rescue request module 40 is also specifically used for:
- the first preset search range and the second preset search range may be the same.
- the rescue request module 40 is also specifically used for:
- a rescue request is initiated to the roadside unit, so that the roadside unit can control the traffic indicating device after receiving the rescue request.
- the Road Side Unit refers to electronic equipment installed on the roadside and capable of communicating with the communication module of the vehicle to realize vehicle identification, electronic deduction, road speed limit, obstacle warning and other functions.
- the rescue request may also be initiated to the roadside unit.
- the roadside unit can send the rescue request to the police station system to achieve rapid alarm, and can also control the traffic indicating device according to the vehicle information included in the rescue request, such as switching the light to red before the vehicle reaches the traffic light.
- the rescue request is initiated by means of point-to-point communication, wherein the communication process adopts the V2X communication protocol.
- the data segment transmitted by the V2X communication protocol includes a user field, and the user field includes the sender's device ID, the receiver's device ID, the sender's public key, and an encryption flag indicating whether the data segment is encrypted.
- the rescue request is initiated by means of point-to-point communication, which can realize one-to-one communication between the vehicle where the user is located and other vehicles, and can improve the security of communication.
- the V2X communication protocol is used in the communication process. The V2X communication method can realize communication interaction without relying on service providers such as taxi applications and taxi service platforms, and can automatically initiate rescue requests without the user's active triggering.
- a user field can be added to the data segment transmitted by the V2X communication protocol.
- the user field includes the sender device ID, the receiver device ID, and the sender device ID.
- the public key of the party and the data segment are encrypted or not.
- the vehicle identification of the user's vehicle is determined through the collected V2X information, which can quickly confirm the vehicle the user is riding in based on the V2X point-to-point short-distance communication method, and according to the vehicle identification of the user's vehicle, the user can Obtain the vehicle information of the vehicle where the user is located in many vehicles; through the collection of sensor data, whether the user is in danger can be detected according to the sensor data.
- the vehicle identification and the vehicle identification of the user’s vehicle can be included in time.
- the rescue request of the vehicle information is sent to the receiving device.
- the rescue request can be automatically sent, without the user's initiative to trigger, without relying on the taxi application, and can achieve safe and convenient calling for help.
- This embodiment provides a computer-readable storage medium on which a computer program is stored.
- the collaborative calling for help method in the embodiment is implemented. In order to avoid repetition, it will not be repeated here.
- the computer program is executed by the processor, the function of each module/unit in the cooperative calling device in the embodiment is realized. In order to avoid repetition, it will not be repeated here.
- Fig. 6 is a schematic diagram of a wearable device provided by an embodiment of the present application.
- the wearable device 50 of this embodiment includes: a processor 51, a memory 52, and a computer program 53 stored in the memory 52 and running on the processor 51, and the computer program 53 is executed by the processor 51 When realizing the collaborative calling for help method in the embodiment.
- the computer program 53 is executed by the processor 51, the functions of the models/units in the cooperative distress call device corresponding to the cooperative distress call method in the embodiment are implemented one-to-one.
- the wearable device 50 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
- the wearable device 50 may include, but is not limited to, a processor 51 and a memory 52.
- FIG. 6 is only an example of the wearable device 50, and does not constitute a limitation on the wearable device 50. It may include more or less components than shown in the figure, or combine certain components, or different components.
- wearable devices can also include input and output devices, network access devices, buses, and so on.
- the so-called processor 51 may be a central processing unit (Central Processing Unit, CPU), other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the memory 52 may be an internal storage unit of the wearable device 50, such as a hard disk or a memory of the wearable device 50.
- the memory 52 may also be an external storage device of the wearable device 50, such as a plug-in hard disk equipped on the wearable device 50, a Smart Media Card (SMC), a Secure Digital (SD) card, and a flash memory card. (Flash Card) and so on.
- the memory 52 may also include both an internal storage unit of the wearable device 50 and an external storage device.
- the memory 52 is used to store computer programs and other programs and data required by the wearable device.
- the memory 52 can also be used to temporarily store data that has been output or will be output.
- first, second, third, etc. may be used in the embodiments of the present application to describe the preset range, etc., these preset ranges should not be limited to these terms. These terms are only used to distinguish the preset ranges from each other.
- the first preset range may also be referred to as the second preset range, and similarly, the second preset range may also be referred to as the first preset range.
- the word “if” as used herein can be interpreted as “when” or “when” or “in response to determination” or “in response to detection”.
- the phrase “if determined” or “if detected (statement or event)” can be interpreted as “when determined” or “in response to determination” or “when detected (statement or event) )” or “in response to detection (statement or event)”.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Public Health (AREA)
- Radar, Positioning & Navigation (AREA)
- Alarm Systems (AREA)
Abstract
本申请公开了一种协同呼救方法、装置、可穿戴设备及存储介质。该协同呼救方法包括:采集V2X信息,通过V2X信息确定用户所在车辆的车辆标识;根据用户所在车辆的车辆标识,获取用户所在车辆的车辆信息;采集传感器数据,并根据传感器数据对用户是否存在危险进行检测;若确定用户存在危险,则发起救援请求,其中,救援请求包括车辆信息和呼叫信息。采用该协同呼救方法能够实现安全便捷的呼救目的。
Description
本申请以2019年10月25日提交的申请号为201911021756.3,名称为“协同呼救方法、装置、可穿戴设备和存储介质”的中国发明专利申请为基础,并要求其优先权。
本申请涉及通信技术领域,尤其涉及一种协同呼救方法、装置、可穿戴设备和存储介质。
目前,用户在乘车、驾驶等情况下发生危险状况时,通常都是利用手机、平板的联网功能,通过基站2G/3G/4G/5G网络发送报警消息,或者拨打电话呼叫110报警求救,或者通过打车应用程序发送报警消息,这些做法都存在较明显的缺陷,难以实现安全便捷的呼救目的。
发明内容
有鉴于此,本申请实施例提供了一种协同呼救方法、装置、可穿戴设备及存储介质,用以解决目前用户在乘车、驾驶等情况下发生危险状况时难以实现安全便捷的呼救目的的问题。
第一方面,本申请实施例提供了一种协同呼救方法,包括:
采集V2X信息,通过所述V2X信息确定用户所在车辆的车辆标识;
根据所述用户所在车辆的车辆标识,获取所述用户所在车辆的车辆信息;
采集传感器数据,并根据所述传感器数据对用户是否存在危险进行检测;
若确定用户存在危险,则发起救援请求,其中,所述救援请求包括所述车辆信息和呼叫信息。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述V2X信息中包括GPS数据,所述采集V2X信息,通过所述V2X信息确定用户所在车辆的车辆标识,包括:
根据所述GPS数据计算用户和周边车辆的距离,其中,预设地理范围内的车辆为所述周边车辆;
在预设时间段内,将与所述用户的距离持续在1.5米内的所述周边车辆确定为所述用户所在车辆;
根据所述用户所在车辆确定所述用户所在车辆的车辆标识。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述传感器数据包括角速度、加速度和心率,所述采集传感器数据,并根据所述传感器数据对用户是否存在危险进行检测,包括:
采集角速度、加速度和心率;
根据所述角速度、所述加速度和所述心率是否满足预设的危险判定条件检测用户是否存在危险,其中,当所述角速度、所述加速度和所述心率满足预设的危险判定条件时,确定所述用户存在危险。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述若确定用户存在危险,则发起救援请求,包括:
若确定用户存在危险,则按不同紧急等级发起所述救援请求,其中,所述紧急等级根据时间进行划分。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述若确定用户存在危险,则按不同紧急等级发起所述救援请求,包括:
在第一预设时间段内,根据所述V2X信息得到紧急车辆提醒数据;
根据所述紧急车辆提醒数据寻找第一预设搜索范围内是否存在紧急车辆;
若存在所述紧急车辆,则周期性地向所述紧急车辆发起救援请求。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述若确定用户存在危险,则按不同紧急等级发起所述救援请求,包括:
若在所述第一预设时间段内,所述第一预设搜索范围内不存在所述紧急车辆,则在第二预设时间段内,对所述第二预设搜索范围内的车辆发起所述救援请求。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述若确定用户存在危险,则按不同紧急等级发起所述救援请求,包括:
若在所述第二预设时间段内,所述第二搜索范围内不存在车辆,则向路侧单元发起所述救援请求,以使所述路侧单元在接收所述救援请求后对交通指示设备进行控制。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述救援请求采用点对点通信的方式发起,其中,通信过程采用V2X通信协议。
如上所述的方面和任一可能的实现方式,进一步提供一种实现方式,所述V2X通信协议传输的数据段中包括用户字段,所述用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和所述数据段是否进行加密的加密标志。
第二方面,本申请实施例提供了一种协同呼救装置,包括:
第一采集模块,用于采集V2X信息,通过所述V2X信息确定用户所在车辆的车辆标识;
车辆信息获取模块,用于根据所述用户所在车辆的车辆标识,获取所述用户所在车辆的车辆信息;
第三采集模块,用于采集传感器数据,并根据所述传感器数据对用户是否存在危险进行检测;
救援请求模块,用于若确定用户存在危险,则发起救援请求,其中,所述救援请求包括所述车辆信息和呼叫信息。
进一步地,所述V2X信息中包括GPS数据,所述第一采集模块,具体用于:
根据所述GPS数据计算用户和周边车辆的距离,其中,预设地理范围内的车辆为所述周边车辆;
在预设时间段内,将与所述用户的距离持续在1.5米内的所述周边车辆确定为所述用户所在车辆;
根据所述用户所在车辆确定所述用户所在车辆的车辆标识。
进一步地,所述传感器数据包括角速度、加速度和心率,所述第三采集模块,具体用于:
采集角速度、加速度和心率;
根据所述角速度、所述加速度和所述心率是否满足预设的危险判定条件检测用户是否存在危险,其中,当所述角速度、所述加速度和所述心率满足预设的危险判定条件时,确定所述用户存在危险。
进一步地,所述救援请求模块,具体用于:
若确定用户存在危险,则按不同紧急等级发起所述救援请求,其中,所述紧急等级根据时间进行划分。
进一步地,所述救援请求模块,还具体用于:
在第一预设时间段内,根据所述V2X信息得到紧急车辆提醒数据;
根据所述紧急车辆提醒数据寻找第一预设搜索范围内是否存在紧急车辆;
若存在所述紧急车辆,则周期性地向所述紧急车辆发起救援请求。
进一步地,所述救援请求模块,还具体用于:
若在所述第一预设时间段内,所述第一预设搜索范围内不存在所述紧急车辆,则在第二预设时间段内,对所述第二预设搜索范围内的车辆发起所述救援请求。
进一步地,所述救援请求模块,还具体用于:
若在所述第二预设时间段内,所述第二搜索范围内不存在车辆,则向路侧单元发起所述救援请求,以使所述路侧单元在接收所述救援请求后对交通指示设备进行控制。
进一步地,所述救援请求采用点对点通信的方式发起,其中,通信过程采用V2X通信协议。
进一步地,所述V2X通信协议传输的数据段中包括用户字段,所述用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和所述数据段是否进行加密的加密标志。
第三方面,一种可穿戴设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述第一方面所述方法的步骤。
第四方面,本申请实施例提供了一种计算机可读存储介质,包括:计算机程序,所述计算机程序被处理器执行时实现上述第一方面所述方法的步骤。
在本申请实施例中,通过采集的V2X信息确定用户所在车辆的车辆标识,能够基于V2X的通信方式,快速确认用户所乘坐的车辆,并根据用户所在车辆的车辆标识,使得用户能够在众多车辆中获取用户所在车辆的车辆信息;通过对传感器数据的采集,可根据传感器数据对用户是否存在危险进行检测,当检测确定用户存在危险时,可及时将包括车辆信息和呼叫信息的救援请求发送到接收设备。该救援请求可实现自动发送,无需用户主动触发,无需依赖打车应用程序,能够实现安全便捷的呼救目的。
为了更清楚地说明本申请实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其它的附图。
图1是本申请一实施例中协同呼救方法的一流程图;
图2是本申请一实施例中协同呼救方法的一应用场景示意图;
图3是本申请一实施例中协同呼救方法的又一流程图;
图4是本申请一实施例中传输的数据段的数据结构示意图;
图5是本申请一实施例中协同呼救装置的一原理框图;
图6是本申请一实施例中可穿戴设备的一示意图。
可以理解地,目前常用的乘客保护方案,其原理是利用手机、平板的联网功能,通过基站2G/3G/4G/5G网络发送报警消息,或者拨打电话呼叫110报警求救,或者通过打车应用程序发送报警消息。以打车应用程序为例,乘客可以通过在打车应用程序上点击安全中心-一键报警-视频报警/呼叫110等方式实现报警求救,然而,这种乘客保护方案存在以下较明显的缺陷:
该报警求救方式需要乘客在打车应用程序上执行多个步骤进行报警,这种情况容易被歹徒发现,引发进一步的冲突;即使在报警时歹徒没有发现,警方通过询问获取到用户的地理位置信息后,也需要较长的时间才能追踪定位到歹徒,此时乘客仍将面临较长时间的危险;若乘客从一开始就被劫持,那么乘客将难以进行操作,连报警都做不到。
可以理解地,除了通过打车应用程序报警的方式,通过基站2G/3G/4G/5G网络发送报警消息,或者拨打电话呼叫110报警求救的方式同样容易影响歹徒的注意,乘客仍有较大危险。该报警求救方式依赖于基站,警察一般都是在某个固定办公场所收到报警消息后,经过确认报警无误才进行下一步的救援,在该救援期间乘客可能出现各种意外,无法实现高效的救援目的。
为了更好的理解本申请的技术方案,下面结合附图对本申请实施例进行详细描述。
图1示出本实施例中协同呼救方法的一流程图。该协同呼救方法可应用在可穿戴设备上,能够在(可穿戴设备)用户乘车、驾驶等状态发生危险时,提供安全便捷的呼救功能。该可穿戴设备包括但不限于智能手环、智能手表、智能戒指、智能项链等可穿戴设备。如图1所示,该协同呼救方法包括:
S10:采集V2X信息,通过V2X信息确定用户所在车辆的车辆标识。
其中,V2X(Vehicle to everything)表示车辆与万物的基于LTE(Long Term Evolution,长期演进)-V(Vehicle)或DSRC(Dedicated Short Range Communications,专用短程通信技术)的通信互联,能够以车辆作为主体与其他事物进行通信互联,例如,车与车、车与可穿戴设备、车与路侧单元等之间的通信互联。
在一实施例中,可穿戴设备通过V2X通信采集V2X信息,其中,该V2X信息包括BSM(Basic safety Message,基础安全消息),该基础安全消息为车辆进行V2X通信时所广播的信息,包括车辆VIN(Vehicle Identification Number)码、车辆行驶速度、形式航向、地理位置、加速度、预测路径、历史路径和车辆类型等。可以理解地,用户在驾驶或乘坐车辆时,可通过身上的可穿戴设备采集V2X信息,建立起用户的可穿戴设备、用户所在车辆与通信范围内其他车辆的通信互联关系。
车辆标识是指能够唯一识别车辆的标识,本实施例中具体可以将V2X信息中的车辆VIN码作为车辆标识。其中,该车辆VIN码是一组由十七个英数组成,用于汽车上的一组独一无二的号码,可以识别汽车的生产商、引擎、底盘序号及其他性能等资料。本申请实施例能够基于V2X的通信方式,快速确认用户所在车辆的车辆标识。
进一步地,在步骤S10中,V2X信息中包括GPS数据,通过V2X信息确定用户所在车辆的车辆标识,具体包括:
S11:根据GPS数据计算用户和周边车辆的距离,其中,预设地理范围内的车辆为周边车辆。
具体地,可将以用户所在地理位置为中心,半径150m范围内的车辆作为周边车辆。
可以理解地,V2X信息中包括GPS(Global Positioning System)数据,也即车辆的地理位置的数据,用户可通过车辆的GPS数据确定用户所在车辆的车辆标识。
在一实施例中,用户在通过可穿戴设备的V2X通信模块接收周边车辆的广播信息,得到基础安全消息后,将根据基础安全消息中的GPS数据计算用户和周边车辆的距离,以对用户和周边车辆的距离进行分析,确定用户所在车辆。
S12:在预设时间段内,将与用户的距离持续在1.5米内的周边车辆确定为用户所在车辆。
可以理解地,前后车在行驶状态下安全距离应在10米以上,因此用户在正常车辆行驶的情况下与前后车的距离基本不可能一直在1.5米内;而对于左右车距,安全行驶的平均左右车距为1.2米,而车身宽度为1.5米以上,因此,用户上车车辆从静止起步到用户遇到危险,始终有车辆与本车并行行驶导致人车距离在1.5米内也基本不可能。
在一实施例中,在预设时间段内,若用户和周边车辆的距离持续在1.5米内,则将该周边车辆确定为用户所在车辆,若在用户遇到危险时,可将用户所在车辆标记为危险车辆,并生成呼救信息,其中,呼救信息包括VRUCW(Vulnerable Road User Collision warning,弱势交通参与者碰撞预警)用户数据:包括用户的使用状态为“SOS求救”,包括用户的个人健康状况等。该呼叫信息能够在用户遇到危险时及时发送到其他车辆或者路侧单元等接收方,以使用户遇险的情况被快速获知。
S13:根据用户所在车辆确定用户所在车辆的车辆标识。
在一实施例中,当确定用户所在车辆后,可选取能够唯一识别的标识作为车辆标识。具体地,可以将用户所在车辆的车辆VIN码作为车辆标识,可方便后续可穿戴设备根据车辆的车辆VIN码对用户所在车辆通过广播发送的V2X信息进行采集。
步骤S11-S13中,提供了一种通过V2X信息确定用户所在车辆的车辆标识的具体实施方式,通过利用用户和周边车辆的距离,能够确定用户所在车辆的车辆标识。
S20:根据用户所在车辆的车辆标识,获取用户所在车辆的车辆信息。
其中,用户所在车辆的车辆信息是指对用户正在乘坐、驾驶的车辆采集得到的V2X信息中,包括用户所在车辆的基础安全消息。
可以理解地,假设用户遇到了危险,则在呼救时需要发送用户所在车辆的车辆信息,才能够让援救方快速确定用户所在地理位置进行援救。
在一实施例中,可根据车辆VIN码,在步骤S10中众多车辆采集的V2X信息中获取得到用户所在车辆的车辆信息,也可以根据车辆标识,采用可穿戴设备的通信数据模块,如支持LTE-V通信数据的RFIC(射频集成电路),接收车辆的V2X通信模块发出的广播信息,采集得到用户所在车辆的车辆信息。本申请实施例中,能够使用户在众多车辆中获取用户所在车辆的车辆信息,以在用户发生危险时,能够快速将用户所在车辆的车辆信息及时发送到其他车辆或者路侧单元等接收方,使得救援人员能够快速准确地确定用户当前的地理位置等信息。
S30:采集传感器数据,并根据传感器数据对用户是否存在危险进行检测。
其中,可穿戴设备包括多种传感器,传感器采集的传感器数据能够体现出用户的个人健康状况,如用户是否有受惊吓、恐惧等不良精神状态出现;如用户身体状态是否发生异常情况,例如身体移动速度变化的幅度、翻转幅度是否过大等异常情况出现,通过这些传感数据能够对用户是否存在危险进行检测。
进一步地,在步骤S30中,传感器数据包括角速度、加速度和心率,采集传感器数据,并根据传感器数据对用户是否存在危险进行检测,包括:
S31:采集角速度、加速度和心率。
在一实施例中,可穿戴设备包括陀螺仪传感器、加速度传感器和心率传感器等传感器,可根据陀螺仪传感器、加速度传感器和心率传感器等传感器采集的角速度、加速度和心率等数据检测用户的个人健康状况,有助于判断用户是否存在危险。
S32:根据角速度、加速度和心率是否满足预设的危险判定条件检测用户是否存在危险,其中,当角速度、加速度和心率满足预设的危险判定条件时,确定用户存在危险。
在一实施例中,当角速度、加速度和心率满足预设的危险判定条件时,如在第一时间区间内同时满足角速度的平均值大于第一预设阈值,以及加速度的平均值大于第二预设阈值,则认为用户存在危险;或者,在第二时间区间内心率的平均值大于第三预设阈值时,认为用户存在危险。
步骤S31-S32中,提供了一种根据传感器数据对用户是否存在危险进行检测的具体实施方式,通过角速度、加速度和心率快速确定用户是否受到危害,以达到及时发送救援请求的目的。
S40:若确定用户存在危险,则发起救援请求,其中,救援请求包括车辆信息和呼叫信息。
其中,呼救信息包括用户的使用状态,具体为“SOS求救”状态,以及包括用户的个人健康状况等信息。该呼叫信息能够在用户遇到危险时及时发送到其他车辆或者路侧单元,以使用户遇险的情况被快速获知。可以理解地,除了呼救信息,为了使救援人员更有效的资源,还需要提供用户所在车辆的车辆信息,包括车辆行驶速度、形式航向、地理位置、加速度、预测路径与历史路径、车辆类型等基础安全消息。通过车辆信息和呼叫信息能够将用户的当前状况及时地发送出去,提高救援效率。
进一步地,在步骤S40中,若确定用户存在危险,则发起救援请求,包括:
S400:若确定用户存在危险,则按不同紧急等级发起救援请求,其中,紧急等级根据时间进行划分。
在一实施例中,具体可以根据时间划分救援请求的紧急程度。根据不同的紧急程度发起的救援请求具有更强的针对性,能够更加合理地利用周边资源进行求救,提高救援效率和救援成功率。
进一步地,在步骤S400中,步骤若确定用户存在危险,则按不同紧急等级发起救援请求,其中,紧急等级根据时间进行划分,具体包括:
S411:在第一预设时间段内,根据V2X信息得到紧急车辆提醒数据。
其中,紧急车辆提醒(Emergency Vehicle Warning,EVW)是识别紧急车辆的类型标识。
V2X信息中包括车辆类型,根据车辆类型能够将采集到的V2X信息进行筛选。在一实施例中,在用户发生危险的前30秒内,以优先寻找紧急车辆作为目标,其中,紧急车辆包括警 车、救护车和消防车等。
S412:根据紧急车辆提醒数据寻找第一预设搜索范围内是否存在紧急车辆。
在一实施例中,将在第一预设搜索范围内搜索紧急车辆,如以汽车的GPS定位为中心,以该中心为圆心的半径150m内的范围进行搜索。
S413:若存在紧急车辆,则周期性地向紧急车辆发起救援请求。
在一实施例中,当在第一预设搜索范围内搜索到紧急车辆时,可以每隔五秒向紧急车辆发起救援请求,以引起紧急车辆的注意,使紧急车辆能够及时发现用户处于危险中。
在一实施例中,当第一预设搜索范围内同时存在警车、救护车和消防车时,将优先对警车发起救援请求;当第一预设搜索范围内同时存在救护车和消防车时,将优先对救护车发起救援请求。可以理解地,紧急车辆对用户可提供救援报警的相关程度不同。本实施例中可以按警车-救护车-消防车的优先级顺序发起救援请求,以使用户能够在同时搜索到多种类型的紧急车辆时,向可提供救援报警的相关程度较高的紧急车辆发起救援请求,达到更优的救援效果。
步骤S411-S413中,提供了一种按不同紧急等级发起救援请求的具体实施方式,通过采集V2X信息寻找紧急车辆,能够有针对性地发起救援请求,让紧急车辆更快速地发现处于险情的用户。该基于V2X信息寻找紧急车辆,发起救援请求的方式能够在不依托打车应用程序、打车服务平台等服务商的情况下实现通信交互,能够自动发起救援请求,无需用户主动触发,呼救的效率更高。
进一步地,在步骤S400中,步骤若确定用户存在危险,则按不同紧急等级发起救援请求,其中,紧急等级根据时间进行划分,具体还包括:
若在第一预设时间段内,第一预设搜索范围内不存在紧急车辆,则在第二预设时间段内,对第二预设搜索范围内的车辆发起救援请求。
可以理解地,找寻紧急车辆寻求救援是一种具有针对性的做法,紧急车辆上的人员若获知用户发起了救援请求,将会快速地安排人员进行救援。但是用户所在车辆不一定能够顺利搜索到紧急车辆,因此,在第二预设时间段内,若30秒内搜索不到紧急车辆,则向第二预设搜索范围内的车辆发起救援请求,其中,第一预设搜索范围和第二预设搜索范围可以是相同的。
在一实施例中,通过在第二预设时间段内,对第二预设搜索范围内的车辆发起救援请求,可以在搜索不到紧急车辆的情况下,向其他车辆进行求助,发起救援请求,以使其他乘客、或驾驶人员能够及时发现用户存在危险。
进一步地,在步骤S400中,若确定用户存在危险,则按不同紧急等级发起救援请求,具体还包括:
若在第二预设时间段内,第二搜索范围内不存在车辆,则向路侧单元发起救援请求,以使路侧单元在接收救援请求后对交通指示设备进行控制。
其中,路侧单元(Road Side Unit,简称RSU)是指安装在路侧,能够与车辆的通信模块进行通讯,实现车辆身份识别、电子扣分、道路限速、障碍预警等功能的电子设备。
在一实施例中,当用户所在车辆附近没有可接收救援请求的车辆时,还可以通过向路侧单元发起救援请求。路侧单元可将救援请求发送到警局系统,实现快速报警,并且,还可以根据救援请求中包括的车辆信息控制交通指示设备,如在车辆到达红绿灯前将灯切换为红灯。
进一步地,救援请求采用点对点通信的方式发起,其中,通信过程采用V2X通信协议。
在一实施例中,救援请求采用点对点通信的方式发起,能够实现用户所在车辆和其他车辆一对一地进行通信,提高通信的安全性。此外,通信过程中采用的是V2X通信协议,采用该V2X的通信方式能够不依托打车应用程序、打车服务平台等服务商实现通信交互,能够自动发起救援请求,无需用户主动触发。
进一步地,为了实现救援请求采用点对点通信的方式,在一实施例中,具体可以在V2X通信协议传输的数据段中添加用户字段,该用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和数据段是否进行加密的加密标志,采用该方式的点对点通信进行数据传输,能够提高救援请求的安全性,防止被歹徒截取破解。
图2示出了本申请实施例的一应用场景示意图,其中,哭脸表示处于危险中的用户,该用户可以是乘客,也可以是驾驶员,配备有可穿戴设备,该可穿戴设备具备V2X通信功能。
具体地,用户所在车辆上装有V2X通信模块,用户可通过可穿戴设备对用户所在车辆进行V2X信息的采集,得到用户所在车辆的车辆信息;如图2所示,图中右上车为警车,属于紧急车辆,其广播的V2X消息中的车辆类型为紧急车辆。图中右下车为普通车辆,非紧急车辆,在用户没找寻到紧急车辆时,可转向附近的普通车辆进行求助。左边道路上的设备为路侧单元。该路侧单元通过地下线缆与交通管理局、警局系统、支付系统等相连接,能够完成诸如近场支付、道路数据预警、接警报案等功能。乘客通过具备V2X通信功能的穿戴设备与路侧单元进行通信,可将救援请求自动发送出去,快速传达救援请求。
图3示出了本申请实施例的又一流程图,其中,配备可穿戴设备的用户在本实施例中具体是指一名乘客。
步骤一:乘客设置可穿戴设备进入乘车模式。
步骤二:可穿戴设备采集V2X信息,通过距离确定用户所在车辆的车辆标识,并根据车辆标识收集用户所在车辆的车辆信息。
步骤三:可穿戴设备通过分析传感器数据检测到用户存在危险。
步骤四:按不同救援等级周期性地执行救援请求,直到救援请求被停止。
步骤五:可穿戴设备通过车辆类型,寻找是否有警车在附近。
步骤六:若30秒内寻找到警车,跳转到步骤九;若30秒内没有寻找到警车,往下执行步骤七。
步骤七:若30秒内寻找到普通车辆,跳转到步骤十一;若30秒内没有寻找到普通车辆,往下执行步骤八。
步骤八:可穿戴设备发起救援请求到路侧单元,并请求下一个红绿灯为红灯。
步骤九:可穿戴设备向警车发送救援请求。
步骤十:警车展开救援。
步骤十一:可穿戴设备向普通车辆发送救援请求。
步骤十二:普通车辆的车机显示与救援请求相关的信息,车主协助报警。
具体地,乘客乘车时,将可穿戴设备设置成乘车模式,其中,可穿戴设备包括支持LTE-V通信数据的RFIC(集成电路)、GPS定位芯片、陀螺仪传感器、加速度传感器、心率传感器。可穿戴设备进入乘车模式后,利用V2X通信模块(基于支持LTE-V通信数据的RFIC组成)接收车辆的广播消息,通过距离确定用户所在车辆的车辆标识,并根据车辆标识收集用户所在 车辆的车辆信息,当穿戴设备通过分析传感器数据检测到用户存在危险时,将进入报警等级一,通过解析基础安全消息中的紧急车辆提醒数据,识别周边是否有警车。一旦发现有警车出现,则立即周期性的向警车发起救援请求;若持续30秒都没有找到紧急车辆,则进入报警等级二。报警等级二增加对周边普通车辆的寻找。寻找过程的优先级按人车距离排序,若持续30秒后用户所在车辆附近没有可接收救援请求的普通车辆时,还可以通过向路侧单元发起救援请求。路侧单元可将救援请求发送到警局系统,实现快速报警,并且,还可以根据救援请求中包括的车辆信息进行决策,控制交通指示设备。例如,在车辆到达红绿灯前将道路指示灯切换为红灯。以上,在用户未停止呼救请求前,会持续执行救援请求。
图4示出一传输的数据段的数据结构示意图。
可以理解地,为了实现点对点通信,使救援请求无法被用户所在车辆解析感知,可以在V2X通信协议中增加用户字段,如图4所示,用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和数据段是否进行加密的加密标志。其中,当加密标志为真时,除用户字段外其他字段均由接收方设备的公钥进行加密,只有接收方设备使用自己的私钥方可解密。可以理解地,发送方公钥具体为非对称加密公钥。进一步地,若数据段加密过程支持多种公钥,则还应增加标识体现使用何种加密算法,以确定公钥长度和使用的加密算法。
在本申请实施例中,通过采集的V2X信息确定用户所在车辆的车辆标识,能够基于V2X通信方式,快速确认用户所乘坐的车辆,并根据用户所在车辆的车辆标识,使得用户能够在众多车辆中获取用户所在车辆的车辆信息;通过对传感器数据的采集,可根据传感器数据对用户是否存在危险进行检测,当检测确定用户存在危险时,可及时将包括车辆信息和呼叫信息的救援请求发送到接收设备。该救援请求可实现自动发送,无需用户主动触发,无需依赖打车应用程序,能够实现安全便捷的呼救目的。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
基于实施例中所提供的协同呼救方法,本申请实施例进一步给出实现上述方法实施例中各步骤及方法的装置实施例。
图5示出与实施例中协同呼救方法一一对应的协同呼救装置的原理框图。如图5所示,该协同呼救装置包括第一采集模块10、车辆信息获取模块20、第三采集模块30和救援请求模块40。其中,第一采集模块10、车辆信息获取模块20、第三采集模块30和救援请求模块40的实现功能与实施例中协同呼救方法对应的步骤一一对应,为避免赘述,本实施例不一一详述。
第一采集模块10,用于采集V2X信息,通过V2X信息确定用户所在车辆的车辆标识。
其中,V2X(Vehicle to everything)表示车辆与万物的基于LTE(Long Term Evolution,长期演进)-V(Vehicle)或DSRC(Dedicated Short Range Communications,专用短程通信技术)的通信互联,能够以车辆作为主体与其他事物进行通信互联,例如,车与车、车与可穿戴设备、车与路侧单元等之间的通信互联。
在一实施例中,可穿戴设备通过V2X通信采集V2X信息,其中,该V2X信息包括BSM(Basic safety Message,基础安全消息),该基础安全消息为车辆进行V2X通信时所广播的信息,包括车辆VIN(Vehicle Identification Number)码、车辆行驶速度、形式航向、地理位置、 加速度、预测路径、历史路径和车辆类型等。可以理解地,用户在驾驶或乘坐车辆时,可通过身上的可穿戴设备采集V2X信息,建立起用户的可穿戴设备、用户所在车辆与通信范围内其他车辆的通信互联关系。
车辆标识是指能够唯一识别车辆的标识,具体可以将V2X信息中的车辆VIN码作为车辆标识。其中,该车辆VIN码是一组由十七个英数组成,用于汽车上的一组独一无二的号码,可以识别汽车的生产商、引擎、底盘序号及其他性能等资料。本申请实施例能够基于V2X的通信方式,快速确认用户所在车辆的车辆标识。
车辆信息获取模块20,用于根据用户所在车辆的车辆标识,获取用户所在车辆的车辆信息。
其中,用户所在车辆的车辆信息是指对用户正在乘坐、驾驶的车采集得到的V2X信息,包括用户所在车辆的基础安全消息。
可以理解地,假设用户遇到了危险,则在呼救时需要发送用户所在车辆的车辆信息,才能够让援救方快速确定用户所在地理位置进行援救。
在一实施例中,可根据车辆VIN码,在众多车辆采集的V2X信息中获取得到用户所在车辆的车辆信息,也可以根据车辆标识,采用可穿戴设备的通信数据模块,如支持LTE-V通信数据的RFIC(射频集成电路),接收车辆的V2X通信模块发出的广播信息,采集得到用户所在车辆的车辆信息。本申请实施例中,能够使用户在众多车辆中获取用户所在车辆的车辆信息,以在用户发生危险时,能够快速将用户所在车辆的车辆信息及时发送到其他车辆或者路侧单元,使得救援人员能够快速准确地确定用户当前的地理位置等信息。
第三采集模块30,用于采集传感器数据,并根据传感器数据对用户是否存在危险进行检测。
其中,可穿戴设备包括多种传感器,传感器采集的传感器数据能够体现出用户的个人健康状况,如用户是否有受惊吓、恐惧等不良精神状态出现;如用户身体状态是否发生异常情况,例如身体移动速度变化的幅度、翻转幅度是否过大等异常情况出现,通过这些传感数据能够对用户是否存在危险进行检测。
救援请求模块40,用于若确定用户存在危险,则发起救援请求,其中,救援请求包括车辆信息和呼叫信息。
其中,呼救信息包括用户的使用状态,具体为“SOS求救”状态,以及包括个人健康状况等信息。该呼叫信息能够在用户遇到危险时及时发送到其他车辆或者路侧单元,以使用户遇险的情况被快速获知。可以理解地,除了呼救信息,为了使救援人员更有效的资源,还需要提供用户所在车辆的车辆信息,包括车辆行驶速度、形式航向、地理位置、加速度、预测路径与历史路径、车辆类型等基础安全消息。通过车辆信息和呼叫信息能够将用户的当前状况及时地发送出去,提高救援效率。
可选地,V2X信息中包括GPS数据。
可选地,第一采集模块10,具体用于:
根据GPS数据计算用户和周边车辆的距离,其中,预设地理范围内的车辆为周边车辆。
在预设时间段内,将与用户的距离持续在1.5米内的周边车辆确定为用户所在车辆。
根据用户所在车辆确定用户所在车辆的车辆标识。
具体地,可将以用户所在地理位置为中心,半径150m范围内的车辆作为周边车辆。
可以理解地,V2X信息中包括GPS(Global Positioning System)数据,也即车辆的地理位置的数据,用户可通过车辆的GPS数据确定用户所在车辆的车辆标识。
在一实施例中,用户在通过可穿戴设备的V2X通信模块接收周边车辆的广播信息,得到基础安全消息后,将根据基础安全消息中的GPS数据计算用户和周边车辆的距离,以对用户和周边车辆的距离进行分析,确定用户所在车辆。
可以理解地,前后车在行驶状态下安全距离应在10米以上,因此用户在正常车辆行驶的情况下与前后车的距离不可能一直在1.5米内;而对于左右车距,安全行驶的平均左右车距为1.2米,而车身宽度为1.5米以上,因此,用户上车车辆从静止起步到用户遇到危险,始终有车辆与本车并行行驶导致人车距离在1.5米内也基本不可能。
在一实施例中,在预设时间段内,若用户和周边车辆的距离持续在1.5米内,则将该周边车辆确定为用户所在车辆,若在用户遇到危险时,可将用户所在车辆标记为危险车辆,并生成呼救信息,其中,呼救信息包括VRUCW(Vulnerable Road User Collision warning,弱势交通参与者碰撞预警)用户数据:包括用户的使用状态为“SOS求救”,包括个人健康状况等。该呼叫信息能够在用户遇到危险时及时发送到其他车辆或者路侧单元,以使用户遇险的情况被快速获知。
在一实施例中,当确定用户所在车辆后,可选取能够唯一识别的标识作为车辆标识。具体地,可以将用户所在车辆的车辆VIN码作为车辆标识,可方便后续可穿戴设备根据车辆的车辆VIN码对用户所在车辆通过广播发送的V2X信息进行采集。
可选地,传感器数据包括角速度、加速度和心率。
可选地,第三采集模块30,具体用于:
采集角速度、加速度和心率。
根据角速度、加速度和心率是否满足预设的危险判定条件检测用户是否存在危险,其中,当角速度、加速度和心率满足预设的危险判定条件时,确定用户存在危险。
在一实施例中,可穿戴设备包括陀螺仪传感器、加速度传感器和心率传感器等传感器,可根据陀螺仪传感器、加速度传感器和心率传感器等传感器采集的角速度、加速度和心率等数据检测用户的个人健康状况,有助于判断用户是否存在危险。
在一实施例中,当角速度、加速度和心率满足预设的危险判定条件时,如在第一时间区间内同时满足角速度的平均值大于第一预设阈值和加速度的平均值大于第二预设阈值,则认为用户存在危险;或者,在第二时间区间内心率的平均值大于第三预设阈值时,认为用户存在危险。
可选地,救援请求模块40,具体用于:
若确定用户存在危险,则按不同紧急等级发起救援请求,其中,紧急等级根据时间进行划分。
在一实施例中,具体可以根据时间划分救援请求的紧急程度。根据不同的紧急程度发起的救援请求具有更强的针对性,能够更加合理地利用周边资源进行求救,提高救援效率和成功率。
可选地,救援请求模块40,还具体用于:
在第一预设时间段内,根据V2X信息得到紧急车辆提醒数据。
根据紧急车辆提醒数据寻找第一预设搜索范围内是否存在紧急车辆。
若存在紧急车辆,则周期性地向紧急车辆发起救援请求。
其中,紧急车辆提醒(Emergency Vehicle Warning,EVW)是识别紧急车辆的类型标识。
V2X信息中包括车辆类型,根据车辆类型能够将采集到的V2X信息进行筛选。在一实施例中,在用户发生危险的前30秒内,以优先寻找紧急车辆作为目标,其中,紧急车辆包括警车、救护车和消防车等。
在一实施例中,将在第一预设搜索范围内搜索紧急车辆,如以汽车的GPS定位为中心,以该中心为圆心的半径150m内的范围进行搜索。
在一实施例中,当在第一预设搜索范围内搜索到紧急车辆时,可以每隔五秒向紧急车辆发起救援请求,以引起紧急车辆的注意,使紧急车辆能够及时发现用户处于危险中。
在一实施例中,当第一预设搜索范围内同时存在警车、救护车和消防车时,将优先对警车发起救援请求;当第一预设搜索范围内同时存在救护车和消防车时,将优先对救护车发起救援请求。可以理解地,紧急车辆对用户可提供救援报警的相关程度不同。本实施例中可以按警车-救护车-消防车的优先级顺序发起救援请求,以使用户能够在同时搜索到多种类型的紧急车辆时,向可提供救援报警的相关程度较高的紧急车辆发起救援请求,达到更优的救援效果。
可选地,救援请求模块40,还具体用于:
若在第一预设时间段内,第一预设搜索范围内不存在紧急车辆,则在第二预设时间段内,对第二预设搜索范围内的车辆发起救援请求。
可以理解地,找寻紧急车辆寻求救援是一种具有针对性的做法,紧急车辆上的人员若获知用户发起了救援请求,将会快速地安排人员进行救援。但是用户所在车辆不一定能够顺利搜索到紧急车辆,因此,在第二预设时间段内,如30秒内搜索不到紧急车辆,则向第二预设搜索范围内的车辆发起救援请求,其中,第一预设搜索范围和第二预设搜索范围可以是相同的。
在一实施例中,通过在第二预设时间段内,对第二预设搜索范围内的车辆发起救援请求,可以在搜索不到紧急车辆的情况下,向其他车辆进行求助,发起救援请求,以使其他乘客、或驾驶人员能够及时发现用户存在危险。
可选地,救援请求模块40,还具体用于:
若在第二预设时间段内,第二搜索范围内不存在车辆,则向路侧单元发起救援请求,以使路侧单元在接收救援请求后对交通指示设备进行控制。
其中,路侧单元(Road Side Unit,简称RSU)是指安装在路侧,能够与车辆的通信模块进行通讯,实现车辆身份识别、电子扣分、道路限速、障碍预警等功能的电子设备。
在一实施例中,当用户所在车辆附近没有可接收救援请求的车辆时,还可以通过向路侧单元发起救援请求。路侧单元可将救援请求发送到警局系统,实现快速报警,并且,还可以根据救援请求中包括的车辆信息控制交通指示设备,如在车辆到达红绿灯前将灯切换为红灯。
可选地,救援请求采用点对点通信的方式发起,其中,通信过程采用V2X通信协议。
可选地,V2X通信协议传输的数据段中包括用户字段,用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和数据段是否进行加密的加密标志。
在一实施例中,救援请求采用点对点通信的方式发起,能够实现用户所在车辆和其他车辆一对一地进行通信,能够提高通信的安全性。此外,通信过程中采用的是V2X通信协议,采用该V2X的通信方式能够不依托打车应用程序、打车服务平台等服务商实现通信交互,能够 自动发起救援请求,无需用户主动触发。
进一步地,为了实现救援请求采用点对点通信的方式,在一实施例中,具体可以在V2X通信协议传输的数据段中添加用户字段,该用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和数据段是否进行加密的加密标志,采用该方式的点对点通信进行数据传输,能够提高救援请求的保密性,防止被歹徒截取破解。
在本申请实施例中,通过采集的V2X信息确定用户所在车辆的车辆标识,能够基于V2X的点对点短距通信方式,快速确认用户所乘坐的车辆,并根据用户所在车辆的车辆标识,使得用户能够在众多车辆中获取用户所在车辆的车辆信息;通过对传感器数据的采集,可根据传感器数据对用户是否存在危险进行检测,当检测确定用户存在危险时,可及时将包括用户所在车辆的车辆标识和车辆信息的救援请求发送到接收设备。该救援请求可实现自动发送,无需用户主动触发,无需依赖打车应用程序,能够实现安全便捷的呼救目的。
本实施例提供一计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现实施例中协同呼救方法,为避免重复,此处不一一赘述。或者,该计算机程序被处理器执行时实现实施例中协同呼救装置中各模块/单元的功能,为避免重复,此处不一一赘述。
图6是本申请一实施例提供的可穿戴设备的示意图。如图6所示,该实施例的可穿戴设备50包括:处理器51、存储器52以及存储在存储器52中并可在处理器51上运行的计算机程序53,该计算机程序53被处理器51执行时实现实施例中协同呼救方法。或者,该计算机程序53被处理器51执行时实现实施例中与协同呼救方法一一对应的协同呼救装置中各模型/单元的功能。
可穿戴设备50可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。可穿戴设备50可包括,但不仅限于,处理器51、存储器52。本领域技术人员可以理解,图6仅仅是可穿戴设备50的示例,并不构成对可穿戴设备50的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如可穿戴设备还可以包括输入输出设备、网络接入设备、总线等。
所称处理器51可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
存储器52可以是可穿戴设备50的内部存储单元,例如可穿戴设备50的硬盘或内存。存储器52也可以是可穿戴设备50的外部存储设备,例如可穿戴设备50上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,存储器52还可以既包括可穿戴设备50的内部存储单元也包括外部存储设备。存储器52用于存储计算机程序以及可穿戴设备所需的其他程序和数据。存储器52还可以用于暂时地存储已经输出或者将要输出的数据。
应当明确,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例, 都属于本申请保护的范围。
在本申请实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。
应当理解,本文中使用的术语“和/或”仅仅是一种描述关联对象的相同的字段,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应当理解,尽管在本申请实施例中可能采用术语第一、第二、第三等来描述预设范围等,但这些预设范围不应限于这些术语。这些术语仅用来将预设范围彼此区分开。例如,在不脱离本申请实施例范围的情况下,第一预设范围也可以被称为第二预设范围,类似地,第二预设范围也可以被称为第一预设范围。
取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”或“响应于检测”。类似地,取决于语境,短语“如果确定”或“如果检测(陈述的条件或事件)”可以被解释成为“当确定时”或“响应于确定”或“当检测(陈述的条件或事件)时”或“响应于检测(陈述的条件或事件)”。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。
Claims (20)
- 一种协同呼救方法,其特征在于,包括:采集V2X信息,通过所述V2X信息确定用户所在车辆的车辆标识;根据所述用户所在车辆的车辆标识,获取所述用户所在车辆的车辆信息;采集传感器数据,并根据所述传感器数据对用户是否存在危险进行检测;若确定用户存在危险,则发起救援请求,其中,所述救援请求包括所述车辆信息和呼叫信息。
- 根据权利要求1所述的方法,其特征在于,所述V2X信息中包括GPS数据,通过所述V2X信息确定用户所在车辆的车辆标识,包括:根据所述GPS数据计算用户和周边车辆的距离,其中,预设地理范围内的车辆为所述周边车辆;在预设时间段内,将与所述用户的距离持续在1.5米内的所述周边车辆确定为所述用户所在车辆;根据所述用户所在车辆确定所述用户所在车辆的车辆标识。
- 根据权利要求1所述的方法,其特征在于,所述传感器数据包括角速度、加速度和心率,所述采集传感器数据,并根据所述传感器数据对用户是否存在危险进行检测,包括:采集角速度、加速度和心率;根据所述角速度、所述加速度和所述心率是否满足预设的危险判定条件检测用户是否存在危险,其中,当所述角速度、所述加速度和所述心率满足预设的危险判定条件时,确定所述用户存在危险。
- 根据权利要求1所述的方法,其特征在于,所述若确定用户存在危险,则发起救援请求,包括:若确定用户存在危险,则按不同紧急等级发起所述救援请求,其中,所述紧急等级根据时间进行划分。
- 根据权利要求4所述的方法,其特征在于,所述若确定用户存在危险,则按不同紧急等级发起所述救援请求,包括:在第一预设时间段内,根据所述V2X信息得到紧急车辆提醒数据;根据所述紧急车辆提醒数据寻找第一预设搜索范围内是否存在紧急车辆;若存在所述紧急车辆,则周期性地向所述紧急车辆发起救援请求。
- 根据权利要求5所述的方法,其特征在于,所述若确定用户存在危险,则按不同紧急等级发起所述救援请求,包括:若在所述第一预设时间段内,所述第一预设搜索范围内不存在所述紧急车辆,则在第二预设时间段内,对所述第二预设搜索范围内的车辆发起所述救援请求。
- 根据权利要求6所述的方法,其特征在于,所述若确定用户存在危险,则按不同紧急等级发起所述救援请求,包括:若在所述第二预设时间段内,所述第二搜索范围内不存在车辆,则向路侧单元发起所述救援请求,以使所述路侧单元在接收所述救援请求后对交通指示设备进行控制。
- 根据权利要求1-7任意一项所述的方法,其特征在于,所述救援请求采用点对点通信 的方式发起,其中,通信过程采用V2X通信协议。
- 根据权利要求8所述的方法,其特征在于,所述V2X通信协议传输的数据段中包括用户字段,所述用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和所述数据段是否进行加密的加密标志。
- 一种协同呼叫装置,其特征在于,包括:第一采集模块,用于采集V2X信息,通过所述V2X信息确定用户所在车辆的车辆标识;车辆信息获取模块,用于根据所述用户所在车辆的车辆标识,获取所述用户所在车辆的车辆信息;第三采集模块,用于采集传感器数据,并根据所述传感器数据对用户是否存在危险进行检测;救援请求模块,用于若确定用户存在危险,则发起救援请求,其中,所述救援请求包括所述车辆信息和呼叫信息。
- 根据权利要求10所述的装置,其特征在于,所述V2X信息中包括GPS数据,所述第一采集模块,具体用于:根据所述GPS数据计算用户和周边车辆的距离,其中,预设地理范围内的车辆为所述周边车辆;在预设时间段内,将与所述用户的距离持续在1.5米内的所述周边车辆确定为所述用户所在车辆;根据所述用户所在车辆确定所述用户所在车辆的车辆标识。
- 根据权利要求10所述的装置,其特征在于,所述传感器数据包括角速度、加速度和心率,所述第三采集模块,具体用于:采集角速度、加速度和心率;根据所述角速度、所述加速度和所述心率是否满足预设的危险判定条件检测用户是否存在危险,其中,当所述角速度、所述加速度和所述心率满足预设的危险判定条件时,确定所述用户存在危险。
- 根据权利要求10所述的装置,其特征在于,所述救援请求模块,具体用于:若确定用户存在危险,则按不同紧急等级发起所述救援请求,其中,所述紧急等级根据时间进行划分。
- 根据权利要求13所述的装置,其特征在于,所述救援请求模块,还具体用于:在第一预设时间段内,根据所述V2X信息得到紧急车辆提醒数据;根据所述紧急车辆提醒数据寻找第一预设搜索范围内是否存在紧急车辆;若存在所述紧急车辆,则周期性地向所述紧急车辆发起救援请求。
- 根据权利要求14所述的装置,其特征在于,所述救援请求模块,还具体用于:若在所述第一预设时间段内,所述第一预设搜索范围内不存在所述紧急车辆,则在第二预设时间段内,对所述第二预设搜索范围内的车辆发起所述救援请求。
- 根据权利要求15所述的装置,其特征在于,所述救援请求模块,还具体用于:若在所述第二预设时间段内,所述第二搜索范围内不存在车辆,则向路侧单元发起所述救援请求,以使所述路侧单元在接收所述救援请求后对交通指示设备进行控制。
- 根据权利要求10-16任意一项所述的装置,其特征在于,所述救援请求采用点对点通信的方式发起,其中,通信过程采用V2X通信协议。
- 根据权利要求17所述的装置,其特征在于,所述V2X通信协议传输的数据段中包括用户字段,所述用户字段中包括发送方设备ID、接收方设备ID、发送方公钥和所述数据段是否进行加密的加密标志。
- 一种可穿戴设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至9任一项所述协同呼救方法的步骤。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至9任一项所述协同呼救方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911021756.3A CN110881166B (zh) | 2019-10-25 | 2019-10-25 | 协同呼救方法、装置、可穿戴设备和存储介质 |
CN201911021756.3 | 2019-10-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021077843A1 true WO2021077843A1 (zh) | 2021-04-29 |
Family
ID=69728156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/105906 WO2021077843A1 (zh) | 2019-10-25 | 2020-07-30 | 协同呼救方法、装置、可穿戴设备和存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110881166B (zh) |
WO (1) | WO2021077843A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110881166B (zh) * | 2019-10-25 | 2021-06-08 | 华为技术有限公司 | 协同呼救方法、装置、可穿戴设备和存储介质 |
CN114071401A (zh) * | 2020-08-04 | 2022-02-18 | Oppo广东移动通信有限公司 | 穿戴式设备的控制方法、装置、穿戴式设备和存储介质 |
CN113836193B (zh) * | 2021-08-13 | 2024-05-17 | 合肥维天运通信息科技股份有限公司 | 一种物流车辆智慧救援方法及系统 |
CN113793479A (zh) * | 2021-11-17 | 2021-12-14 | 聊城中塑电子科技有限公司 | 基于车联网的人员危险感知方法、系统及电子设备 |
CN114326951A (zh) * | 2021-12-31 | 2022-04-12 | 歌尔科技有限公司 | 一种佩戴检测方法、系统、装置及可穿戴设备 |
CN117597954A (zh) * | 2022-06-13 | 2024-02-23 | 北京小米移动软件有限公司 | 一种呼救方法、装置、设备及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105321340A (zh) * | 2015-11-23 | 2016-02-10 | 上海汽车集团股份有限公司 | 基于车路通信的救援信号发送方法和装置以及车辆 |
CN106448043A (zh) * | 2016-07-29 | 2017-02-22 | 深圳市元征科技股份有限公司 | 求援方法以及装置 |
CN109472730A (zh) * | 2018-10-31 | 2019-03-15 | 深圳市元征科技股份有限公司 | 一种车辆紧急预警方法、装置、设备、系统 |
CN109766405A (zh) * | 2019-03-06 | 2019-05-17 | 路特迩科技(杭州)有限公司 | 基于电子地图的交通和旅行信息服务系统及方法 |
US20190164423A1 (en) * | 2017-11-27 | 2019-05-30 | Honda Motor Co., Ltd. | System and method for providing road user related data based on vehicle communications |
CN110881166A (zh) * | 2019-10-25 | 2020-03-13 | 华为技术有限公司 | 协同呼救方法、装置、可穿戴设备和存储介质 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170213165A1 (en) * | 2016-01-26 | 2017-07-27 | GM Global Technology Operations LLC | Systems and methods for vehicle ride safety and security of person and property |
US9965942B2 (en) * | 2016-06-01 | 2018-05-08 | Tile, Inc. | User intervention based on tracking device sensor data |
WO2018120470A1 (zh) * | 2016-12-30 | 2018-07-05 | 华为技术有限公司 | 一种倒车图像处理的方法及其相关设备 |
CN108297874B (zh) * | 2017-04-18 | 2021-06-29 | 黄海虹 | 一种用于共享汽车的驾驶员身份授权系统 |
CN109118710A (zh) * | 2018-09-06 | 2019-01-01 | 宁波亿拍客网络科技有限公司 | 一种危险时辅助实现获得保护的方法和装置及其拓展 |
CN109299801A (zh) * | 2018-09-07 | 2019-02-01 | 福建兑信科技有限公司 | 一种网约车锁定司机自动识别系统 |
CN109711920A (zh) * | 2018-11-05 | 2019-05-03 | 界首市菁华科技信息咨询服务有限公司 | 一种网约车安全监控系统 |
CN109584008B (zh) * | 2018-11-27 | 2021-01-22 | 重庆理工大学 | 基于语音识别的网约车异常驾驶环境监督系统及方法 |
CN109727432A (zh) * | 2019-01-28 | 2019-05-07 | 深圳市世强元件网络有限公司 | 互联网平台一键报警方法及计算机终端 |
CN109982259A (zh) * | 2019-03-07 | 2019-07-05 | 深圳市华慧云科技有限公司 | 网约顺风车安全监控和报警方法及装置 |
-
2019
- 2019-10-25 CN CN201911021756.3A patent/CN110881166B/zh active Active
-
2020
- 2020-07-30 WO PCT/CN2020/105906 patent/WO2021077843A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105321340A (zh) * | 2015-11-23 | 2016-02-10 | 上海汽车集团股份有限公司 | 基于车路通信的救援信号发送方法和装置以及车辆 |
CN106448043A (zh) * | 2016-07-29 | 2017-02-22 | 深圳市元征科技股份有限公司 | 求援方法以及装置 |
US20190164423A1 (en) * | 2017-11-27 | 2019-05-30 | Honda Motor Co., Ltd. | System and method for providing road user related data based on vehicle communications |
CN109472730A (zh) * | 2018-10-31 | 2019-03-15 | 深圳市元征科技股份有限公司 | 一种车辆紧急预警方法、装置、设备、系统 |
CN109766405A (zh) * | 2019-03-06 | 2019-05-17 | 路特迩科技(杭州)有限公司 | 基于电子地图的交通和旅行信息服务系统及方法 |
CN110881166A (zh) * | 2019-10-25 | 2020-03-13 | 华为技术有限公司 | 协同呼救方法、装置、可穿戴设备和存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN110881166A (zh) | 2020-03-13 |
CN110881166B (zh) | 2021-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021077843A1 (zh) | 协同呼救方法、装置、可穿戴设备和存储介质 | |
US10769922B2 (en) | Help seeking method, system, and apparatus, and computer storage medium | |
US10171953B2 (en) | Vehicle event notification via cell broadcast | |
US9142124B2 (en) | Vehicle-mounted communication device and navigation device equipped with this vehicle-mounted communication device, communication device for pedestrians and navigation device equipped with this communication device for pedestrians, and pedestrian-to-vehicle communication system | |
CN111785019B (zh) | 一种基于v2x的车辆交通数据生成方法、系统及存储介质 | |
EP2831858B1 (en) | Service of an emergency event based on proximity | |
EP3545508B1 (en) | Method and device for selecting notification recipient | |
KR100893005B1 (ko) | 차량 사고 경보 서비스를 위한 서비스 제어 장치, 시스템,텔레메틱스 단말 및 그 방법 | |
US20200172050A1 (en) | Onboard device vehicle monitoring method and system | |
US20160006861A1 (en) | Mobile device usage activity reporting system and method | |
CN110459052A (zh) | 一种车辆事故记录方法、装置及车辆 | |
US9153135B2 (en) | Mobile computing device emergency warning system and method | |
Liu et al. | POFS: A novel pedestrian-oriented forewarning system for vulnerable pedestrian safety | |
CN106331007B (zh) | 车联网中告警信息的处理方法及装置 | |
US11017476B1 (en) | Telematics system and method for accident detection and notification | |
JP6856325B2 (ja) | 車両の運転者に警告するための方法及びシステム | |
US20170270787A1 (en) | System and method for roadside alerts | |
US11553321B2 (en) | Apparatus and method for dispatching a tow truck in response to a roadway emergency | |
US20170289773A1 (en) | Intelligent security system | |
US20230351894A1 (en) | Accident reporter | |
US20200168095A1 (en) | Notifications for ambient dangerous situations | |
CN111063138A (zh) | 信息处理装置、信息处理系统以及信息处理方法 | |
CN113438624A (zh) | 一种车辆救援方法及其装置 | |
Agarwal et al. | TLST: Time of arrival based localization and smart tunnel concept in VANETs | |
JP2005293032A (ja) | 車輌運転状況監視システム及びこのシステム用の車輌運転状況監視プログラム。 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20878641 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20878641 Country of ref document: EP Kind code of ref document: A1 |