Disclosure of Invention
The application provides a target object information management method, a target object information management device, electronic equipment and a storage medium, which have the effect of improving information management efficiency in a case investigation process.
In a first aspect of the present application, there is provided a target object information management method, including:
receiving a query request aiming at an escaping person, wherein the query request carries an identity mark of the escaping person;
determining the topics of the topic nodes of the mind map and the topics of the N-level nodes according to the query request;
Based on the identity and the subject node, matching the entity document of the escaping person to acquire first entity information of the escaping person;
determining first node content of a first dimension N+1 level node according to the first entity information;
and determining second node content of the second dimension N+1 level node based on the first entity information and candidate entity information of an entity information database, wherein the candidate entity information comprises candidate service identification number information.
By adopting the technical scheme, the device determines the subjects of the subject nodes of the mind map and the subjects of the N-level nodes according to the query request of the evasion person, which is equivalent to assisting the user to acquire the detection thought aiming at the evasion person through the mind map. Meanwhile, the device rapidly matches the entity document of the evasion person according to the query request and the subject node, and automatically acquires the candidate entity information, so that manual query of a user is not needed, and the processing time is reduced. The automatic information processing mode adopted by the application improves the accuracy and efficiency of information processing, and achieves the effect of improving the information management efficiency in the case investigation process.
Optionally, the determining the first node content of the n+1 level node in the first dimension specifically includes:
according to the identity, determining a basic information theme of the theme node in the first dimension;
Determining the theme of the first-dimension N-level node according to the basic information theme;
according to the subject of the first dimension N level node, matching the entity information of an entity information database to obtain the first entity information;
And determining the first node content based on the analysis result of the first entity information.
By adopting the technical scheme, the device acquires the theme of the N-level node in the first dimension, namely the theme of the information aiming at the escaping personnel, which the user needs to know. And the device matches the entity information of the entity information database according to the theme to acquire the first entity information related to the evasion staff. And finally, determining the content of the first node based on the analysis result of the first entity information, namely determining the mind map and the related information of the evasion staff.
Optionally, the determining the second node content of the n+1 level node of the second dimension specifically includes:
determining a detection clue theme of the theme node of the second dimension according to the identity;
Acquiring the theme of the N-level node of the second dimension according to the investigation clue theme;
acquiring at least one candidate entity information of the entity information database according to the subject of the N-level node of the second dimension, wherein the candidate entity information also comprises candidate vehicle information, candidate personnel information and candidate relational information;
comparing the first entity information with at least one piece of candidate entity information, and judging whether information related to the first entity information exists in the at least one piece of candidate entity information;
and if the information related to the first entity information exists in the at least one piece of candidate entity information, determining the candidate entity information with the related information as the second node content.
By adopting the technical scheme, the device firstly acquires the subjects of the N-level nodes in the second dimension, including the direction which is required to be detected for the user of the evasion person. The device acquires at least one candidate entity information of the entity information database according to the theme, can help a user to quickly acquire related information in multiple aspects of evasion staff, including case related staff, vehicles, relations and the like, and improves the range of the acquired information.
Optionally, after comparing the first entity information with the plurality of candidate entity information, determining whether information associated with the first entity information exists in the at least one candidate entity information, the method further includes:
and if the information related to the first entity information does not exist in the at least one candidate entity information, determining the second dimension N+1 level node as a prompt node.
By adopting the technical scheme, after suspicious information aiming at a certain direction is acquired, but information related to the escaping person is not acquired, the device prompts the user to detect according to the direction through the prompt node.
Optionally, after acquiring the subject of the N-level node in the second dimension according to the identity, the method further includes:
And setting the N+1 level node of the second dimension as a blank node if the candidate entity information of the entity information database is not acquired according to the subject of the N level node of the second dimension.
By adopting the technical scheme, if the device does not acquire the candidate entity information of the entity information database based on the subject of the N-level node in the second dimension, and the fact that the related case related information does not exist for the direction is indicated, the corresponding node is set as a blank node, so that a user can select information which does not need to detect the directions, and the detection time is saved.
Optionally, the topics of the topic node include a basic information topic and a forensic cue topic.
By adopting the technical scheme, the device divides the topics of the topic nodes into basic information topics and investigation clue topics, so that the thinking guide graph is clearer, and a user can conveniently and quickly locate the information nodes to be checked.
Optionally, the determining, according to the first entity information, the first node content of the n+1 level node in the first dimension specifically further includes:
Acquiring mining analysis results of the first entity information, wherein the mining analysis results comprise user portraits and checking results;
and determining the mining analysis result as the first node content.
By adopting the technical scheme, the image of the escaping person and the checking result are used as the first node content, so that the comprehensive analysis and understanding of the escaping person by the user are facilitated. By prompting the information in the mind map, a user can more quickly and comprehensively know the related information of the case, analyze and compare the information, and further improve the investigation efficiency and accuracy.
In a second aspect of the present application, there is provided a target object information management apparatus including a receiving module and a processing module, wherein:
The receiving module is used for receiving a query request aiming at the escaping personnel, wherein the query request carries the identity of the escaping personnel;
The processing module is used for determining the theme of the theme node of the mind map and the theme of the N-level node according to the query request;
Based on the identity and the subject node, matching the entity document of the escaping person to acquire first entity information of the escaping person;
determining first node content of a first dimension N+1 level node according to the first entity information;
and determining second node content of the second dimension N+1 level node based on the first entity information and candidate entity information of an entity information database, wherein the candidate entity information comprises candidate service identification number information.
In a third aspect the application provides an electronic device comprising a processor, a memory for storing instructions, a user interface and a network interface, both for communicating to other devices, the processor being for executing the instructions stored in the memory to cause the electronic device to perform a method as claimed in any one of the preceding claims.
In a fourth aspect of the application there is provided a computer readable storage medium storing instructions which, when executed, perform the method steps of any of the preceding claims.
In summary, one or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
The device determines the theme of the theme node of the mind map and the theme of the N-level node according to the inquiry request of the evasion person, which is equivalent to displaying the thought aiming at the evasion person through the mind map. The apparatus determines first node content, i.e. basic information related to the evasion person, based on the first entity information and determines second node content, i.e. other cue information associated with the evasion person, based on the first entity information and the candidate entity information. The automatic information processing mode adopted by the application improves the accuracy and efficiency of information processing, and achieves the effect of improving the information management efficiency in the case investigation process.
Detailed Description
In order that those skilled in the art will better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments.
In describing embodiments of the present application, words such as "for example" or "for example" are used to mean serving as examples, illustrations, or descriptions. Any embodiment or design described herein as "such as" or "for example" in embodiments of the application should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "or" for example "is intended to present related concepts in a concrete fashion.
In the description of embodiments of the application, the term "plurality" means two or more. For example, a plurality of systems means two or more systems, and a plurality of screen terminals means two or more screen terminals. Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating an indicated technical feature. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
Before describing embodiments of the present application, some terms involved in the embodiments of the present application will be first defined and described.
In order to facilitate management of information with different sources, the application discloses an entity document, which converts information of different types of entities into information of uniform entity document types for management, all the entity documents are stored in an entity information database, and all the entity documents are updated in real time. The entity can be a person or an article, can be a case of a public security system, and can also be a virtual account number such as a bank card number. The information contained in the entity document is generally called entity information, and the entity information mainly comprises three parts of information, namely basic information, behavior information and relation information.
Referring to fig. 1, each person corresponds to an entity document, and basic information in the entity document includes information such as a name, an identification card number, deposit, etc. of an object corresponding to the entity document. The behavior information comprises a recorded journey of an object corresponding to the entity document, and specifically comprises information such as riding time, riding number of vehicles, departure place, entity ID corresponding to the behavior and the like. The relationship information comprises related persons of the object corresponding to the entity document, which can be classmates, parents and neighbors. The relationship information also includes entity information for the associated persons.
Referring to fig. 2, each service identification number corresponds to an entity document, and the service identification numbers include, but are not limited to, a bank card number, an identification card number, and a mobile phone number. The basic information in the entity document comprises the specific card number of the bank card number, the person to whom the card number belongs, the bank to which the card number belongs and the like. The relationship information includes entity information of a person to whom the service identification number belongs. The behavior information comprises recorded transactions or balance inquiry operations performed on the bank card number.
Each computer corresponds to an entity document, and the basic information in the entity document comprises the information such as the MAC address, the IP address, the affiliated personnel and the like of the computer corresponding to the entity document. The behavior information comprises recorded operations processed by the computer, wherein the operations can be starting up, downloading software and browsing web pages. The relationship information includes entity information of persons to whom the computer belongs.
In case investigation, users (policemen) still rely primarily on their personal experience and skills to analyze various information related to the case. In the case investigation process, the conventional investigation system records information related to the case, but various information sources are independent, such as information called from other systems, and information provided by witness, and a large amount of verification work is required for the information. And the lack of correlation between various information results in incomplete information collection and difficult analysis. Therefore, a method is needed to improve the information management efficiency during case investigation.
The embodiment discloses a target object information management method applied to a server or a device, and for convenience of description, the device is used as an execution subject. Referring to fig. 1, the method comprises the steps of:
S110, receiving a query request aiming at the escaping person, wherein the query request carries the identity of the escaping person.
Specifically, a user (a police) inputs a query request carrying an identity mark of an escaping person on the device through a text input mode or a voice input mode, wherein the identity mark is an identity mark capable of uniquely identifying the escaping person, such as an identity card number. The device may be an electronic device such as a mobile phone, a tablet computer, a wearable device, a PC (Personal Computer, a personal computer), or a background server running an application program of a target object information management method.
S120, determining the theme of the theme node of the mind map and the theme of the N-level node according to the query request.
In one possible implementation, the topics of the topic nodes include a base information topic and a forensic cue topic.
Specifically, after receiving a query request carrying an identity, the device determines whether an input target object is an evasion person according to the identity of the query request, and if the target object is the evasion person, determines that the subject of the subject node comprises a basic information subject and a investigation clue subject. The basic information theme indicates that the subsequent node content is key information of the evasion person, and the investigation clue theme indicates that the subsequent node content is related clues of the evasion person. The N-level nodes are sub-topic nodes except topic nodes, and the topics of the N-level nodes comprise prompt information topics of contents of lower-level nodes. The N+1 level node is based on the N level node, and a new subtopic node or a subtopic node is added, so that the content of the N level node can be better developed and explained. Thus, any one node is an n+1 level node with respect to the previous level node, and any one node is an N level node with respect to the next level node, except the root node.
S130, based on the identity and the subject node, matching the entity document of the evasion person, and acquiring the first entity information of the evasion person.
And S140, determining the first node content of the first-dimension N+1 level node according to the first entity information.
In one possible implementation, determining the first node content of the first dimension N+1 level node specifically includes determining a basic information topic of the topic node of the first dimension according to the identity. And determining the prompt information subject of the key information of the N-level node in the first dimension according to the basic information subject. And matching the entity information of the entity information database according to the prompt information subject of the key information of the N-level node in the first dimension to obtain the first entity information. And determining the content of the first node based on the analysis result of the first entity information.
Specifically, after receiving a query request carrying an identity mark of an evasion person and determining a basic information theme of a first dimension theme node, the device determines the content of the first dimension theme node as basic information. And the device determines the prompt information theme of the N-level node in the first dimension according to the basic information theme. The prompting information theme is a prompting information theme corresponding to the key information, and the prompting information theme is used for prompting the theme of the key information filled in the subordinate node, and the corresponding node content comprises one or more of the themes of an identity card number, a mobile phone number, an address, a bank card number, deposit and the like. After the prompt information theme is obtained, the entity document of the evasion person is called in the entity information database, and the corresponding first entity information is matched according to the prompt information theme through a character matching algorithm. And finally, the key information obtained after the key words are extracted from the first entity information is filled in the N+1 level nodes in the first dimension to obtain the content of the first node.
For example, referring to fig. 4, the device determines the basic information topic of the first dimension topic node, that is, the content of the first dimension topic node is "basic information" according to the evasion personnel information with the identity of Zhang three. The device determines that the theme of the N-level node in the first dimension is the prompting information theme of the key information of Zhang three according to the basic information theme, and the prompting information theme may include one or more of an identity card number, a mobile phone number, an address, a bank card number, deposit and the like. The device retrieves related entity documents of the third item from the entity information database, and matches corresponding first entity information according to the prompt information subjects. Finally, the device extracts the key words of the first entity information and converts the first entity information into the first node content of the corresponding mind map. For example, according to the first entity information, the address of Zhang three is A city B area, the keyword "A city B area" of the first entity information is extracted to obtain the keyword "A city B area", and the keyword "A city B area" is filled in the later stage node of the prompting information subject node "address" to obtain the first node content.
S150, determining second node content of the second dimension N+1 level node based on the first entity information and candidate entity information of the entity information database, wherein the candidate entity information comprises candidate service identification number information.
In one possible implementation, determining the second node content of the second dimension n+1 level node specifically includes determining the subject of the subject node detection cue of the second dimension based on the identity. And determining the theme of the N-level node of the second dimension according to the theme of the investigation clue. And acquiring at least one candidate entity information of the entity information database according to the subject of the N-level node of the second dimension, wherein the candidate entity information also comprises candidate vehicle information, candidate personnel information and candidate relation information. And comparing the first entity information with at least one candidate entity information, and judging whether information related to the first entity information exists in the at least one candidate entity information. And if the information related to the first entity information exists in the at least one candidate entity information, determining the candidate entity information with the related information as the second node content.
Specifically, referring to fig. 5, the device determines, according to the identity of the target object, that the subject of the second dimension subject node is the subject of the investigation clue as the evasion staff. The device determines the topic of the N-level node of the second dimension as the prompt information topic of the investigation clue of the evasion person according to the investigation clue topic. The prompt information of the investigation clue comprises the identification number of the suspicious service, the identity personnel of the imposter, the suspicious motor vehicle and the relatives. After determining the prompt message subject of the detection clue, the device needs to call at least one candidate entity information in a preset range. The preset range may be set according to the address of the evacuee or the occurrence position, for example, when the evacuee address is in the B area of the a city, a plurality of candidate entity information of the a city may be called, a plurality of candidate entity information of the B area may be called, and a plurality of candidate entity information of the province in which the a city is located may be called. The specific calling mode can be adjusted according to practical situations, and the embodiment is not limited specifically.
Referring to fig. 5, in the above example, the apparatus then obtains at least one candidate entity information of the entity information database based on the subject matter of the N-level node of the second dimension. If the subject of the N-level node is to find suspicious service identification numbers, the device invokes entity documents of all suspicious service identification numbers in the preset time of the a city, wherein the service identification numbers include, but are not limited to, mobile phone numbers, bank card numbers and identity card numbers. The suspicious service identification number is a service identification number with suspicious behavior information in corresponding behavior information in the entity document, for example, an account with the same bank card number transfers money with the same amount to another account for multiple times, and the bank card number is marked as a service identification number. After the entity documents of all suspicious service identification numbers in the preset time of the A city are called, the suspicious behavior information is set as candidate service identification number information and is filled in the subordinate node of the 'found suspicious service identification number' in the figure.
The device determines the theme of the theme node of the mind map and the theme of the N-level node according to the inquiry request of the evasion person, which is equivalent to displaying the thought aiming at the evasion person through the mind map. The apparatus determines first node content, i.e. basic information related to the evasion person, based on the first entity information and determines second node content, i.e. other cue information associated with the evasion person, based on the first entity information and the candidate entity information. The automatic information processing mode adopted by the application improves the accuracy and efficiency of information processing, and achieves the effect of improving the information management efficiency in the case investigation process.
Referring to fig. 5, in the above example, if the subject of the N-level node is finding an imposter, the apparatus retrieves all entity documents of all imposters of other persons in city a. For example, if the identity of the third party is found to be online in the internet bar, the device calls the entity documents of all the identity personnel found to be used by other people in the city a, sets the basic information of the third party as candidate personnel information, and fills the candidate personnel information into the lower node of the figure for finding the identity personnel found to be used.
Referring to fig. 5, in the above example, if the subject of the N-level node is the discovery of suspicious vehicles, the apparatus retrieves the entity documents of all suspicious vehicles in city a. A suspicious motor vehicle is a motor vehicle whose behavior is inconsistent with the behavior of the owner, e.g., the behavior information of the fourth prune shows that the fourth prune is always on duty at the first company, but that all vehicles of the fourth prune often leave the a market on the weekdays, then the vehicle is a suspicious motor vehicle. The device invokes the entity document of all suspicious motor vehicles in the city A, sets the behavior information of the vehicle as candidate vehicle information, and fills the candidate vehicle information into the lower node of the 'suspicious motor vehicle found' in the figure.
Referring to fig. 5, in the above example, if the topic of the N-level node is to find a relationship person, the apparatus invokes an entity document of the owner in the a city, obtains relationship information in the entity document, and obtains the relationship person of the owner according to the relationship information, where the relationship person includes but is not limited to relatives, friends, and compactness. The device is retrieving the entity document of the relationship. And acquiring the behavior information and the relationship information of the entity document, and judging whether the relationship person and the evasion person have an association relationship and/or whether contact behaviors exist according to the behavior information and the relationship information. If the device judges that the relationship exists between the relationship person and the escaping person and/or whether the contact behavior exists, the device invokes an entity document of the owner in the A city and acquires the relationship information, the entity information of the owner is set as candidate relationship person information and is filled in a lower node of the 'found relationship person' in the figure, and the entity information of the relationship person is filled in a second layer node of the 'found relationship person'.
After at least one candidate entity information is selected, the device needs to compare the candidate entity information with the first entity information and judge whether the candidate entity information and the first entity information have associated information. If there is only one candidate entity information, the single candidate entity information is compared with the first entity information. And if the plurality of entity information exists, comparing the plurality of entity information with the first entity information in sequence. And according to the judgment that the candidate entity information and the first entity information have the associated information, filling the candidate entity information into the second node content. For example, referring to fig. 1 and 2, it is determined that a bank card number having a service identification number of 123456789 takes out a cash on a previous day, and then deposits a cash of the same amount on the same day as a bank account of an evacuee by three. The behavior information of the service identification number will be filled as the second node content as the lower node content of "find suspicious service identification number".
In a possible implementation manner, after acquiring the subject of the N-level node of the second dimension according to the identity, the method specifically further includes setting the n+1-level node of the second dimension as an empty node if candidate entity information of the entity information database is not acquired according to the subject of the N-level node of the second dimension.
Specifically, according to the topic of a certain N-level node in the second dimension, the device does not find corresponding entity information in the entity information database as candidate entity information, for example, when the topic is to find an imposter identity person, the entity information database does not acquire the behavior information with the behavior type of imposter identity, which indicates that the a city does not have a person imposter identity to perform activities in a preset time period, and prompts a user (civil police) to do not search related information in the direction when detecting the evasion person Zhang three. The device sets the corresponding node as a blank node, so that the user is not required to detect the information of the directions, and the time is saved.
In one possible implementation manner, after comparing the first entity information with the at least one candidate entity information, judging whether the information related to the first entity information exists in the at least one candidate entity information, and specifically, determining the second dimension n+1 level node as a prompt node if the information related to the first entity information does not exist in the at least one candidate entity information.
Specifically, the device obtains corresponding candidate entity information in the entity information database according to the second dimension N-level node, but the device does not directly judge that the candidate entity information has information related to the first entity information. For example, a plurality of suspicious service identification numbers are acquired as a plurality of suspicious bank card numbers, but the accounts of the bank card numbers do not have direct or indirect transactions with the accounts of the evasion personnel who are in charge of three. The device determines the subordinate node of the suspicious service identification number as a prompt node, prompts the user (policing) to detect according to the theme, and fills the information obtained by detection into the prompt node.
In one possible implementation, the topics of the topic nodes include a base information topic and a forensic cue topic.
In particular, referring to fig. 4, the topic node may be a root node of the mind map for exposing the topic of the mind map. If the identity of the evasion person is the evasion person, the theme of the theme node comprises a basic information theme and a investigation clue theme. The device divides the topics of the topic nodes into basic information topics and investigation clue topics, so that the mind map is clearer and is convenient for users (polices) to quickly locate the information nodes to be checked.
In one possible implementation manner, the method for determining the first node content of the first dimension N+1 level node according to the first entity information specifically further comprises the steps of obtaining mining analysis results of the first entity information, wherein the mining analysis results comprise user portraits and checking results. And determining the mining analysis result as the first node content.
Specifically, after the device acquires the first entity information related to all the evasions from the entity information database, the first entity information is analyzed and mined based on the data analysis and mining technology through the clue analysis tool, and valuable information is extracted. Such information may include behavioral habits, preference characteristics, social relationships, etc. of the evading person. Based on the information, a picture of the evasion person is constructed, wherein the picture of the evasion person comprises, but is not limited to, personal information such as sex, age, height, weight, skin color, location, occupation and the like of the evasion person, and behavior information such as possible places to go, possible vehicles to use, possible shielding measures and the like. Meanwhile, the device performs identity check on the escaping personnel based on key information in the thinking guide diagram, invokes biological information such as DNA and fingerprint of the escaping personnel, and displays a check result as first node content for assisting a user (police) to quickly break a case.
Through the scheme, the device determines the topics of the topic nodes of the mind map and the topics of the N-level nodes according to the query request of the evasion person, which is equivalent to displaying the detection thought aiming at the evasion person through the mind map. The apparatus determines first node content, i.e. basic information related to the evasion person, based on the first entity information and determines second node content, i.e. other cue information associated with the evasion person, based on the first entity information and the candidate entity information. The automatic information processing mode adopted by the application improves the accuracy and efficiency of information processing, and achieves the effect of improving the information management efficiency in the case investigation process.
The embodiment also discloses a personnel escaping information management device, referring to fig. 6, the target object information management device comprises a receiving module 601 and a processing module 602, wherein:
The receiving module 601 is configured to receive a query request for an escaping person, where the query request carries an identity of the escaping person.
The processing module 602 is configured to determine, according to the query request, a topic of a topic node of the mind map and a topic of an N-level node.
And matching the entity document of the escaping person based on the identity and the subject node to acquire the first entity information of the escaping person.
And determining the first node content of the first-dimension N+1 level node according to the first entity information.
And determining second node content of the second dimension N+1 level node based on the first entity information and candidate entity information of the entity information database, wherein the candidate entity information comprises candidate service identification number information.
In a possible implementation manner, the processing module 602 is configured to determine, according to the identity, a basic information topic of the topic node in the first dimension.
And determining the theme of the N-level node in the first dimension according to the basic information theme.
And matching the entity information of the entity information database according to the subject of the N-level node in the first dimension to acquire the first entity information.
And determining the content of the first node based on the analysis result of the first entity information.
In one possible implementation, the processing module 602 is configured to determine, according to the identity, a forensic cue topic of the topic node of the second dimension.
And determining the theme of the N-level nodes in the second dimension according to the investigation clue theme.
And acquiring at least one candidate entity information of the entity information database according to the subject of the N-level node of the second dimension, wherein the candidate entity information also comprises candidate vehicle information, candidate personnel information and candidate relation information.
And comparing the first entity information with at least one candidate entity information, and judging whether information related to the first entity information exists in the at least one candidate entity information.
And if the information related to the first entity information exists in the at least one candidate entity information, determining the candidate entity information with the related information as the second node content.
In a possible implementation manner, the processing module 602 is configured to determine the second dimension n+1 level node as the hint node if no information associated with the first entity information exists in the at least one candidate entity information.
In a possible implementation manner, the processing module 602 is configured to set, according to the subject of the N level node of the second dimension, the n+1 level node of the second dimension as a blank node if no candidate entity information of the entity information database is obtained.
In one possible implementation, the processing module 602 is configured to determine that the topics of the topic nodes include a base information topic and a forensic cue topic.
In one possible implementation, the processing module 602 is configured to obtain a mining analysis result for the first entity information, where the mining analysis result includes a user portrait and a verification result.
And determining the mining analysis result as the first node content.
The present embodiment also discloses an electronic device, referring to fig. 7, which may comprise at least one processor 701, at least one communication bus 702, a user interface 703, a network interface 704, at least one memory 705.
Wherein the communication bus 702 is used to enable connected communications between these components.
The user interface 703 may include a Display screen (Display), a Camera (Camera), and the optional user interface 703 may further include a standard wired interface, and a wireless interface.
The network interface 704 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Wherein the processor 701 may include one or more processing cores. The processor 701 connects various portions of the overall server using various interfaces and lines, performs various functions of the server and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 705, and invoking data stored in the memory 705. Alternatively, the processor 701 may be implemented in at least one hardware form of digital signal Processing (DIGITAL SIGNAL Processing, DSP), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 701 may integrate one or a combination of several of a central processor 701 (Central Processing Unit, CPU), an image processor 701 (Graphics Processing Unit, GPU), a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like, the GPU is used for rendering and drawing contents required to be displayed by the display screen, and the modem is used for processing wireless communication. It will be appreciated that the modem may not be integrated into the processor 701 and may be implemented by a single chip.
The Memory 705 may include a random access Memory 705 (Random Access Memory, RAM), or may include a Read-Only Memory 705 (Read-Only Memory). Optionally, the memory 705 includes a non-transitory computer readable medium (non-transitory computer-readable storage medium). Memory 705 may be used to store instructions, programs, code, sets of codes, or instruction sets. The memory 705 may include a stored program area that may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, etc., and a stored data area that may store data related to the various method embodiments described above, etc. The memory 705 may also optionally be at least one storage device located remotely from the processor 701. As shown, an operating system, a network communication module, a user interface 703 module, and an application program of an escape person information management method may be included in the memory 705 as a computer storage medium.
In the electronic device shown in the figures, the user interface 703 is mainly used for providing an input interface for a user to obtain data entered by the user, while the processor 701 may be used for invoking an application program stored in the memory 705 for a method of managing escape information, which when executed by the one or more processors 701 causes the electronic device to perform the method as in one or more of the embodiments described above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all of the preferred embodiments, and that the acts and modules referred to are not necessarily required for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as a division of units, merely a division of logic functions, and there may be additional divisions in actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some service interface, device or unit indirect coupling or communication connection, electrical or otherwise.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable memory 705. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory 705, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method of the various embodiments of the present application. The memory 705 includes various media capable of storing program codes, such as a usb disk, a removable hard disk, a magnetic disk, or an optical disk.
The foregoing is merely exemplary embodiments of the present disclosure and is not intended to limit the scope of the present disclosure. That is, equivalent changes and modifications are contemplated by the teachings of this disclosure, which fall within the scope of the present disclosure. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a scope and spirit of the disclosure being indicated by the claims.