Invisible alarming method
A stealth, alarm mode technology, applied in the direction of alarm, TV, telephone communication, etc., can solve the problems that the police are not easy to track the target, the target is not easy to track, the alarm is not clear, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0041] The present invention designs an invisible alarm method, which can integrate the location information into the alarm command, so that the alarm personnel can judge their exact geographical location, what state they are in, and whether there is a preliminary state of the person being held hostage, etc. according to the received information. Judgment, so as to provide a reference for the police officers to reasonably arrange the police force, especially the following setting method: including the following steps:
[0042] 1) In the one-key alarm mode, the application sends out an alarm command;
[0043] 2) The application side integrates the location information into the alarm command at the same time;
[0044] 3) The alarm command containing location information is received by the alarm receiver;
[0045] 4) The police officer at the alarm receiver performs police processing according to the information displayed in the received alarm command.
[0046] When using this ...
Embodiment 2
[0048] This embodiment is further optimized on the basis of the above-mentioned embodiments. In order to better realize the present invention, the following setting method is adopted in particular: the specific steps of the step 1) are:
[0049] 1.1) The user triggers any key or a single key on the application side; for example, there are number keys, letter keys, etc. on the mobile phone, and one of the keys is set as a single key (triggering the key will trigger an alarm);
[0050] 1.2) After receiving the information, the internal processing system of the application triggers the alarm system to form an alarm command; that is, the internal processing system of the application receives the instruction information of any key or a single key as an alarm signal, and then further triggers the alarm signal set by the application. Alarm system to alarm;
[0051] 1.3) The internal processing system of the application triggers the positioning system synchronously; in order to form pos...
Embodiment 3
[0053] This embodiment is further optimized on the basis of any of the above-mentioned embodiments. In order to better realize the present invention, the following setting method is adopted in particular: the one-key alarm mode includes:
[0054] A) Any key on the application end is triggered for 2 to 5 consecutive times to form an alarm command; any key on the application end can be set to be touched twice or 3 times or 4 times or 5 times in a row (more than twice the usual pressure, so that it can Overcome the shortcomings of false alarms), and then the hardware or software in the application can judge its existing alarms and form corresponding alarm instructions (the alarm instructions can also form multiple text messages, which can include their address, Relevant data and other information), so that the police officer can quickly judge the state of the alarm according to the received alarm command.
[0055] B) An alarm command is formed after a single key is triggered on t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com