Invisible alarming method

A stealth, alarm mode technology, applied in the direction of alarm, TV, telephone communication, etc., can solve the problems that the police are not easy to track the target, the target is not easy to track, the alarm is not clear, etc.

Inactive Publication Date: 2019-02-26
蒋进松
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As public security management, fire protection and other fields have higher and higher requirements for the efficiency and accuracy of police dispatching, the traditional way of receiving and handling police can no longer meet the existing requirements, and it is urgent to use information technology to solve this problem
In real life, when being robbed or held hostage, it is difficult for the victim to report to the police, and there are also shortcomings such as unclear alarm and difficult for the police to track the target. place, resulting in a great waste of police and material resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] The present invention designs an invisible alarm method, which can integrate the location information into the alarm command, so that the alarm personnel can judge their exact geographical location, what state they are in, and whether there is a preliminary state of the person being held hostage, etc. according to the received information. Judgment, so as to provide a reference for the police officers to reasonably arrange the police force, especially the following setting method: including the following steps:

[0042] 1) In the one-key alarm mode, the application sends out an alarm command;

[0043] 2) The application side integrates the location information into the alarm command at the same time;

[0044] 3) The alarm command containing location information is received by the alarm receiver;

[0045] 4) The police officer at the alarm receiver performs police processing according to the information displayed in the received alarm command.

[0046] When using this ...

Embodiment 2

[0048] This embodiment is further optimized on the basis of the above-mentioned embodiments. In order to better realize the present invention, the following setting method is adopted in particular: the specific steps of the step 1) are:

[0049] 1.1) The user triggers any key or a single key on the application side; for example, there are number keys, letter keys, etc. on the mobile phone, and one of the keys is set as a single key (triggering the key will trigger an alarm);

[0050] 1.2) After receiving the information, the internal processing system of the application triggers the alarm system to form an alarm command; that is, the internal processing system of the application receives the instruction information of any key or a single key as an alarm signal, and then further triggers the alarm signal set by the application. Alarm system to alarm;

[0051] 1.3) The internal processing system of the application triggers the positioning system synchronously; in order to form pos...

Embodiment 3

[0053] This embodiment is further optimized on the basis of any of the above-mentioned embodiments. In order to better realize the present invention, the following setting method is adopted in particular: the one-key alarm mode includes:

[0054] A) Any key on the application end is triggered for 2 to 5 consecutive times to form an alarm command; any key on the application end can be set to be touched twice or 3 times or 4 times or 5 times in a row (more than twice the usual pressure, so that it can Overcome the shortcomings of false alarms), and then the hardware or software in the application can judge its existing alarms and form corresponding alarm instructions (the alarm instructions can also form multiple text messages, which can include their address, Relevant data and other information), so that the police officer can quickly judge the state of the alarm according to the received alarm command.

[0055] B) An alarm command is formed after a single key is triggered on t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an invisible alarming method, in which location information can be aggregated into an alarm instruction to enable alarm receiving staff to make judgment of initial states aboutwhere the accurate geographic position is, what the state is, whether there are people that are kidnapped, etc, so reference is provided for the alarm receiving worker staff to make reasonable arrangement. The method comprises the following steps: 1) an application terminal sends out an alarm command under a one-key alarm mode; 2) the application end simultaneously integrates the position information into an alarm instruction; 3) the alarm instruction containing the position information is received by an alarm receiver; 4) an police officer at the alarm receiver performs policing processing according to the information displayed by the received alarm instruction.

Description

technical field [0001] The invention relates to the fields of power operation and maintenance management technology and the like, and specifically relates to an invisible alarm method. Background technique [0002] As public security management, fire protection and other fields have higher and higher requirements for the efficiency and accuracy of police dispatching, the traditional way of receiving and handling police can no longer meet the existing requirements, and it is urgent to use information technology to solve this problem. In real life, when being robbed or held hostage, it is difficult for the victim to report to the police, and there are also shortcomings such as unclear alarm and difficult for the police to track the target. place, resulting in a great waste of police and material resources. Contents of the invention [0003] The purpose of the present invention is to provide an invisible alarm method, which can integrate the location information into the ala...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08B21/02G08B25/00H04N7/18H04M1/725
CPCG08B21/02G08B25/00H04N7/181H04M1/72403
Inventor 蒋进松
Owner 蒋进松
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products