WO2020114112A1 - Procédé et appareil d'alarme intelligents à base de chaîne de blocs, et dispositif électronique - Google Patents
Procédé et appareil d'alarme intelligents à base de chaîne de blocs, et dispositif électronique Download PDFInfo
- Publication number
- WO2020114112A1 WO2020114112A1 PCT/CN2019/112157 CN2019112157W WO2020114112A1 WO 2020114112 A1 WO2020114112 A1 WO 2020114112A1 CN 2019112157 W CN2019112157 W CN 2019112157W WO 2020114112 A1 WO2020114112 A1 WO 2020114112A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- confirmation message
- user
- user equipment
- security confirmation
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72451—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
Definitions
- One or more embodiments of this specification relate to the field of blockchain technology, and in particular to a blockchain-based intelligent alarm method and device, and electronic equipment.
- the user when facing an emergency, the user can make an alarm by dialing an alarm phone (or other emergency phone) through a mobile phone.
- an alarm phone or other emergency phone
- the prerequisite for a successful alarm is that the user can find the emergency situation in time, take out the mobile phone successfully, and dial or press the combination button on the mobile phone smoothly.
- one or more embodiments of this specification provide a smart alarm method and device based on blockchain, and electronic equipment.
- a smart alarm method based on blockchain is proposed, which is applied to blockchain nodes, and the method includes:
- the smart contract is used to determine whether the reception interval of the security confirmation message satisfies a preset reception cycle, and trigger an alarm operation when the reception interval does not satisfy the preset reception cycle.
- a smart alarm device based on a blockchain which is applied to a blockchain node.
- the device includes:
- the receiving unit receives a security confirmation message sent by the user equipment, and the security confirmation message is generated by the user equipment in response to the detected user state confirmation operation;
- a calling unit calling a smart contract
- the smart contract is used to determine whether the receiving interval of the security confirmation message satisfies a preset receiving cycle, and triggers an alarm if the receiving interval does not satisfy the preset receiving cycle operating.
- an electronic device including:
- Memory for storing processor executable instructions
- the processor executes the executable instruction to implement the method as described in the above embodiment.
- FIG. 1 is a flowchart of a blockchain-based intelligent alarm method provided by an exemplary embodiment.
- FIG. 2 is a schematic diagram of the overall architecture of an intelligent alarm provided by an exemplary embodiment.
- FIG. 3 is an interactive schematic diagram for implementing intelligent alarm provided by an exemplary embodiment.
- FIG. 4 is a schematic structural diagram of an apparatus provided by an exemplary embodiment.
- FIG. 5 is a block diagram of a blockchain-based intelligent alarm device provided by an exemplary embodiment.
- the steps of the corresponding method are not necessarily performed in the order shown and described in this specification.
- the method may include more or fewer steps than described in this specification.
- the single step described in this specification may be decomposed into multiple steps for description in other embodiments; and the multiple steps described in this specification may also be combined into a single step in other embodiments. description.
- FIG. 1 is a flowchart of a blockchain-based intelligent alarm method provided by an exemplary embodiment. As shown in Figure 1, this method is applied to blockchain nodes and can include the following steps:
- Step 102 Receive a security confirmation message sent by the user equipment, where the security confirmation message is generated by the user equipment in response to the detected user status confirmation operation.
- the user device may be any type of electronic device such as a mobile phone, tablet computer, smart watch, etc. used by the user, and this specification does not limit this.
- a phone card registered with the user's real name, or pre-binding the identification of the MAC address of the electronic device with the user a unique mapping relationship between the electronic device and the user can be established, so that The electronic device may be regarded as a user device corresponding to the user.
- the user can perform a user status confirmation operation on the user device before the emergency is in a safe state, to indicate that the user is still in In a safe state.
- the user can make settings on the user device to determine whether the smart alarm function needs to be turned on.
- the smart alarm function is used to implement the smart alarm scheme of this manual; in other words, when the smart alarm function is turned on, it can be based on the The technical solution realizes intelligent alarm.
- the user can manually switch the intelligent alarm function, or set a certain judgment rule, so that the user equipment can automatically switch the intelligent alarm function based on the judgment rule;
- the judgment rule can include a time range, for example, the time range can be daily 9-12 pm at night, so that the user device can automatically turn on the smart alarm function when it is in the time range, otherwise it will automatically turn off the smart alarm function;
- the judgment rule can include a geographic location range, for example, the geographic location range can be the crime rate The higher area allows the intelligent alarm function to be automatically turned on when the user equipment is in the geographic location range, otherwise automatically turns off the intelligent alarm function;
- the judgment rule may include the time range and geographic location range, so that when the user is in the time range When the device is in this geographic location range, the user device can automatically turn on the smart alarm function, otherwise it will automatically turn off the smart alarm function.
- the user status confirmation operation may include at least one of unlocking the user equipment, turning on the camera of the user equipment, and shooting through the camera of the user equipment, which is not limited in this specification.
- the user of the user equipment obtains the corresponding digital identity in advance and authorizes the user equipment so that the user equipment can sign the security confirmation message sent based on the digital identity, and the blockchain node can This verifies the identity of the sender of the security confirmation message to identify the fraudulent use of identity by illegal users.
- the blockchain node can be determined that the user of the user equipment has a higher risk of facing an emergency, so that the user of the user equipment is alerted to the risk; or, the user of the user equipment It may even be faced with an emergency situation.
- the user device when the user device signs the security confirmation message sent based on the user's digital identity, the user device does not use the phone card or user registered with the user's real name even if the user has not logged in to the registered account. If the device's MAC address and other identifiers are not bound to the user in advance, the signature can also be used to indicate the user's identity.
- step 104 a smart contract is invoked, and the smart contract is used to determine whether the reception interval of the security confirmation message satisfies a preset reception cycle, and trigger an alarm if the reception interval does not satisfy the preset reception cycle operating.
- the user when the user has faced an emergency situation, such as robbery or kidnapping, on the one hand, the user may be threatened by criminals and cannot successfully take out the user equipment for operation, or the user equipment may have been snatched or damaged by the criminals On the other hand, the user may have lost the ability to operate the user device (such as injury or syncope, etc.), so in this specification, the user status confirmation operation is performed when the user is in a safe state, and is received and counted by the blockchain node
- the corresponding security confirmation message sent by the user equipment can speculate that the user may have faced an emergency situation when the reception status of the security confirmation message is abnormal (such as the reception interval does not meet the preset reception cycle), without requiring the user to implement any Operation can not only reduce the difficulty of the user's operation, improve the accuracy of the judgment of the user's state, but also prevent the user's operation of the user's device in an emergency from causing criminals' doubts or angering the criminals, which helps protect the user's personal
- the receiving interval of the security confirmation message when the receiving interval of the security confirmation message is too large, such as exceeding the preset receiving period and the difference is greater than the preset value, the user is likely to face an emergency situation and cannot perform the user status confirmation operation, it can be determined as not Satisfying the preset receiving cycle, thereby triggering an alarm operation; or, when the receiving interval of the safety confirmation message is too small, such as receiving multiple safety confirmation messages within the same preset receiving cycle, the user is likely to have faced an emergency but is inconvenient Implementing alarms and other operations that easily cause criminals to doubt or provoke criminals, so you can continue to perform user status confirmation operations and cause abnormal transmission of security confirmation messages. At this time, you can determine that the preset reception cycle is not met, which triggers the alarm operation. .
- the user equipment may issue a prompt to the user based on the above-mentioned preset receiving cycle, so that the user can complete the user status confirmation operation on time while in a safe state, to avoid forgetting
- the transmission status of the safety confirmation message is abnormal due to operation and other reasons to prevent false alarms caused thereby.
- the smart contract is also used to provide the alarm object with the received security confirmation message from the user device when the alarm operation is triggered, for the alarm object (such as the police) to refer to, such as an alarm
- the alarm object such as the police
- the object can confirm the number of security confirmation messages, the sender, the reception interval, etc., thereby analyzing whether the relevant user has faced an emergency situation, etc.
- the security confirmation message includes environment description information of the environment in which the user equipment is located.
- the environment description information may include at least one of the following: photos or videos taken by the user equipment, audio collected by the user equipment, positioning information collected by the user equipment, track information generated by the user equipment, etc. , This manual does not limit this.
- photos or videos taken by the user equipment especially when the safety confirmation message contains the above-mentioned environment description information, it helps the alarm object to confirm the location of the relevant user, surrounding buildings, and even from photos, audio or The video can identify suspected criminals or analyze what kind of emergency situations may be faced, so that the alarm object can better assist related users to get out of the emergency situation.
- the blockchain node may publish the security confirmation message and/or the digital summary information (such as a hash value) of the security confirmation message to the blockchain, and may deposit the security confirmation message to facilitate Follow-up inspection, management or accountability.
- the digital summary information such as a hash value
- the blockchain node may analyze the content contained in the security confirmation message and pass the analysis result to the smart contract, so that when the smart contract confirms that there is abnormal content according to the analysis result, the The alarm operation is described.
- the user implements the user status confirmation operation, he may not realize that he has already faced an emergency situation or there is a risk of facing an emergency situation, or a criminal may simulate user behavior and implement a user status confirmation operation after committing a crime, so that the blockchain nodes are safe
- the reception interval of the confirmation message is not abnormal.
- you can analyze the content contained in the safety confirmation message such as the person, place, behavior (such as fighting, help gesture, etc.) contained in the photo or video, and the video or audio.
- the appearance of crying, help, etc., abnormal location information or trajectory information, etc. to analyze the possible safety problems, so as to trigger the alarm operation in time.
- FIG. 2 is a schematic diagram of the overall architecture of an intelligent alarm provided by an exemplary embodiment.
- the user A can perform a user status confirmation operation on the mobile phone 21, and the mobile phone 21 can accordingly generate a corresponding security confirmation message and send the security confirmation message to the server 22 .
- the server 22 can confirm the reception of the safety confirmation message by invoking a smart contract, so that when a preset condition is reached, an alarm operation is automatically triggered.
- FIG. 3 is an interactive schematic diagram for implementing intelligent alarm provided by an exemplary embodiment. As shown in FIG. 3, the interaction process may include the following steps:
- Step 301 Establish a binding relationship between the mobile phone 21 and the server 22.
- the binding relationship that needs to be established is the binding relationship between the identity information of the user A and the device information of the mobile phone 21. Based on the binding relationship, the server 22 can confirm that the security confirmation message corresponds to the user A when receiving the security confirmation message subsequently sent by the mobile phone 21.
- user A may register an account with server 22 in advance to obtain a registered account uniquely corresponding to user A. Then, user A can log in to the registered account on the mobile phone 21, and the server 22 determines that the registered account (corresponding to user A) and the mobile phone 21 are established based on the login information of the registered account on the mobile phone 21. Binding relationship. Similarly, the user A can use the mobile phone number registered with the real name on the mobile phone 21, which also enables the server 22 to determine that the mobile phone number (corresponding to the user A) has established a binding relationship with the mobile phone 21.
- step 302 the mobile phone 21 enables the intelligent alarm function.
- the mobile phone 21 can turn off the smart alarm function by default, and the user A can temporarily turn on the smart alarm function when needed; for example, when the user A works overtime on a certain day until later, the smart alarm function can be turned on To ensure safety on the way home.
- the mobile phone 21 can automatically turn on and off the intelligent alarm function by judging the preset conditions.
- user A may set the preset conditions to include: a.
- the time condition is from 10 pm to 4 am the next day, and b.
- the geographical position condition is that it is in an area not covered by a camera; then, by time information and geographical position Comprehensive judgment of information, for example, when the mobile phone 21 is in the above-mentioned camera uncovered area at 11 o'clock in the evening, it can be determined that the above-mentioned preset conditions are met, so the smart alarm function can be automatically turned on; When the camera does not cover the area, the mobile phone 21 can automatically turn off the smart alarm function.
- step 303 the mobile phone 21 can implement an operation reminder at the reminder moment.
- the mobile phone 21 can determine the corresponding reminder time according to the preset period, so as to implement the operation reminder for the user A at the reminder time, so that the user A can implement the user state on time Confirm the operation.
- the reminder for the user status confirmation operation can be a special reminder method predefined by user A, and the reminder content avoids disclosure of information related to the intelligent alarm function.
- the reminder content avoids disclosure of information related to the intelligent alarm function.
- the user status confirmation operation is a shooting operation
- Prompt is issued to prevent criminals from simulating or coercing user A to implement relevant operations.
- it is possible to avoid including information related to the type of operation in the reminder content such as outputting "please perform a preset operation” or similar reminder content, and avoiding output of "please take a photo” or similar reminder content.
- step 304 the mobile phone 21 detects a shooting operation.
- the camera of the mobile phone 21 may be turned on actively or under the prompt of the above operation reminder to perform the shooting operation, such as Take at least one photo.
- the user status confirmation operation may include other types, such as unlocking the mobile phone 21, inputting a specific character string on the mobile phone 21, etc., which is not limited in this specification.
- step 305 the mobile phone 21 collects environment description information.
- the mobile phone 21 can collect information on the environment where it is located to obtain corresponding environment description information, which can be used for The environment in which the mobile phone 21 or the user A is located is described in more detail.
- the environment description information may include: the photo taken by the mobile phone 21 in step 304, the video collected by the mobile phone 21 after the camera is turned on, the audio collected by the mobile phone 21, the positioning information collected by the mobile phone 21, the trajectory information generated by the mobile phone 21, etc. This manual does not limit this.
- step 306 the mobile phone 21 sends a security confirmation message to the server 22.
- the security confirmation message may include the above-mentioned environment description information.
- the user A can register in advance to obtain a unique corresponding digital identity, which is characterized by a set of public and private key pairs; accordingly, the mobile phone 21 can sign the security confirmation message through the private key corresponding to the user A's digital identity.
- the server 22 may perform signature verification on the received security confirmation message.
- the server 22 can verify the security confirmation message with the public key corresponding to the user A to determine that the security confirmation message has been authorized by the user A and is not impersonated by a criminal User A's identity is sent.
- the server 22 may trigger an alarm operation .
- step 308 the server 22 invokes a smart contract to verify whether the receiving interval is in compliance.
- a blockchain client is running on the server 22, so that the server 22 is configured as a blockchain node, and the server 22 can call the smart contract accordingly, and the security confirmation message is received at the moment Enter the smart contract to verify whether the receiving interval of the security confirmation message from the mobile phone 21 conforms to the preset receiving cycle.
- the security confirmation message sent by the mobile phone 21 was received at 22:20 last time, then normally the mobile phone 21 should be received again around 22:25.
- the security confirmation message sent; and considering that the operation of user A cannot be very punctual, the above 3-minute warning period can be used as a fault tolerance period, then if the security confirmation message sent by the mobile phone 21 is not received at 22:28, the smart contract It can be determined that the user A has not implemented the user status confirmation operation on time, and the user A has a high probability of facing an emergency situation, so the smart contract can automatically trigger an alarm operation.
- the smart contract can determine that User A may have faced an emergency situation and hopes to pass The aforementioned abnormal operation issues a warning, so the smart contract can automatically trigger an alarm operation.
- step 309 the server 22 verifies the environment description information by calling a smart contract.
- the server 22 may extract the environment description information or the content content further contained therein, and input the environment description information or information content into the smart contract to be performed by the smart contract test.
- the smart contract may verify the reception interval of the security confirmation message, but by analyzing the above environmental description information or information content, such as whether the photograph taken contains suspicious persons (such as face recognition to determine the photo The person has a criminal history, etc.), whether the captured video contains the ongoing criminal behavior, whether the captured video or the collected audio contains a fighting sound or a cry for help, etc., can further determine whether the received security confirmation message is the user A is sent in a safe state, whether there is a situation where criminals simulate user A or coerce user A to perform user state confirmation operations, etc. If a criminal is found to simulate user A or threaten user A, the smart contract can trigger an alarm operation.
- the surrounding environment (such as street status, surrounding buildings, etc.) of user A can be obtained by analyzing the environment description information or information content , Surrounding people, geographic location information, walking trajectory information, and user A’s facial expressions, voices, behaviors, etc., and provide relevant information to the alarm object when implementing the alarm operation, so that the alarm object can implement a more accurate analysis And more effective measures.
- FIG. 4 is a schematic structural diagram of a device provided by an exemplary embodiment. Please refer to FIG. 4.
- the device includes a processor 402, an internal bus 404, a network interface 406, a memory 408, and a non-volatile memory 410.
- the processor 402 reads the corresponding computer program from the non-volatile memory 410 into the memory 408 and then runs it to form a blockchain-based smart alarm device at a logical level.
- one or more embodiments of this specification do not exclude other implementations, such as a logic device or a combination of software and hardware, etc., that is to say, the execution body of the following processing flow is not limited to each
- the logic unit may also be a hardware or logic device.
- the smart alarm device based on the blockchain is applied to the blockchain node, and may include:
- the receiving unit 51 receives a security confirmation message sent by the user equipment, where the security confirmation message is generated by the user equipment in response to the detected user status confirmation operation;
- the calling unit 52 invokes a smart contract, and the smart contract is used to determine whether the reception interval of the security confirmation message satisfies a preset reception cycle, and triggers when the reception interval does not satisfy the preset reception cycle Alarm operation.
- the security confirmation message is signed by the user of the user equipment through the corresponding digital identity.
- the security confirmation message includes environment description information of the environment in which the user equipment is located.
- the environment description information includes at least one of the following: photos or videos taken by the user equipment, audio collected by the user equipment, positioning information collected by the user equipment, and trajectory information generated by the user equipment .
- the smart contract is also used to provide the alarm object with the received security confirmation message from the user equipment when the alarm operation is triggered.
- Optional also includes:
- the analyzing unit 53 analyzes the content contained in the security confirmation message
- the transmission unit 54 transmits the analysis result to the smart contract, so that the smart contract triggers the alarm operation when it is confirmed that there is abnormal content according to the analysis result.
- Optional also includes:
- the issuing unit 55 publishes the security confirmation message and/or digital summary information of the security confirmation message to the blockchain.
- the system, device, module or unit explained in the above embodiments may be specifically implemented by a computer chip or entity, or implemented by a product with a certain function.
- a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet computer, wearable device, or any combination of these devices.
- This specification proposes a computer-readable medium on which computer instructions are stored.
- the technical solution of this specification is implemented, such as the smart alarm method based on blockchain in any of the above embodiments, here I will not repeat them one by one.
- the computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- Memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer-readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
- RAM random access memory
- ROM read only memory
- flash RAM flash random access memory
- Computer-readable media including permanent and non-permanent, removable and non-removable media, can store information by any method or technology.
- the information may be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic cassette tapes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
- computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.
- first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
- first information may also be referred to as second information, and similarly, the second information may also be referred to as first information.
- word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination”.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Environmental & Geological Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
L'invention concerne un procédé et un appareil d'alarme intelligents à base de chaîne de blocs, ainsi qu'un dispositif électronique, s'appliquant à un nœud de chaîne de blocs. Le procédé d'alarme intelligent basé sur une chaîne de blocs consiste à : recevoir un message de confirmation de sécurité envoyé par un équipement utilisateur, le message de confirmation de sécurité étant généré par l'équipement utilisateur en réponse à une opération de confirmation d'état d'utilisateur détectée (102) ; et invoquer un contrat intelligent, le contrat intelligent étant utilisé pour déterminer si un intervalle de réception pour le message de confirmation de sécurité satisfait une période de réception prédéfinie et, si l'intervalle de réception ne satisfait pas la période de réception prédéfinie, déclencher une opération d'alarme (104).
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811482684.8 | 2018-12-05 | ||
| CN201811482684.8A CN110033602A (zh) | 2018-12-05 | 2018-12-05 | 基于区块链的智能报警方法及装置、电子设备 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2020114112A1 true WO2020114112A1 (fr) | 2020-06-11 |
Family
ID=67235304
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2019/112157 Ceased WO2020114112A1 (fr) | 2018-12-05 | 2019-10-21 | Procédé et appareil d'alarme intelligents à base de chaîne de blocs, et dispositif électronique |
Country Status (3)
| Country | Link |
|---|---|
| CN (1) | CN110033602A (fr) |
| TW (1) | TWI711319B (fr) |
| WO (1) | WO2020114112A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2025196281A1 (fr) * | 2024-03-21 | 2025-09-25 | Sony Group Corporation | Procédé et système de détection de l'utilisation non autorisée d'un dispositif personnel |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110033602A (zh) * | 2018-12-05 | 2019-07-19 | 阿里巴巴集团控股有限公司 | 基于区块链的智能报警方法及装置、电子设备 |
| CN111127824A (zh) * | 2019-09-17 | 2020-05-08 | 中国联合网络通信集团有限公司 | 一种预警方法、装置及系统 |
| CN112598183A (zh) * | 2020-12-26 | 2021-04-02 | 深圳市八方通达科技有限公司 | 一种基于区块链的犯罪预测方法、系统及存储介质 |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107317730A (zh) * | 2017-08-21 | 2017-11-03 | 上海点融信息科技有限责任公司 | 用于监控区块链节点状态的方法、设备和系统 |
| CN107657401A (zh) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | 基于区块链技术的快递箱监控方法、装置和系统 |
| US20180176228A1 (en) * | 2016-12-21 | 2018-06-21 | International Business Machines Corporation | Monitoring actions performed by a network of peer devices using a blockchain |
| CN108632381A (zh) * | 2018-05-14 | 2018-10-09 | 济南浪潮高新科技投资发展有限公司 | 一种基于区块链的环境监督方法及系统 |
| CN108777703A (zh) * | 2018-05-15 | 2018-11-09 | 维沃移动通信有限公司 | 一种基于区块链的异常行为处理方法及系统 |
| CN108804165A (zh) * | 2018-05-25 | 2018-11-13 | 李昭强 | 一种基于用户开锁行为分析的信息处理方法、装置及存储介质 |
| CN110033602A (zh) * | 2018-12-05 | 2019-07-19 | 阿里巴巴集团控股有限公司 | 基于区块链的智能报警方法及装置、电子设备 |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105118228A (zh) * | 2015-07-11 | 2015-12-02 | 深圳市前海安测信息技术有限公司 | 用于监护儿童安全的自动报警系统及方法 |
| CN105096420A (zh) * | 2015-07-31 | 2015-11-25 | 北京旷视科技有限公司 | 门禁系统以及用于其的数据处理方法 |
| CN106056516B (zh) * | 2016-05-31 | 2018-12-04 | 杭州致峰网络科技有限公司 | 监护方法及系统 |
| CN106205043A (zh) * | 2016-08-29 | 2016-12-07 | 马良花 | 一种自动报警的校园卡 |
| CN107707633A (zh) * | 2017-09-19 | 2018-02-16 | 深圳市易成自动驾驶技术有限公司 | 车辆信息处理方法、设备及可读存储介质 |
| CN108156133B (zh) * | 2017-11-28 | 2021-04-27 | 黄敬易 | 人身安全确认方法、装置、系统及用户终端 |
| CN108665253A (zh) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | 一种区块链网络的数据处理方法、装置、设备及存储介质 |
-
2018
- 2018-12-05 CN CN201811482684.8A patent/CN110033602A/zh active Pending
-
2019
- 2019-09-18 TW TW108133588A patent/TWI711319B/zh active
- 2019-10-21 WO PCT/CN2019/112157 patent/WO2020114112A1/fr not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180176228A1 (en) * | 2016-12-21 | 2018-06-21 | International Business Machines Corporation | Monitoring actions performed by a network of peer devices using a blockchain |
| CN107657401A (zh) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | 基于区块链技术的快递箱监控方法、装置和系统 |
| CN107317730A (zh) * | 2017-08-21 | 2017-11-03 | 上海点融信息科技有限责任公司 | 用于监控区块链节点状态的方法、设备和系统 |
| CN108632381A (zh) * | 2018-05-14 | 2018-10-09 | 济南浪潮高新科技投资发展有限公司 | 一种基于区块链的环境监督方法及系统 |
| CN108777703A (zh) * | 2018-05-15 | 2018-11-09 | 维沃移动通信有限公司 | 一种基于区块链的异常行为处理方法及系统 |
| CN108804165A (zh) * | 2018-05-25 | 2018-11-13 | 李昭强 | 一种基于用户开锁行为分析的信息处理方法、装置及存储介质 |
| CN110033602A (zh) * | 2018-12-05 | 2019-07-19 | 阿里巴巴集团控股有限公司 | 基于区块链的智能报警方法及装置、电子设备 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2025196281A1 (fr) * | 2024-03-21 | 2025-09-25 | Sony Group Corporation | Procédé et système de détection de l'utilisation non autorisée d'un dispositif personnel |
Also Published As
| Publication number | Publication date |
|---|---|
| TWI711319B (zh) | 2020-11-21 |
| TW202037195A (zh) | 2020-10-01 |
| CN110033602A (zh) | 2019-07-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11238722B2 (en) | Methods and systems for providing online monitoring of released criminals by law enforcement | |
| CN107506755B (zh) | 监控录像识别方法及装置 | |
| US11722844B2 (en) | Personal monitoring system using a remote timer | |
| TWI711319B (zh) | 基於區塊鏈的智慧報警方法及裝置、電子設備 | |
| Omede et al. | IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System | |
| US20090181640A1 (en) | Interactive Personal Surveillance and Security (IPSS) System | |
| US20150081579A1 (en) | System for conveying data to responders and routing, reviewing and approving supplemental pertinent data | |
| US10276027B2 (en) | Mobile device loss prevention | |
| Margapuri et al. | PiBase: an IoT-based security system using google firebase and Raspberry Pi | |
| HK1244555A1 (zh) | 电子抢先式证据性托管平台 | |
| CN112115882A (zh) | 用户在线检测方法、装置、电子设备及存储介质 | |
| Jovanovic et al. | SOSerbia: Android‐Based Software Platform for Sending Emergency Messages | |
| US20230230190A1 (en) | Personal protector platform | |
| US12374211B2 (en) | Systems and methods for alarm event data record processing | |
| KR20160131678A (ko) | 카메라를 구비한 보호용 휴대 장치 및 영상 촬영 방법 | |
| AU2014203056A1 (en) | A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
| Margapuri et al. | PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase | |
| Goyal et al. | 5G Enabled IoT-Based DL with BC Model for Secured Home Door System | |
| Patil et al. | Technologies Furnish Safety-Security Systems for Women at Workplace | |
| KR20140019260A (ko) | 이동 통신망을 이용한 개인대상범죄의 예방 및 대응 방법과 치안당국과의 정보공유 방법 | |
| Tomar et al. | An eve teasing prohibitor application with SOS services: A systematic review | |
| Vikruthi et al. | Design and Development of IoT based Smart Women Security Gadget | |
| Gill et al. | The Evolution of Physical Security Measures: Assessing the Benefits and Implications of Using More Advanced Technologies | |
| US20250139285A1 (en) | Monitoring system, communication apparatus, monitoring method, and non-transitory computer readable medium | |
| Shiny Angel et al. | Software controlled system for ensuring safety and security of women with reporting vulnerabilities |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19892124 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 19892124 Country of ref document: EP Kind code of ref document: A1 |