CN105530476A - Intelligent security protection system configuration method and apparatus - Google Patents

Intelligent security protection system configuration method and apparatus Download PDF

Info

Publication number
CN105530476A
CN105530476A CN201510970157.1A CN201510970157A CN105530476A CN 105530476 A CN105530476 A CN 105530476A CN 201510970157 A CN201510970157 A CN 201510970157A CN 105530476 A CN105530476 A CN 105530476A
Authority
CN
China
Prior art keywords
security switch
identification information
information
corresponding relation
azimuth information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510970157.1A
Other languages
Chinese (zh)
Inventor
王尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510970157.1A priority Critical patent/CN105530476A/en
Publication of CN105530476A publication Critical patent/CN105530476A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices

Abstract

The invention provides an intelligent security protection system configuration method. The method comprises the following steps: obtaining identifier information and azimuth information of one or more preset security protection switches and establishing a list of corresponding relationships between the identifier information and the azimuth information; writing the corresponding relationship list into a storage space of a preset camera apparatus; and controlling the camera apparatus to be in a monitoring state, so that the camera apparatus can adjust a camera shooting angle to perform shooting in response to a camera shooting driving signal sent by at least one security protection switch. The invention furthermore provides an intelligent security protection system configuration apparatus. Therefore, the intelligent security protection system configuration method and apparatus can realize intelligent and efficient security protection monitoring.

Description

Intelligent safety and defence system collocation method and device
Technical field
The present invention relates to safe antitheft technical field, particularly relate to a kind of intelligent safety and defence system collocation method and device.
Background technology
Along with the develop rapidly of science and technology, the means of crime of offender develops into present intellectuality, complicated, hiddenization from the simplification in past, obviousization.Meanwhile, people to self and the personal safety of household and the attention rate of property safety also more and more high.Therefore, in recent years, increasing people selected to install guard against theft and alarm system at home.
The effect of safety monitoring alarming system in people's life is become stronger day by day, and people also more and more pay attention to the use of the monitoring and alarming system of security protection aspect.When having illegal invasion person or gas leak in manager, system can make a phone call, sends the mobile phone of note to designated user by automatic poking.Monitored picture in family can be checked and controls that household electrical appliances in its family are arranged, the operation such as to withdraw a garrison of deploying troops on garrison duty by the terminal equipment such as very first time mobile phone or computer after user receives mobile phone short message.Safety monitoring alarming system traditional on the market, in the communication technology, usually adopts P2P (point-to-point) NAT through-transmission technique, and carries out information transmission by communications such as WiFi, 3G, ZigBee.Whether safety monitoring alarming system is generally be used for detection door, window, drawer etc. by door magnetic technology illegally to be opened or mobile, once robber pushes the door open, door and doorframe will produce displacement, door magnetic and magnet also produce displacement simultaneously, (electric wave) signal is transmitted to main frame at once, and main frame ring chimes of doom also dials default telephone number.In addition, along with external high in the clouds camera Dropcam sound of the wind water rises, domestic security protection camera is also broken through the soil as emerged rapidly in large numbersBamboo shoots after a spring rain.Camera is combined with door magnetic technology, be different from the safety-protection system of the simple function existed on the market: the simple functions such as burglar alarm, fire alarm and gas leakage alarm can only be realized, situation at that time can not be recorded, resident can not be made to understand the information of monitoring in real time, strong evidence can not be provided for solving a case of the police.Intelligent security guard product builds and plays three-dimensional intelligent household security system, and multipath is omnibearing guards house security.
But, because present security product is on the market also immature, in practical application, there is a lot of problem.Such as, the present domestic environment of people often has multiple door, and safety-protection system cannot be corresponding with camera by a certain door, door magnetic exactly, thus, often cause indoor security chaotic, make the house security of people there is certain risk to a certain extent.
Summary of the invention
Object of the present invention is intended to solve at least one problem above-mentioned, provides a kind of chat control method of carrying out based on e-book and device, to realize the function of e-book instant chat.
To achieve these goals, the invention provides a kind of intelligent safety and defence system collocation method, comprise the following steps:
Obtain identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Described corresponding relation list is written in the memory space of the camera head pre-set;
Control described camera head in the monitoring state, make the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
Further, obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, setting up in the step of corresponding relation list of each identification information and azimuth information, comprising:
Obtain the identification information of encryption, after identification information is decrypted, each identification information and azimuth information are set up corresponding relation list.
Further, method also comprises:
Send operating instruction when security switch is triggered, the azimuth information of Long-distance Control camera head security switch according to corresponding relation list lookup, and open camera function.
Further, method also comprises:
Send rotation command, the anglec of rotation of the The Cloud Terrace of long-range adjustment camera head, to make to arrange camera thereon towards the direction corresponding with rotation information to implement shooting with video-corder this direction.
Further, method also comprises:
Send focusing instruction, Long-distance Control camera head makes its shot with video-corder picture that zooms in or out.
The present invention also provides a kind of intelligent safety and defence system collocation method, comprises the following steps:
Obtain identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Described corresponding relation list is written in the memory space of the machine pre-set;
Obtain the shooting drive singal that at least one security switch sends, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
Further, method also comprises:
When security switch is triggered, in response to operating instruction, the azimuth information of security switch according to corresponding relation list lookup, and shoot with video-corder.
Further, method also comprises:
In response to rotation command, the camera be arranged on The Cloud Terrace is rotated to an angle towards the direction corresponding with rotation information, and carry out the party to shoot with video-corder.
Further, method also comprises:
In response to focusing instruction, make its shot with video-corder picture that zooms in or out.
Further, method also comprises:
In response to END instruction, terminate current to shoot with video-corder task.
A kind of intelligent safety and defence system inking device, is characterized in that, comprising:
First acquisition module: for obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
First memory module: for described corresponding relation list is written in the memory space of the camera head pre-set;
First respond module: in the monitoring state for controlling described camera head, makes the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
Further, described first acquisition module comprises:
Deciphering module: for obtaining the identification information of encryption, after identification information is decrypted, each identification information and azimuth information are set up corresponding relation list.
Further, device also comprises:
First runs module: for sending operating instruction when security switch is triggered, the azimuth information of Long-distance Control camera head security switch according to corresponding relation list lookup, and open camera function.
Further, device also comprises:
First rotating module: for sending rotation command, the anglec of rotation of the The Cloud Terrace of long-range adjustment camera head, to make to arrange camera thereon towards the direction corresponding with rotation information to implement shooting with video-corder this direction.
Further, device also comprises:
First focusing module: for sending focusing instruction, Long-distance Control camera head makes its shot with video-corder picture that zooms in or out.
The present invention also provides a kind of intelligent safety and defence system inking device, it is characterized in that, comprising:
Second acquisition module: for obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Second memory module: for described corresponding relation list is written in the memory space of the machine pre-set;
Second respond module: for obtaining the shooting drive singal that at least one security switch sends, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
Further, device also comprises:
Second runs module: for when security switch is triggered, in response to operating instruction, the azimuth information of security switch according to corresponding relation list lookup, and shoots with video-corder.
Further, device also comprises:
Second rotating module: in response to rotation command, the camera be arranged on The Cloud Terrace is rotated to an angle towards the direction corresponding with rotation information, and carry out the party to shoot with video-corder.
Further, device also comprises:
Second focusing module: in response to focusing instruction, make its shot with video-corder picture that zooms in or out.
Further, device also comprises:
Terminate module: in response to END instruction, terminate current to shoot with video-corder task.
The solution of the present invention has the following advantages:
1, the present invention is by obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, and sets up the corresponding relation list of each identification information and azimuth information; Described corresponding relation list is written in the memory space of the camera head pre-set; Control described camera head in the monitoring state, make the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch, realizes the pairing of smart machine and security switch and camera head, thus reach intellectuality and the high efficiency of safety-protection system
2, the present invention is by obtaining the identification information of encryption, after identification information is decrypted, each identification information and azimuth information are set up corresponding relation list, thus the safety realizing smart machine and security switch is matched, improve tightness and the fail safe of safety-protection system on the whole.
The aspect that the present invention adds and advantage will part provide in the following description, and these will become obvious from the following description, or be recognized by practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or additional aspect and advantage will become obvious and easy understand from the following description of the accompanying drawings of embodiments, wherein:
Fig. 1 is the schematic flow sheet of intelligent safety and defence system collocation method embodiment one of the present invention;
Fig. 2 is the schematic flow sheet of intelligent safety and defence system collocation method embodiment two of the present invention;
Fig. 3 is the structural representation of intelligent safety and defence system inking device embodiment one of the present invention;
Fig. 4 is the structured flowchart of the acquisition module of intelligent safety and defence system inking device embodiment one of the present invention;
Fig. 5 is the structural representation of intelligent safety and defence system inking device embodiment two of the present invention.
Embodiment
Be described below in detail embodiments of the invention, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has element that is identical or similar functions from start to finish.Being exemplary below by the embodiment be described with reference to the drawings, only for explaining the present invention, and can not limitation of the present invention being interpreted as.
Those skilled in the art of the present technique are appreciated that unless expressly stated, and singulative used herein " ", " one ", " described " and " being somebody's turn to do " also can comprise plural form.Should be further understood that, the wording used in specification of the present invention " comprises " and refers to there is described feature, integer, step, operation, element and/or assembly, but does not get rid of and exist or add other features one or more, integer, step, operation, element, assembly and/or their group.Should be appreciated that, when we claim element to be " connected " or " coupling " to another element time, it can be directly connected or coupled to other elements, or also can there is intermediary element.In addition, " connection " used herein or " coupling " can comprise wireless connections or wirelessly to couple.Wording "and/or" used herein comprises one or more whole or arbitrary unit listing item be associated and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (comprising technical term and scientific terminology), have the meaning identical with the general understanding of the those of ordinary skill in field belonging to the present invention.It should also be understood that, those terms defined in such as general dictionary, should be understood to that there is the meaning consistent with the meaning in the context of prior art, unless and by specific definitions as here, otherwise can not explain by idealized or too formal implication.
Those skilled in the art of the present technique are appreciated that, here used " terminal ", " terminal equipment " had both comprised the equipment of wireless signal receiver, it only possesses the equipment of the wireless signal receiver without emissivities, comprise again the equipment receiving and launch hardware, it has and on bidirectional communication link, can perform the reception of two-way communication and launch the equipment of hardware.This equipment can comprise: honeycomb or other communication equipments, its honeycomb or other communication equipment of having single line display or multi-line display or not having multi-line display; PCS (PersonalCommunicationsService, PCS Personal Communications System), it can combine voice, data processing, fax and/or its communication ability; PDA (PersonalDigitalAssistant, personal digital assistant), it can comprise radio frequency receiver, beep-pager, the Internet/intranet access, web browser, notepad, calendar and/or GPS (GlobalPositioningSystem, global positioning system) receiver; Conventional laptop and/or palmtop computer or other equipment, it has and/or comprises the conventional laptop of radio frequency receiver and/or palmtop computer or other equipment.Here used " terminal ", " terminal equipment " can be portable, can transport, be arranged in the vehicles (aviation, sea-freight and/or land), or be suitable for and/or be configured at local runtime, and/or with distribution form, any other position operating in the earth and/or space is run.Here used " terminal ", " terminal equipment " can also be communication terminal, access terminals, music/video playback terminal, can be such as PDA, MID (MobileInternetDevice, mobile internet device) and/or there is the mobile phone of music/video playing function, also can be the equipment such as intelligent television, Set Top Box.
Those skilled in the art of the present technique are appreciated that used remote network devices here, and it includes but not limited to the cloud that computer, network host, single network server, multiple webserver collection or multiple server are formed.At this, cloud is formed by based on a large amount of computer of cloud computing (CloudComputing) or the webserver, and wherein, cloud computing is the one of Distributed Calculation, the super virtual machine be made up of a group loosely-coupled computer collection.In embodiments of the invention, realize communicating by any communication mode between remote network devices, terminal equipment with WNS server, include but not limited to, the mobile communication based on 3GPP, LTE, WIMAX, the computer network communication based on TCP/IP, udp protocol and the low coverage wireless transmission method based on bluetooth, infrared transmission standard.
The method of the invention is mainly applicable to intelligent mobile phone terminal or Intelligent flat terminal etc., is not restricted to the type of its operating system, can be the operating systems such as Android, IOS, Saipan.In order to the detailed implementation of intelligent safety and defence system collocation method of the present invention is described, refer to Fig. 1, the method comprises the following steps:
S11, the identification information obtaining the one or more security switchs pre-set and azimuth information thereof, set up the corresponding relation list of each identification information and azimuth information.
Smart machine is by obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, and the identification information of security switch and azimuth information are set up mutually corresponding relation list, thus be convenient to the management of smart machine to security switch and camera head.In the present embodiment, smart machine includes but not limited to smart mobile phone, Intelligent flat or Intelligent worn device.
In intelligent safety and defence system collocation method of the present invention, security switch can be door magnetic (Doorsensor).Whether door magnetic is used to detection door, window, drawer etc. and is illegally opened or the trigger event of movement.So-called door magnetic is door status switch in fact, and be substantially made up of permanent magnet and door magnetic main body two parts, there is one block of permanent magnet permanent magnet inside, is used for producing constant magnetic field; Door magnetic body interior has the tongue tube of an open type, and is connected with wireless launcher; When permanent magnet and tongue tube lean on very near (being such as less than 5 millimeters), door status switch is in work stand-by state; After permanent magnet leaves tongue tube certain distance, door status switch is in normally open.Therefore, when being loaded on the objects such as door, window, drawer when door abampere, door magnetic when the objects such as door, window, drawer are opened or are mobile, can be identified as open event, sends signal by wireless launcher; Certainly, when the objects such as door, window, drawer are finally closed, door magnetic is identified as close event, also can send signal by wireless launcher.The Receiving Host Received signal strength of door magnetic, and signal is converted into information, then by modes such as radio communications, information is sent to camera head.
Camera head communication module can be connected by Bluetooth communication with security switch, and security switch is trusted communication interface by pre-established bluetooth and sent information to camera head.
Described pre-established bluetooth trusts communication interface, the communication interface that the communication module that can be understood as camera head was carried out Bluetooth pairing with security switch in advance and formed.Such as, camera head and security switch just carried out Bluetooth pairing in advance before dispatching from the factory, or camera head and security switch to have arrived in user's hand user again by its Bluetooth pairing.Just be equivalent to bluetooth pre-established through the camera head of a Bluetooth pairing and security switch and trusted communication interface, such camera head once carries out can directly breaking the wall of mistrust when bluetooth is connected connection with security switch upper, no longer carries out Bluetooth pairing.
Therefore; in the information that security switch sends; usually characteristic information or the mark of unique identification of security switch can also be comprised; such as, in physical address (MAC) and identifier (ID) at least one; such smart machine just can be added trust list when Bluetooth pairing in advance, can identify and directly automatically connect when next time connects.
Wherein, obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, setting up in the step of corresponding relation list of each identification information and azimuth information:
Obtain the identification information of encryption, after identification information is decrypted, each identification information and azimuth information are set up corresponding relation list.
By the way, realize the pairing of smart machine and security switch and camera head, thus be reached through the object that smart machine manages security switch and camera head.In order to realize this object, iBeacon technology can be adopted, function setting that low-power consumption bluetooth (BLE) communicates will be had on security switch, security switch sends oneself distinctive ID towards periphery by BLE technology, can take some actions when smart machine receives this ID according to this ID.Such as, iBeacon just can be used when security switch changes or quit work to send information to smart machine, make user's very first time just can know this information, thus make reasonable judgement.Wherein, BLE is the broadcast frame of " announcement frame ", and announcement frame is the frame regularly sent, as long as support that the equipment of BLE just can receive.The data of iBeacon are formed primarily of four kinds of information, are UUID (universal unique identifier), Major, Minor, MeasuredPower respectively.Wherein, UUID is 128 bit identifiers of standard, Major and Minor is the identifier of 16.Such as, chain store can in Major writing area information, the ID etc. in indivedual shop can be write in Minor.In addition, when embedding iBeacon function in household electrical appliances, product type can be represented with Major, represent error code with Minor, be used for externally notifying fault.MeasuredPower be reference Received signal strength between iBeacon module and receiver when 1m by force (RSSI), receiver calculates the distance of sending module and receiver according to the intensity of this reference RSSI and Received signal strength.
In network information transfer, mainly contain two kinds of cryptographic algorithm; MD5 and RSA, wherein, MD5 is irreversible, can only encrypt and can not decipher; RSA is reversible, and a character string can after rsa encryption, and the character string after encryption passes to opposite end as on server, then is decrypted.Be encrypted it before information transmission, corresponding cipher mode can have multiple, such as, can be encrypted by symmetric key mechanisms to described information, and described symmetric key mechanisms refers to that the key that deciphering uses is identical with encrypting the key used.In addition, also a symmetric key can be arranged by transmitting terminal and receiving terminal both sides.When recipient needs to watch described information, subsequent ciphertext can be untied with the private key of oneself and obtain described symmetric key, then untie initial ciphertext with described symmetric key and obtain cleartext information.Described private key can be generated by user and recipient oneself and be preserved, and corresponding PKI is full disclosure.In addition, also described private key can be kept at described recipient local, pass through password protection.In order to prevent Trojan software from stealing private key and private key password further simultaneously, can also adopt hardware private keys (USBkey that such as Net silver uses), private key is importing after this hardware, and private key is just not readable, the operation of deciphering only and signing electronically.
In addition, smart machine can obtain identification information and the azimuth information of security switch in the following manner: the modes such as infrared technique, wireless technology or barcode scanning.In the present embodiment, will for wireless technology.
Smart machine obtains identification information and the azimuth information of security switch by wireless technology; Can be specifically bluetooth approach, WIFI, wireless radio-frequency, ZigBee technology etc.Wherein, Bluetooth technology is a kind of wireless data of opening and the equipment of information transmission, be a kind of short range transmission equipment utilizing wireless replacement wire cable, permanent plant can be realized, short-range data between mobile device and building personal area network exchanges (the UHF radio wave using the ISM wave band of 2.4-2.485GHz).Bluetooth uses frequency hopping, and the Data Segmentation of transmission is become packet, and the bluetooth channel of being specified by 79 transmits packet respectively.The frequency range of each channel is 1MHz, and bluetooth 4.0 uses 2MHz spacing, can hold 40 channels.First channel starts from 2402MHz, and every 1MHz channel, to 2480MHz.There is adaptive frequency hopping (AdaptiveFrequency-Hopping is called for short AFH) function, usual jumping per second 1600 times.Bluetooth is based on packet, the agreement having client/server.Main equipment at the most can with seven in same piconet from device talk.All devices shares the clock of main equipment.Base clock that packet switching defines based on main equipment, that run for interval with 312.5 μ s.Two clock cycle form the groove of 625 μ s, and when two, gap just constitutes the gap pair of 1250 μ s.Under the simple scenario of single groove package, main equipment sends information at even numbers groove, odd number groove is received information.Then just in time contrary from equipment.Gap when package capacity is 1,3 or 5, but no matter be which kind of situation, main equipment all can transmit from even numbers groove, transmits from odd number groove from equipment.
Utilize the transfer of data that bluetooth is carried out, transfer of data can be carried out at any time between main equipment and other equipment (applying except few broadcast mode).Main equipment can select to access from equipment; Typically, it can between devices with the mode rapid translating of rotating.Because be main equipment select to access from equipment, will await orders in receiving slit from equipment in theory, the burden of main equipment is than fewer from equipment.Main equipment can be connected from equipment with seven, but is but difficult to be connected with more than one main equipment from equipment.
Realize the method for Bluetooth data transfer: joined by Bluetooth communication modules in data detection instrument, every user data that so just can realize detecting is transferred to the intelligent android system equipment end opening bluetooth port in the mode of electric wave.Because mobile terminal can scan neighbouring a lot of equipment, so need to confirm that device port carries out transfer of data again.Corresponding reception interface can be opened when mobile terminal receives data simultaneously, thus realize the display of data.
And WIFI, be the technology that the terminals such as PC, handheld device (as pad, mobile phone) can wirelessly be connected to each other by one.Can by opening a wifi hotspot recipient in android system, then transmit leg connects this wifi hotspot, and such recipient and transmission are sent out just at a local area network (LAN), are then communicated by socket.
For wireless radio-frequency (RFID), be a kind of contactless automatic identification technology, relative to traditional magnetic card and IC-card technology have noncontact, reading rate fast, without features such as wearing and tearing.Wireless radio-frequency carries out noncontact bidirectional data transfers between reader and radio-frequency card, to reach the object of target identification and exchanges data, compared with traditional bar code, magnetic card and IC-card, radio-frequency card has that noncontact, reading rate are fast, without wearing and tearing, not affected by environment, the life-span long, feature easy to use and have anti-collision function, can process multiple cards simultaneously.The most basic rfid system is made up of following three parts: 1) label, i.e. radio-frequency card: be made up of coupling element and chip, label contains built-in aerial, for radio-frequency antenna between communicate.2) reader: the equipment reading or write label information.3) antenna: transmit radiofrequency signal between label and reader.The basic functional principle of RFID is after label enters magnetic field, and receive the radiofrequency signal that plug-in reader sends, the energy obtained by means of induced current sends out storage product information in the chips, or initiatively sends the signal of a certain frequency; Plug-in reader reads information and after decoding, delivers to CIS and carry out relevant data process.
And ZigBee technology, being a kind of short distance, low power consumption wireless network technology, is a kind of technical scheme between radio mark technology and bluetooth.ZigBee technology has following characteristics: 1) reliability, adopt collision-avoidance mechanism, there is between node module the function of automatic dynamic networking, information is transmitted by the mode of automatic route in whole Zigbee network, the MAC layer of Zigbee adopts csma/conflict avoidance Access Algorithm, ensure that the reliability of information transmission.2) time delay is short, should be used as optimization for delay sensitive, communication delay and to activate time delay from resting state all very short, and usual time delay is all between 15ms to 30ms.3) capacity is large, and in a ZigBee networking, maximum ALARA Principle of host node 254 is from node, if by network coordinator, 65000 network nodes can be supported at most in whole networking.4) fail safe, ZigBee provides data integrity inspection and authentication functions.5) excellent network topology ability, ZigBee equipment has Wi-Fi self-healing ability, and ZigBee has ability that is starlike, tree-shaped and mesh network topology.Therefore, by ZigBee wireless network topology can simply coverage be wider.Each ZigBee-network node not only itself can as monitored object, and such as its transducer connected directly carries out data acquisition and monitoring, automatically can also pass the data information of coming by other network node of transfer.In addition, each ZigBee-network node (FFD) also can in the scope of oneself quorum sensing inhibitor, and multiple isolated child node (RFD) wireless connections not bearing network information transfer task.
In addition to the method described above, smart machine can also select communication channel automatically according to the size of data, and the communication realizing data is smooth.
S12, described corresponding relation list to be written in the memory space of the camera head pre-set.
Android provides following four kinds of storage modes: SharePreference, SQLite, File, ContentProvider.Data in android system are substantially all privately owned, under generally leaving " data/data/ program package name " catalogue in.If realize data sharing, correct mode uses ContentProvider.
SharedPreference is a kind of light-duty data storage method, is actually " key-value " key-value pair data stored based on XML file.Be commonly used to more stored program configuration informations.It is stored in " under data/data/ program package name/shared_prefs catalogue.SharedPreference itself can only obtain data, does not support to store and amendment, stores and revises and will be realized by Editor object.SQLite is a lightweight relevant database, and SQLite only has NULL, INTEGER, REAL (floating number), TEXT (character string) and BLOB (large data) five types, there is not BOOLEAN and DATE type.File is file storing mode.ContentProvider is complicated relative to other Method compare, and its function is also revolutionary change relative to other mode certainly.It can realize across application between data manipulation.Utilize the methods such as delete, update, insert, query of ContentResolver object to remove to grasp the object of ContentProvider, allow the method for ContentProvider object go data manipulation.
Lower SQLiteDatabase is introduced at this, encapsulate the API of certain operations database, use such can to carry out adding (Create), inquiry (Retrieve), upgrade (Update) and delete (Delete) operation by complete paired data.In order to realize managing database version, SQLiteOpenHelper class provides two important methods, onCreate (SQLiteDatabasedb) and onUpgrade (SQLiteDatabasedb respectively, intoldVersion, intnewVersion), the former generates database table for using for the first time during software, upgrades database table structure when the latter is used for upgrade software.When getWritableDatabase or the getReadableDatabase method calling SQLiteOpenHelper obtains the SQLiteDatabase example for operating database time, if database does not exist, android system can generate a database automatically, then onCreate method is called, onCreate method just can be called when first generation database, can generate database table structure and add some to apply the initialization data used in onCreate method.
Terminal equipment generally can comprise communication unit, the memory including one or more computer-readable recording mediums, input unit, display unit, transducer, voicefrequency circuit, WiFi module, include the parts such as processor and power supply that more than or processes core.Communication unit can be used for receiving and sending messages or in communication process, the reception of signal and transmission, this communication unit can be the network communication equipments such as RF (RadioFrequency, radio frequency) circuit, router, modulator-demodulator.Especially, when communication unit is RF circuit, after being received by the downlink information of base station, transfer to more than one or one processor process; In addition, base station is sent to by relating to up data.Usually, RF circuit as communication unit includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupler, LNA (LowNoiseAmplifier, low noise amplifier), duplexer etc.In addition, communication unit can also by radio communication and network and other devices communicatings.Described radio communication can use arbitrary communication standard or agreement, include but not limited to GSM (GlobalSystemofMobilecommunication, global system for mobile communications), GPRS (GeneralPacketRadioService, general packet radio service), CDMA (CodeDivisionMultipleAccess, code division multiple access), WCDMA (WidebandCodeDivisionMultipleAccess, Wideband Code Division Multiple Access (WCDMA)), LTE (LongTermEvolution, Long Term Evolution), Email, SMS (ShortMessagingService, Short Message Service) etc.Memory can be used for storing software program and module, and processor is stored in software program and the module of memory by running, thus performs the application of various function and data processing.Memory mainly can comprise storage program district and store data field, and wherein, storage program district can storage operation system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of terminal equipment.In addition, memory can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory can also comprise Memory Controller, to provide processor and input unit to the access of memory.
Thus, in intelligent safety and defence system collocation method of the present invention, can adopt but be not limited to the data storage method of SQLite, the identification information of security switch and its azimuth information being carried out corresponding lists, then stores.
S13, to control described camera head in the monitoring state, makes the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
In intelligent safety and defence system collocation method of the present invention, camera head can the camera device of image recording, video and sound, in the present embodiment for monitoring.Camera head is made up of two large entity part usually: camera and The Cloud Terrace.Camera is arranged on The Cloud Terrace, is in the state that can rotate up and down, can control motor carry out left-right rotation by level, rotates up and down by vertically controlling motor.
When security switch is multiple, azimuth information that can be corresponding different according to respective identification information (such as MAC or ID).Such as, security switch may be installed on multiple gate, multiple window, multiple safety cabinet etc., these security switchs usually scatter and are arranged at diverse location, so can make the direction corresponding to each sense security switch of camera head identification by the identification information of security switch.
But, if exist camera head receive simultaneously multiple security switch send shooting drive singal time, then because respective drive singal all correspond to respective monitor task, camera head may not be determined to monitor the direction corresponding to which security switch, thus causes monitoring chaotic.Therefore, in the present embodiment, may be thought of as each security switch and corresponding priority level is set, when camera head receives the shooting drive singal of multiple security switch transmission simultaneously, monitor according to the direction corresponding to other security switch of limit priority.Therefore, the processing module of camera head can also according to the identification information of security switch, determine the priority level information corresponding with the identification information of security switch, and relation list the priority level information corresponding for the identification information of security switch and azimuth information being set up correspondence stores.
In addition to the above, can also set this intelligent safety and defence system at real-life actual needs according to people.
In addition, in order to improve Consumer's Experience, the smart machine of user and security switch and camera head can be bound, all can identify when user is used at every turn and directly automatically connect.
OAuth (open mandate) is an open standard, user is allowed to allow third-party application access the resource of the secret that this user stores on a certain website (as photo, video, contacts list), and without the need to username and password is supplied to third-party application.OAuth2.0 pays close attention to the simplification of client developer, is Web application simultaneously, desktop application and mobile phone, and living room equipment provides special identifying procedure.
Wherein, send operating instruction when security switch is triggered, the azimuth information of Long-distance Control camera head security switch according to corresponding relation list lookup, and open camera function.
In some cases, even if security switch is triggered, may not need to monitor yet.Such as, when security switch is installed on gate, window, safety cabinet, when gate, window, safety cabinet are unlocked and trigger security switch, if the legal event that the personnel obtained the authorization carry out, then without the need to monitoring.Therefore, be triggered trigger under legal event if camera head monitors security switch, after this information triggered can be received, ignore monitor task; If camera head monitors security switch and is triggered and do not trigger under legal event, just after receiving this information triggered, accept monitor task.Adopt this kind of design concept, can Consumer's Experience be improved.
In addition, the more personnel obtained the authorization may be had within some time period to carry out legal event to trigger security switch, such as, a large amount of friends and families may be had during family party to open gate and trigger security switch, therefore user can set a certain event section photographic device inside without the need to responding operating instruction to accept monitor task.Camera head, within the time period of setting, even if receive the operating instruction produced because security switch is triggered, does not affect it yet and suspends monitor task.
Or in some cases, family has people to be in the time period by day, does not now need camera head close supervision gate, only needs just need camera head close supervision gate for security consideration evening.Therefore, camera head can just receive the operating instruction produced because security switch is triggered within the time period of setting, thus accepts monitor task.
Wherein, send rotation command, the anglec of rotation of the The Cloud Terrace of long-range adjustment camera head, to make to arrange camera thereon towards the direction corresponding with rotation information to implement shooting with video-corder this direction.
Camera being arranged on The Cloud Terrace, making it be in the state that can rotate up and down, motor can be controlled by level and carry out left-right rotation, rotating up and down by vertically controlling motor.
Usual camera can be arranged at an initial position, as the normal place of camera.When the shooting drive singal that camera head sends in response to security switch, then according to the azimuth information of the required corresponding security switch of the corresponding relation list lookup be stored in camera head space, then, camera will rotate as calculating basic point based on this normal place.Such as, when camera is just positioned at normal place, a security switch (can adopt the mode of numbering to distinguish security switch, but be not limited to a kind of mode) send shooting drive singal to camera head, camera head is according to the drive singal received, azimuth information corresponding to a security switch is searched immediately (such as in the memory space of self, security switch is relative to the angle of camera head---the A angle that turns right, upwards rotation B angle), camera, under the drive of motor, the A angle that turns right, upwards rotates B angle; Or, if camera is not positioned at normal place, such as, to be positioned at for normal place C angle, upwards D angle to the right, then can to obtain the required angle of rotating of camera for C-A angle, upwards D-B angle to the right, wherein ,-be minus sign.
Wherein, send focusing instruction, Long-distance Control camera head makes its shot with video-corder picture that zooms in or out.
In order to better realize safety protection function, user can according to on-the-spot actual needs, and the picture of shooting with video-corder camera head carries out the adjustment of size.Such as, when the picture that camera head is shot with video-corder is because of time distant and fuzzy, can send focusing instruction, Long-distance Control camera head amplifies its picture of shooting with video-corder, thus more clear; In like manner, when the picture that camera head is shot with video-corder can only shoot with video-corder a part of scene because of close together, can send focusing instruction, Long-distance Control camera head reduces its picture of shooting with video-corder, thus more comprehensive.In actual applications, concrete zooms in or out operation, can adopt manual regulation and control, namely adopts the operating gesture of multi-point touch screen, when smart machine senses that the relative distance of user's two fingers becomes large, then and magnified picture size; Relatively, when the relative distance of two fingers sensing user diminishes, then picture dimension is reduced.
In addition, when smart machine comprises microphone, user can be zoomed in or out the picture that camera head is shot with video-corder by voice.Such as, when acoustic sensor on the smart machine receiver perceived on the voice of user or smart machine receives the signal of " picture amplification ", first the semanteme of these voice is identified, amplify if semanteme is picture, then be sent to camera head by long-range for this signal, control camera head and realize this operation; In like manner, when the receiver perceived on the voice of user or smart machine of the acoustic sensor on smart machine receives the signal of " picture reduces ", first the semanteme of these voice is identified, reduce for picture if semantic, then be sent to camera head by long-range for this signal, control camera head and realize this operation.
Certainly, along with the development of science and technology, shoot with video-corder zooming in or out operation and also can adopting other effective mode of picture.
Fig. 2 is the schematic flow sheet of intelligent safety and defence system collocation method embodiment two of the present invention, and a kind of intelligent safety and defence system collocation method, comprises the following steps:
S21, the identification information obtaining the one or more security switchs pre-set and azimuth information thereof, set up the corresponding relation list of each identification information and azimuth information;
Smart machine is by obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, and the identification information of security switch and azimuth information are set up mutually corresponding relation list, thus be convenient to the management of smart machine to security switch and camera head.In the present embodiment, smart machine includes but not limited to smart mobile phone, Intelligent flat or Intelligent worn device.
In intelligent safety and defence system collocation method of the present invention, security switch can be door magnetic (Doorsensor).Whether door magnetic is used to detection door, window, drawer etc. and is illegally opened or the trigger event of movement.So-called door magnetic is door status switch in fact, is substantially made up of permanent magnet and door magnetic main body two parts.There is one block of permanent magnet permanent magnet inside, is used for producing constant magnetic field; Door magnetic body interior has the tongue tube of an open type, and is connected with wireless launcher; When permanent magnet and tongue tube lean on very near (being such as less than 5 millimeters), door status switch is in work stand-by state; After permanent magnet leaves tongue tube certain distance, door status switch is in normally open.Therefore, when being loaded on the objects such as door, window, drawer when door abampere, door magnetic when the objects such as door, window, drawer are opened or are mobile, can be identified as open event, sends signal by wireless launcher; Certainly, when the objects such as door, window, drawer are finally closed, door magnetic is identified as close event, also can send signal by wireless launcher.The Receiving Host Received signal strength of door magnetic, and signal is converted into information, then by modes such as radio communications, information is sent to camera head.
Camera head communication module can be connected by Bluetooth communication with security switch, and security switch is trusted communication interface by pre-established bluetooth and sent information to camera head.
Described pre-established bluetooth trusts communication interface, the communication interface that the communication module that can be understood as camera head was carried out Bluetooth pairing with security switch in advance and formed.Such as, camera head and security switch just carried out Bluetooth pairing in advance before dispatching from the factory, or camera head and security switch to have arrived in user's hand user again by its Bluetooth pairing.Just be equivalent to bluetooth pre-established through the camera head of a Bluetooth pairing and security switch and trusted communication interface, such camera head once carries out can directly breaking the wall of mistrust when bluetooth is connected connection with security switch upper, no longer carries out Bluetooth pairing.
Therefore; in the information that security switch sends; usually characteristic information or the mark of unique identification of security switch can also be comprised; such as, in physical address (MAC) and identifier (ID) at least one; such camera head just can be added trust list when Bluetooth pairing in advance, can identify and directly automatically connect when next time connects.
S22, described corresponding relation list is written in the memory space of the machine pre-set;
Android provides following four kinds of storage modes: SharePreference, SQLite, File, ContentProvider.Data in android system are substantially all privately owned, under generally leaving " data/data/ program package name " catalogue in.If realize data sharing, correct mode uses ContentProvider.
SharedPreference is a kind of light-duty data storage method, is actually " key-value " key-value pair data stored based on XML file.Be commonly used to more stored program configuration informations.It is stored in " under data/data/ program package name/shared_prefs catalogue.SharedPreference itself can only obtain data, does not support to store and amendment, stores and revises and will be realized by Editor object.SQLite is a lightweight relevant database, and SQLite only has NULL, INTEGER, REAL (floating number), TEXT (character string) and BLOB (large data) five types, there is not BOOLEAN and DATE type.File is file storing mode.ContentProvider is complicated relative to other Method compare, and its function is also revolutionary change relative to other mode certainly.It can realize across application between data manipulation.Utilize the methods such as delete, update, insert, query of ContentResolver object to remove to grasp the object of ContentProvider, allow the method for ContentProvider object go data manipulation.
Lower SQLiteDatabase is introduced at this, encapsulate the API of certain operations database, use such can to carry out adding (Create), inquiry (Retrieve), upgrade (Update) and delete (Delete) operation by complete paired data.In order to realize managing database version, SQLiteOpenHelper class provides two important methods, onCreate (SQLiteDatabasedb) and onUpgrade (SQLiteDatabasedb respectively, intoldVersion, intnewVersion), the former generates database table for using for the first time during software, upgrades database table structure when the latter is used for upgrade software.When getWritableDatabase or the getReadableDatabase method calling SQLiteOpenHelper obtains the SQLiteDatabase example for operating database time, if database does not exist, android system can generate a database automatically, then onCreate method is called, onCreate method just can be called when first generation database, can generate database table structure and add some to apply the initialization data used in onCreate method.
Terminal equipment generally can comprise communication unit, the memory including one or more computer-readable recording mediums, input unit, display unit, transducer, voicefrequency circuit, WiFi module, include the parts such as processor and power supply that more than or processes core.Communication unit can be used for receiving and sending messages or in communication process, the reception of signal and transmission, this communication unit can be the network communication equipments such as RF (RadioFrequency, radio frequency) circuit, router, modulator-demodulator.Especially, when communication unit is RF circuit, after being received by the downlink information of base station, transfer to more than one or one processor process; In addition, base station is sent to by relating to up data.Usually, RF circuit as communication unit includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupler, LNA (LowNoiseAmplifier, low noise amplifier), duplexer etc.In addition, communication unit can also by radio communication and network and other devices communicatings.Described radio communication can use arbitrary communication standard or agreement, include but not limited to GSM (GlobalSystemofMobilecommunication, global system for mobile communications), GPRS (GeneralPacketRadioService, general packet radio service), CDMA (CodeDivisionMultipleAccess, code division multiple access), WCDMA (WidebandCodeDivisionMultipleAccess, Wideband Code Division Multiple Access (WCDMA)), LTE (LongTermEvolution, Long Term Evolution), Email, SMS (ShortMessagingService, Short Message Service) etc.Memory can be used for storing software program and module, and processor is stored in software program and the module of memory by running, thus performs the application of various function and data processing.Memory mainly can comprise storage program district and store data field, and wherein, storage program district can storage operation system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of terminal equipment.In addition, memory can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory can also comprise Memory Controller, to provide processor and input unit to the access of memory.
Thus, in intelligent safety and defence system collocation method of the present invention, can adopt but be not limited to the data storage method of SQLite, the identification information of security switch and its azimuth information being carried out corresponding lists, then stores.
S23, obtain at least one security switch send shooting drive singal, thus adjustment camera angle take; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
When security switch is multiple, azimuth information that can be corresponding different according to respective identification information (such as MAC or ID).Such as, security switch may be installed on multiple gate, multiple window, multiple safety cabinet etc., these security switchs usually scatter and are arranged at diverse location, so can make the direction corresponding to each sense security switch of camera head identification by the identification information of security switch.
But, if exist camera head receive simultaneously multiple security switch send shooting drive singal time, then because respective drive singal all correspond to respective monitor task, camera head may not be determined to monitor the direction corresponding to which security switch, thus causes monitoring chaotic.Therefore, in the present embodiment, may be thought of as each security switch and corresponding priority level is set, when camera head receives the shooting drive singal of multiple security switch transmission simultaneously, monitor according to the direction corresponding to other security switch of limit priority.Therefore, the processing module of camera head can also according to the identification information of security switch, determine the priority level information corresponding with the identification information of security switch, and relation list the priority level information corresponding for the identification information of security switch and azimuth information being set up correspondence stores.
In addition, in order to improve Consumer's Experience, the smart machine of user and security switch and camera head can be bound, all can identify when user is used at every turn and directly automatically connect.
OAuth (open mandate) is an open standard, user is allowed to allow third-party application access the resource of the secret that this user stores on a certain website (as photo, video, contacts list), and without the need to username and password is supplied to third-party application.OAuth2.0 pays close attention to the simplification of client developer, is Web application simultaneously, desktop application and mobile phone, and living room equipment provides special identifying procedure.
Wherein, when security switch is triggered, in response to operating instruction, the azimuth information of security switch according to corresponding relation list lookup, and shoot with video-corder.
In some cases, even if security switch is triggered, may not need to monitor yet.Such as, when security switch is installed on gate, window, safety cabinet, when gate, window, safety cabinet are unlocked and trigger security switch, if the legal event that the personnel obtained the authorization carry out, then without the need to monitoring.Therefore, be triggered trigger under legal event if camera head monitors security switch, after this information triggered can be received, ignore monitor task; If camera head monitors security switch and is triggered and do not trigger under legal event, just after receiving this information triggered, accept monitor task.Adopt this kind of design concept, can Consumer's Experience be improved.
In addition, the more personnel obtained the authorization may be had within some time period to carry out legal event to trigger security switch, such as, a large amount of friends and families may be had during family party to open gate and trigger security switch, therefore user can set a certain event section photographic device inside without the need to responding operating instruction to accept monitor task.Camera head, within the time period of setting, even if receive the operating instruction produced because security switch is triggered, does not affect it yet and suspends monitor task.
Or in some cases, family has people to be in the time period by day, does not now need camera head close supervision gate, only needs just need camera head close supervision gate for security consideration evening.Therefore, camera head can just receive the operating instruction produced because security switch is triggered within the time period of setting, thus accepts monitor task.
In addition to the above, can also set this intelligent safety and defence system at real-life actual needs according to people.
Wherein, in response to rotation command, the camera be arranged on The Cloud Terrace is rotated to an angle towards the direction corresponding with rotation information, and carry out the party to shoot with video-corder.
In intelligent safety and defence system collocation method of the present invention, camera head can the camera device of image recording, video and sound, in the present embodiment for monitoring.Camera head is made up of two large entity part usually: camera and The Cloud Terrace.Camera is arranged on The Cloud Terrace, is in the state that can rotate up and down, can control motor carry out left-right rotation by level, rotates up and down by vertically controlling motor.
Usual camera can be arranged at an initial position, as the normal place of camera.When the shooting drive singal that camera head sends in response to security switch, then according to the azimuth information of the required corresponding security switch of the corresponding relation list lookup be stored in camera head space, then, camera will rotate as calculating basic point based on this normal place.Such as, when camera is just positioned at normal place, a security switch (can adopt the mode of numbering to distinguish security switch, but be not limited to a kind of mode) send shooting drive singal to camera head, camera head is according to the drive singal received, azimuth information corresponding to a security switch is searched immediately (such as in the memory space of self, security switch is relative to the angle of camera head---the A angle that turns right, upwards rotation B angle), camera, under the drive of motor, the A angle that turns right, upwards rotates B angle; Or, if camera is not positioned at normal place, such as, to be positioned at for normal place C angle, upwards D angle to the right, then can to obtain the required angle of rotating of camera for C-A angle, upwards D-B angle to the right, wherein ,-be minus sign.
Wherein, in response to focusing instruction, its shot with video-corder picture that zooms in or out is made.
In like manner in intelligent safety and defence system collocation method embodiment one, user can according to on-the-spot actual needs, and the picture of shooting with video-corder camera head carries out the adjustment of size.Such as, when the picture that camera head is shot with video-corder is because of time distant and fuzzy, camera head receives the focusing instruction that smart machine sends, and smart machine Long-distance Control camera head amplifies its picture of shooting with video-corder, thus more clear; In like manner, when the picture that camera head is shot with video-corder can only shoot with video-corder a part of scene because of close together, camera head receives the focusing instruction that smart machine sends, and smart machine Long-distance Control camera head reduces its picture of shooting with video-corder, thus more comprehensive.In actual applications, concrete zooms in or out operation, can adopt manual regulation and control, namely adopts the operating gesture of multi-point touch screen, when smart machine senses that the relative distance of user's two fingers becomes large, then and magnified picture size; Relatively, when the relative distance of two fingers sensing user diminishes, then picture dimension is reduced.
In addition, when smart machine comprises microphone, user can be zoomed in or out the picture that camera head is shot with video-corder by voice.Such as, when acoustic sensor on the smart machine receiver perceived on the voice of user or smart machine receives the signal of " picture amplification ", first the semanteme of these voice is identified, amplify if semanteme is picture, then be sent to camera head by long-range for this signal, control camera head and realize this operation; In like manner, when the receiver perceived on the voice of user or smart machine of the acoustic sensor on smart machine receives the signal of " picture reduces ", first the semanteme of these voice is identified, reduce for picture if semantic, then be sent to camera head by long-range for this signal, control camera head and realize this operation.
Certainly, along with the development of science and technology, shoot with video-corder zooming in or out operation and also can adopting other effective mode of picture.
Wherein, in response to END instruction, terminate current to shoot with video-corder task.
When monitor task completes, camera head can self terminate to shoot with video-corder, the END instruction that also can send according to smart machine and terminate current to shoot with video-corder task.
Refer to Fig. 3, the structural representation of intelligent safety and defence system inking device embodiment one of the present invention, comprising: the first acquisition module 11, first memory module 12, first respond module 13, first runs module 14, first rotating module 15 and the first focusing module 16.
The function of above-mentioned each module is as follows:
First acquisition module 11: for obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information.
First memory module 12: for described corresponding relation list is written in the memory space of the camera head pre-set.
First respond module 13: in the monitoring state for controlling described camera head, makes the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
First runs module 14: for sending operating instruction when security switch is triggered, the azimuth information of Long-distance Control camera head security switch according to corresponding relation list lookup, and open camera function.
First rotating module 15: for sending rotation command, the anglec of rotation of the The Cloud Terrace of long-range adjustment camera head, to make to arrange camera thereon towards the direction corresponding with rotation information to implement shooting with video-corder this direction.
First focusing module 16: for sending focusing instruction, Long-distance Control camera head makes its shot with video-corder picture that zooms in or out.
Fig. 4 is the structured flowchart of the acquisition module of intelligent safety and defence system inking device embodiment one of the present invention.Wherein, described first acquisition module 11 also comprises: deciphering module 17: for obtaining the identification information of encryption, after being decrypted, each identification information and azimuth information are set up corresponding relation list to identification information.
Smart machine is by the first acquisition module, obtain identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information, wherein, the identification information of security switch can be characteristic information or the mark of unique identification, such as, in physical address (MAC) and identifier (ID) at least one.Afterwards, by the corresponding relation list storage of the identification information of the security switch of foundation and azimuth information in the memory space of the camera head pre-set.In the present embodiment, this corresponding relation list of SQLite database purchase is preferably.When in order to consider more than one of security switch, avoiding monitoring chaotic, in advance priority level can be set to multiple security switch.When the first respond module starts, camera head is monitored according to the priority level height of security switch.Under first operation module, the azimuth information of smart machine Long-distance Control camera head security switch according to corresponding relation list lookup, and open camera function.In first rotating module, because camera head is that camera is placed on The Cloud Terrace, is realized the Angulation changes of camera by motor, thus complete shooting-recording function.Camera head is in response to the rotation command of smart machine, according to the drive singal received, azimuth information corresponding to a security switch is searched immediately (such as in the memory space of self, security switch is relative to the angle of camera head---the A angle that turns right, upwards rotation B angle), camera, under the drive of motor, the A angle that turns right, upwards rotates B angle; Or, if camera is not positioned at normal place, such as, to be positioned at for normal place C angle, upwards D angle to the right, then can to obtain the required angle of rotating of camera for C-A angle, upwards D-B angle to the right, wherein ,-be minus sign.Under first focusing module, according to the actual conditions of shooting with video-corder, user can pass through smart machine Long-distance Control camera head, and focus to it, zoom in or out the picture of shooting with video-corder.In addition, the first acquisition module comprises deciphering module, for obtaining the identification information of encryption, after being decrypted, each identification information and azimuth information is set up corresponding relation list to identification information, thus improves the fail safe of safety-protection system.
Refer to Fig. 5, the structural representation of intelligent safety and defence system inking device embodiment two of the present invention, comprising: the second acquisition module 21, second memory module 22, second respond module 23, second is run module 24, second rotating module 25, second focusing module 26 and terminated module 27.
The function of above-mentioned each module is as follows:
Second acquisition module 21: for obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Second memory module 22: for described corresponding relation list is written in the memory space of the machine pre-set;
Second respond module 23: for obtaining the shooting drive singal that at least one security switch sends, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
Second runs module 24: for when security switch is triggered, in response to operating instruction, the azimuth information of security switch according to corresponding relation list lookup, and shoots with video-corder.
Second rotating module 25: in response to rotation command, the camera be arranged on The Cloud Terrace is rotated to an angle towards the direction corresponding with rotation information, and carry out the party to shoot with video-corder.
Second focusing module 26: in response to focusing instruction, make its shot with video-corder picture that zooms in or out.
Terminate module 27: in response to END instruction, terminate current to shoot with video-corder task.
Camera head is by the second acquisition module, obtain identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information, wherein, the identification information of security switch can be characteristic information or the mark of unique identification, such as, in physical address (MAC) and identifier (ID) at least one.Afterwards, by the corresponding relation list storage of the identification information of the security switch of foundation and azimuth information in the memory space of the camera head the machine pre-set.In the present embodiment, this corresponding relation list of SQLite database purchase is preferably.When in order to consider more than one of security switch, avoiding monitoring chaotic, in advance priority level can be set to multiple security switch.When the second respond module starts, camera head is monitored according to the priority level height of security switch.Under second operation module, when security switch is triggered, the azimuth information of camera head security switch according to corresponding relation list lookup, and automatically open camera function.In second rotating module, because camera head is that camera is placed on The Cloud Terrace, is realized the Angulation changes of camera by motor, thus complete shooting-recording function.Camera head is in response to rotation command, according to the drive singal received, azimuth information corresponding to a security switch is searched immediately (such as in the memory space of self, security switch is relative to the angle of camera head---the A angle that turns right, upwards rotation B angle), camera, under the drive of motor, the A angle that turns right, upwards rotates B angle; Or, if camera is not positioned at normal place, such as, to be positioned at for normal place C angle, upwards D angle to the right, then can to obtain the required angle of rotating of camera for C-A angle, upwards D-B angle to the right, wherein ,-be minus sign.Under second focusing module, according to the actual conditions of shooting with video-corder, user can pass through smart machine Long-distance Control camera head, and focus to it, zoom in or out the picture of shooting with video-corder.
The above is only some embodiments of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. an intelligent safety and defence system collocation method, is characterized in that, comprises the following steps:
Obtain identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Described corresponding relation list is written in the memory space of the camera head pre-set;
Control described camera head in the monitoring state, make the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
2. a kind of intelligent safety and defence system collocation method according to claim 1, it is characterized in that, obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, setting up in the step of corresponding relation list of each identification information and azimuth information, comprising:
Obtain the identification information of encryption, after identification information is decrypted, each identification information and azimuth information are set up corresponding relation list.
3. a kind of intelligent safety and defence system collocation method according to claim 1, is characterized in that, comprising:
Send operating instruction when security switch is triggered, the azimuth information of Long-distance Control camera head security switch according to corresponding relation list lookup, and open camera function.
4. an intelligent safety and defence system collocation method, is characterized in that, comprises the following steps:
Obtain identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Described corresponding relation list is written in the memory space of the machine pre-set;
Obtain the shooting drive singal that at least one security switch sends, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
5. a kind of intelligent safety and defence system collocation method according to claim 4, is characterized in that, comprising:
When security switch is triggered, in response to operating instruction, the azimuth information of security switch according to corresponding relation list lookup, and shoot with video-corder.
6. a kind of intelligent safety and defence system collocation method according to claim 5, is characterized in that, comprising:
In response to rotation command, the camera be arranged on The Cloud Terrace is rotated to an angle towards the direction corresponding with rotation information, and carry out the party to shoot with video-corder.
7. an intelligent safety and defence system inking device, is characterized in that, comprising:
First acquisition module: for obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
First memory module: for described corresponding relation list is written in the memory space of the camera head pre-set;
First respond module: in the monitoring state for controlling described camera head, makes the shooting drive singal that it sends in response at least one security switch, thus adjustment camera angle is taken; Described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
8. a kind of intelligent safety and defence system inking device according to claim 7, is characterized in that, described first acquisition module comprises:
Deciphering module: for obtaining the identification information of encryption, after identification information is decrypted, each identification information and azimuth information are set up corresponding relation list.
9. an intelligent safety and defence system inking device, is characterized in that, comprising:
Second acquisition module: for obtaining identification information and the azimuth information thereof of the one or more security switchs pre-set, set up the corresponding relation list of each identification information and azimuth information;
Second memory module: for described corresponding relation list is written in the memory space of the machine pre-set;
Second respond module: for obtaining the shooting drive singal that at least one security switch sends, thus adjustment camera angle is taken; Wherein, described shooting drive singal is that described security switch generates when being activated, and comprises identification information and the azimuth information of described security switch.
10. a kind of intelligent safety and defence system inking device according to claim 9, is characterized in that, comprising:
Second runs module: for when security switch is triggered, in response to operating instruction, the azimuth information of security switch according to corresponding relation list lookup, and shoots with video-corder.
CN201510970157.1A 2015-12-22 2015-12-22 Intelligent security protection system configuration method and apparatus Pending CN105530476A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510970157.1A CN105530476A (en) 2015-12-22 2015-12-22 Intelligent security protection system configuration method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510970157.1A CN105530476A (en) 2015-12-22 2015-12-22 Intelligent security protection system configuration method and apparatus

Publications (1)

Publication Number Publication Date
CN105530476A true CN105530476A (en) 2016-04-27

Family

ID=55772419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510970157.1A Pending CN105530476A (en) 2015-12-22 2015-12-22 Intelligent security protection system configuration method and apparatus

Country Status (1)

Country Link
CN (1) CN105530476A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127997A (en) * 2016-08-19 2016-11-16 成都乐也科技有限公司 A kind of intelligent safety defense monitoring system
CN106971893A (en) * 2017-04-24 2017-07-21 习水县西科电脑科技有限公司 A kind of safety-protection system
CN107589725A (en) * 2017-08-29 2018-01-16 深圳市盛路物联通讯技术有限公司 A kind of intelligent home equipment control method and control device based on built-in aerial
CN109882987A (en) * 2019-03-06 2019-06-14 广东美的制冷设备有限公司 Air-conditioning equipment safety protection function control method, device and equipment
CN110677471A (en) * 2019-09-24 2020-01-10 日立楼宇技术(广州)有限公司 Data link construction method, device, equipment and storage medium of access control system
CN111757009A (en) * 2020-07-10 2020-10-09 广州博冠智能科技有限公司 Smart home camera control method, device, equipment and storage medium
CN111818477A (en) * 2020-07-21 2020-10-23 河海大学常州校区 Wireless energy-saving system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335879A (en) * 2008-07-10 2008-12-31 华南理工大学 Multi-point triggering fixed point tracking monitoring method and system
CN103581527A (en) * 2012-07-18 2014-02-12 中国移动通信集团公司 Tracking photographing method, device and security protection host in security protection system
US20140139662A1 (en) * 2012-11-21 2014-05-22 Hon Hai Precision Industry Co., Ltd. Monitoring device, handheld device and monitoring method
CN104134307A (en) * 2014-08-13 2014-11-05 新昌县康泓机械科技有限公司 Intelligent monitoring device
CN104378587A (en) * 2014-10-27 2015-02-25 小米科技有限责任公司 Camera equipment control method, device and equipment
CN104867263A (en) * 2015-05-15 2015-08-26 深圳市万物联有限公司 Camera positioning alarm method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335879A (en) * 2008-07-10 2008-12-31 华南理工大学 Multi-point triggering fixed point tracking monitoring method and system
CN103581527A (en) * 2012-07-18 2014-02-12 中国移动通信集团公司 Tracking photographing method, device and security protection host in security protection system
US20140139662A1 (en) * 2012-11-21 2014-05-22 Hon Hai Precision Industry Co., Ltd. Monitoring device, handheld device and monitoring method
CN104134307A (en) * 2014-08-13 2014-11-05 新昌县康泓机械科技有限公司 Intelligent monitoring device
CN104378587A (en) * 2014-10-27 2015-02-25 小米科技有限责任公司 Camera equipment control method, device and equipment
CN104867263A (en) * 2015-05-15 2015-08-26 深圳市万物联有限公司 Camera positioning alarm method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
信息产业部电子工程标准定额站: "《全国统一安装工程预算定额第13 建筑智能化系统设备安装工程预算手册》", 29 February 2004 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127997A (en) * 2016-08-19 2016-11-16 成都乐也科技有限公司 A kind of intelligent safety defense monitoring system
CN106971893A (en) * 2017-04-24 2017-07-21 习水县西科电脑科技有限公司 A kind of safety-protection system
CN106971893B (en) * 2017-04-24 2019-07-30 习水县西科电脑科技有限公司 A kind of security system
CN107589725A (en) * 2017-08-29 2018-01-16 深圳市盛路物联通讯技术有限公司 A kind of intelligent home equipment control method and control device based on built-in aerial
CN109882987A (en) * 2019-03-06 2019-06-14 广东美的制冷设备有限公司 Air-conditioning equipment safety protection function control method, device and equipment
CN110677471A (en) * 2019-09-24 2020-01-10 日立楼宇技术(广州)有限公司 Data link construction method, device, equipment and storage medium of access control system
CN111757009A (en) * 2020-07-10 2020-10-09 广州博冠智能科技有限公司 Smart home camera control method, device, equipment and storage medium
CN111757009B (en) * 2020-07-10 2022-06-10 广州博冠智能科技有限公司 Smart home camera control method, device, equipment and storage medium
CN111818477A (en) * 2020-07-21 2020-10-23 河海大学常州校区 Wireless energy-saving system and method

Similar Documents

Publication Publication Date Title
CN105530476A (en) Intelligent security protection system configuration method and apparatus
US10616765B2 (en) Security for wireless broadcasts
EP3698535B1 (en) Privacy preserving tag
US10178579B2 (en) Internet of things (IoT) system and method for selecting a secondary communication channel
EP2677506B1 (en) Smart lock structure and operating method thereof
KR101470747B1 (en) Method and apparatus for implementing doorlock system using mobile terminal
US10873634B2 (en) Apparatus and method for temporarily loaning internet of things (IOT) devices
US10097358B2 (en) Securing IoT devices using an out-of-band beacon
KR20190013867A (en) System and method for establishing a secure communication channel with an Internet (IoT) device
KR101820323B1 (en) Secure wireless device connection using power line messages
KR101876183B1 (en) Security-enhanced residential gateway device based on internet of things
Billure et al. Internet of Things-a study on the security challenges
CN105019772A (en) Safe case with wireless encrypted storage function and remote monitoring function
WO2015021624A1 (en) Wearable device and data transmission method
EP3320711A1 (en) Security for wireless broadcasts
US20220408263A1 (en) Access control system and method
Abbood et al. Internet of things (IoT): A technology review, security issues, threats, and open challenges
Mantoro et al. Secured communication between mobile devices and smart home appliances
JPWO2015115380A1 (en) IDENTIFICATION INFORMATION TRANSMITTING DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
Chatzigiannakis Apps for smart buildings: A case study on building security
EP3193539B1 (en) Control of an operating mode of a mobile terminal
KR101487349B1 (en) Terminal Authentication Method in Wireless Access Point and Wireless LAN System using the same
WO2019138850A1 (en) Information processing device, information processing method, information processing program, and electronic device
Baig Securing the internet of things infrastructure–standards and techniques
Sahu et al. Challenges and Issues in Securing Data Privacy in IoT and Connected Devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160427

RJ01 Rejection of invention patent application after publication