[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110572776B - Method for dividing safety area, terminal and storage medium - Google Patents

Method for dividing safety area, terminal and storage medium Download PDF

Info

Publication number
CN110572776B
CN110572776B CN201910894964.8A CN201910894964A CN110572776B CN 110572776 B CN110572776 B CN 110572776B CN 201910894964 A CN201910894964 A CN 201910894964A CN 110572776 B CN110572776 B CN 110572776B
Authority
CN
China
Prior art keywords
information
designated
area
specified object
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910894964.8A
Other languages
Chinese (zh)
Other versions
CN110572776A (en
Inventor
童鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ZHIYING TECHNOLOGY Co.,Ltd.
Original Assignee
Shenzhen Zhiying Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhiying Technology Co ltd filed Critical Shenzhen Zhiying Technology Co ltd
Priority to CN201910894964.8A priority Critical patent/CN110572776B/en
Publication of CN110572776A publication Critical patent/CN110572776A/en
Application granted granted Critical
Publication of CN110572776B publication Critical patent/CN110572776B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0269System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a method for dividing a safety area, a terminal and a storage medium, wherein the method comprises the following steps: in a preset time period, detecting the stay time and stay times of a specified object at any position; when the fact that the stay time of the specified object at a position is larger than the preset time and the stay times are larger than the preset times is detected, recording the position as the specified position; acquiring position information of at least one designated position; and obtaining a safety region according to the position information and a preset division rule, so that the trouble that a user needs to set by himself is saved, the safety region is automatically divided according to the historical data of the specified object, and the safety region is more flexible and accurate.

Description

Method for dividing safety area, terminal and storage medium
Technical Field
The present invention relates to the technical field of terminal devices, and in particular, to a method for partitioning a secure area, a terminal, and a storage medium.
Background
Nowadays, terminal devices are increasing, functions of the terminal devices are also increasing, for example, functions of weather forecasting, telephone calling, step recording, heart rate testing, blood pressure testing, positioning and the like are provided on a smart watch, the terminal devices for the old and children generally have a security fence function, the security fence is a virtual electronic fence, namely, an area is designated, and when the terminal devices detect that the terminal devices exceed the area, an alarm is given out.
At present, a fence area of an electronic fence is usually set by a user, and the set fence area is a safe area, but when an actual safe area of the user changes, the user needs to change the set fence area by himself or herself, which is not only troublesome, but also cannot be flexibly changed.
Disclosure of Invention
The invention mainly aims to provide a safe region dividing method, a terminal and a storage medium, and aims to solve the technical problem that setting a safe region by an electronic fence in the prior art is troublesome.
In order to achieve the above object, the present invention provides a method for dividing a secure area, including:
in a preset time period, detecting the stay time and stay times of a specified object at any position;
when the fact that the stay time of the specified object at a position is larger than the preset time and the stay times are larger than the preset times is detected, recording the position as the specified position;
acquiring position information of at least one designated position;
and obtaining a safety region according to the position information and a preset division rule.
Further, after the step of obtaining the safety area according to the position information and the preset division rule, the method includes:
acquiring current state information of the specified object;
judging whether the specified object is in the safe area or not according to the current state information;
if the specified object is not in the safe area, issuing an unsafe alarm about the specified object;
if the safety area is located, judging whether a condition for sending an alarm is met or not according to the current state information;
and if the condition for sending the alarm is met, sending the alarm corresponding to the condition.
Further, the step of issuing an insecure alarm about the specified object is followed by:
acquiring environmental sound information of the position of the specified object;
analyzing the environmental sound information to judge whether the specified object is in a safe state.
Further, the position information includes target WiFi signal information of a plurality of target WiFi accounts at the specified position, and the step of obtaining the safety zone according to the position information and according to a preset division rule includes:
determining the coverage range of each target WiFi signal according to each target WiFi signal information;
and recording the area obtained by adding the coverage range of each target WiFi signal as the safe area.
Further, the current state information includes WiFi signal information, and the step of determining whether the designated object is in the safe area according to the current state information includes:
judging whether a WiFi signal is searched at the current position of the specified object;
if the WiFi signals are searched, acquiring WiFi account numbers corresponding to the WiFi signals;
when the WiFi account number is detected to be contained in the designated account number set and is larger than the preset number, the designated object is judged to be in the safe area; wherein the designated account set includes each of the target WiFi accounts.
Further, the step of obtaining the safety area according to the position information and a preset division rule includes:
and calculating the geometric center of a geometric figure formed by connecting the designated positions according to the positioning information of the designated positions, dividing a circular area by taking the geometric center as the center of a circle and the distance between the geometric center and the designated position, which is the farthest distance, as the radius, and marking the circular area as the safe area.
Further, the current state information includes a motion trajectory and movement information of the designated object, and the step of determining whether a condition for issuing an alarm is satisfied according to the current state information includes:
judging whether the specified object moves or not according to the movement information;
if the designated object is moving, judging whether the position of the designated object deviates from the geometric center according to the motion track;
and if the geometric center is deviated, judging that the condition for giving an alarm is met.
Further, the current state information includes a motion trajectory and movement information of the designated object, and the step of determining whether a condition for issuing an alarm is satisfied according to the current state information includes:
judging whether the specified object moves or not according to the movement information;
if the designated object is moving, judging whether the designated object moves towards the boundary of the safe area or not according to the motion track;
if the specified object moves towards the boundary of the safe area, calculating a first duration according to the movement information and the distance between the current position of the specified object and the boundary of the safe area towards which the specified object moves;
judging whether the first time length is smaller than a preset threshold value or not;
and if the first time length is less than a preset threshold value, judging that the condition of sending an alarm is met.
The invention also provides a terminal, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of any one of the methods when executing the computer program.
The invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of any one of the above.
The method for dividing the safety area, the terminal and the storage medium have the advantages that: the positions where the designated objects frequently stay are found out by automatically detecting the stay time and the stay times of the designated objects at any position in the preset time period, and then the safety regions are divided according to the positions according to the preset division rules, so that the trouble that a user needs to set by himself/herself is saved, the safety regions are automatically divided according to the historical data of the designated objects, and the method is flexible and accurate.
Drawings
Fig. 1 is a schematic diagram illustrating steps of a method for partitioning a security area according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating steps of a method for partitioning a secure area according to another embodiment of the present invention;
FIG. 3 is a diagram illustrating specific steps of one embodiment of step S4 in FIG. 1;
fig. 4 is a block diagram of a terminal structure in the embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As used herein, the singular forms "a", "an", "the" and "the" include plural referents unless the content clearly dictates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, units, modules, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, units, modules, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Referring to fig. 1, an embodiment of the present invention provides a method for dividing a secure area, including:
step S1: in a preset time period, detecting the stay time and stay times of a specified object at any position;
step S2: when the fact that the stay time of the specified object at a position is larger than the preset time and the stay times are larger than the preset times is detected, recording the position as the specified position;
step S3: acquiring position information of at least one designated position;
step S4: and obtaining a safety region according to the position information and a preset division rule.
The safe area dividing method of the electronic fence is applied to terminal equipment, such as a mobile phone, a notebook computer, an iPad, a bracelet, a watch and the like. For convenience of illustration, the method in this embodiment is applied to a mobile terminal of a user, as described in step S1, the above specified location may be obtained through historical location data of a specified object, specifically, within a preset time period, for example, within 1 month, the mobile terminal obtains location information of the specified object through a wearable device of the specified object, the location information includes positioning information, specifically, the above mobile terminal is in communication connection with a terminal device carried by the above specified object, the mobile terminal may obtain location information of any location through the terminal device of the specified object, then obtains a staying time of the specified object at any location through the location information, and a staying number, when it is detected that the staying time of the specified object at a location is greater than the preset time and the staying number of times at the location is greater than the preset number, it is indicated that the specified object is often present at the location, i.e. the location is within the arena of the designated object, then the location is marked as the designated location, and the above method is repeated until all arenas of the designated object are ensured to be found, usually including at least one designated location.
It should be noted that, in step S1, the stay time and the stay number of the designated object at any position are detected within a preset time period, wherein, in addition to continuously acquiring the position information of the designated object through a GPS module or a position sensor in the wearable device of the designated object and then obtaining the stay time and the stay number through the position information, for better energy saving, a timing trigger may be set to turn on the GPS module or the position sensor to acquire the position information within the designated time period, instead of continuously acquiring, for example, acquiring the position information from 12 a.m. to 1 a.m. and then turning off, because the designated object is generally in a sleep state, the position does not change, and then the acquisition of the position information is turned on at 9 a.m. to 10 a.m. Further, a first designated position of the designated object may be obtained first, and then other designated positions are obtained under a trigger condition, for example, the first designated position of the designated object is obtained first, the first designated position may be a position of a house of the designated object, then historical data of a motion trajectory of the designated object is obtained, a time period of the designated object going out of the house is analyzed from the historical data, when the time period is reached, a module for obtaining position information is automatically triggered to be opened, otherwise, the module is kept closed, so that the purpose of saving energy is achieved; or acquiring a first designated position first, recording a WiFi signal of the first designated position as a designated signal, when the wearable device of the designated object is connected to the designated signal, defaulting that the designated object is at the first designated position, closing the module for acquiring the position information, and triggering and opening the module for acquiring the position information when the wearable device of the designated object is disconnected and the designated information cannot be searched.
In other embodiments, in order to save more energy, the operation of the device with higher power consumption may be started after the corresponding action reaches the trigger condition by detecting the action of the device with lower power consumption, so as to obtain more accurate position information. For example, the acceleration sensor is a device with lower power consumption, and the positioning device such as the GPS is a device with higher power consumption, and the motion of the device with lower power consumption can be detected, for example, when the user state is changed from static to moving, the state change can be detected by the acceleration sensor with lower power consumption, after the acceleration reaches the level of normal walking of the user, the device with higher power consumption is awakened at intervals of a certain time length to perform position acquisition, the device with higher power consumption is dormant after the acquisition, the device with higher power consumption is awakened again at intervals of a certain time length to perform position acquisition, and the steps are repeated to reduce the power consumption.
As shown in step S3, when all activity places of the designated object are found, that is, the designated location is found, the mobile terminal obtains location information of at least one designated location of the designated object, and for the location information, the mobile terminal may obtain the location information through a wearable device or a mobile phone of the designated object in this embodiment; in other embodiments, the user may directly input the location information of the designated location on the mobile terminal. The method is mainly suitable for guardians and people under guardianship, such as users, parents or children thereof, and the like, for example, the mobile phone of the user is bound with the wearable device of the designated object, and the mobile phone of the user can acquire corresponding information through the wearable device of the designated object. The designated location is generally a place where a designated object frequently appears, such as a house, a region near the house, an entertainment place, and the like.
As described in the above step S4, the safety area is obtained according to the position information according to the preset division rule, and the position information may be positioning information, environment information, signal information, etc. of the designated position. The preset division rule is that the safety area can be divided by a place, the safety area can be divided by a signal coverage area, or the safety area can be divided by a designated building in the environment, in this embodiment, the designated positions are specifically a plurality of positions, and the position information includes positioning information corresponding to each designated position, and the step S4 includes:
step S40: and calculating the geometric center of a geometric figure formed by connecting the designated positions according to the positioning information of the designated positions, dividing a circular area by taking the geometric center as the center of a circle and the distance between the geometric center and the designated position, which is the farthest distance, as the radius, and marking the circular area as the safe area.
In this embodiment, first, the coordinates of each designated position are sequentially connected to form a geometric figure according to the positioning information of each designated position, such as longitude and latitude coordinates, so as to find the geometric center of the geometric figure, then a circle center area is divided by using the geometric center as a circle center and using the distance between the geometric center and the designated position, which is the farthest distance, as a radius, and the circle area is recorded as the safety area.
In another embodiment, the location information is environment information, the environment information includes image information or video information of an environment, such as an image of a building, and when the number of times of acquiring a certain building image within a preset time period exceeds a preset number of times, the location of the building is a safe location, a range within a specified distance of the building may be divided into safe areas, for example, a statue image of a square acquired within one month exceeds 5 times, the square is a moving place of a specified object, and an area within 500 meters from the statue image may be divided into safe areas.
In another embodiment, the safety area may be accurately updated in real time by repeating steps S1-S4 every preset period of time, for example, every other year to retrieve the location information of the designated object, and then dividing the safety area.
Referring to fig. 2, in one embodiment, after the step S4, the method includes:
step S5: acquiring current state information of the specified object;
step S6: judging whether the specified object is in the safe area or not according to the current state information;
step S7: if the specified object is not in the safe area, issuing an unsafe alarm about the specified object;
step S8: if the safety area is located, judging whether a condition for sending an alarm is met or not according to the current state information;
step S9: if the condition for sending the alarm is met, sending the alarm corresponding to the condition
As described in the above steps S5-S6, the mobile terminal of the user may send an instruction to the wearable device of the designated object to obtain its current status information, where the current status information includes positioning information, signal information, motion information, etc., for example, by using a GPS function of the wearable device, to obtain current positioning information of the designated object, for example, current coordinates of the designated object. And then judging whether the specified object is in the safe area or not according to the current state information, and when the current coordinate of the specified object does not fall within the safe area range, namely the specified object is not in the safe area, then sending an unsafe alarm about that the specified object is in the unsafe area. In another embodiment, the above steps S5-S7 can be directly implemented by a wearable device of a designated object, and the non-safety alarm is issued and simultaneously sent to the mobile terminal of the user, so that the user can know timely and avoid danger.
As described in the above steps S8-S9, when it is determined that the designated object is in the safe area, but there is still a potential danger, it can be determined whether the condition for issuing an alarm is satisfied according to the current position information, if not, no alarm is needed, if so, an alarm corresponding to the condition is issued, for example, the current position information is positioning information, when the designated object is located near the boundary of the safe area, for example, within 10 meters from the boundary, in order to prevent the designated object from moving to the unsafe area in advance, further, the distance between the current position coordinate and the boundary coordinate is calculated, and then an alarm about that the designated object is located at the boundary of the safe area can be issued, and the alarm content can include information about the distance between the designated object and the boundary, for example, "xxx", 5 meters from the boundary of the safe area.
In this embodiment, after issuing a non-safety alarm about the designated object, in order to further reduce the potential safety hazard, the method may further include, after step S9, determining whether the designated object is safe by acquiring environmental information around the designated object:
step S91: acquiring environmental sound information of the position of the specified object;
step S92: analyzing the environmental sound information to judge whether the specified object is in a safe state.
In this embodiment, when an alarm indicating that the designated object is in an unsafe area is issued, an acquiring sound instruction is issued to the wearable device of the designated object, and then the recording function is turned on to acquire the environmental sound information, and after the environmental sound information is acquired, the environmental sound information can be analyzed, specifically, the environmental sound information can be identified, for example, by using a voice recognition technology in the prior art, to determine the current environment state of the designated object, for example, first determine whether a sound is acquired to determine that the designated object is in a quiet place or a noisy place, and if a sound is acquired, determine whether the sound is the sound of the designated object, and if so, identifying the voice of the specified object to acquire the current state information of the specified object, for example, the voice of the specified object is "i am at xxx, very safe" or "save", matching the key words by identifying the fields in the voice to obtain the corresponding state, and if the identified key words are "save", judging that the specified object is in the unsafe state, so that the user can know the safe state of the specified object and take corresponding measures in time.
In another embodiment, the above steps can be directly implemented by a wearable device of a designated object, when it is determined that an alarm needs to be issued, the wearable device issues a corresponding alarm to remind the designated object, for example, "warn that you have exited a safe area," and simultaneously, information about the exit of the designated object from the safe area can be sent to a designated terminal bound to the wearable device, for example, a designated terminal of a child is bound to the wearable device of a parent, and at this time, the designated terminal of the child can receive the alarm, for example, "father has exited the safe area, you may have danger, ask for defense," and on the other hand, when the wearable device issues the alarm, the wearable device simultaneously triggers to start a recording function and issues a prompt, for example, the prompt is "please record or speak the current trip" or "meet a dangerous call," and so that the designated object can ask for help or record the trip by voice, and when the recording information is acquired, the recording information is sent to the appointed terminal, so that children can prevent potential risks of parents in advance.
In another embodiment, the image information of the surrounding environment of the current position of the designated object may be acquired through the camera, and the image is identified through the image identification technology to analyze the state of the designated object, for example, to identify that the surrounding environment in the image is a remote and open wilderness environment, and if further identifying that a stranger appears in the image, it is obvious that the designated object is in an unsafe state, at this time, the user may take countermeasures in time through the information.
Referring to fig. 3, in an embodiment, the preset division rule may be divided by WiFi signal coverage, specifically, the location information includes target WiFi signal information of a plurality of target WiFi accounts at a specified location, and the step S4 includes:
step S41: determining the coverage range of each target WiFi signal according to each target WiFi signal information;
step S42: and recording the area obtained by adding the coverage areas of the target WiFi signals as the safe area.
In this embodiment, the target WiFi signal may be searched and obtained through a WiFi module of a terminal device of a designated object, a WiFi signal coverage range is a range that can receive a WiFi signal, different WiFi signal transmitters (such as routers) are required to be known, WiFi signal coverage ranges corresponding to the WiFi signal transmitters are different, a same position may be covered with WiFi signals of a plurality of WiFi accounts, and WiFi accounts are fixed, a router corresponding to the WiFi account is usually fixed at a certain position, when the WiFi signal of the WiFi account covers the designated position, that is, the WiFi signal basically always covers the designated position, so that a safety region is divided by the coverage range of the WiFi signal, specifically, the coverage range of the target WiFi signal is determined according to the target WiFi signal information, the target WiFi signal information includes information of the target WiFi account, signal strength, signal range and the like, first, the number of the target WiFi signal covering the designated position is determined through the target WiFi signal information, and a target WiFi account name and a signal range corresponding to the target WiFi account name and the signal range, and adding the signal coverage ranges of each target WiFi to obtain the secure area, that is, the secure area may search for the at least one target WiFi signal, where for example, the WiFi signal range of the account a is 50 meters, the router a corresponding to the account a is 30 meters away from the specified position, the WiFi signal range of the account B is 50 meters, the router B corresponding to the account B is 20 meters away from the specified position, and both the two cover the specified position, and the secure area is an area within the WiFi signal coverage range of the account a plus an area within the WiFi signal coverage range of the account B.
Further, the step S8 includes:
step S81: judging whether a WiFi signal is searched at the current position of the specified object;
step S82: if the WiFi signals are searched, acquiring WiFi account numbers corresponding to the WiFi signals;
step S83: when the WiFi account number is detected to be contained in the designated account number set and is larger than the preset number, the designated object is judged to be in the safe area; wherein the designated account set includes each of the target WiFi accounts.
As described in step S81, since the rule for dividing the safety area may be based on the coverage area division of the WiFi signal, when determining whether the designated object is in the safety area, the designated object is determined by whether the corresponding WiFi signal is retrieved. Specifically, it is first determined whether the WiFi signal can be retrieved from the current position of the designated object, and if the WiFi signal cannot be retrieved, the current position of the designated object can be determined by obtaining the positioning information, and accordingly, the security area is the area divided in step S40, and then it is determined whether the designated object is in the security area according to the positioning information.
As described in the foregoing steps S82-S83, if a WiFi signal is searched, an account corresponding to the WiFi signal is acquired, for example, 5 WiFi signals are searched, accounts corresponding to the 5 WiFi signals are acquired, and then it is detected whether there are target WiFi accounts in a designated account set in the WiFi accounts corresponding to the searched WiFi signal, where the designated account set is a set of all target WiFi accounts that can be searched in a secure area, that is, a set of WiFi accounts corresponding to all WiFi signals used to determine the secure area when the foregoing steps S41-S42 are executed. If no target WiFi account exists in the WiFi accounts corresponding to the currently searched WiFi signals, the designated object is judged not to be in a safe area, if the searched WiFi accounts have the target WiFi accounts and the number of the target WiFi accounts in the searched WiFi accounts is larger than a preset number, the designated object can be judged to be in the safe area, for example, 3 target accounts are arranged in the 5 searched WiFi accounts, and the preset number is 2, namely when the 5 searched WiFi accounts have more than two target WiFi accounts, namely the detected 5 WiFi accounts are contained in a designated account set and the number of the detected 5 WiFi accounts is larger than the preset number, the designated object can be judged to be in the safe area.
In one embodiment, the step S8 includes:
step S81: judging whether the specified object moves or not according to the movement information;
step S82: if the designated object is moving, judging whether the position of the designated object deviates from the geometric center according to the motion track;
step S83: and if the geometric center is deviated, judging that the condition for giving an alarm is met.
As described in the above steps S81-S83, the current state information further includes a motion trajectory of the designated object and movement information, the movement information may be obtained by a wearable device of the designated object, the movement information includes displacement information of the designated object and speed information, when the displacement of the designated object in a unit time is not zero, the speed is not zero, indicating that the designated object is moving, and then it may be determined whether the position of the designated object is deviated from a geometric center of the safety area according to the motion trajectory, and when the position of the designated object is deviated from the geometric center, it is determined that the condition for issuing an alarm is satisfied. Further, in order to make the alarm more accurate, whether the designated object is moving in an accelerated manner or not can be calculated by using the displacement information and the displacement information in unit time, if the designated object is moving in an accelerated manner, in order to prevent the designated object from leaving the safety zone in time, whether the position of the designated object is deviated from the geometric center or not can be judged according to the motion track, when the position of the designated object is deviated from the geometric center and the extension direction of the motion track is towards the boundary of the safety zone, the designated object is moving in an accelerated manner, so that the designated object is likely to be rapidly away from the safety zone, an alarm can be given in advance, in the embodiment, when the designated object is judged to be accelerating and the position of the designated object is deviated from the geometric center, the condition for giving the alarm is judged to be satisfied, an alarm instruction is triggered, and an alarm, if the alarm is "xx is moving in acceleration, namely, the original safety area is noticed", and the like.
In another embodiment, the step S8 includes:
step S81': judging whether the specified object moves or not according to the movement information;
step S82': if the designated object is moving, judging whether the designated object moves towards the boundary of the safe area or not according to the motion track;
step S83': if the designated object moves towards the boundary of the safety area, calculating a first duration according to the movement information and the distance between the current position of the designated object and the boundary of the safety area;
step S84': judging whether the first time length is smaller than a preset threshold value or not;
step S85': and if the first time length is less than a preset threshold value, judging that the condition of sending an alarm is met.
In this embodiment, the current state information includes movement information of the designated object and motion trajectory information, whether the designated object is moving is determined according to the movement information, the movement information includes displacement information of the designated object per unit time, that is, speed information of the designated object, when the designated object is displaced per unit time, it is determined that the designated object is moving, then it is determined whether the designated object is moving towards the boundary of the safety area according to the motion trajectory, when it is determined that the designated object is moving towards the boundary of the safety area, that is, it is determined that the designated object has a tendency to leave the safety area, it is further determined whether a condition for issuing an alarm is satisfied by a distance between the designated object and the boundary, that is, by the movement information, that is, speed information of the designated object, and a boundary distance between the current position of the designated object and the safety area towards the, calculating to obtain a first time length, wherein the first time length is a time length when the designated object is about to leave the safety area, and then comparing the first time length with a preset threshold value, wherein the preset threshold value can be set for 5 minutes, 10 minutes and the like, and is not limited here, and a user can set the time for taking measures according to actual needs. And when the first time length is smaller than a preset threshold value, the alarm condition is met, and an alarm corresponding to the condition can be sent out.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the method according to any one of the above.
An embodiment of the present invention further provides a terminal, as shown in fig. 4, for convenience of description, only a part related to the embodiment of the present invention is shown, and details of the specific technology are not disclosed, please refer to the method part of the embodiment of the present invention. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a watch, a bracelet, etc., taking the terminal as the mobile phone as an example:
fig. 4 is a block diagram illustrating a partial structure of a mobile phone related to a terminal provided in an embodiment of the present invention. Referring to fig. 4, the handset includes: radio Frequency (RF) circuit 110, memory 120, input unit 130, display unit 140, sensor 150, audio circuit 160, wireless-fidelity (Wi-Fi) module 170, processor 180, and power supply 190. Those skilled in the art will appreciate that the handset configuration shown in fig. 4 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 4:
the RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 180; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 110 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 110 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 120 may be used to store software programs and modules, and the processor 180 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 130 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 130 may include a touch panel 131 and other input devices 132. The touch panel 131, also referred to as a touch screen, may collect touch operations of a user on or near the touch panel 131 (e.g., operations of the user on or near the touch panel 131 using any suitable object or accessory such as a finger or a stylus pen), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 131 may include two parts, i.e., a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 180, and can receive and execute commands sent by the processor 180. In addition, the touch panel 131 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 130 may include other input devices 132 in addition to the touch panel 131. In particular, other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 140 may be used to display information input by a user or information provided to the user and various menus of the mobile phone. The Display unit 140 may include a Display panel 141, and optionally, the Display panel 141 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 131 can cover the display panel 141, and when the touch panel 131 detects a touch operation on or near the touch panel 131, the touch operation is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 provides a corresponding visual output on the display panel 141 according to the type of the touch event. Although in fig. 4, the touch panel 131 and the display panel 141 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 131 and the display panel 141 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 150, such as a displacement sensor, a temperature sensor, a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 141 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 141 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between the user and the handset. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electric signal, which is received by the audio circuit 160 and converted into audio data, and then the audio data is processed by the audio data output processor 180, and then the audio data is transmitted to the cellular phone through the RF circuit 110, or the audio data is output to the memory 120 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 170, and provides wireless broadband Internet access for the user. Although fig. 4 shows the WiFi module 170, it is understood that it does not belong to the essential constitution of the handset, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 180 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 120 and calling data stored in the memory 120, thereby integrally monitoring the mobile phone. Alternatively, processor 180 may include one or more processing units; preferably, the processor 180 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 180.
The handset also includes a power supply 190 (e.g., a battery) for powering the various components, and preferably, the power supply may be logically connected to the processor 180 via a power management system, such that functions such as managing charging, discharging, and power consumption are performed via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
Referring to fig. 4, in the embodiment of the present invention, the processor 180 included in the terminal further has the following functions:
in a preset time period, detecting the stay time and stay times of a specified object at any position;
when the fact that the stay time of the specified object at a position is larger than the preset time and the stay times are larger than the preset times is detected, recording the position as the specified position;
acquiring position information of at least one designated position;
and obtaining a safety region according to the position information and a preset division rule.
The memory 120 is used for storing a program that supports the processor 180 to execute the safe area dividing method of the electronic fence according to the above embodiment;
the processor 180 is configured to execute programs stored in the memory 120.
In summary, the method, the terminal and the storage medium for dividing the security area of the electronic fence provided in the embodiments of the present invention include: in a preset time period, detecting the stay time and stay times of a specified object at any position; when the fact that the stay time of the specified object at a position is larger than the preset time and the stay times are larger than the preset times is detected, recording the position as the specified position; acquiring position information of at least one designated position; and obtaining a safety region according to the position information and a preset division rule.
Those skilled in the art will appreciate that the present invention includes apparatus directed to performing one or more of the operations described in the present application. These devices may be specially designed and manufactured for the required purposes, or they may comprise known devices in general-purpose computers. These devices have stored therein computer programs that are selectively activated or reconfigured. Such a computer program may be stored in a device (e.g., computer) readable medium, including, but not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magnetic-optical disks, ROMs (Read-Only memories), RAMs (Random Access memories), EPROMs (Erasable Programmable Read-Only memories), EEPROMs (Electrically Erasable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a bus. That is, a readable medium includes any medium that stores or transmits information in a form readable by a device (e.g., a computer).
It will be understood by those within the art that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. Those skilled in the art will appreciate that the computer program instructions may be implemented by a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, implement the features specified in the block or blocks of the block diagrams and/or flowchart illustrations of the present disclosure.
Those of skill in the art will appreciate that various operations, methods, steps in the processes, acts, or solutions discussed in the present application may be alternated, modified, combined, or deleted. Further, various operations, methods, steps in the flows, which have been discussed in the present application, may be interchanged, modified, rearranged, decomposed, combined, or eliminated. Further, steps, measures, schemes in the various operations, methods, procedures disclosed in the prior art and the present invention can also be alternated, changed, rearranged, decomposed, combined, or deleted.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. A method for dividing a secure area is characterized by comprising the following steps:
in a preset time period, detecting the stay time and stay times of a specified object at any position;
when the fact that the stay time of the specified object at a position is larger than the preset time and the stay times are larger than the preset times is detected, recording the position as the specified position;
acquiring position information of at least one designated position;
obtaining a safety region according to each position information and a preset division rule;
the position information comprises target WiFi signal information of a plurality of target WiFi accounts at the specified position, and the step of obtaining the safety zone according to the position information and preset division rules comprises the following steps:
determining the coverage range of each target WiFi signal according to each target WiFi signal information;
and recording the area obtained by adding the coverage range of each target WiFi signal as the safe area.
2. The method for dividing the safety area according to claim 1, wherein the step of obtaining the safety area according to the position information and the preset dividing rule is followed by:
acquiring current state information of the specified object;
judging whether the specified object is in the safe area or not according to the current state information;
if the specified object is not in the safe area, issuing an unsafe alarm about the specified object;
if the safety area is located, judging whether a condition for sending an alarm is met or not according to the current state information;
and if the condition for sending the alarm is met, sending the alarm corresponding to the condition.
3. The method of dividing a safety area according to claim 2, wherein the step of issuing an insecure alarm about the specified object is followed by:
acquiring environmental sound information of the position of the specified object;
analyzing the environmental sound information to judge whether the specified object is in a safe state.
4. The method for dividing the safety area according to claim 2, wherein the current status information includes WiFi signal information, and the step of determining whether the designated object is in the safety area according to the current status information includes:
judging whether a WiFi signal is searched at the current position of the specified object;
if the WiFi signals are searched, acquiring WiFi account numbers corresponding to the WiFi signals;
when the WiFi account number is detected to be contained in the designated account number set and is larger than the preset number, the designated object is judged to be in the safe area; wherein the designated account set includes each of the target WiFi accounts.
5. The method for dividing the safety area according to claim 2, wherein the designated position is plural, the position information includes positioning information, and the step of obtaining the safety area according to the position information and the preset dividing rule includes:
and calculating the geometric center of a geometric figure formed by connecting the designated positions according to the positioning information of the designated positions, dividing a circular area by taking the geometric center as the center of a circle and the distance between the geometric center and the designated position, which is the farthest distance, as the radius, and marking the circular area as the safe area.
6. The method for dividing a safety area according to claim 5, wherein the current state information includes a motion trajectory and movement information of the designated object, and the step of determining whether a condition for issuing an alarm is satisfied according to the current state information includes:
judging whether the specified object moves or not according to the movement information;
if the designated object is moving, judging whether the position of the designated object deviates from the geometric center according to the motion track;
and if the geometric center is deviated, judging that the condition for giving an alarm is met.
7. The method for dividing a safety area according to claim 2, wherein the current state information includes a motion trajectory and movement information of the designated object, and the step of determining whether a condition for issuing an alarm is satisfied according to the current state information includes:
judging whether the specified object moves or not according to the movement information;
if the designated object is moving, judging whether the designated object moves towards the boundary of the safe area or not according to the motion track;
if the specified object moves towards the boundary of the safe area, calculating a first duration according to the movement information and the distance between the current position of the specified object and the boundary of the safe area towards which the specified object moves;
judging whether the first time length is smaller than a preset threshold value or not;
and if the first time length is less than a preset threshold value, judging that the condition of sending an alarm is met.
8. A terminal comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method according to any of claims 1 to 7.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201910894964.8A 2019-09-20 2019-09-20 Method for dividing safety area, terminal and storage medium Active CN110572776B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910894964.8A CN110572776B (en) 2019-09-20 2019-09-20 Method for dividing safety area, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910894964.8A CN110572776B (en) 2019-09-20 2019-09-20 Method for dividing safety area, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110572776A CN110572776A (en) 2019-12-13
CN110572776B true CN110572776B (en) 2021-07-16

Family

ID=68781572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910894964.8A Active CN110572776B (en) 2019-09-20 2019-09-20 Method for dividing safety area, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110572776B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111578960B (en) * 2020-04-17 2022-07-05 汉海信息技术(上海)有限公司 Navigation method and device and electronic equipment
CN111899384B (en) * 2020-07-31 2022-11-15 平安国际融资租赁有限公司 Remote vehicle locking method and device, computer equipment and storage medium
CN112068079A (en) * 2020-08-28 2020-12-11 森思泰克河北科技有限公司 Defense area dividing method and device for security radar, terminal and storage medium
CN112188406B (en) * 2020-09-29 2023-03-14 深圳市沃特沃德股份有限公司 Position reporting method, device and storage medium
CN113076564B (en) * 2021-04-13 2022-10-14 山东北斗云信息技术有限公司 Hard disk protection method, device and equipment based on Beidou positioning and storage medium
CN113038388B (en) * 2021-05-27 2021-09-14 展讯通信(上海)有限公司 User state monitoring method, device and system and computer readable storage medium
CN115512516B (en) * 2021-06-22 2023-11-17 北京熵行科技有限公司 Fall monitoring method, and corresponding electronic equipment and device
CN113923667B (en) * 2021-09-30 2024-07-02 北京字节跳动网络技术有限公司 Control method, device, equipment and medium of terminal equipment
CN114429701B (en) * 2021-12-16 2023-07-18 珠海格力电器股份有限公司 Anti-lost method and device, storage medium and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9451409B2 (en) * 2012-06-27 2016-09-20 Ntt Docomo, Inc. Information processing device, information providing method, and program
CN106664679B (en) * 2015-04-20 2019-11-29 华为技术有限公司 A kind of mobile terminal locating method, device, equipment and server
CN107529135A (en) * 2016-06-20 2017-12-29 同济大学 User Activity type identification method based on smart machine data
CN107230322B (en) * 2017-07-26 2019-04-26 中国地质大学(武汉) For determining whether moving object leaves the monitoring method of safety zone
CN109299408B (en) * 2018-10-24 2020-12-01 斑马网络技术有限公司 Information pushing method and device, vehicle, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN110572776A (en) 2019-12-13

Similar Documents

Publication Publication Date Title
CN110572776B (en) Method for dividing safety area, terminal and storage medium
CN108834068B (en) Positioning method based on wearable device and wearable device
CN111316673B (en) Electronic fence updating method and communication device
CN106331370B (en) A kind of data transmission method and terminal device
CN107592615B (en) Positioning method and device
CN106447836A (en) Access control terminal binding method and related equipment
CN109246291B (en) Mobile terminal and sleep reminding method and device
US20170097816A1 (en) Context-based applications for mobile devices
CN106778591B (en) Alarm method and device and mobile terminal
CN106445596B (en) Method and device for managing setting items
CN106991034A (en) A kind of method and apparatus and mobile terminal for monitoring interim card
CN106507482A (en) A kind of network locating method and terminal device
CN107908939B (en) Terminal alarm method and device and mobile terminal
CN107317918B (en) Parameter setting method and related product
CN106408869B (en) Terminal and method and device for detecting human body falling
CN105933209B (en) Position sharing method and device
CN112128925B (en) Method for intelligently remotely controlling air conditioner, intelligent terminal and storage medium
CN106844135B (en) Temperature monitoring method and device of mobile terminal and mobile terminal
CN109141355B (en) Relative height measuring method based on multiple sensors and wearable equipment
CN109068000B (en) Sensor control method, mobile terminal, and computer-readable storage medium
CN109167752B (en) Mobile terminal and method and device for automatically logging in application platform
CN112114879A (en) Terminal wake-up method, terminal and storage medium
CN106603650B (en) Method for sharing position information and terminal equipment
CN106850942B (en) Temperature monitoring method and device of mobile terminal and mobile terminal
CN106066953B (en) Fingerprint unlocking control method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210122

Address after: 518000 Building 405A, 01B, Zone E, Zhiheng Industrial Park, Nantou Street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: SHENZHEN ZHIYING TECHNOLOGY Co.,Ltd.

Address before: 518000 1-10 Floor, Building A2, Nanshan Zhiyuan, 1001 Xueyuan Avenue, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: QIKU INTERNET TECHNOLOGY (SHENZHEN) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant