WO2022121741A1 - 一种疫情防控方法、电子设备、应用服务器和系统 - Google Patents
一种疫情防控方法、电子设备、应用服务器和系统 Download PDFInfo
- Publication number
- WO2022121741A1 WO2022121741A1 PCT/CN2021/134614 CN2021134614W WO2022121741A1 WO 2022121741 A1 WO2022121741 A1 WO 2022121741A1 CN 2021134614 W CN2021134614 W CN 2021134614W WO 2022121741 A1 WO2022121741 A1 WO 2022121741A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- risk
- information
- fence
- risk level
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 87
- 230000002265 prevention Effects 0.000 title claims abstract description 77
- 238000004590 computer program Methods 0.000 claims description 26
- 238000013459 approach Methods 0.000 claims description 3
- 238000003745 diagnosis Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 16
- 201000010099 disease Diseases 0.000 description 16
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 16
- 239000011159 matrix material Substances 0.000 description 15
- 238000007726 management method Methods 0.000 description 10
- 230000000694 effects Effects 0.000 description 9
- 238000004364 calculation method Methods 0.000 description 6
- 208000035473 Communicable disease Diseases 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 238000011084 recovery Methods 0.000 description 5
- 208000015181 infectious disease Diseases 0.000 description 4
- 239000003086 colorant Substances 0.000 description 3
- 238000011534 incubation Methods 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 238000002955 isolation Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000000241 respiratory effect Effects 0.000 description 2
- 239000004984 smart glass Substances 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000005541 medical transmission Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0637—Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/80—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
Definitions
- the present application relates to the technical field of epidemic prevention and control, and in particular, to an epidemic prevention and control method, electronic device, application server and system.
- the epidemic prevention department needs to supervise the activities of the crowd during the epidemic prevention period.
- a designated place such as a community, subway, commercial building, school, restaurant, etc.
- use a mobile phone to actively scan the positioning QR code to report the current position information to the epidemic prevention department to record the activity track.
- the epidemic prevention department determines the close contact based on the patient's movement trajectory, and isolates and examines the close contact.
- the epidemic prevention department will promptly publicize the movement trajectory of the confirmed patient, so that possible contacts can conduct self-isolation and inspection.
- the present application provides an epidemic prevention and control method, electronic equipment, application server and system, which can solve the problem in the prior art to a certain extent that during the outbreak of infectious diseases, users cannot know the risk situation of themselves and others in time, which is not conducive to the epidemic situation. control issues.
- the embodiments of the present application provide an epidemic prevention and control method, which is applied to an electronic device.
- the method includes: acquiring supervision information of at least one user in a target area, where the supervision information includes location information and risk information;
- the corresponding mobile fence is displayed on the electronic map, and the attribute information of the mobile fence is used to represent the risk level of the corresponding user.
- the electronic device in this embodiment includes user equipment, such as a mobile phone, a tablet computer, and the like.
- user equipment such as a mobile phone, a tablet computer, and the like.
- the attribute information of the moving fence includes at least one of radius, color, and identification.
- the color of the moving fence can be black, red, orange, yellow and green respectively
- the radius of the moving fence can be 8 meters, 6 meters, 4 meters, 2 meters, 0 meters respectively.
- the at least one user in the target area includes a first user corresponding to the electronic device and a user whose risk level is higher than a preset level.
- the preset risk level may be low risk.
- the method can prevent the electronic device from displaying a large number of electronic fences of non-risk users or low-risk users on the map, so that the user can quickly identify the electronic fences of users with higher risks.
- the at least one user within the target area includes a first user and a second user, the first user corresponding to the electronic device, the first mobile fence and the first risk level, and the second user corresponding to the second mobile fence and The second risk level corresponds; the first risk level is lower than the second risk level.
- the method further includes: when the boundary distance between the first moving fence and the second moving fence is less than a preset value, the electronic device displays a first warning notification, where the first warning notification is used to instruct the risky user to approach the first user.
- the method can perform a risk warning for the first user when the first user may come into contact with the risk user, thereby reducing the contact between the first user and the risk user.
- the method further includes: highlighting the second moving fence on the electronic map, and displaying the moving direction of the second moving fence.
- the method further includes: when the first moving fence overlaps the second moving fence, displaying a second early warning notification, where the second early warning notification is used to prompt the first user to be in contact with a risk user.
- the method can remind the first user to stay away from the risk user who is in contact and reduce the contact time.
- the method further includes: after the first moving fence is separated from the second moving fence, updating the first risk level according to contact information between the first moving fence and the second moving fence; wherein the contact information includes contact Time, distance of exposure and second risk level. And, according to the updated first risk level, the attribute information of the first moving fence is updated and displayed. After the first user contacts the risk user, the method can quickly update the first mobile fence of the first user, so that the user can quickly understand his own risk situation.
- the method further includes: displaying a fixed fence in the target area on the electronic map, where the fixed fence is used to indicate a risk area; when the first user is not an isolated user in the fixed fence, and the first user enters the fixed fence
- the electronic device displays first prompt information
- the first prompt information is used to prompt the first user to stay away from the risk area.
- the method further includes, when the first user is an isolated user in the fixed fence and the first user is outside the fixed fence, displaying second prompt information, where the second prompt information is used to prompt the first user to prohibit Leave the risk area.
- the method further includes, when the target area is the display area of the electronic map, obtaining supervision information of at least one user in the target area, including: determining the area information of the display area; sending the area information to the application server; Supervision information of at least one user in the display area sent by the application server is received.
- the method further includes, when the target area is a preset range of the electronic device, acquiring supervision information of at least one user in the target area, including: determining location information of the electronic device; sending the location information to the application server ; Receive supervision information of at least one user within the preset range of the electronic device sent by the application server.
- displaying the mobile fence corresponding to the user on the electronic map according to the supervision information includes: determining attribute information of the mobile fence according to the risk level; information and this attribute information, showing the moving fence.
- displaying the user's mobile fence on the electronic map according to the supervision information includes: displaying the mobile fence directly according to the location information and attribute information.
- an embodiment of the present application provides an epidemic prevention and control method, which is applied to an application server.
- the method includes: sending supervision information of at least one user in a target area to an electronic device, where the supervision information includes location information and risk information.
- the supervision information is used for the electronic device to display the mobile fence of the corresponding user on the electronic map, and the attribute information of the mobile fence is used to represent the risk level of the corresponding user.
- the method further includes: receiving a diagnosis notification sent by the hospital equipment, where the diagnosis notification includes a diagnosis notification or a recovery notification; and updating the risk information of the corresponding user according to the diagnosis notification. For example, after receiving the recovery notification from the hospital, the risk level of the corresponding user is determined as no risk; after receiving the confirmation notification from the hospital, the risk level of the corresponding user is determined as "confirmed".
- embodiments of the present application provide an electronic device, including a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor implements the first aspect when executing the computer program Epidemic prevention and control methods.
- the electronic device includes a portable device such as a mobile phone, a tablet computer, or a wearable smart device (eg, a Bluetooth headset, a smart watch, and smart glasses).
- a portable device such as a mobile phone, a tablet computer, or a wearable smart device (eg, a Bluetooth headset, a smart watch, and smart glasses).
- the user can quickly understand the risk level of himself and others by viewing the mobile fence of each user on the electronic map, which helps reduce the user's contact with other risk users, slows down the spread of disease, prevents Control the epidemic.
- an embodiment of the present application provides an application server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the second aspect when the computer program is executed. Epidemic prevention and control methods.
- an embodiment of the present application provides an epidemic prevention and control system, including a plurality of electronic devices as described in the third aspect, and an application server as described in the fourth aspect.
- the epidemic prevention and control system further includes hospital equipment, and the hospital equipment is configured to send a diagnosis notification of the user to the application server, wherein the diagnosis notification includes a diagnosis notification or a recovery notification; the application server is further configured to, according to Diagnostic notifications update risk information for the corresponding user.
- the system further includes a management department device, and the management department device is configured to obtain the supervision information of any user within a specific range (for example, a city or a province), or the information of the supervision information of all users within the specific range. statistical results.
- a specific range for example, a city or a province
- an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the method described in the first aspect.
- an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the method described in the second aspect.
- FIG. 1 is a schematic diagram of a geofence provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of a geofence provided by another embodiment of the present application.
- FIG. 3 is a schematic structural diagram of an epidemic prevention and control system provided by an embodiment of the present application.
- FIG. 4 is a schematic diagram of a personal information interface of an epidemic prevention and control application provided by an embodiment of the present application
- FIG. 5 is a schematic diagram of an emergency contact interface of an epidemic prevention and control application provided by an embodiment of the present application.
- FIG. 6 is a flowchart of an epidemic prevention and control method provided by an embodiment of the present application.
- FIG. 7 is a schematic interface diagram of an epidemic prevention and control application provided by an embodiment of the present application.
- FIG. 8 is a schematic interface diagram of an epidemic prevention and control application provided by another embodiment of the present application.
- FIG. 9 is a schematic interface diagram of an epidemic prevention and control application provided by another embodiment of the present application.
- FIG. 10 is a schematic diagram of an epidemic prevention and control method provided by another embodiment of the present application.
- FIG. 11 is a schematic diagram of contact distance calculation provided by an embodiment of the present application.
- FIG. 13 is a schematic diagram of a change in risk level provided by an embodiment of the present application.
- FIG. 14 is a schematic interface diagram of an epidemic prevention and control application provided by another embodiment of the present application.
- infectious diseases especially respiratory infectious diseases
- risk groups such as those who have been infected with the disease, or those who have a high possibility of infection
- the close contact of people may lead to the further spread of the epidemic.
- the epidemic prevention department needs to supervise the activities of the crowd during the epidemic prevention period.
- a designated place such as a community, subway, commercial building, school, restaurant, etc.
- they use their mobile phones to actively scan and locate the QR code to report the current location information to the epidemic prevention department for record. Movement tracking.
- the epidemic prevention department determines the close contact based on the patient's movement trajectory, and isolates and examines the close contact.
- the epidemic prevention department will promptly publicize the movement trajectory of the confirmed patient, so that possible contacts can conduct self-isolation and inspection, etc., to prevent the further spread of the disease as much as possible.
- the embodiments of the present application provide an epidemic prevention and control method based on a geo-fencing technology, which can perform real-time monitoring and early warning on a user's risk situation, and reduce the spread of the epidemic to a certain extent.
- FIG. 1 is a schematic diagram of a geofence provided by an embodiment of the present application.
- a geo-fence is a virtual geographic boundary, which can be understood as a virtual fence, through which a geographic area (such as hospital A) can be determined in a real physical space, so that the Manage people or things in the area.
- LBS location-based service
- the geo-fencing technology can be applied to various location-based service (LBS) applications, such as office applications, vehicle management applications, drone control applications, user tracking applications, and the protection Epidemic control application (abbreviation: epidemic prevention and control application), etc.
- LBS location-based service
- this embodiment does not limit the specific types of epidemic prevention and control applications.
- a geofence may be the boundary of the coverage area of a wireless fidelity (WiFi) signal from a router.
- the geofence may be the boundary of the coverage area of the Bluetooth (BT) signal emitted by the electronic device.
- BT Bluetooth
- a geofence may be a coordinate range of a positioning system.
- the positioning system may be a global positioning system (global positioning system, GPS), a Beidou navigation satellite system (beidou navigation satellite system, BDS), and the like.
- the geo-fence may be in various shapes, such as a circle, an ellipse, a square, or other regular or irregular shapes, which are not limited in this embodiment.
- the geofences involved in this embodiment include fixed fences and mobile fences.
- the location of the fixed fence is determined, such as the geo-fence of hospital A in Figure 1.
- the location of the mobile fence will change constantly.
- the geofence of the user equipment in Figure 2 when the user equipment moves from the A to the B position, the user's geofence also changes from the A position to the B position. position moves.
- the following describes an epidemic prevention and control system to which the epidemic prevention and control method provided by the present application is applicable in conjunction with FIG. 3 .
- FIG. 3 is a schematic structural diagram of an epidemic prevention and control system provided by an embodiment of the present application.
- the system includes an application server, multiple management devices and multiple user devices.
- the application server provides epidemic prevention and control services by providing epidemic prevention and control applications, including user risk monitoring and risk warning.
- the epidemic prevention and control application can be downloaded and installed by the management device and the user device in the form of a client, and can also be called in the form of a small program (eg, a WeChat applet), which is not limited in this embodiment.
- a small program eg, a WeChat applet
- Management equipment includes management department equipment and hospital equipment.
- the equipment of the management department is used for the overall management of the epidemic prevention and control work by the epidemic prevention department.
- the management department device can obtain relevant information of any user within a specific scope (eg city A or province A) (eg, supervision information hereinafter), or statistical results of relevant information of all users within the scope.
- the hospital equipment is used by medical staff to upload the patient's diagnosis notification.
- the diagnosis notification includes the diagnosis notification, the recovery notification, etc. These notifications include at least the patient's name and ID number and other information.
- the application server After the application server receives the diagnosis notification, it can send it to the corresponding user equipment.
- the user equipment includes portable electronic devices such as a mobile phone, a tablet computer, a personal digital assistant (PDA), or a wearable smart device (such as a Bluetooth headset, a smart watch, and smart glasses).
- portable electronic devices such as a mobile phone, a tablet computer, a personal digital assistant (PDA), or a wearable smart device (such as a Bluetooth headset, a smart watch, and smart glasses).
- PDA personal digital assistant
- wearable smart device such as a Bluetooth headset, a smart watch, and smart glasses.
- the specific type of equipment is not limited.
- the user equipment establishes a connection with the application server by running the epidemic prevention and control application. Specifically, after registering the user account (identification, ID) of the epidemic prevention and control application, the user device obtains various information of the user (such as personal information and location information, etc.) through the epidemic prevention and control application, and sends the information to the application server .
- information of the user such as personal information and location information, etc.
- the location of the user equipment can be considered to be the user's location.
- one user ID is only allowed to log in on one user device at the same time.
- the user can register personal information with the application server through the user device.
- the personal information that the user needs to register may include name (such as "Wang Huaweing”), certificate type (such as "ID card”), certificate number (such as "6************") ****2"), phone number (such as "135XXXXXXX”), and initial contact information.
- the initial contact information is used to determine the user's contact with the risk group before registering the user ID.
- the initial contact information may include at least one of the following: (1) whether to return from area A (high-risk area) within 7 days; (2) the length of stay in area A; (3) whether to return from area B within 7 days area (medium risk area) to return; (4) length of stay in area B.
- the user can also preset some emergency contacts in the epidemic prevention and control application, such as parents, children, spouses, friends, etc.
- the server is able to notify its emergency contacts in a timely manner.
- the application server or user equipment will automatically determine the user's initial risk information (that is, the risk information after registration and before contact with other risk users) according to the user's initial contact information.
- the determination of the initial risk information is described below by taking the application server as an example.
- the application server may determine the user's initial risk information according to the user's initial contact information and whether the user has received a diagnosis notification sent by the hospital.
- the risk information may include at least one of a risk level, attribute information of a moving fence, and a risk value.
- the initial risk information of the user includes at least one of the initial risk level, the attribute information of the initial moving fence and the initial risk value.
- the attribute information of the moving fence includes at least one of radius, color, and identification.
- the logo can be a text logo, such as the words "safe", "dangerous", etc., or an image used to identify the degree of danger.
- the risk level is used to indicate the possibility of the user contracting the disease under prevention and control.
- the risk levels may be “diagnosed”, “high risk”, “medium risk”, “low risk” and “no risk” in order from high to low.
- users other than non-risk users eg, diagnosed users, high-risk users, medium-risk users, and low-risk users
- the initial risk level is used to represent the risk level when the user just registers the epidemic prevention and control application.
- a risk level correspondence table (eg, Table 1) is stored in the application server, and the correspondence table includes whether a diagnosis notification from the hospital is received, the correspondence between initial contact information and the initial risk level.
- the application server can determine the initial risk level of the user. It should be noted that the correspondence between the confirmation notification from the hospital, the initial contact information and the initial risk level can be adjusted according to the actual epidemic situation (such as the characteristics of disease transmission, the location of the disease outbreak, the severity of the epidemic, etc.). This embodiment does not limit this.
- mobile fences with different radii are set for users with different risk levels to indicate the dangerous contact range of the users. It can be understood that, the larger the radius of the user's moving fence, the larger the dangerous contact range of the user.
- the initial moving fence radius is used to represent the moving fence radius when the user just registers.
- the application server stores a mobile fence radius correspondence table (for example, Table 2), and the correspondence table includes the correspondence relationship between the risk level and the mobile fence radius.
- the application server can determine the (initial) moving fence radius according to the (initial) risk level.
- the moving fence radii corresponding to the risk levels "Confirmed”, “High Risk”, “Medium Risk”, “Low Risk” and “No Risk” are 8 meters, 6 meters, 4 meters, respectively. meters, 2 meters, 0 meters. It should be noted that the corresponding relationship between the risk level and the radius of the moving fence can be adjusted according to the actual epidemic situation, which is not limited in this embodiment.
- the risk value is also used to express the likelihood of a user contracting a disease. The higher the risk value, the more likely the user is to contract the disease. Different from the risk level, the risk value quantifies the possibility that the user has been infected with the disease, which is convenient for updating the risk information of each user during the epidemic prevention and control process (for details, please refer to the description below).
- the initial risk value is used to represent the risk value when the user just registers.
- the application server stores a corresponding relationship table between risk levels and risk values (eg, Table 3).
- the application server may determine the initial risk value of the user in combination with the corresponding relationship table according to the initial risk level of the user. Taking Table 3 as an example, when the initial risk level of the user is "medium risk”, the initial risk value of the user may be any value from "4 to 3", for example, the middle value is 3.5.
- the mobile fences corresponding to different risk levels can be set to different colors. For example, set the colors of the moving fences corresponding to the risk levels "Confirmed”, “High Risk”, “Medium Risk”, “Low Risk” and “No Risk” to black, red, orange, yellow and green respectively. Users can quickly understand the corresponding risk level according to the color of the moving fence displayed on the electronic map.
- the application server determines that the user's initial risk level is "diagnosed", and the initial moving fence radius is 8. meters, the initial risk value is 10, and the color of the moving fence is black.
- the application server does not receive a confirmation notification from user B, and user C has not been to regions A and B within 7 days, determine the initial status of user C.
- the risk level is "no risk”
- the initial moving fence radius is 0 meters (that is, no moving fence)
- the initial risk value is 0, and the color of the moving fence is green.
- the application server can supervise the user through the user device. Specifically, it includes monitoring the user's activities through fixed fences and mobile fences.
- the application server may set a fixed fence in some risk areas (for example, cell A), and set all users corresponding to user equipment in cell A as isolated users.
- the application server may also set different colors for the corresponding fixed fences according to the risk level of the risk area.
- the application server supervises the user's activities. Taking the first user as an example, specifically, when the first user is not an isolated user in cell A, if the application server detects that the first user enters the fixed fence of cell A, it sends a first prompt to the user equipment of the first user. message, prompting it to stay away from cell A. When the first user is an isolated user in cell A, but the application server detects that the first user is outside the fixed fence, the application server sends second prompt information to the user equipment of the first user, prompting the first user to prohibit leaving A community.
- the user equipment can also supervise the activities of the user by itself. Taking the first user as an example, specifically, when the first user is not an isolated user in the A cell, if the user equipment detects that the first user enters the fixed fence of the A cell, a first prompt message is displayed, prompting him to stay away from the A cell. . When the first user is an isolated user in cell A, but the user equipment detects that the first user is outside the fixed fence, a second prompt message is displayed, prompting the first user not to leave cell A.
- the user equipment may display prompt messages (including the first prompt message and the second prompt message) through the prompt box.
- a wearable device such as a Bluetooth headset or a smart watch
- the user equipment can remind the user through the wearable device.
- the user equipment detects that the Bluetooth headset is in a wearing state
- the content of the prompt message can be played through the Bluetooth headset.
- the user equipment may display the content of the prompt message through the smart watch, so that the user can obtain the content of the message in time.
- the smart watch can also vibrate or sound a ringtone to remind the user to check.
- the application server can expand the range of its fixed fence, for example, by extending the boundary of the fixed fence by 20 meters, to strengthen the protection of cell A. Protection of people inside and outside the community.
- the application server can notify the users in the fixed fence.
- the user equipment may not display the mobile fence for the quarantined user, nor perform risk warning for the user.
- the user device displays the user's mobile fence and enables risk warning for the user.
- the following describes the content of monitoring user activities through mobile fences.
- the epidemic prevention and control method provided in this embodiment includes three parts, which are the display of the mobile fence, the risk warning, and the update of the risk information. Each part is described below.
- FIG. 6 is a flowchart of an epidemic prevention and control method provided by an embodiment of the present application.
- the method shows the process of how the user equipment displays the moving fence on the electronic map, and specifically includes the following steps S601-S602.
- the user equipment acquires supervision information of at least one user in the target area, where the supervision information includes location information and risk information.
- the epidemic prevention and control application can supervise all users who use the application, and determine the user's supervision information, such as location information, contact information, risk information, etc., through the user equipment of these users in real time.
- the location information may be GPS coordinates or BDS coordinates.
- the user equipment when the user equipment is associated with the smart watch, when the user equipment detects that the smart watch is being worn, the user equipment can send the location information of the smart watch as the user's location information to the application server, so as to more accurately reflect the user. s position.
- the user equipment obtains the supervision information of at least one user in the target area, which may be implemented in any of the following manners.
- the target area is the display area of the electronic map.
- the display area of the electronic map may be the map area displayed by default after the user equipment opens the epidemic prevention and control application, and the user equipment is usually located in the display area.
- the target area may also be another area of the electronic map displayed by the user's control device, so that the user can view the risk situation of the people in the other area.
- the user equipment first determines the area information of the display area of the electronic map, and sends the area information to the application server.
- the application server can determine the display area of the electronic map according to the area information, and send the supervision information of at least one user in the display area to the user equipment.
- the target area is within a preset range (eg, 1 km around) of the user equipment.
- the user equipment may first determine the location information of the user equipment, and send the location information to the application server. After receiving the location information, the application server sends the supervision information of at least one user within the preset range of the user equipment to the user equipment according to the location information of the user equipment.
- the at least one user includes every user in the target area, or a user whose risk level is higher than a preset level (eg, medium risk) in the target area, or a user whose risk level is higher than that of the first user.
- a preset level eg, medium risk
- the user equipment displays the corresponding mobile fence on the electronic map according to the supervision information of each user, and the attribute information of the mobile fence is used to represent the risk level of the corresponding user.
- the user equipment After receiving the user's supervision information, the user equipment displays the user's mobile fence located in the electronic map display area on the electronic map. 7, in the user equipment, the users in the electronic map display area include the first user, the second user, the third user, the fourth user and the fifth user, therefore, the user equipment according to these users The corresponding supervision information will be displayed on the electronic map. Users can quickly understand the risk situation of themselves and surrounding users through the electronic map, so as to reduce contact with risk users.
- the risk information included in the supervision information is the risk level.
- the user equipment when displaying the corresponding mobile fence according to the supervision information of each user, the user equipment first needs to determine the attribute of the mobile fence according to the user's risk level. Information, such as at least one of color, radius, and logo.
- the attribute information of the mobile fence is used to represent the risk level of the corresponding user. Subsequently, for each user, the user equipment displays the corresponding mobile fence according to the corresponding location information and attribute information.
- the risk information included in the supervision information is attribute information of the mobile fence.
- the user equipment can directly display the corresponding mobile fence according to the location information and attribute information corresponding to the user. .
- the moving fence is determined by taking the location of the corresponding user (ie, the location of the user equipment) as the center of the circle and combining with the radius of the moving fence. Therefore, in the process that the user equipment moves with the user, the moving fence of the user equipment also moves continuously with the user.
- the non-risk users usually account for the majority, while the risk users usually account for only a small number.
- the user equipment can display moving fences according to the risk level of each user.
- the user equipment may display the moving fences of all the users in the display area on the electronic map, so that the user can observe the risk situation of everyone around.
- the user equipment may only display the first user's mobile fence on the electronic map.
- the user equipment may only display the moving fence of the first user and the moving fence of the user whose risk level is higher than or equal to the first user on the electronic map. For example, when the risk level of the first user is "high risk", the user equipment may only display the moving fence of the first user, and the moving fences of the high-risk user and the diagnosed user.
- each user equipment will continuously report its supervision information to the application server, and the user equipment of the first user will also repeatedly execute S601 to S602 at preset time intervals (for example, 1 second), that is, obtain information from the application server within the target area. At least one user's supervision information and update the mobile user's mobile fence. That is to say, on the electronic map displayed on the user equipment, the mobile fence of each user will change with the change of their location information and risk information.
- the user can know whether there are risk users around, can judge the distance between the mobile fence and the risk user according to the distance between the mobile fences, and can observe whether the mobile fence overlaps with other mobile fences. , to determine whether it has contact with risky users.
- the mobile fence is first displayed on the electronic map of the user equipment according to the user's initial risk information.
- the application server needs to update the current risk information of the user, and display the moving fence according to the updated risk information. If the user has no corresponding initial risk information due to unregistered personal information (including initial contact information), the user equipment may temporarily not display the user's mobile fence on the map. After the user comes into contact with the risk group, the user equipment determines and displays its moving fence according to the contact situation.
- the moving fence on the electronic map may be displayed on the electronic map according to the actual size of the moving fence and the current scale of the electronic map. The higher the user's risk level, the larger the radius of the moving fence displayed on the electronic map.
- the moving fence on the electronic map will also change according to the zoom-in or zoom-out ratio of the electronic map.
- the epidemic prevention and control method provided in this embodiment can also perform risk warning for users according to the moving fences of each user.
- the process of risk warning is described below by taking the first user and the second user as examples.
- the first user corresponds to the first risk level, the first mobile fence, and the first risk value
- the second user corresponds to the second risk level, the second mobile fence, and the second risk value.
- the first risk level is lower than the second risk level, or the second risk level is higher than the preset level.
- the early warning process is as follows.
- a first warning notification is sent to the user equipment.
- the user equipment displays after receiving the first warning notification.
- the first warning notification is directly displayed.
- the second user may move in a direction close to the first user.
- a preset value e.g. 10 meters, 20 meters, etc.
- the first warning notification is used to prompt a user at risk near the first user to approach.
- the first warning notice may be prompt information "a high-risk user is approaching, please leave this place quickly”.
- the user equipment can also highlight the second moving fence for quick identification by the user.
- the user equipment may flash and display the second moving fence, or highlight the second moving fence.
- the user can also view the real-time location and movement direction of the risky user through the electronic map of the epidemic prevention and control application, so that the user can plan a departure route and avoid contact with the risky user.
- the application server after the application server detects that the first moving fence overlaps the second moving fence, the application server sends a second early warning notification to the user equipment.
- the user equipment displays after receiving the second warning notification.
- the second warning notification is directly displayed.
- the second early warning notification is used to prompt the user that he is in contact with the risky user.
- the second early warning notification may be prompt information "in contact with high-risk users, please pay attention to protection and stay away quickly".
- the user equipment may display an early warning notification for multiple users using the above risk early warning method, and may also display a third early warning notification, where the third early warning notification is used to prompt the user that there are multiple risk users nearby.
- the user equipment of the user can simultaneously highlight the moving fences of the above-mentioned multiple risk users on the electronic map.
- the application server may send the early warning notification (including the first early warning notification, the second early warning notification and the third early warning notification) to the user equipment in the form of a short message or an application message.
- the user equipment may display the warning notification through a pop-up box.
- the user equipment can remind the user through the wearable device after receiving an early warning notification. For example, after detecting that the Bluetooth headset is being worn, the user equipment can play the content of the warning notification through the Bluetooth headset. Alternatively, after detecting that the smart watch is being worn, the user equipment may display the content of the warning notification through the smart watch, so that the user can obtain the notification content in time. After receiving the warning notification, the smart watch can also vibrate or sound a ringtone to prompt the user to check.
- a connected wearable device such as a Bluetooth headset or a smart watch
- the user equipment can remind the user through the wearable device after receiving an early warning notification. For example, after detecting that the Bluetooth headset is being worn, the user equipment can play the content of the warning notification through the Bluetooth headset. Alternatively, after detecting that the smart watch is being worn, the user equipment may display the content of the warning notification through the smart watch, so that the user can obtain the notification content in time. After receiving the warning notification, the smart watch can also vibrate or sound a ringtone to prompt the user
- the epidemic prevention and control method provided by the embodiments of the present application can remind the user to stay away from the risky user when there is a risky user around the user, thereby avoiding the close contact between the user and the risky user to a certain extent, and reducing the epidemic situation. diffusion.
- the application server needs to update the user's risk information (including the risk level, the moving fence radius and the risk value) according to the contact information.
- FIG. 10 is a schematic diagram of an epidemic prevention and control method provided by another embodiment of the present application.
- the method shows the user's risk information update process, and the method can be applied to the user equipment, and can also be applied to the application server. If the user equipment executes the method, after updating the risk information of the first user, the user equipment needs to report the updated risk information to the application server.
- the method is exemplarily described below by taking the application server updating the risk information of the first user as an example.
- the method specifically includes the following steps S1001-S1003.
- the application server determines the contact information between the first moving fence and the second moving fence.
- the contact information of the first moving fence and the second moving fence (also referred to as the contact information of the first user and the second user) includes: the contact time t, the contact distance d, and the contact information corresponding to the second user.
- the second risk value (or the second risk level, wherein, according to the corresponding relationship between the risk level and the risk value, the second risk value corresponding to the second risk level can be determined, thereby updating the risk information of the first user).
- the contact time refers to the duration for which the first moving fence and the second moving fence overlap. The longer the contact time, the greater the risk of the first user being infected with the disease by the second user.
- the application server detects that the first moving fence starts to overlap with the second moving fence at 19:15:00 (ie 19:15:00), and separates at 19:15:10 (ie 19:15:10), Then the contact time between the first moving fence and the second moving fence is 10 seconds.
- the contact distance is used to represent the distance at which the first moving fence and the second moving fence overlap. The larger the contact distance is, the more the first moving fence and the second moving fence overlap, and the greater the risk of the first user being infected with the disease by the second user.
- r1 is the radius of the first moving fence
- r2 is the radius of the second moving fence
- D is the distance between the center of the first moving fence and the center of the second moving fence, that is, the distance between the first user and the second user distance between.
- the application server stores the current risk information of each user, including the above-mentioned second risk value, which can be directly invoked by the application server during use.
- the second risk value may be the initial risk value of the second user, or may be obtained by the application server after the second user updates the initial risk value after contacting the risk user.
- the application server may also acquire the second risk level of the first user, and combine the corresponding relationship between the risk level and the risk value (eg, FIG. 3 ) to determine the second risk value corresponding to the second risk level. For example, when the second risk level is "high risk”, the second risk value is determined to be "7".
- the application server updates the first risk level according to the contact information.
- the application server may determine contact information between the first mobile fence and the second mobile fence in real time, and update the first risk level in real time according to the contact information. It should be understood that the updated first risk level cannot be higher than the second risk level. When the updated first risk level is the same as the second risk level, the first risk level will not be updated during this contact process.
- the method has a fast update speed, and the first user can know the change of his own risk situation in real time in the process of contacting with the risk user.
- the application server may first update the first risk value in real time using the risk value formula according to the contact information, and then re-determine the first risk value according to the updated first risk value.
- the application server may update the first risk level in real time according to the contact information between the first user and the risk user with the highest risk level. If there are multiple risk users with the highest risk level, the application server can arbitrarily select one of them as the contact object of the first user, and update the first risk level.
- the application server may also, after detecting that the contact between the first user and the second user ends, according to the contact information and the first user's data within a preset time (for example, at least one incubation period of the disease to be prevented and controlled)
- the historical exposure information is used to update the first risk level using a preset risk level calculation model. Compared with updating the risk level in real time, this method has higher accuracy.
- the historical contact information may include all contact information of the user within the preset time, or may be part of the contact information, or may be a representative contact information of each day within the preset time.
- the contact information with the risk user with the highest risk level can be used as the first user.
- a user's contact information on the current day For example, if the first user contacts a high-risk user and a low-risk user within one day, the contact information with the high-risk user is used as the contact information of the current day.
- the contact time is 0, and the contact distance is 0.
- the value at risk is determined according to the risk level. For example, when the user's risk level is "medium risk", its risk value may be 3.5. If the user contacts a risk user on the day of registration, and the risk level of the risk user is higher than the current risk level of the first user, the contact information with the risk user is used as the contact information of the day.
- the risk value, contact distance and contact time in his current contact information are all 0.
- the update process of the first risk level provided in this embodiment will be described below by taking respiratory infectious disease A (with an average incubation period of 7 days) as an example. Taking today is February 7 as an example, the contact information of the first user from February 1 to February 7 is shown in Table 4, for example.
- the application server may generate an eigenvalue matrix F according to the contact information of the first user in at least one latency period. For example, for the contact information shown in Table 4, the corresponding eigenvalue matrix
- the application server can calculate the risk matrix Q of the user today.
- the risk matrix In one example,
- ⁇ [0.4 0.3 0.3].
- the weight coefficients in the second coefficient matrix may be pre-configured, which is not limited in this embodiment.
- the application server may calculate the updated first risk value of the first user according to the second coefficient matrix ⁇ and the risk matrix Q. Specifically, the first value at risk In one example,
- the application server updates the attribute information of the first mobile fence according to the updated first risk level.
- the application server can determine the updated radius of the first moving fence according to the updated first risk level, the correspondence table between the risk level and the radius of the moving fence. According to the updated first risk level, the corresponding relationship between the risk level and the color, the color of the updated first moving fence can be determined.
- the updated risk level of the first user is "medium risk”
- the color of the updated first moving fence is "orange”.
- the application server updates the first risk level and the first moving fence, it controls the user equipment to update the attribute information of the first moving fence displayed on the electronic map of the risk supervision application. For example, before the first moving fence overlaps with the second moving fence, as shown in FIG. 8 , the corresponding first risk level is “low risk”, the fence radius is 2 meters, and the fence color is displayed in yellow. After it comes into contact with the second moving fence, as shown in Figure 14, its first risk level is "medium risk”, the fence radius is 4 meters, and the fence color is orange.
- the user can quickly understand the change of his own risk situation through the change of the color and size of the fence, which can play a role in real-time warning of the user's risk situation, and reduce the situation of blindly contacting people because the user cannot know their risk situation in time, which is beneficial to Epidemic prevention and control.
- the application server can quickly update the user's current risk level, moving fence radius, risk value and other risk information according to the contact information between the user and the risk user, so that the user can timely understand their own risk situation.
- the application server can notify the relevant electronic devices in the supervision system in the form of a short message or an application message.
- the application server may send a level change notification to the corresponding user equipment in the form of a short message or an application message.
- the user equipment receives and displays the level change notification.
- the wearable device can remind the user. For example, after detecting that the Bluetooth headset is being worn, the user equipment plays the content of the level change notification through the Bluetooth headset. Alternatively, after detecting that the smart watch is being worn, the user equipment displays the content of the level change notification through the smart watch, so that the user can obtain the notification content in time.
- the content of the level change notification may be "Your risk level is upgraded to low risk, please wear a mask and pay attention to protection”.
- the content of the level change notification can be "Your risk level is upgraded to high risk, please go to the hospital for inspection in time”.
- the application server may also notify the user's emergency contact, so that the emergency contact can learn about the risk status in time.
- the application server reports the user's risk information to the epidemic prevention department, so that the epidemic prevention department can timely control the development of the epidemic situation.
- this embodiment further provides a user equipment, where the user equipment is configured to obtain supervision information of at least one user in a target area, where the supervision information includes location information and risk information.
- the supervision information of each user the corresponding mobile fence is displayed on the electronic map, and the attribute information of the mobile fence is used to represent the risk level of the corresponding user.
- the user can view the mobile fence of each user on the electronic map, and quickly understand the risk situation of himself and others, which helps reduce the user's contact with other risk users, and can slow down the spread of diseases, prevent and control the disease. epidemic.
- the attribute information of the moving fence includes at least one of radius, color, and identification.
- the at least one user in the target area includes a first user corresponding to the user equipment, and a user whose risk level is higher than a preset level.
- the preset risk level may be low risk.
- the user equipment can prevent the user equipment from displaying a large number of electronic fences of non-risk users or low-risk users on the map, so that the user can quickly identify the electronic fences of users with higher risks.
- the at least one user within the target area includes a first user and a second user, the first user corresponding to the user device, the first mobile fence and the first risk level, and the second user corresponding to the second mobile fence and The second risk level corresponds; the first risk level is lower than the second risk level.
- the user equipment is also configured to: when the boundary distance between the first mobile fence and the second mobile fence is less than a preset value, the user equipment displays a first warning notification, and the first warning notification is used to indicate that the risky user is close to the first user.
- the user equipment can perform a risk warning for the first user when the first user may come into contact with the risky user, so as to reduce the contact between the first user and the risky user.
- the user equipment is further configured to: highlight the second moving fence on the electronic map, and display the moving direction of the second moving fence. Through the user equipment, the first user can quickly identify the location of the risk user, and plan an escape route to reduce contact with the risk user.
- the user equipment is further configured to: when the first moving fence overlaps the second moving fence, display a second early warning notification, where the second early warning notification is used to prompt the first user that he is in contact with a risk user.
- the user equipment can remind the first user to stay away from the risk user being contacted, and reduce the contact time.
- the user equipment is further configured to: after the first mobile fence and the second mobile fence are separated, update the first risk level according to the contact information between the first mobile fence and the second mobile fence; wherein the contact Information includes exposure time, exposure distance, and second risk level. And, according to the updated first risk level, the attribute information of the first moving fence is updated and displayed. After the first user contacts the risk user, the user equipment can quickly update the first risk level of the first user, so that the user can quickly understand his own risk situation.
- the user equipment is further configured to display a fixed fence within the target area on the electronic map, the fixed fence being used to indicate a risk area.
- the user equipment displays first prompt information, where the first prompt information is used to prompt the first user to stay away from the risk area.
- the user equipment is further configured to: when the first user is an isolated user in the fixed fence and the first user is outside the fixed fence, display second prompt information, where the second prompt information is used to prompt the first user A user is prohibited from leaving the risk area.
- the user equipment is further configured to: when the target area is the display area of the electronic map, determine the area information of the display area; send the area information to the application server; receive the information in the display area sent by the application server Regulatory information for at least one user.
- the user equipment is further configured to: when the target area is a preset range of the electronic device, determine the location information of the electronic device; send the location information to the application server; receive the electronic device sent by the application server Supervisory information of at least one user within the preset range of the device.
- the user equipment is further configured to: when the risk information in the supervision information is attribute information of the mobile fence, display the mobile fence directly according to the location information and the attribute information.
- Embodiments of the present application further provide an application server, where the application server is configured to send supervision information of at least one user in a target area to a user equipment, where the supervision information includes location information and risk information.
- the supervision information is used for the user equipment to display the mobile fence of each user on the electronic map, and the attribute information of the mobile fence is used to represent the risk level of the corresponding user.
- the processor is further configured to receive a diagnosis notification sent by the hospital equipment, where the diagnosis notification includes a diagnosis notification or a recovery notification; and update the risk information of the corresponding user according to the diagnosis notification.
- An embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the operations configured and performed by the user equipment described above.
- Embodiments of the present application provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the above-mentioned operations configured and executed by the application server are implemented.
- the computer-readable medium in this embodiment may include at least: any entity or device capable of carrying computer program codes to the application server/terminal device, recording medium, computer memory, read-only memory (ROM) ), random access memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media.
- ROM read-only memory
- RAM random access memory
- electrical carrier signals telecommunications signals
- software distribution media For example, U disk, mobile hard disk, disk or CD, etc.
- computer readable media may not be electrical carrier signals and telecommunications signals.
- the processor mentioned in the embodiments of this application may be a central processing unit (central processing unit, CPU), and may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), application specific integrated circuits (application specific integrated circuits) circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
- a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- This embodiment also provides a computer program product that, when the computer program product runs on the user equipment, enables the user equipment to perform the operations that the user equipment is configured to perform in the foregoing embodiments.
- This embodiment also provides a computer program product, which, when the computer program product runs on the application server, causes the application server to perform the operations that the application server is configured to perform in the foregoing embodiments.
- the computer program includes computer program code
- the computer program code may be in the form of source code, object code, executable file or some intermediate forms, and the like.
- references in this specification to "one embodiment” or “some embodiments” and the like mean that a particular feature, structure or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
- appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically emphasized otherwise.
- the terms “including”, “including”, “having” and their variants mean “including but not limited to” unless specifically emphasized otherwise.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Game Theory and Decision Science (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Medical Informatics (AREA)
- Computer Security & Cryptography (AREA)
- Biomedical Technology (AREA)
- Databases & Information Systems (AREA)
- Pathology (AREA)
- Epidemiology (AREA)
- Traffic Control Systems (AREA)
Abstract
本申请实施例提供一种疫情防控方法、电子设备、应用服务器和系统,涉及疫情防控技术领域。该方法包括:电子设备获取目标区域内至少一个用户的监管信息,该监管信息包括位置信息和风险信息;以及根据每个用户的监管信息,在电子地图上显示对应的移动围栏,移动围栏的属性信息用于表征对应用户的风险等级。通过本实施例提供的技术方案,用户可以通过查看电子地图上各个用户的移动围栏,快速了解自身以及他人的风险等级,有助于减少用户与其他风险用户的接触,能够减缓疾病的传播、防控疫情。
Description
本申请要求于2020年12月09日提交国家知识产权局、申请号为202011429250.9、申请名称为“一种疫情防控方法、电子设备、应用服务器和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及疫情防控技术领域,尤其涉及一种疫情防控方法、电子设备、应用服务器和系统。
在传染性疾病爆发期间,可能会有一些风险人群(例如已感染疾病的人群,或者存在较大感染可能性的人群)在社会上流动。因此,在日常生活中,人群的密切接触可能会导致疫情的进一步扩散。
为了有效遏制疫情的扩散,防疫部门需要在防疫期间对人群的活动进行监管。目前,有一种监管方法是每个人在进入指定地点(例如小区、地铁、商厦、学校、饭店等)时,使用手机主动扫描定位二维码向防疫部门上报当前时刻的位置信息,以记录活动轨迹。当出现确诊患者之后时,防疫部门根据该患者的活动轨迹确定密切接触者,并对密切接触者进行隔离与检查。此外,防疫部门还会及时公示该确诊患者的活动轨迹,以便可能的接触者进行自我隔离与检查等。
然而,在上述监管方法中,人们只能通过防疫部门的通知才能获知自己及他人的风险情况,例如自己是否接触或者可能接触风险人群等。由于用户不能及时获知自己及他人的风险情况,可能会导致该用户接触风险人群,并在接触风险人群之后接触更多的人,不利于疫情的防控。
发明内容
本申请提供一种疫情防控方法、电子设备、应用服务器和系统,能够在一定程度上解决现有技术中,在传染性疾病爆发期间,用户不能及时获知自己及他人的风险情况、不利于疫情的防控的问题。
为达到上述目的,本申请采用如下技术方案:
第一方面,本申请实施例提供一种疫情防控方法,应用于电子设备,该方法包括:获取目标区域内至少一个用户的监管信息,该监管信息包括位置信息和风险信息;根据每个用户的监管信息,在电子地图上显示对应的移动围栏,移动围栏的属性信息用于表征对应用户的风险等级。
本实施例中的电子设备包括用户设备,例如手机、平板电脑等。通过本实施例提供的疫情防控方法,用户可以通过查看电子地图上各个用户的移动围栏,快速了解自身以及他人的风险等级,有助于减少用户与其他风险用户的接触,能够减缓疾病的传播、防控疫情。
在一些实施例中,移动围栏的属性信息包括半径、颜色、标识中的至少一种。例如, 针对风险等级“确诊”、“高风险”、“中风险”、“低风险”和“无风险”,移动围栏的颜色可以分别为黑色、红色、橙色、黄色和绿色,移动围栏的半径可以分别为8米、6米、4米、2米、0米。
在一些实施例中,目标区域内的至少一个用户包括与该电子设备对应的第一用户,以及风险等级高于预设等级的用户。例如该预设风险等级可以为低风险。该方法能够避免电子设备在地图上显示大量无风险用户或者低风险用户的电子围栏,便于用户快速识别出较高风险的用户的电子围栏。
在一些实施例中,目标区域内的至少一个用户包括第一用户和第二用户,第一用户与电子设备、第一移动围栏和第一风险等级相对应,第二用户与第二移动围栏和第二风险等级相对应;第一风险等级低于第二风险等级。该方法还包括:当第一移动围栏与第二移动围栏的边界距离小于预设值时,电子设备显示第一预警通知,第一预警通知用于指示有风险用户靠近第一用户。该方法能够在第一用户可能接触到风险用户时,对第一用户进行风险预警,减少第一用户与风险用户的接触。
在一些实施例中,该方法还包括:在电子地图上突出显示第二移动围栏,并显示第二移动围栏的移动方向。通过该方法,第一用户可以快速识别到风险用户的位置,从而规划躲避路线,减少与风险用户的接触。
在一些实施例中,该方法还包括:当第一移动围栏与第二移动围栏重叠时,显示第二预警通知,第二预警通知用于提示第一用户正在与风险用户接触。该方法能够提醒第一用户远离正在接触的风险用户,减少接触时长。
在一些实施例中,该方法还包括:当第一移动围栏与第二移动围栏分离后,根据第一移动围栏与第二移动围栏的接触信息,更新第一风险等级;其中,接触信息包括接触时间、接触距离和第二风险等级。以及,根据更新后的第一风险等级,更新显示第一移动围栏的属性信息。在第一用户与风险用户接触之后,该方法能够快速更新第一用户的第一移动围栏,以便用户快速了解自身的风险情况。
在一些实施例中,该方法还包括:在电子地图上显示目标区域内的固定围栏,固定围栏用于指示风险区域;当第一用户不是固定围栏内的隔离用户,且第一用户进入固定围栏时,电子设备显示第一提示信息,该第一提示信息用于提示第一用户远离该风险区域。
在一些实施例中,该方法还包括,当第一用户是固定围栏内的隔离用户,且第一用户处于固定围栏外部时,显示第二提示信息,第二提示信息用于提示第一用户禁止离开风险区域。
在一些实施例中,该方法还包括,当目标区域是电子地图的显示区域时,获取目标区域内至少一个用户的监管信息,包括:确定显示区域的区域信息;将区域信息发送给应用服务器;接收应用服务器发送的该显示区域内的至少一个用户的监管信息。
在一些实施例中,该方法还包括,当目标区域为电子设备的预设范围时,获取目标区域内至少一个用户的监管信息,包括:确定电子设备的位置信息;将位置信息发送给应用服务器;接收应用服务器发送的该电子设备预设范围内的至少一个用户的监管信息。
在一些实施例中,当监管信息中的风险信息包括用户的风险等级时,根据监管信息在电子地图上显示对应用户的移动围栏,包括:根据风险等级确定移动围栏的属性信息;根据用户的位置信息和该属性信息,显示移动围栏。
在一些实施例中,当监管信息中的风险信息包括移动围栏的属性信息时,根据监管信息在电子地图上显示用户的移动围栏,包括:直接根据位置信息和属性信息,显示移动围栏。
第二方面,本申请实施例提供一种疫情防控方法,应用于应用服务器,该方法包括:向电子设备发送目标区域内至少一个用户的监管信息,该监管信息包括位置信息和风险信息。其中,监管信息用于电子设备在电子地图上显示对应用户的移动围栏,移动围栏的属性信息用于表征对应用户的风险等级。
在一些实施例中,该方法还包括:接收医院设备发送的诊断通知,诊断通知包括确诊通知或者康复通知;以及,根据诊断通知更新对应用户的风险信息。例如,在接收到医院的康复通知之后,将对应用户的风险等级确定为无风险;在接收到医院的确诊通知之后,将对应用户的风险等级确定为“确诊”。
第三方面,本申请实施例提供一种电子设备,包括存储器、处理器以及存储在存储器中并可在处理器上运行的计算机程序,处理器执行该计算机程序时实现如第一方面所述的疫情防控方法。
在本实施例中,电子设备包括手机、平板电脑或者可穿戴智能设备(如蓝牙耳机、智能手表、智能眼镜)等便携式设备。通过本实施例提供的电子设备,用户可以通过查看电子地图上各个用户的移动围栏,快速了解自身以及他人的风险等级,有助于减少用户与其他风险用户的接触,能够减缓疾病的传播、防控疫情。
第四方面,本申请实施例提供一种应用服务器,包括存储器、处理器以及存储在存储器中并可在处理器上运行的计算机程序,处理器执行该计算机程序时实现如第二方面所述的疫情防控方法。
第五方面,本申请实施例提供一种疫情防控系统,包括多个如上述第三方面所述的电子设备,以及如上述第四方面示出的应用服务器。
在一些实施例中,该疫情防控系统还包括医院设备,医院设备被配置为,向应用服务器发送用户的诊断通知,其中,诊断通知包括确诊通知或者康复通知;应用服务器还被配置为,根据诊断通知更新对应用户的风险信息。
在一些实施例中,该系统还包括管理部门设备,管理部门设备被配置为,获取特定范围内(例如某城市或者某省)任意用户的监管信息,或者该特定范围内所有用户的监管信息的统计结果。
第六方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被处理器执行时实现如上述第一方面所述的方法。
第七方面,本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被处理器执行时实现如上述第二方面所述的方法。
可以理解的是,上述第二方面至第七方面的有益效果可以参见上述第一方面中的相关描述,在此不再赘述。
图1是本申请的一个实施例提供的地理围栏的示意图;
图2是本申请另一个实施例提供的地理围栏的示意图;
图3是本申请实施例提供的疫情防控系统的结构示意图;
图4是本申请实施例提供的疫情防控应用的个人信息界面示意图;
图5是本申请实施例提供的疫情防控应用的紧急联系人界面示意图;
图6是本申请的一个实施例提供的疫情防控方法的流程图;
图7是本申请的一个实施例提供的疫情防控应用的界面示意图;
图8是本申请另一个实施例提供的疫情防控应用的界面示意图;
图9是本申请又一个实施例提供的疫情防控应用的界面示意图;
图10是本申请另一个实施例提供的疫情防控方法示意图;
图11是本申请的一个实施例提供的接触距离计算示意图;
图12是本申请另一个实施例提供的接触距离计算示意图;
图13是本申请实施例提供的风险等级变化示意图;
图14是本申请又一个实施例提供的疫情防控应用的界面示意图。
在传染性疾病(尤其是呼吸道传染性疾病)爆发期间,可能会有一些风险人群(例如已感染疾病的人群,或者存在较大感染可能性的人群)在社会上流动。因此,在日常生活中,人群的密切接触可能会导致疫情的进一步扩散。
为了有效遏制疫情的扩散,防疫部门需要在防疫期间对人群的活动进行监管。目前,有一种疫情防控方法是每个人在进入指定地点(例如小区、地铁、商厦、学校、饭店等)时,使用手机主动扫描定位二维码向防疫部门上报当前时刻的位置信息,以记录活动轨迹。当出现确诊患者之后时,防疫部门根据该患者的活动轨迹确定密切接触者,并对密切接触者进行隔离与检查。此外,防疫部门还会及时公示该确诊患者的活动轨迹,以便可能的接触者进行自我隔离与检查等,尽可能地防止疾病的进一步扩散。
然而,在上述监管方法中,人们只能通过防疫部门的通知才能获知自己及他人的风险情况,例如自己是否接触或者可能接触风险人群等。由于用户不能及时获知自己及他人的风险情况,可能会导致该用户接触风险人群,并在接触风险人群之后接触更多的人,不利于疫情的防控。
为此,本申请实施例提供一种基于地理围栏技术(Geo-fencing)的疫情防控方法,能够对用户的风险情况进行实时监控与预警,在一定程度上减少疫情的扩散。
下面结合附图对本申请实施例提供的技术方案进行示例性说明。
图1是本申请实施例提供的地理围栏的示意图。参见图1所示,地理围栏是一个虚拟的地理边界,其可以理解为一个虚拟的栅栏,通过该虚拟的栅栏可以在真实的物理空间中确定出一个地理区域(例如A医院),以便对该区域内的人或物进行管理。基于此,地理围栏技术可以应用于各个基于位置的服务(location based service,LBS)应用中,例如办公应用、车辆管理应用、无人机控制应用、用户追踪应用以及本实施例提供的用于防控疫情的应用程序(简称:疫情防控应用)等。需要说明的是,本实施例对疫情防控应用的具体类型不进行限制。
地理围栏的具体实现形式可能有多种。例如,地理围栏可以是路由器发出的无线保真(wireless fidelity,WiFi)信号的覆盖范围的边界。或者,地理围栏可以是电子设备发出的蓝牙(Bluetooth,BT)信号的覆盖范围的边界。再或者,地理围栏可以是定位系统的坐标范围。示例性的,该定位系统可以为全球定位系统(global positioning system,GPS)、北 斗卫星导航系统(beidou navigation satellite system,BDS)等。此外,地理围栏可以是各种形状的,例如圆形、椭圆形、方形或者其他规则或者不规则的形状等,本实施例对其不进行限制。
本实施例涉及的地理围栏包括固定围栏和移动围栏。其中,固定围栏所在的位置是确定的,例如图1中A医院的地理围栏。移动围栏的位置会不断地发生变化,例如图2中用户设备的地理围栏,在用户设备随着用户从A位置向B位置移动的过程中,该用户的地理围栏也随之从A位置向B位置移动。
下面结合图3对本申请提供的疫情防控方法所适用的疫情防控系统进行说明。
图3是本申请实施例提供的疫情防控系统的结构示意图。该系统包括应用服务器、多个管理设备和多个用户设备。
应用服务器通过提供疫情防控应用提供疫情防控服务,该服务包括用户风险监控、风险预警等。其中,疫情防控应用可以通过客户端的形式被管理设备和用户设备下载并安装,也可以通过小程序(例如微信小程序)的形式被调用,本实施例对此不进行限制。用户通过疫情防控应用可以来实时监控自身以及周围用户的风险情况。
管理设备包括管理部门设备和医院设备。其中,管理部门设备用于防疫部门统筹管理疫情防控工作。例如,管理部门设备能够获取特定范围内(例如A城市或者A省)任意用户的相关信息(例如下文中的监管信息),或者该范围内所有用户的相关信息的统计结果。医院设备用于医护人员上传患者的诊断通知,诊断通知包括确诊通知、康复通知等,这些通知至少包括患者的姓名和身份证号码等信息。应用服务器接收到诊断通知之后,可以将其发送给对应的用户设备。
在本实施例中,用户设备包括手机、平板电脑、个人数字助理(personal digital assistant,PDA)或者可穿戴智能设备(如蓝牙耳机、智能手表、智能眼镜)等便携式电子设备,本实施例对用户设备的具体类型不进行限制。
用户设备通过运行疫情防控应用与应用服务器建立连接。具体地,用户设备在注册疫情防控应用的用户账号(identification,ID)之后,通过疫情防控应用获取用户的各项信息(例如个人信息和位置信息等),并将这些信息发送给应用服务器。应理解,由于手机等用户设备通常有且仅有一个确定的用户,且会被该用户随身携带,因此可以认为该用户设备的位置即为用户的位置。此外,为了保证用户的位置信息的准确性和可靠性,一个用户ID在同一时刻仅允许在一个用户设备上登录。
在用户设备运行疫情防控应用时,可选的,用户可以通过用户设备向应用服务器注册个人信息。例如图4所示,用户需要注册的个人信息可以包括姓名(如“王小明”)、证件类型(如“身份证”)、证件号码(如“6****************2”)、电话号码(如“135XXXXXXXX”)以及初始接触信息。其中,初始接触信息用于确定用户在注册用户ID前与风险人群的接触情况。示例性的,初始接触信息可以包括如下内容中的至少一项:(1)是否7天内从A地区(高风险地区)返回;(2)在A地区停留时长;(3)是否7天内从B地区(中风险地区)返回;(4)在B地区停留时长。
此外,参见图5所示,用户还可以在疫情防控应用中预先设置一些紧急联系人,例如父母、子女、配偶、朋友等,以便在该用户出现感染风险、确诊或者康复等情况后,应用服务器能够及时通知其紧急联系人。
用户在疫情防控应用注册成功之后,应用服务器或者用户设备会自动根据用户的初始接触信息确定该用户的初始风险信息(即注册后且未与其他风险用户接触之前的风险信息)。下面以应用服务器为例,对初始风险信息的确定进行说明。
可选的,应用服务器可以根据用户的初始接触信息,以及该用户是否有接收到医院发送的确诊通知,确定该用户的初始风险信息。在本实施例中,风险信息可以包括风险等级、移动围栏的属性信息、风险值中的至少一种。对应地,用户的初始风险信息则包括初始风险等级、初始移动围栏的属性信息和初始风险值中的至少一种。其中,移动围栏的属性信息包括半径、颜色、标识中的至少一种。标识可以为文字标识,如文字“安全”、“危险”等,也可以为用于标识危险程度的图像。
风险等级用于表示用户感染所防控疾病的可能性。在一个示例中,风险等级按照由高到底的次序依次可以为“确诊”、“高风险”、“中风险”、“低风险”和“无风险”。为了便于描述,本实施例将无风险用户以外的其他用户(例如确诊用户、高风险用户、中风险用户、低风险用户)统称为风险用户。在本实施例中,初始风险等级用于表示用户刚注册疫情防控应用时的风险等级。
应用服务器中存储有一个风险等级对应关系表(例如表1),该对应关系表包括是否收到医院的确诊通知、初始接触信息和初始风险等级之间的对应关系。根据该对应关系表,应用服务器可以确定用户的初始风险等级。需要说明的是,是否收到医院的确诊通知、初始接触信息和初始风险等级之间的对应关系可根据实际疫情情况(例如疾病传播特点、疾病爆发地点、疫情严重程度等)进行适应性调整,本实施例对此不进行限制。
表1风险等级对应关系表
针对疫情,当用户与风险用户发生接触后,可能会被传染。并且,风险等级越高,用户被传染的可能性就越大。为此,本实施例给不同风险等级的用户设置了不同半径的移动围栏,以表示该用户的危险接触范围。可以理解,用户的移动围栏半径越大,该用户的危险接触范围就越大。在本实施例中,初始移动围栏半径用于表示用户刚注册时的移动围栏半径。
可选的,应用服务器中存储有一个移动围栏半径对应关系表(例如表2),该对应关系表包括风险等级和移动围栏半径的对应关系。应用服务器根据(初始)风险等级即可确定(初始)移动围栏半径。在一个示例中,参见表2所示,风险等级“确诊”、“高风险”、“中风险”、“低风险”和“无风险”对应的移动围栏半径分别为8米、6米、4米、2米、0米。需 要说明的是,风险等级和移动围栏半径的对应关系可以根据实际疫情情况进行调整,本实施例对此不进行限制。
表2移动围栏半径对应关系表
风险等级 | 移动围栏半径(单位:米) |
确诊 | 8 |
高风险 | 6 |
中风险 | 4 |
低风险 | 2 |
无风险 | 0 |
风险值也用于表示用户感染疾病的可能性。风险值越高,该用户感染疾病的可能性就越大。与风险等级不同的是,风险值将该用户的已感染疾病的可能性进行了量化表示,便于后续在疫情防控过程中更新各个用户的风险信息(具体参见下文描述)。在本实施例中,初始风险值用于表示用户刚注册时的风险值。
可选的,应用服务器中存储有一个风险等级和风险值的对应关系表(例如表3)。应用服务器可以根据用户的初始风险等级,结合该对应关系表确定用户的初始风险值。以表3为例,当用户的初始风险等级为“中风险”时,其初始风险值可以是“4~3”中的任意一个数值,例如中间值3.5。
表3风险等级和风险值的对应关系表
风险等级 | 风险值 |
确诊 | 10 |
高风险 | 9~5 |
中风险 | 4~3 |
低风险 | 2~1 |
无风险 | 0 |
此外,为了便于用户识别周围风险人群的风险等级,可以将不同风险等级对应的移动围栏设置为不同的颜色。例如,将风险等级“确诊”、“高风险”、“中风险”、“低风险”和“无风险”对应的移动围栏的颜色分别设置为黑色、红色、橙色、黄色和绿色。用户根据电子地图上显示的移动围栏的颜色即可快速了解其对应的风险等级。
以用户A为例,结合表1~表3所示的对应关系,若应用服务器接收到了用户A的确诊通知,则应用服务器确定该用户的初始风险等级为“确诊”,初始移动围栏半径为8米,初始风险值为10,移动围栏颜色为黑色。
以用户B为例,结合表1~表3所示的对应关系,若应用服务器未接收到用户B的确诊通知,且用户B曾在A地区逗留2天并于7天内从返回本地,则确定用户B的初始风险等级为“高风险”,初始移动围栏半径为6米,初始风险值为7,移动围栏颜色为红色。
以用户C为例,结合表1~表3所示的对应关系,若应用服务器未接收到用户B的确诊通知,且用户C在7天内未去过A和B地区,则确定用户C的初始风险等级为“无风险”,初始移动围栏半径为0米(即无移动围栏),初始风险值为0,移动围栏的颜色为绿色。
当用户通过用户设备在疫情防控应用注册成功之后,应用服务器即可通过该用户设备 对该用户进行监管。具体包括通过固定围栏和移动围栏对用户的活动进行监管。
下面首先对通过固定围栏监管用户活动的内容进行说明。
应用服务器可以在一些风险区域(例如A小区)设置一个固定围栏,并将A小区内的用户设备所对应的用户全部设置为隔离用户。可选的,应用服务器还可以根据风险区域的风险等级,为其对应的固定围栏设置不同的颜色。
在一种可能的实现方式中,应用服务器对用户的活动进行监管。以第一用户为例,具体地,当第一用户不是A小区内的隔离用户时,如果应用服务器检测到第一用户进入A小区的固定围栏,则向第一用户的用户设备发送第一提示消息,提示其远离A小区。当第一用户是A小区内的隔离用户时,但应用服务器检测到第一用户处于该固定围栏外部时,应用服务器向第一用户的用户设备发送第二提示信息,提示第一用户禁止离开A小区。
在另一种可能的实现方式中,用户设备也可以自行对用户的活动进行监管。以第一用户为例,具体地,当第一用户不是A小区内的隔离用户时,如果用户设备检测到第一用户进入A小区的固定围栏,则显示第一提示消息,提示其远离A小区。当第一用户是A小区内的隔离用户时,但用户设备检测到第一用户处于该固定围栏外部时,显示第二提示信息,提示第一用户禁止离开A小区。
用户设备可以通过提示框显示提示消息(包括第一提示消息和第二提示消息)。此外,可选的,如果该用户设备连接有可穿戴设备,例如蓝牙耳机或者智能手表,则用户设备可以通过可穿戴设备提醒用户。例如,用户设备在检测到蓝牙耳机处于佩戴状态时,可以通过蓝牙耳机播放提示消息的内容。或者,用户设备在检测到智能手表处于佩戴状态时,可以通过智能手表显示提示消息的内容,以便用户能够及时获取到消息内容。此外,智能手表在接收到提示消息之后,也可以振动或者发出铃声,以提醒用户查看。
此外,当A小区的风险等级升高之后(例如在A小区内出现大量的确诊患者之后),应用服务器可以扩大其固定围栏的范围,例如将固定围栏的边界外扩20米,以加强对A小区内外人群的防护。当固定围栏的范围调整之后,应用服务器可以通知固定围栏内的用户。
可选的,当隔离用户在隔离区域内时,用户设备可以不显示隔离用户的移动围栏,也不对该用户进行风险预警。而当隔离用户离开固定围栏之后,用户设备再显示该用户的移动围栏,并开启对该用户进行风险预警。
下面对通过移动围栏监管用户活动的内容进行说明。
针对移动围栏,本实施例提供的疫情防控方法包括三部分内容,分别为移动围栏的显示、风险预警以及风险信息更新,下面分别对各个部分进行说明。
(一)移动围栏的显示
图6是本申请的一个实施例提供的疫情防控方法的流程图。该方法示出了用户设备如何在电子地图上显示移动围栏的过程,具体包括如下步骤S601~S602。
S601,用户设备获取目标区域内至少一个用户的监管信息,监管信息包括位置信息和风险信息。
首先,应理解,疫情防控应用能够监管所有使用该应用的用户,实时通过这些用户的用户设备确定用户的监管信息,例如位置信息、接触信息、风险信息等。示例性的,该位置信息可以为GPS坐标或者BDS坐标。可选的,当用户设备与智能手表相关联时,用户 设备在检测到智能手表处于佩戴状态时,可以将智能手表的位置信息作为该用户的位置信息发送给应用服务器,以便更准确地反应用户的位置。
以用户设备对应的用户是第一用户为例,本实施例中,用户设备获取目标区域内至少一个用户的监管信息,可以通过以下任意一种方式实现。
在一种可能的实现方式中,目标区域是电子地图的显示区域。其中,电子地图的显示区域可以是用户设备打开疫情防控应用之后,默认显示的地图区域,该用户设备通常处于该显示区域内。或者,目标区域也可以是用户控制用户设备显示的电子地图的其他区域,以便用户查看其他区域的人群的风险情况。基于此,用户设备首先确定电子地图的显示区域的区域信息,并将该区域信息发送给应用服务器。应用服务器根据该区域信息可以确定电子地图的显示区域,并将显示区域内至少一个用户的监管信息发送给用户设备。
在另一种可能的实现方式中,目标区域是用户设备的预设范围(如周围1千米)内。基于此,用户设备可以先确定用户设备的位置信息,并将该位置信息发送给应用服务器。应用服务器接收到该位置信息之后,根据用户设备的位置信息,将该用户设备预设范围内的至少一个用户的监管信息发送给用户设备。
可选的,该至少一个用户包括目标区域内每一个用户,或者该目标区域内风险等级高于预设等级(如中风险)的用户,或者风险等级高于第一用户的风险等级的用户。
S602,用户设备根据每个用户的监管信息,在电子地图上显示对应的移动围栏,移动围栏的属性信息用于表征对应用户的风险等级。
用户设备在接收到用户的监管信息之后,将位于电子地图显示区域内的用户的移动围栏显示在电子地图上。示例性的,参见图7所示,在用户设备中,电子地图显示区域内的用户包括第一用户、第二用户、第三用户、第四用户和第五用户,因此,用户设备根据这些用户的监管信息,将对应的移动围栏显示在电子地图上。用户通过该电子地图即可快速了解自身以及周围用户的风险情况,以减少和风险用户的接触。
在一些实施例中,监管信息所包括的风险信息为风险等级,此时,用户设备在根据每个用户的监管信息显示对应的移动围栏时,首先需要根据用户的风险等级确定其移动围栏的属性信息,如颜色、半径、标识中的至少一个。其中,移动围栏的属性信息用于表征对应用户的风险等级。随后,对于每个用户,用户设备根据对应的位置信息和属性信息,显示对应的移动围栏。
在另一些实施例中,监管信息所包括的风险信息为移动围栏的属性信息,此时,对于每个用户,用户设备根据该用户对应的位置信息和属性信息,直接显示对应的移动围栏即可。
在本实施例中,移动围栏是以对应用户所在的位置(即该用户设备所在的位置)为圆心,结合移动围栏半径确定的。因此,在该用户设备随着用户移动的过程中,其移动围栏也会随着用户不断移动。
此外,用户设备电子地图的显示区域内可能同时有很多被监管的用户,其中,无风险用户通常占多数,而风险用户通常仅占少数。用户设备可以根据各个用户的风险等级显示移动围栏。
在一种可能的实现方式中,用户设备可以在电子地图上,显示该显示区域所有用户的移动围栏,以便用户观察周围所有人的风险情况。
在另一种可能的实现方式中,为了避免用户设备显示过多的移动围栏,造成用户视觉上的混乱,影响用户查看风险用户的移动围栏,用户设备可以只在电子地图上显示第一用户的移动围栏,以及其他风险用户的移动围栏,而不显示无风险用户的移动围栏。
在又一种可能的实现方式中,用户设备可以只在电子地图上显示第一用户的移动围栏,以及风险等级高于或者等于第一用户的用户的移动围栏。例如,当第一用户的风险等级是“高风险”时,用户设备可以只显示第一用户的移动围栏,以及高风险用户和确诊用户的移动围栏。
应理解,各个用户设备会不断地向应用服务器上报其监管信息,而第一用户的用户设备也会每间隔预设时间(例如1秒)重复执行S601~S602,即从应用服务器获取目标区域内至少一个用户的监管信息,并更新移动用户的移动围栏。也就是说,在用户设备显示的电子地图上,各个用户的移动围栏都会随着其位置信息和风险信息的变化而变化。
根据电子地图上显示的移动围栏,用户能够了解周围是否有风险用户,可以根据移动围栏之间的距离判断其与风险用户之间的距离,可以通过观察自己的移动围栏是否与其他移动围栏发生重叠,判断其是否与风险用户发生接触。
还应理解,用户设备的电子地图上首先根据用户的初始风险信息显示移动围栏。当该用户和其他风险用户发生接触之后,应用服务器需要对该用户当前的风险信息进行更新,并根据更新后的风险信息显示移动围栏。如果用户由于未注册个人信息(其中包括初始接触信息)而没有对应的初始风险信息,用户设备可以在地图上暂不显示该用户的移动围栏。当该用户与风险人群发生接触之后,用户设备再根据接触情况确定并显示其移动围栏。
还应理解,电子地图上的移动围栏可以是根据该移动围栏的实际尺寸和电子地图当前的比例尺显示在电子地图上的。用户的风险等级越高,电子地图上显示的移动围栏的半径也就越大。当用户放大或者缩小电子地图时,电子地图上的移动围栏也会根据电子地图放大或者缩小的比例进行变化。
通过本实施例提供的疫情防控方法,用户能够快速了解自身以及他人的风险情况,减少与风险用户的接触,有助于减缓疾病的传播、防控疫情。
(二)风险预警
本实施例提供的疫情防控方法还能够根据各个用户的移动围栏,对用户进行风险预警。下面以第一用户和第二用户为例,对风险预警的过程进行说明。
需要说明的是,在本实施例中,第一用户与第一风险等级、第一移动围栏、第一风险值相对应,第二用户与第二风险等级、第二移动围栏、第二风险值相对应。其中,第一风险等级低于第二风险等级,或者第二风险等级高于预设等级。
当第一风险等级是“低风险”、第二风险等级是“高风险”、预设等级是“高风险”时,该预警过程具体如下所示。
在一些实施例中,当应用服务器检测到第一移动围栏与第二移动围栏的边界距离小于预设值时,向该用户设备发送第一预警通知。用户设备在接收到第一预警通知之后进行显示。或者,当用户设备检测到第一移动围栏与第二移动围栏的边界距离小于预设值时,直接显示第一预警通知。
参见图8所示,当第一用户处于某些区域时,第二用户可能会向靠近第一用户的方向运动。当用户设备检测到第一移动围栏与第二移动围栏的边界距离小于预设值(例如10 米、20米等)时,显示第一预警通知。该第一预警通知用于提示第一用户附近有风险用户靠近。示例性的,该第一预警通知可以为提示信息“有高风险用户靠近,请您快速离开此地”。
此外,用户设备还可以突出显示该第二移动围栏,以便用户快速识别。可选的,用户设备可以闪烁显示该第二移动围栏,或者高亮显示该第二移动围栏。
在本实施例中,用户还可以通过疫情防控应用的电子地图查看风险用户的实时位置和运动方向,以便用户规划离开的路线,避免与该风险用户的接触。
在另一些实施例中,参见图9所示,当应用服务器检测到第一移动围栏与第二移动围栏重叠之后,应用服务器向该用户设备发送第二预警通知。用户设备在接收到第二预警通知之后进行显示。或者,当用户设备检测到第一移动围栏与第二移动围栏重叠之后,直接显示第二预警通知。该第二预警通知用于提示用户正在与风险用户接触。示例性的,该第二预警通知可以为提示信息“与高风险用户接触中,请注意防护并快速远离”。
需要说明的是,在一些人群密集的场所,第一用户附近可能会同时存在多个(指两个或两个上)风险等级高于或等于预设等级(例如“高风险”)的用户。此时,用户设备可以针对多个用户分别采用上述风险预警方法显示预警通知,也可以显示第三预警通知,该第三预警通知用于提示用户其附近存在多个风险用户。同时,该用户的用户设备可以在电子地图上同时突出显示上述多个风险用户的移动围栏。
在本申请中,应用服务器可以将预警通知(包括第一预警通知、第二预警通知和第三预警通知)通过短信或者应用消息的形式发送给用户设备。用户设备在接收到预警通知之后,可以通过弹框显示该预警通知。
可选的,当用户设备有连接的可穿戴设备时,例如蓝牙耳机或者智能手表,用户设备在收到预警通知之后可以通过可穿戴设备提醒用户。例如,用户设备在检测到蓝牙耳机处于佩戴状态后,可以通过蓝牙耳机播放预警通知的内容。或者,用户设备在检测到戴智能手表处于佩戴状态后,可以通过智能手表显示预警通知的内容,以便用户能够及时获取到通知内容。智能手表在接收到预警通知之后,也可以震动或者发出铃声,以提示用户查看。
综上所述,本申请实施例提供的疫情防控方法,能够在用户周围出现风险用户时,提醒用户远离该风险用户,从而在一定程度上避免用户与该风险用户的近距离接触,减少疫情的扩散。
(三)风险信息更新
当用户没有及时远离靠近的风险用户,并与风险用户接触之后(在疫情防控应用的电子地图上表现为,该用户的移动围栏与其他用户的移动围栏发生重叠),该用户可能会被感染。因此,应用服务器需要根据接触信息,更新该用户的风险信息(包括风险等级、移动围栏半径和风险值)。
图10是本申请另一个实施例提供的疫情防控方法示意图。该方法示出了用户的风险信息更新过程,该方法可以应用于用户设备,也可以应用于应用服务器。如果是用户设备执行该方法,则用户设备在更新第一用户的风险信息之后,需要将更新后的风险信息上报给应用服务器。
下面以应用服务器更新第一用户的风险信息为例,对该方法进行示例性说明。该方法具体包括如下步骤S1001~S1003。
S1001,当第一移动围栏与第二移动围栏发生重叠,应用服务器确定第一移动围栏与 第二移动围栏的接触信息。
在本实施例中,第一移动围栏和第二移动围栏的接触信息(也可以称作第一用户和第二用户的接触信息)包括:接触时间t、接触距离d以及第二用户对应的第二风险值(或者第二风险等级,其中,根据风险等级和风险值的对应关系,可以确定第二风险等级对应的第二风险值,从而更新第一用户的风险信息)。
接触时间是指第一移动围栏和第二移动围栏重叠的持续时长。接触时间越长,第一用户被第二用户传染疾病的风险就越大。例如,应用服务器在19:15:00(即19点15分0秒)检测到第一移动围栏与第二移动围栏开始重叠,19:15:10(即19点15分10秒)时分离,那么第一移动围栏和第二移动围栏的接触时间为10秒。
接触距离用于表示第一移动围栏和第二移动围栏重叠的距离。接触距离越大,第一移动围栏和第二移动围栏重叠的越多,第一用户被第二用户传染疾病的风险就越大。
在一些实施例中,参见图11所示,接触距离d用于表示第一移动围栏的进入第二移动围栏内部的最大距离,d=r
1+r
2-D。其中,r
1为第一移动围栏的半径,r
2为第二移动围栏的半径,D为第一移动围栏的中心与第二移动围栏的中心的距离,也就是第一用户与第二用户之间的距离。
在另一些实施例中,参见图12所示,接触距离d用于表示第一用户进入第二移动围栏内部的最大距离,d=r
2-D。
应用服务器中存储有每一个用户当前的风险信息,其中就包括上述第二风险值,应用服务器在使用时直接调用即可。应理解,第二风险值有可能是第二用户的初始风险值,也有可能是第二用户在与风险用户接触后,应用服务器对初始风险值更新后得到的。
此外,应用服务器也可以获取第一用户的第二风险等级,并结合风险等级和风险值的对应关系(例如图3),确定给第二风险等级对应的第二风险值。例如,当第二风险等级为“高风险”时,将第二风险值确定为“7”。
S1002,应用服务器根据该接触信息更新第一风险等级。
在一些实施例中,如果第二风险等级高于第一风险等级,那么应用服务器可以实时确定第一移动围栏与第二移动围栏的接触信息,并根据该接触信息实时更新第一风险等级。应理解,更新后的第一风险等级不能高于第二风险等级,当更新后的第一风险等级与第二风险等级相同时,在本次接触过程中,将不再更新第一风险等级。该方法具有较快的更新速度,第一用户在与风险用户接触的过程中即可实时了解自己的风险情况的变化。
在一种可能的实现方式中,当第一用户与第二用户接触时,应用服务器可以先根据接触信息,采用风险值公式实时更新第一风险值,再根据更新后的第一风险值重新确定第一风险等级。在一个示例中,风险值公式可以为:X′
1=X
1+(a
1X
2+a
2d+a
3t)。其中,X′
1为更新后的第一风险值,X
1为第一用户与第二用户接触前的第一风险值,X
2为第二用户与第一用户接触前的第二风险值,d为当前的最大接触距离,t为当前的接触时长,a
1、a
2和a
3分别为预设的系数。例如,当X
1=1.5、X
2=5、d=3米、t=10秒、a
3=0.01、a
1=0.1、a
2=0.02时,更新后的第一风险值X′
1=1.5+(0.1×5+0.02×6+0.02×10)=2.32。那么根据表3所示的对应关系,第一用户的风险等级更新为“中风险”。
可选的,在该实施例中,如果第一用户同时接触了多个风险用户,那么应用服务器可以根据第一用户与风险等级最高的风险用户的接触信息,来实时更新第一风险等级。如果 风险等级最高的风险用户也有多个,应用服务器可以任意选择其中一个作为第一用户的接触对象,更新第一风险等级。
在另一些实施例中,应用服务器也可以在检测到第一用户与第二用户接触结束后,根据该接触信息以及第一用户在预设时间(例如所防控疾病的至少一个潜伏期)内的历史接触信息,使用预设的风险等级计算模型来更新第一风险等级。该方法相对于实时更新风险等级,具有较高的准确度。
可选的,历史接触信息可以包括用户在该预设时间内的所有接触信息,也可以是部分接触信息,也可以是在该预设时间内的每一天中的一个有代表性的接触信息。
对于在每一天中选择一个有代表性的接触信息,示例性的,如果第一用户在一天之内接触了至少两个风险用户,则可以将与风险等级最高的一个风险用户的接触信息作为第一用户当天的接触信息。例如,第一用户在一天内接触了一个高风险用户和一个低风险用户,则将与该高风险用户的接触信息作为当天的接触信息。
此外,需要说明的是,在第一用户注册疫情防控应用的当天,如果第一用户在注册后未接触任何风险用户,则在当天的接触信息中,接触时间为0,接触距离为0,风险值根据风险等级确定。例如,当用户的风险等级是“中风险”时,其风险值可以为3.5。如果用户在注册当天接触了风险用户,且该风险用户的风险等级高于该第一用户当前的风险等级,则将与该风险用户的接触信息作为当天的接触信息。
在第一用户注册风险应用当天过后,如果用户在一天之内未接触任何风险用户,则其当前的接触信息中的风险值、接触距离和接触时间均为0。
下面以呼吸道传染疾病A(潜伏期平均为7天)为例,对本实施例提供的第一风险等级的更新过程进行说明。以今天是2月7日为例,第一用户在2月1日至2月7日的接触信息例如表4所示。
表4接触信息表
在至少一个潜伏期内(例如7天内),每一天的接触信息对用户更新后的第一风险等级的影响可能不同。为此,本申请实施例提供一个与特征值矩阵F对应的第一系数矩阵W,其中包括特征值矩阵内每一天的接触信息的权重系数。例如,如果F中包括7天的接触信息,则对应的W=[w
1 w
2 w
3 w
4 w
5 w
6 w
7]
T,其中,w
1至w
7分别为2月1日到2月7日的接触信息的第一权重系数,并且w
1+w
2+w
3+w
4+w
5+w
6+w
7=1。示例性的,W=[0.05 0.05 0.1 0.1 0.2 0.2 0.3]
T。需要说明的是,第一系数矩阵中的权重系数可 以是预先配置的,本实施例在此不进行限制。
在风险矩阵Q中,q
1、q
2和q
3对第一用户更新后的第一风险值的影响也可能不同。为此,本申请实施例提供一个第二系数矩阵λ=[λ
1 λ
2 λ
3],其中,λ
1、λ
2和λ
3分别为q
1、q
2和q
3的权重系数。示例性的,λ=[0.4 0.3 0.3]。需要说明的是,第二系数矩阵中的权重系数可以是预先配置的,本实施例在此不进行限制。
应用服务器在计算出第一用户的第一风险值之后,即可根据第一风险值、风险值和风险等级的对应关系,确定第一用户更新后的第一风险等级。在一个示例中,当更新后的第一风险值q=4.255时,结合表3所示的风险值和风险等级的对应关系,应用服务器可以确定第一用户更新后的第一风险等级为“中风险”。
应理解,参见图13所示,当用户在疫情期间频繁地与风险人群发生接触,其计算周期内的接触信息的数值会增多增大,根据风险等级模型,用户的风险等级会逐渐升高。而如果采取隔离措施或者减少与风险人群的接触,计算周期内的接触信息的数据中“0”值则越来越多,根据风险等级计算模型,用户的风险等级会逐渐降低直至无风险。
S1003,应用服务器根据更新后的第一风险等级,更新第一移动围栏的属性信息。
应用服务器根据更新后的第一风险等级、风险等级与移动围栏半径的对应关系表,即可确定出更新后的第一移动围栏的半径。根据更新后的第一风险等级、风险等级和颜色的对应关系,可以确定更新后的第一移动围栏的颜色。
在一个示例中,当第一用户更新后的风险等级为“中风险”时,结合表4所示的风险等级和移动围栏半径的对应关系可知,用户当前的移动围栏半径为4米。结合风险等级和颜色的对应关系,可以确定更新后的第一移动围栏的颜色为“橙色”。
此外,当应用服务器更新第一风险等级和第一移动围栏之后,控制用户设备更新风险监管应用电子地图上显示的第一移动围栏的属性信息。例如,第一移动围栏在与第二移动围栏重叠之前,参见图8所示,其对应的第一风险等级为“低风险”,围栏半径为2米,围栏颜色显示为黄色。当其与第二移动围栏接触之后,参见图14所示,其第一风险等级为“中 风险”,围栏半径为4米,围栏颜色显示为橙色。
用户通过围栏颜色及大小的变化,即可快速了解到其自身风险情况的变化,能够起到实时预警用户风险状况的作用,减少由于用户不能及时获知其风险情况而盲目接触人群的情况,有利于疫情的防控。
综上所述,应用服务器可以根据用户与风险用户的接触信息,快速更新用户当前的风险等级、移动围栏半径、风险值等风险信息,便于用户及时了解自身的风险情况。
当用户的风险等级变更后,应用服务器可以通过短消息或者应用消息的形式通知监管系统中的相关的电子设备。
在一些实施例中,当用户的风险等级变更之后,应用服务器可以通过短消息或者应用消息的形式向对应的用户设备发送等级变更通知。用户设备接收并显示该等级变更通知。如果用户设备有连接的蓝牙耳机或者智能手表等可穿戴设备,则在收到等级变更通知之后,可以通过可穿戴设备提醒用户。例如,用户设备在检测到蓝牙耳机处于佩戴状态后,通过蓝牙耳机播放等级变更通知的内容。或者,用户设备在检测到智能手表处于佩戴状态后,通过智能手表显示等级变更通知的内容,以便用户能够及时获取到通知内容。
示例性的,当风险等级升级为低风险时,该等级变更通知的内容可以为“您的风险等级升级为低风险,请您佩戴口罩并注意防护”。当风险等级升高为高风险时,该等级变更通知的内容可以为“您的风险等级升级为高风险,请您及时去医院检查”。
在另一些实施例中,当用户的风险等级变更之后,应用服务器还可以通知该用户的紧急联系人,以便其紧急联系人能够及时了解其风险状况。
在其他一些实施例中,当用户的风险等级高于预设等级(例如“高风险”)之后,应用服务器向防疫部门上报该用户的风险信息,以便防疫部门及时掌控疫情的发展情况。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
基于上述疫情防控方法,本实施例还提供一种用户设备,该用户设备被配置为:获取目标区域内至少一个用户的监管信息,该监管信息包括位置信息和风险信息。根据每个用户的监管信息,在电子地图上显示对应的移动围栏,移动围栏的属性信息用于表征对应用户的风险等级。
通过本实施例提供的用户设备,用户可以查看电子地图上各个用户的移动围栏,快速了解自身以及他人的风险情况,有助于减少用户与其他风险用户的接触,能够减缓疾病的传播、防控疫情。
在一些实施例中,移动围栏的属性信息包括半径、颜色、标识中的至少一种。
在一些实施例中,目标区域内的至少一个用户包括与该用户设备对应的第一用户,以及风险等级高于预设等级的用户。例如该预设风险等级可以为低风险。该用户设备能够避免用户设备在地图上显示大量无风险用户或者低风险用户的电子围栏,便于用户快速识别出较高风险的用户的电子围栏。
在一些实施例中,目标区域内的至少一个用户包括第一用户和第二用户,第一用户与用户设备、第一移动围栏和第一风险等级相对应,第二用户与第二移动围栏和第二风险等级相对应;第一风险等级低于第二风险等级。该用户设备还被配置为:当第一移动围栏与第二移动围栏的边界距离小于预设值时,用户设备显示第一预警通知,第一预警通知用于 指示有风险用户靠近第一用户。该用户设备能够在第一用户可能接触到风险用户时,对第一用户进行风险预警,减少第一用户与风险用户的接触。
在一些实施例中,该用户设备还被配置为:在电子地图上突出显示第二移动围栏,并显示第二移动围栏的移动方向。通过该用户设备,第一用户可以快速识别到风险用户的位置,并规划躲避路线,减少与风险用户的接触。
在一些实施例中,该用户设备还被配置为:当第一移动围栏与第二移动围栏重叠时,显示第二预警通知,第二预警通知用于提示第一用户正在与风险用户接触。该用户设备能够提醒第一用户远离正在接触的风险用户,减少接触时长。
在一些实施例中,该用户设备还被配置为:当第一移动围栏与第二移动围栏分离后,根据第一移动围栏与第二移动围栏的接触信息,更新第一风险等级;其中,接触信息包括接触时间、接触距离和第二风险等级。以及,根据更新后的第一风险等级,更新显示第一移动围栏的属性信息。在第一用户与风险用户接触之后,该用户设备能够快速更新第一用户的第一风险等级,以便用户快速了解自身的风险情况。
在一些实施例中,该用户设备还被配置为:在电子地图上显示目标区域内的固定围栏,固定围栏用于指示风险区域。当第一用户不是固定围栏内的隔离用户,且第一用户进入固定围栏时,用户设备显示第一提示信息,该第一提示信息用于提示第一用户远离该风险区域。
在一些实施例中,该用户设备还被配置为:当第一用户是固定围栏内的隔离用户,且第一用户处于固定围栏外部时,显示第二提示信息,第二提示信息用于提示第一用户禁止离开风险区域。
在一些实施例中,该用户设备还被配置为:当目标区域是电子地图的显示区域时,确定显示区域的区域信息;将区域信息发送给应用服务器;接收应用服务器发送的该显示区域内的至少一个用户的监管信息。
在一些实施例中,该用户设备还被配置为:当目标区域为所述电子设备的预设范围时,确定电子设备的位置信息;将位置信息发送给应用服务器;接收应用服务器发送的该电子设备预设范围内的至少一个用户的监管信息。
在一些实施例中,该用户设备还被配置为:当监管信息中的风险信息为移动围栏的属性信息,直接根据位置信息和属性信息,显示移动围栏。
本申请实施例还提供一种应用服务器,该应用服务器被配置为,向用户设备发送目标区域内至少一个用户的监管信息,该监管信息包括位置信息和风险信息。其中,监管信息用于用户设备在电子地图上显示每个用户的移动围栏,移动围栏的属性信息用于表征对应用户的风险等级。
在一些实施例中,该处理器还被配置为,接收医院设备发送的诊断通知,诊断通知包括确诊通知或者康复通知;以及,根据诊断通知更新对应用户的风险信息。
本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被处理器执行时实现如上述用户设备被配置执行的操作。
本申请实施例提供一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,该计算机程序被处理器执行时实现如上述应用服务器被配置执行的操作。
应理解,本实施例中的计算机可读介质至少可以包括:能够将计算机程序代码携带到 应用服务器/终端设备的任何实体或装置、记录介质、计算机存储器、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、电载波信号、电信信号以及软件分发介质。例如U盘、移动硬盘、磁碟或者光盘等。在某些司法管辖区,根据立法和专利实践,计算机可读介质不可以是电载波信号和电信信号。
本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
本实施例还提供一种计算机程序产品,当该计算机程序产品在用户设备上运行时,使得用户设备执行上述实施例中用户设备被配置执行的操作。
本实施例还提供一种计算机程序产品,当该计算机程序产品在应用服务器上运行时,使得应用服务器执行上述实施例中应用服务器被配置执行的操作。
其中,计算机程序包括计算机程序代码,计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。
应理解,本文中涉及的第一、第二、第三以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请的范围。
在本申请说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
最后应说明的是:以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (15)
- 一种疫情防控方法,应用于电子设备,其特征在于,所述方法包括:获取目标区域内至少一个用户的监管信息,所述监管信息包括位置信息和风险信息;根据每个用户的所述监管信息,在电子地图上显示对应的移动围栏,所述移动围栏的属性信息用于表征对应用户的风险等级。
- 根据权利要求1所述的方法,其特征在于,所述至少一个用户包括第一用户和第二用户,所述第一用户与所述电子设备、第一移动围栏和第一风险等级相对应,所述第二用户与第二移动围栏和第二风险等级相对应;所述第一风险等级低于所述第二风险等级,所述方法还包括:当所述第一移动围栏与所述第二移动围栏的边界距离小于预设值时,显示第一预警通知,所述第一预警通知用于指示有风险用户靠近所述第一用户。
- 根据权利要求2所述的方法,其特征在于,所述方法还包括:在所述电子地图上突出显示所述第二移动围栏,并显示所述第二移动围栏的移动方向。
- 根据权利要求2或3所述的方法,其特征在于,所述方法还包括:当所述第一移动围栏与所述第二移动围栏重叠时,显示第二预警通知,所述第二预警通知用于提示所述第一用户正在与风险用户接触。
- 根据权利要求4所述的方法,其特征在于,所述方法还包括:当所述第一移动围栏与所述第二移动围栏分离后,根据第一移动围栏与所述第二移动围栏的接触信息,更新所述第一风险等级;其中,所述接触信息包括接触时间、接触距离和所述第二风险等级;根据更新后的第一风险等级,更新显示所述第一移动围栏的属性信息。
- 根据权利要求2至5任一项所述的方法,其特征在于,所述第二用户是所述第一用户预设范围内,风险等级最高的用户。
- 根据权利要求2至6任一项所述的方法,其特征在于,所述方法还包括:在所述电子地图上显示所述目标区域内的固定围栏,所述固定围栏用于指示风险区域;当所述第一用户不是所述固定围栏内的隔离用户,且所述第一用户进入所述固定围栏后,显示第一提示信息,所述第一提示信息用于提示所述第一用户远离所述风险区域。
- 根据权利要求7所述的方法,其特征在于,所述方法还包括:当所述第一用户是所述固定围栏内的隔离用户,但所述第一用户处于所述固定围栏外部时,显示第二提示信息,所述第二提示信息用于提示所述第一用户禁止离开所述风险区域。
- 根据权利要求1至8任一项所述的方法,其特征在于,当所述目标区域是所述电子地图的显示区域时,所述获取目标区域内至少一个用户的监管信息,包括:确定所述显示区域的区域信息;将所述区域信息发送给应用服务器;接收所述应用服务器发送的所述显示区域内的至少一个用户的监管信息。
- 根据权利要求1至8任一项所述的方法,其特征在于,所述目标区域为所述电子设备的预设范围,所述获取目标区域内至少一个用户的监管信息,包括:确定所述电子设备的位置信息;将所述位置信息发送给应用服务器;接收所述应用服务器发送的所述电子设备预设范围内的至少一个用户的监管信息。
- 根据权利要求1至10任一项所述的方法,其特征在于,当所述风险信息包括风险等级时,根据所述监管信息在电子地图上显示对应用户的移动围栏,包括:根据所述风险等级确定所述移动围栏的属性信息;根据所述位置信息和所述属性信息,显示所述移动围栏。
- 根据权利要求1至10任一项所述的方法,其特征在于,当所述风险信息包括所述移动围栏的属性信息时,根据所述监管信息在电子地图上显示所述用户的移动围栏,包括:直接根据所述位置信息和所述属性信息,显示所述移动围栏。
- 一种电子设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至12任一项所述的方法。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至12任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在电子设备上运行时,使得所述电子设备实现如权利要求1至12任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011429250.9 | 2020-12-09 | ||
CN202011429250.9A CN114611860A (zh) | 2020-12-09 | 2020-12-09 | 一种疫情防控方法、电子设备、应用服务器和系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022121741A1 true WO2022121741A1 (zh) | 2022-06-16 |
Family
ID=81856751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/134614 WO2022121741A1 (zh) | 2020-12-09 | 2021-11-30 | 一种疫情防控方法、电子设备、应用服务器和系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114611860A (zh) |
WO (1) | WO2022121741A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116866842A (zh) * | 2023-09-05 | 2023-10-10 | 成都健康医联信息产业有限公司 | 一种传染病跨时空目标追踪预警方法、系统、终端及介质 |
CN117057741A (zh) * | 2023-08-18 | 2023-11-14 | 南京鲜玩网络科技有限公司 | 一种基于大数据的人员筛查预警系统及方法 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115098487A (zh) * | 2022-07-13 | 2022-09-23 | 浙江欧歌科技股份有限公司 | 一种多维的传染病数据分析治理系统 |
CN115330270A (zh) * | 2022-10-12 | 2022-11-11 | 太极计算机股份有限公司 | 目标用户的风险判定方法、装置、电子设备以及存储介质 |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103310083A (zh) * | 2012-03-09 | 2013-09-18 | 李晓松 | 一种传染病聚集性探测与早期预警系统 |
US20130318027A1 (en) * | 2011-11-20 | 2013-11-28 | Gal Almogy | System and method to enable detection of viral infection by users of electronic communication devices |
CN104063509A (zh) * | 2014-07-09 | 2014-09-24 | 武汉大学 | 一种移动式地理围栏的信息推送系统及其方法 |
US20170206334A1 (en) * | 2016-01-14 | 2017-07-20 | Stuart Tin Fah Huang | Proximity Tracing Methods and Systems |
CN111311018A (zh) * | 2020-03-04 | 2020-06-19 | 苏州远征魂车船技术有限公司 | 传染疫情精准管控系统 |
CN111383771A (zh) * | 2020-02-26 | 2020-07-07 | 汤一平 | 基于流行传染病病毒场的防控系统 |
CN111464951A (zh) * | 2020-03-31 | 2020-07-28 | 深圳前海微众银行股份有限公司 | 疫情防控方法、装置、设备及计算机可读存储介质 |
CN111477341A (zh) * | 2020-06-18 | 2020-07-31 | 杭州数梦工场科技有限公司 | 一种疫情监测方法、装置、电子设备及存储介质 |
CN111540476A (zh) * | 2020-04-20 | 2020-08-14 | 中国科学院地理科学与资源研究所 | 一种基于手机信令数据的呼吸道传染病传染树重构方法 |
CN111627565A (zh) * | 2020-05-29 | 2020-09-04 | 深圳华文寰宇信息科技发展有限公司 | 一种传染疫情危险源的预警系统及方法 |
CN111640515A (zh) * | 2020-05-26 | 2020-09-08 | 深圳市通用互联科技有限责任公司 | 区域的疫情风险确定方法、装置、计算机设备和存储介质 |
CN111933299A (zh) * | 2020-08-14 | 2020-11-13 | 工银科技有限公司 | 传染病感染风险评估方法和装置、电子设备以及存储介质 |
-
2020
- 2020-12-09 CN CN202011429250.9A patent/CN114611860A/zh active Pending
-
2021
- 2021-11-30 WO PCT/CN2021/134614 patent/WO2022121741A1/zh active Application Filing
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130318027A1 (en) * | 2011-11-20 | 2013-11-28 | Gal Almogy | System and method to enable detection of viral infection by users of electronic communication devices |
CN103310083A (zh) * | 2012-03-09 | 2013-09-18 | 李晓松 | 一种传染病聚集性探测与早期预警系统 |
CN104063509A (zh) * | 2014-07-09 | 2014-09-24 | 武汉大学 | 一种移动式地理围栏的信息推送系统及其方法 |
US20170206334A1 (en) * | 2016-01-14 | 2017-07-20 | Stuart Tin Fah Huang | Proximity Tracing Methods and Systems |
CN111383771A (zh) * | 2020-02-26 | 2020-07-07 | 汤一平 | 基于流行传染病病毒场的防控系统 |
CN111311018A (zh) * | 2020-03-04 | 2020-06-19 | 苏州远征魂车船技术有限公司 | 传染疫情精准管控系统 |
CN111464951A (zh) * | 2020-03-31 | 2020-07-28 | 深圳前海微众银行股份有限公司 | 疫情防控方法、装置、设备及计算机可读存储介质 |
CN111540476A (zh) * | 2020-04-20 | 2020-08-14 | 中国科学院地理科学与资源研究所 | 一种基于手机信令数据的呼吸道传染病传染树重构方法 |
CN111640515A (zh) * | 2020-05-26 | 2020-09-08 | 深圳市通用互联科技有限责任公司 | 区域的疫情风险确定方法、装置、计算机设备和存储介质 |
CN111627565A (zh) * | 2020-05-29 | 2020-09-04 | 深圳华文寰宇信息科技发展有限公司 | 一种传染疫情危险源的预警系统及方法 |
CN111477341A (zh) * | 2020-06-18 | 2020-07-31 | 杭州数梦工场科技有限公司 | 一种疫情监测方法、装置、电子设备及存储介质 |
CN111933299A (zh) * | 2020-08-14 | 2020-11-13 | 工银科技有限公司 | 传染病感染风险评估方法和装置、电子设备以及存储介质 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117057741A (zh) * | 2023-08-18 | 2023-11-14 | 南京鲜玩网络科技有限公司 | 一种基于大数据的人员筛查预警系统及方法 |
CN117057741B (zh) * | 2023-08-18 | 2024-03-29 | 南京鲜玩网络科技有限公司 | 一种基于大数据的人员筛查预警系统及方法 |
CN116866842A (zh) * | 2023-09-05 | 2023-10-10 | 成都健康医联信息产业有限公司 | 一种传染病跨时空目标追踪预警方法、系统、终端及介质 |
CN116866842B (zh) * | 2023-09-05 | 2023-11-21 | 成都健康医联信息产业有限公司 | 一种传染病跨时空目标追踪预警方法、系统、终端及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN114611860A (zh) | 2022-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022121741A1 (zh) | 一种疫情防控方法、电子设备、应用服务器和系统 | |
US11943694B2 (en) | Systems and methods for emergency data integration | |
US11871325B2 (en) | Systems and user interfaces for emergency data integration | |
US11356833B2 (en) | Systems and methods for delivering and supporting digital requests for emergency service | |
US11695871B2 (en) | Systems and methods for emergency data integration | |
US11716605B2 (en) | Systems and methods for victim identification | |
US11641575B2 (en) | Emergency data management and access system | |
US20220014895A1 (en) | Spatiotemporal analysis for emergency response | |
WO2021203037A1 (en) | Systems and methods for identifying and activating emergency response assets | |
US11743706B2 (en) | Enhanced communication functions for emergency service providers | |
US11704990B2 (en) | Method and apparatus for social distancing alarm systems | |
JP2011166231A (ja) | 携帯端末装置、携帯端末制御方法及び情報通信システム | |
CN111627565B (zh) | 一种传染疫情危险源的预警系统及方法 | |
US11282360B2 (en) | Geographic boundary compliance detection using body-worn offender monitoring electronic devices | |
EP3809386B1 (en) | Guardian service provision system, program, and guardian service provision method | |
US20230207139A1 (en) | A method system and storage medium for locating source of infection based on big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21902448 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21902448 Country of ref document: EP Kind code of ref document: A1 |