Detailed Description
The intelligent bracelet personalized interactive feedback system based on cloud service solves the technical problem that in the prior art, the user emotion design requirement is difficult to meet due to the fact that the interaction mode is relatively single, personalized interaction and instant feedback are lacked. Through integrated high in the clouds platform in intelligent bracelet, the action of first user is analyzed in real time to trigger different types of feedback according to these actions, trigger specific emotion feedback in real time according to the individualized demand of settlement, make nimble reply according to different emotion demands, further satisfy the demand of user in emotion interaction, promoted user individuation interactive experience.
In the following, the technical solutions of the present application will be clearly and completely described with reference to the accompanying drawings, and it should be understood that the described embodiments are only some embodiments of the present application, but not all embodiments of the present application, and that the present application is not limited by the exemplary embodiments described herein. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application. It should be further noted that, for convenience of description, only some, but not all of the drawings related to the present application are shown.
Referring to fig. 1, the application provides an intelligent bracelet personalized interactive feedback system based on cloud service, wherein the intelligent bracelet personalized interactive feedback system based on cloud service comprises:
The initialization module 11 is configured to integrate a cloud platform in an intelligent bracelet, and initialize the cloud platform through user data, where the intelligent bracelet includes a first bracelet corresponding to a first user and a second bracelet corresponding to a second user.
Specifically, the intelligent bracelet is wearable equipment integrating a sensor and a wireless communication technology and is used for monitoring the health condition of a user, providing reminding and interacting with other intelligent equipment, and the intelligent bracelet is internally provided with components such as a Bluetooth chip, an NFC chip, an LED lamp bead, a vibration motor, an encryption chip, a rechargeable lithium battery, a charging management circuit and the like. The Bluetooth (supporting Bluetooth 5.0 and above) and NFC chips are used for realizing rapid pairing between devices, and the intelligent bracelet and the mobile phone APP are generally connected, so that stable long-distance communication with the mobile phone APP is ensured, and real-time transmission of data is realized. For example, when a party sends an interactive command, the bluetooth module can quickly transmit the command to the control unit of the bracelet. The user searches nearby equipment through Bluetooth, and stable connection between intelligent bracelets is ensured. The NFC chip is used for the primary pairing process, and a user can complete equipment identification and connection initialization only by approaching the mobile phone to the bracelet, so that pairing operation is simplified, and user experience is improved.
The cloud platform is integrated in the intelligent bracelet, the cloud platform is initialized through user data, and the user data are personal information and the like of a user acquired from the mobile phone APP and are used for initializing the intelligent bracelet. The cloud platform is a server architecture based on cloud computing and is used for storing and processing a large amount of user data, supporting data interaction between a plurality of user terminals (such as mobile phone APP and bracelet equipment) and capable of providing functions of real-time analysis, push notification, data storage, management and the like. Through the cloud platform, the data of the user can be stored in a centralized mode, so that the data security is ensured, and flexible access and management can be performed. The cloud platform ensures that user information (such as personalized settings, interactive records, multimedia files and the like) is not lost or damaged through a distributed storage technology and a redundant backup strategy, and can quickly perform data retrieval and calling.
The first and second hand rings represent two different users (e.g., two users between lovers). Each user has a corresponding bracelet (the bracelet of the first user and the bracelet of the second user), interaction is carried out through the cloud platform, and emotion, interaction information and data of the users are transmitted. The device ID, version information and the like of the bracelet are also uploaded to the cloud end, so that the platform is ensured to correctly identify the model and the function of each device. The intelligent bracelets of each user are connected to the corresponding account numbers, the bracelets of the first user and the bracelets of the second user establish a pairing relationship on the cloud platform, and each bracelet is associated with specific user data. Through the pairing relationship, the cloud platform can effectively manage interaction data and emotion information of the cloud platform and the interaction data. Through the data management of the cloud platform, more personalized services can be provided for users, such as generating data reports according to interaction frequency and emotion expression among lovers, customizing push notifications and the like.
And the identity authentication module 12 is used for carrying out identity authentication on the intelligent bracelet, collecting user information after the identity authentication is passed, and uploading the user information to the cloud platform through a first encryption channel, wherein the user information comprises first user information and second user information.
Specifically, after initializing the smart band, strict identity authentication is required, and the user needs to input a user name and a password to perform preliminary identity confirmation for confirming whether the user has the access right of the account. After the user passes the account password verification, the second-layer verification is further performed through a biological recognition technology (such as fingerprint, facial recognition or iris scanning, etc.), so that the security is improved, and the unauthorized user is prevented from accessing. Through two-layer verification, it is ensured that only the user can complete identity authentication, and the safety of equipment and data is ensured. Once the identity authentication is successful, the user information is acquired and stored through the bracelet, wherein the user information comprises first user information and second user information. The user information includes account information, pairing information, and the like of the user. After the user information is uploaded, the cloud platform stores and manages data, processes the data, associates the information of the first user with the information of the second user, and creates a virtual pairing relationship between lovers. In actual situations, the information of two devices is usually obtained through an NFC chip on the smart band, an automatic pairing process is triggered, and device identification and connection initialization are rapidly completed.
And uploading the acquired user information to the cloud platform through the first encryption channel. The encryption channel is a communication link for safely transmitting data, and adopts an encryption technology to protect the data so as to ensure that information is not stolen or tampered in the transmission process. The first encryption channel is a data uploading channel from the intelligent bracelet to the cloud platform, and provides a safe encryption guarantee for user information transmission. The encryption channel is established through an encryption protocol (e.g., SSL/TLS) to provide a secure communication link between two devices (e.g., smart band and cloud platform). Before data transmission, the client (bracelet) and the server (cloud platform) can ensure that the two parties can safely exchange data by negotiating information such as an encryption algorithm, a secret key and the like. The cloud platform and the smart band can respectively generate a pair of public and private keys by combining public key encryption and symmetric encryption. By means of public key encryption, the keys at the time of data transmission can be exchanged securely. During data transmission, a symmetric encryption algorithm (e.g., AES) is used to encrypt specific data content because symmetric encryption is more efficient than public key encryption.
When a first user (such as lover a) performs identity verification through the smart band and collects information, the information (such as personal account number, preference setting and the like) is encrypted through a first encryption channel and uploaded to the cloud platform. In the data transmission process, if any third party does not have a corresponding decryption key, the transmitted content cannot be read, so that the data is prevented from being attacked or stolen by a man-in-the-middle in the transmission process. Through the encryption channel, the security of the user information in the transmission process is ensured, man-in-the-middle attack or data leakage is prevented, all information uploaded to the cloud is stored in an encrypted mode, and leakage of private information caused by attack or data leakage of the server is avoided.
An initialization pairing module 13, configured to perform initialization pairing on the first hand ring and the second hand ring based on the first user information and the second user information.
Specifically, initializing pairing refers to the operation of performing initial connection and pairing between two smart bands based on identity information (such as first user information and second user information) provided by a user in a smart band system. The pairing process ensures that the bracelet devices can communicate correctly and stably, and the paired devices can exchange data and perform interactive operation. The users (such as A and B in lovers) corresponding to each bracelet can provide user identity information through the bracelet or the mobile phone APP when pairing for the first time, and the cloud platform establishes a user file through the information. When two bracelets are within the same physical range (e.g., when two lovers are standing together), pairing between devices can be performed via the bluetooth protocol.
When the two bracelets are paired for the first time, the two bracelets can be paired fast through the NFC chip. The user only needs to approach the two bracelets, and the NFC chip can trigger an automatic pairing process to rapidly complete equipment identification and connection initialization. After the bracelet searches the equipment of the user B through Bluetooth, a pairing request is sent. After the user B agrees to connect, the user B confirms whether the user B and the user B belong to the same pair of lovers through identity verification. If the verification is passed, the intelligent bracelet uploads the information of the first user and the second user to the cloud platform through the first encryption channel and initializes pairing. After pairing is completed, all pairing data and user preference settings are uploaded to the cloud platform for storage through the first encrypted communication. The cloud platform can create a pairing record, so that the two bracelets can perform data transmission stably and accurately in the subsequent interaction process. After successful pairing, the wristband will remain in a long-term paired state. During this period, the cloud platform remembers the pairing information, whether or not the user restarts the bracelet, ensuring that subsequent interactions and data transmissions are not interrupted. And through the security management of the encryption channel and the cloud platform, the pairing data and personal information of the user are ensured to be effectively protected.
The interaction data collection module 14 is configured to collect first user interaction data from the first bracelet after pairing is initialized, and upload the first user interaction data to the cloud platform through the first encryption channel.
Specifically, user interaction data, namely a series of operations and behavior data of a user when using the smart band, is acquired from the first bracelet after pairing is initialized. For example, the user may interact by touching, vibrating, clicking on a button, selecting an expression, or sending a message, etc., either periodically collected, in real-time, or based on certain events or contexts. It should be noted that the first or second in the description is not specific to any one, but is merely a distinction. Once the collected interaction data is recorded, the data needs to be securely transmitted to the cloud platform for further processing and storage. In order to ensure the privacy and the security of the data, the data is transmitted by using a first encryption channel, and the first user interaction data is uploaded to the cloud platform.
The first user performs interactive operation by using the bracelet, acquires interactive data through a sensor or an input interface arranged in the bracelet, and performs encryption processing through an established first encryption channel. The data is encrypted during transmission to prevent leakage. The encrypted data is uploaded to a cloud platform and stored in a database of the cloud platform, and the cloud platform performs corresponding processing according to the data type. And uploading data through the encryption channel, so that the safety of the interactive data of the user in the transmission process is ensured, and the interactive data is prevented from being stolen or tampered.
And the interaction feedback module 15 is configured to transmit the first user interaction data to the second hand ring through a second encryption channel when the first user interaction data triggers a preset condition, and acquire second user feedback information.
Specifically, the preset condition refers to a rule or an event set in advance, and when the interaction data of the user accords with the rule, certain operation or feedback is triggered. Once the first user interaction data trigger the preset condition, the first user interaction data are transmitted to the bracelet of the second user according to the triggered preset condition, and the bracelet is displayed in a corresponding mode. Due to the fact that user privacy data and interaction information are involved, in order to ensure that the data are not tampered or leaked in the transmission process, the data are transmitted through the second encryption channel. The second encryption channel is similar to the first encryption channel but uses different encryption parameters (e.g., keys or encryption algorithms). The second encryption channel adopts different encryption modes or key pairs so as to improve the system security and avoid potential security risks under the same channel.
After the data is transmitted through the second encrypted channel, the target device (i.e., the second hand ring) receives this portion of the data and presents it or uses it to activate certain feedback functions such as vibration, color change, display information. Once the second user receives the interaction data of the first user, the second user can make feedback according to the emotion or the demand of the second user, for example, the second user can make feedback information by touching a button of a bracelet to indicate acceptance or response, and the second user feedback information is generated. And the feedback information of the second user is collected again and uploaded to the cloud platform, and then is transmitted to the first user through the second encryption channel, so that bidirectional emotion interaction is formed. Timely feedback is performed by triggering preset conditions, more personalized lover interaction experience is provided, and meanwhile, the safety and privacy of data are ensured through multi-layer encryption.
Further, as shown in fig. 2, the identity authentication module 12 in the cloud service-based smart bracelet personalized interactive feedback system is further configured to:
The user authentication method comprises the steps of carrying out identity authentication on a user through an access control terminal built in the intelligent bracelet, wherein the access control terminal comprises an authentication information acquisition unit and an authentication passing judgment unit, acquiring initial identity information of the user through the authentication information acquisition unit, uploading the initial identity information of the user to the cloud platform through the encryption channel, acquiring user account information and biological identification information in real time through the authentication passing judgment unit, carrying out first identity authentication, judging whether the user input information is consistent with the user account information, carrying out second identity authentication if the user input information is consistent with the user account information, acquiring biological information of the user in real time through the authentication passing judgment unit, judging whether the biological information of the user is consistent with the biological identification information, and outputting a judgment result of passing authentication if the biological information of the user is consistent with the biological identification information.
Specifically, the access control terminal is a hardware module integrated in the intelligent bracelet and used for managing and verifying the identity of a user, and comprises two key parts, namely an authentication information acquisition unit and an authentication passing judgment unit. The authentication information collection unit is responsible for collecting identity information of the user, including account information (such as a user name and a password) and biometric information (such as fingerprint and facial recognition and the like) of the user. The authentication is carried out by the judging unit according to the information input by the user and the prestored identity information, so as to confirm whether the identity of the user is legal or not, and the accuracy of the identity is ensured by relying on a two-step authentication mechanism (account password verification and biological recognition verification).
And acquiring user account information and biological identification information through an authentication information acquisition unit, and uploading the user account information and the biological identification information to a cloud platform through a first encryption channel. The user provides the biometric feature by entering account information (e.g., user name, password) and using a biometric device (e.g., fingerprint scan or facial recognition). For example, if a user uses a bracelet for the first time, it is necessary to input a user name and a password, and scan the user's fingerprint through a built-in fingerprint identification sensor to acquire fingerprint data as biometric information. The encryption channel transmission safely uploads the acquired identity information to the cloud platform through the encryption channel, so that privacy protection in the data transmission process is ensured.
The authentication is carried out by acquiring account information (such as account number, password or verification code) input by a user in real time through the judging unit, and comparing the account information with the user account information stored on the cloud platform in real time. The authentication passing judging unit checks whether account information (such as a user name and a password) input by the user is matched with cloud storage, if so, the authentication passes, and the second identity authentication step is entered. If the account information is inconsistent, authentication fails, and the user is prompted to input account information again or take other recovery measures (such as retrieving a password). For example, the user inputs his user name and password on the smart bracelet, and the cloud platform compares the information stored in the database. If the information is consistent, the system considers the first identity authentication to pass.
After the account number passes verification, the authentication passing judging unit can acquire the biological identification information (such as fingerprint, facial image or other biological characteristics) of the user in real time, and compares the biological identification information with the biological identification information stored in the cloud. And checking whether the real-time biological information provided by the user is consistent with the biological identification information (such as fingerprint data) pre-stored in the cloud database. If the identity authentication is consistent, the identity authentication is passed, and if the identity authentication is inconsistent, the authentication fails, and the user is prompted to try again. If both rounds of authentication (account authentication and biometric authentication) pass, the authentication pass judging unit outputs a result of successful authentication and allows the user to continue personalized setting, pairing operation and the like of the bracelet. If any verification fails, the authentication flow is interrupted, and the user is prompted for related errors or operation suggestions. Through multi-layer identity authentication (account verification and biological identification verification), account theft and identity counterfeiting are effectively prevented, and the safety of user data is improved.
Further, the identity authentication module 12 in the cloud service-based smart bracelet personalized interactive feedback system is further configured to:
Encrypting the user information to generate encrypted information, wherein the encrypted information comprises encrypted data and an encryption key, establishing a first encryption channel between the intelligent bracelet and the cloud platform, and synchronizing the encrypted information to the cloud platform for storage through the first encryption channel.
In particular, user information refers to various data related to the user, including personal identity information (e.g., name, date of birth, contact, etc.), device pairing information (e.g., unique identifier of the bracelet, pairing code, etc.), and other data generated when interacting with or using the bracelet. The collected user information (such as personal information and pairing information) is encrypted by an encryption algorithm, including AES (symmetric encryption) for encrypting the stored data, or RSA (asymmetric encryption) is used for encrypting a transmission key, so that the security of the key exchange process is ensured. During encryption, an encryption key or session key (e.g., using AES) is generated for encrypting the user information, ensuring confidentiality of the data. The generation of encryption keys is critical to the encryption process, especially when symmetric encryption algorithms are used, where the keys must be kept secret. In practical applications, the key may be automatically generated by an encryption algorithm, or generated and managed by an encryption module of the cloud platform.
The encrypted user information is converted into encrypted information and is ready to be uploaded to the cloud platform. The encryption information comprises encryption data and an encryption key, wherein the encryption data is output after the original data (such as personal information or interactive record of a user) is processed by an encryption algorithm, is usually a messy code and cannot be directly read, and the encryption key is a key used in encryption operation, so that the encryption data cannot be decrypted by unauthorized persons, and is a key in symmetric encryption or a private key in asymmetric encryption.
And a first encryption communication channel is established between the intelligent bracelet and the cloud platform by using a TLS/SSL protocol, so that confidentiality and integrity in the data transmission process are ensured. In the TLS connection establishment process, the client (smart bracelet) and the cloud platform perform identity verification, and generate a session key through an encryption algorithm. The encrypted user information is uploaded through the established first encryption channel. The data stream in the uploading process is protected by symmetric encryption (such as AES), so that the data is ensured not to be tampered in the transmission process. After the encryption channel is established, the intelligent bracelet uploads the encrypted user information to the cloud platform through the channel. And after the cloud platform receives the encryption information, the encryption information is stored. The cloud platform can decrypt and read the stored data only under the support of the legal decryption key. And the user information is encrypted through an encryption algorithm, so that the safety of the user information in the transmission process between the intelligent bracelet and the cloud platform is ensured. In the whole process, the safety management and the use of the secret key protect the privacy of users and the safety of data and prevent the risks of data disclosure and tampering.
Further, the identity authentication module 12 in the cloud service-based smart bracelet personalized interactive feedback system is further configured to:
The method comprises the steps of traversing the encryption key on the cloud platform, determining a decryption key, obtaining a user input key through the intelligent bracelet, judging whether the user input key is consistent with the decryption key, decrypting the encryption information based on the decryption key to obtain decryption information if the user input key is consistent with the decryption key, and transmitting the decryption information to the intelligent bracelet for display.
Specifically, when the user side needs to acquire the encryption information, in order to recover the data, the cloud platform needs to traverse the key storage library through the encryption key to find out the corresponding decryption key. The decryption key is a key for restoring the encrypted data to the original data. Typically, the decryption key is paired with the encryption key, especially in symmetric encryption, where the decryption key is the same as the encryption key, whereas in asymmetric encryption, the decryption key and encryption key are different, and the decryption key is typically kept private. To ensure that only legitimate users can decrypt the information and view the data, the user is required to enter a key on the smart bracelet, typically including a password, PIN code, fingerprint, or other biometric information. After the user inputs the key, the smart band compares the key with the decryption key stored by the cloud platform. If the two keys match, indicating that the user authentication is passed, the decryption operation may be continued.
If the verification is passed, the cloud platform decrypts the encrypted information by using the decryption key, recovers the original user data or interaction record, and generally performs decryption by using a symmetric or asymmetric encryption algorithm. Once the data is successfully decrypted, the cloud platform transmits the decrypted information to the smart band through a secure encrypted channel (usually a second encrypted channel), and the smart band displays the decrypted information to the user through a display screen of the smart band. By means of the encryption information and the key management system, only authorized users are ensured to be capable of decrypting and accessing personal information, and privacy protection capability is improved.
Further, the interaction feedback module 15 in the cloud service-based smart bracelet personalized interaction feedback system is further configured to:
The method comprises the steps of determining preset conditions according to user requirements, determining data types of first user interaction data through a data classifier, matching corresponding target preset conditions based on the data types, transmitting the first user interaction data to a second hand ring through a second encryption channel if the target preset conditions are the first-level trigger conditions, and carrying out mild reminding, wherein encryption parameters of the first encryption channel and the second encryption channel are different, transmitting the first user interaction data to the second hand ring through the second encryption channel if the target preset conditions are the second-level trigger conditions, carrying out moderate reminding, and transmitting the first user interaction data to the second hand ring through the second encryption channel if the target preset conditions are the third-level trigger conditions, and carrying out severe reminding.
Specifically, the trigger conditions are defined according to the user's needs and divided into three levels, each representing a different interaction strength or importance. The primary trigger condition indicates a relatively slight interaction or low priority alert (e.g., tap, brief text, low intensity physiological change, etc.). For example, the user clicks a button once on the smart band or sends a brief mood. The secondary trigger condition represents normal interaction or information of medium importance (e.g., medium number of touches, long text, medium intensity physiological changes, etc.). For example, users frequently interact, send more complex expressions or make sustained touches. The three-level trigger condition represents an important interaction or high priority alert (e.g., multiple touches, large text, high intensity physiological changes, etc.). For example, the user sends a message with strong emotion, or makes multiple touches, deep interactions, etc.
After receiving the first user interaction data, the type of the data is analyzed by a data classifier. The data classifier is trained and generates a model based on information such as historical interaction data, user behaviors, trigger conditions and the like, and is used for judging the type of the interaction data in real time. And matching corresponding preset conditions according to the analysis result (data type) of the data classifier. The method comprises the steps of selecting a first-level triggering condition if the data classifier judges that first user interaction data belongs to a mild reminder, selecting a second-level triggering condition if the data classifier judges that the first user interaction data belongs to a moderate reminder, and selecting a third-level triggering condition if the data classifier judges that the first user interaction data belongs to a severe reminder.
If the target preset condition is the first-level trigger condition, the target preset condition is transmitted to the second hand ring through the second encryption channel, and slight reminding (such as slight vibration, flashing and the like) is performed. For example, suppose that the first user sent a simple greeting message (e.g. "good morning"). The data classifier recognizes that this is lightly interactive data, selects a first level trigger condition and transmits the data to the second hand-ring over the second encrypted channel. The second hand ring can carry out light vibration reminding after receiving the data and displays the characters of 'good morning'. If the target preset condition is a secondary trigger condition, the target preset condition is transmitted to the second hand ring through the second encryption channel, and moderate reminding (such as moderate vibration, flashing, text reminding and the like) is performed. If the target preset condition is a three-level trigger condition, the target preset condition is transmitted to the second hand ring through the second encryption channel, and severe reminding (such as strong vibration, flashing, long text prompt, push notification and the like) is performed.
The encryption parameters of the first encryption channel and the second encryption channel are different, so that independent security guarantee is ensured for data transmission at different stages. The first encryption channel is used for uploading data of the bracelet and the cloud platform, and the second encryption channel is used for transmitting the data from the cloud platform to the bracelet. Through tertiary trigger condition and data classifier, provide individualized feedback according to different user interaction scenes, ensure that every interaction of user can both obtain the response that accords with its importance and urgency, the warning of different intensity has ensured that the user can in time receive important information, has avoided the excessive disturbance to daily interactive simultaneously.
The first encryption channel is used for ensuring the security of data transmission from the smart bracelet to the cloud platform, and the data uploaded through the channel generally comprises user interaction data (such as buttons clicked by a user, selected emoticons, sent mood states and the like), personalized settings, historical interaction records and the like. A symmetric encryption algorithm (e.g., AES) or an asymmetric encryption algorithm (e.g., RSA) is typically used to secure the data. The second encryption channel is used for transmitting feedback information of the cloud platform back to the intelligent bracelet, and comprises emotion interaction feedback, reminding information, customized notification (such as lovers' souvenir reminding, special event reminding and the like), customized setting and the like. Similar to the first encryption channel, the second encryption channel also uses a high-strength encryption algorithm to ensure the security of data transmission, preventing user feedback or push content from being compromised or tampered with. Through the first encryption channel and the second encryption channel, the safety of all data in the transmission process is ensured, and data leakage or tampering is prevented.
Further, the interaction feedback module 15 in the cloud service-based smart bracelet personalized interaction feedback system is further configured to:
According to the historical interaction records, collecting a sample interaction data set, and marking the data type of each sample interaction data to obtain a sample data type set; and constructing and training the data classifier by adopting the sample interaction data set and the sample data type set as supervision training data until convergence conditions are met.
In particular, interaction data is collected from a user's smart bracelet device and other related devices. Such data may include touch actions, messaging, heart rate variability, number of steps, intensity of exercise, time stamps, etc. And labeling each piece of interaction data, and determining corresponding operation types such as mild reminding, moderate reminding and severe reminding. By labeling, each sample interaction data set will be provided with a corresponding tag representing the type of operation of the interaction data. And performing data cleaning on the obtained sample interaction data set and sample data type set, filling in missing values or deleting samples containing a large number of missing values. And then, the features with different scales are standardized (for example, the z-score is standardized), so that the same scale among the features is ensured, and the influence of certain features on model training due to larger dimensions is avoided.
And constructing a supervised learning model based on the historical interaction data set and the operation type set, respectively training as the characteristics and the target value according to the input characteristics, and learning how to judge the corresponding operation type label from the characteristics. To evaluate the performance of the classifier, the dataset was divided into training and testing sets, with a common division ratio of 70% for training and 30% for testing. The training set data is input into the classifier for training through the selected classification algorithm (such as decision tree, random forest, etc.). The classifier will learn how to classify the different interaction data into the correct operation type based on the input features of the training set. During training, cross-validation is used to evaluate the performance of the model, preventing overfitting. A suitable optimization algorithm (e.g., gradient descent, random gradient descent) is selected to update the model parameters. And evaluating the trained model by using a test data set, and calculating the accuracy, precision, recall rate and F1 score of the model under different operation types, so that the model can effectively distinguish reminders of different levels. And analyzing the difference between the predicted result of the model and the real label, checking which operation types are misclassified, and adjusting the model.
And deploying the trained model into a cloud platform, so that user interaction data can be input into the model in real time for prediction. In real-time use, real-time data (e.g., touch, message length, heart rate, etc.) is collected and input into the trained model as the user interacts. The model predicts the operation type (light, moderate or heavy) of the interaction according to the input characteristics, and carries out corresponding reminding according to the prediction result. The optimization model is continued based on real-time feedback from the user (e.g., whether the reminder is valid, too frequent, etc.). New user interaction data is continuously collected over time and used to further train and optimize the model. For new interaction data, the model is updated step by step so that the model can adapt to new patterns as the user's behavior changes. Sample interaction data is collected and marked through a history interaction record, a data classifier is trained by a supervised learning method (such as decision trees, random forests and the like), and finally a model capable of analyzing and predicting the user interaction operation type in real time is obtained.
Further, the intelligent bracelet personalized interactive feedback system based on cloud service further comprises a personalized setting module, wherein the personalized setting module is further used for:
The method comprises the steps of obtaining user personalized content through the intelligent bracelet, uploading the user personalized content to the cloud platform for storage through the first encryption channel, carrying out standardized processing on the user personalized content through the cloud platform to obtain standardized personalized content, carrying out statistical analysis on the standardized personalized content to obtain a data analysis result, and transmitting the data analysis result to the intelligent bracelet for display.
Specifically, the personalized content of the user refers to the content which is input and customized by the user according to the interests, emotion requirements and interaction modes of the user, and the content comprises characters, voice, pictures, videos and the like. The user may also define the look and feel of the wristband, the interaction pattern (e.g., flashing color, vibration pattern, etc.), which may be considered as part of the personalized content. The intelligent bracelet obtains personalized content input by a user in a mode of voice recognition, text input, a camera and the like. The acquired personalized content is encrypted through a first encryption channel (such as TLS encryption, AES encryption and the like) so as to ensure that the data is not stolen or tampered in the uploading process.
After the personalized content is uploaded to the cloud platform, the personalized content is subjected to standardized processing, and the personalized content (text, voice, pictures, video and the like) in different forms is converted into a unified standard format, so that subsequent storage, analysis and display are facilitated. The cloud platform can count and analyze the standardized personalized content, including the frequency of uploading the content by the user, the common interaction mode, the specific reminding preference and the like. The data analysis results (e.g., user interaction frequency, common content type, etc.) are transmitted back to the smart band via a second encryption channel (e.g., SSL/TLS encryption). And the intelligent bracelet displays the personalized data report according to the received analysis result, and displays the personalized content of the user under the corresponding condition set by the user. The user can express emotion by inputting different personalized contents (such as words, voice, pictures, videos and the like), and the bracelet can provide a specific interaction mode such as customized flashing color, vibration mode and the like according to the preference of the user. Through uploading and data analysis of personalized content, the intelligent bracelet can continuously adapt to emotion requirements of users, interaction frequency and depth between lovers are improved, and emotion connection is enhanced.
Further, the intelligent bracelet personalized interactive feedback system based on cloud service further comprises an electric quantity reminding module, wherein the electric quantity reminding module is further used for:
The method comprises the steps of carrying out electric quantity self-checking on the intelligent bracelet, establishing an electric quantity self-checking result, carrying out electric quantity adaptation analysis according to a selection mode of a user after the intelligent bracelet is authenticated to obtain an electric quantity verification result, judging whether the electric quantity self-checking result meets the electric quantity verification result, and if the electric quantity self-checking result does not meet the electric quantity verification result, reporting an electric quantity reminding.
Specifically, the intelligent bracelet automatically detects and evaluates the self battery electric quantity through a built-in charging management circuit in the starting or running process. Through the electric quantity self-checking, the intelligent bracelet can determine the information such as the residual electric quantity, the health state and whether the current battery needs to be charged. The self-checking result of the electric quantity is output data generated in the self-checking process of the electric quantity, and generally comprises information such as the residual electric quantity of the bracelet battery, the charging state (whether the bracelet battery is fully charged or not and whether the bracelet battery is in charging or not), the health condition of the battery and the like.
After the bracelet passes authentication, the user selects a different use mode (such as a power saving mode, a normal mode, a high performance mode, a specific function and the like). And according to the selection of a user, combining the current battery state, carrying out electric quantity adaptation analysis, and estimating the battery service condition under the selected mode. The selection mode refers to a specific operation mode selected by the user when using the smart band, which affects the battery consumption of the band.
The electric quantity adaptation analysis refers to estimating and optimizing the electric quantity use condition according to the mode selected by the user and the current battery state of the intelligent bracelet. The power demand and the residual power of the bracelet are analyzed according to different use scenes (such as an energy-saving mode, a common mode and the like) so as to provide an optimized battery use scheme for users. And comparing the electric quantity self-checking result with a preset electric quantity standard to obtain a verification result of whether the electric quantity required by the mode selected by the user is met. The electric quantity verification result refers to a judgment result of whether the obtained electric quantity is enough to support a mode selected by a user after electric quantity adaptation analysis. If the amount of power is insufficient to support the mode, the user will be prompted to charge.
And judging whether the electric quantity requirement of the current mode is met according to the electric quantity self-checking result (such as the residual electric quantity and the health condition) and the electric quantity verification result (such as whether the battery is enough to support the selected mode). If the self-checking result of the electric quantity does not meet the verification result of the electric quantity, triggering an electric quantity reminding to inform a user that the electric quantity of the battery is insufficient, and taking action (such as charging or switching modes) is needed. And through electric quantity adaptation analysis, a battery use strategy is adjusted according to a mode selected by a user, so that the premature exhaustion of the battery is avoided, and the service time is prolonged. And according to the using habits and requirements of different users, intelligent electric quantity distribution is performed on the modes selected by the users, and the using efficiency of the battery is optimized.
In summary, the intelligent bracelet personalized interactive feedback system based on cloud service provided by the application has the following technical effects:
The cloud platform is integrated in an intelligent bracelet through an initialization module, the cloud platform is initialized through user data, the intelligent bracelet comprises a first bracelet corresponding to a first user and a second bracelet corresponding to a second user, an identity authentication module is used for authenticating the intelligent bracelet, after the identity authentication is passed, user information is collected and uploaded to the cloud platform through a first encryption channel, the user information comprises the first user information and the second user information, an initialization pairing module is used for conducting initialization pairing on the first bracelet and the second bracelet based on the first user information and the second user information, an interaction data collection module is used for collecting first user interaction data from the first bracelet after initialization pairing and uploading the first user interaction data to the cloud platform through the first encryption channel, and an interaction feedback module is used for transmitting the first user interaction data to the second encryption channel through the second encryption channel and obtaining second user interaction data when the first user interaction data trigger a preset condition. That is, through integrating the high in the clouds platform in intelligent bracelet, the action of first user is analyzed in real time to trigger different types of feedback according to these actions, trigger specific emotion feedback in real time according to user's individualized demand, make nimble reply according to different emotion demands, further satisfy user's demand in emotion interaction, promoted user individuation interactive experience.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and the equivalent techniques thereof, the present application is also intended to include such modifications and variations.