Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A triggering method and device for a security flow

A security and process technology, applied in the Internet field, can solve problems such as the inability to guarantee the personal safety of users, and the inability to guarantee the immediate triggering of the security process, so as to achieve the effect of ensuring personal safety.

Inactive Publication Date: 2019-06-25
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of this specification provides a method and device for triggering a security process, which is used to solve the problems that the existing technology cannot guarantee the immediate triggering of the security process and the personal safety of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A triggering method and device for a security flow
  • A triggering method and device for a security flow
  • A triggering method and device for a security flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solution and advantages of this specification clearer, the technical solution of this application will be clearly and completely described below in conjunction with specific embodiments of this specification and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the description, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present application.

[0051] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0052] figure 1 The triggering process of the first security process provided by the embodiment of this specification may specifically include the following steps:

[0053] S100: The server ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a triggering method and device for a security flow. When the distribution of orders is completed, aiming at each user related to the order, a security flow triggering conditioncorresponding to the user is sent to a terminal where other users related to the order are located, the terminal where other users are located monitors whether the security process is triggered or not according to the received security process triggering condition, therefore, even if the terminal of the victim user or the victim user is controlled by a violent party, the terminal of the violent party can still immediately trigger the starting of the security process according to the security process triggering condition corresponding to the victim user, so that the personal safety of the usercan be effectively ensured.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a method and device for triggering a security process. Background technique [0002] With the development of Internet technology, applications dedicated to providing users with life services, such as online car-hailing applications and food delivery applications, emerge in an endless stream. While these applications bring convenience to users' lives, they also bring dangers to users' personal safety. Hidden danger. [0003] Take online car-hailing as an example. In the actual application scenario of online car-hailing, drivers and passengers spend a long time together in a relatively closed environment, and various uncertain factors are superimposed on each other, resulting in high safety risks. Serious safety scenarios such as traffic accidents, illegal activities (beating, insulting, molesting, robbery), loss of contact, drivers resisting law enforcement, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06Q50/26G06Q50/30G06Q30/06
CPCG06Q10/103G06Q50/265G06Q30/0635G06Q50/40
Inventor 苟艺范莉莉
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products