CN111583484A - Device control method, device, electronic device and computer-readable storage medium - Google Patents

Device control method, device, electronic device and computer-readable storage medium Download PDF

Info

Publication number
CN111583484A
CN111583484A CN202010253940.7A CN202010253940A CN111583484A CN 111583484 A CN111583484 A CN 111583484A CN 202010253940 A CN202010253940 A CN 202010253940A CN 111583484 A CN111583484 A CN 111583484A
Authority
CN
China
Prior art keywords
electronic device
user
information
electronic equipment
face information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010253940.7A
Other languages
Chinese (zh)
Inventor
张誉
韩立籼
陈孝良
苏少炜
常乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202010253940.7A priority Critical patent/CN111583484A/en
Publication of CN111583484A publication Critical patent/CN111583484A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones

Abstract

The disclosure provides a device control method and device, electronic equipment and a computer readable storage medium, and belongs to the technical field of smart home. The face information sent by the first electronic equipment is received, the identity of a user corresponding to the face information is identified according to the received face information, if the user corresponding to the face information is not a first target user with access authority, the face information is sent to the second electronic equipment, and the user of the second electronic equipment determines whether to open the door or not.

Description

Device control method, device, electronic device and computer-readable storage medium
Technical Field
The present disclosure relates to the field of smart home technologies, and in particular, to an apparatus control method and apparatus, an electronic apparatus, and a computer-readable storage medium.
Background
In recent years, the smart home industry has entered a rapid development period under the drive of intelligent and automatic high and new technologies. The intelligent home connects various intelligent devices (such as audio and video devices, lighting systems, security systems, audio and video servers, network home appliances and the like) in the home together through the Internet of things technology, and provides multiple functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environment monitoring, programmable timing control and the like. For example, the intelligent door adopts a face recognition or fingerprint recognition mode, so that a user can unlock the door lock without carrying a key, and great convenience is brought to the life of people.
At present, when the intelligent door carries out face recognition, the face information of a known person is recorded in a database of a central control device corresponding to the intelligent door, when the intelligent door recognizes the face information of the person, the recognized face information is sent to the central control device, the central control device judges the recognized face information according to the recorded face information of the known person, if the recognized face information exists in the database, the central control device sends a door opening instruction to the intelligent door, and if not, the intelligent door sends a door opening refusing instruction to the intelligent door to respond to the received instruction and execute corresponding operation.
At present, the face information of the basis needs to be input into the database of the central control device in advance when the face information is judged, when a visitor visits, the face information of the visitor does not exist in the database of the central control device, a door opening instruction cannot be sent to the intelligent door, the intelligent door cannot execute door opening operation, and user experience is poor.
Disclosure of Invention
The embodiment of the disclosure provides a device control method and device, an electronic device and a computer-readable storage medium, which can solve the problem that in the related art, a door lock cannot be opened without face information of a visitor in a database, so that user experience is poor. The technical scheme is as follows:
in one aspect, a device control method is provided, and the method includes:
receiving face information sent by first electronic equipment, wherein the first electronic equipment is electronic equipment arranged on a controlled door;
according to the received face information, the identity of the user corresponding to the face information is identified;
if the user corresponding to the face information is not a first target user, the face information is sent to a second electronic device, the first target user is a user authorized to enter, and the second electronic device is a portable electronic device bound with a third electronic device;
and receiving an operation instruction fed back by the second electronic equipment, and responding to the operation instruction, and controlling the door lock state through the first electronic equipment.
In a possible implementation manner, after the sending the face information to the second electronic device if the user corresponding to the face information is not the first target user, the method further includes:
sending prompt information to the second electronic device, wherein the prompt information is used for prompting a user that a visitor visits and inquiring whether the user corresponding to the face information calls or not;
and receiving feedback information sent by the second electronic equipment, wherein the feedback information is used for indicating whether to communicate with the second electronic equipment.
In a possible implementation manner, after receiving the feedback information sent by the second electronic device, the method further includes:
if the feedback information is first feedback information, the first electronic equipment is communicated with the second electronic equipment, and the first feedback information is used for indicating that a user agrees to communicate with the user corresponding to the face information;
and if the feedback information is second feedback information, sending a first operation instruction to the first electronic device, wherein the second feedback information is used for indicating a user to refuse to communicate with the user corresponding to the face information, and the first operation instruction is used for indicating the first electronic device to keep the door lock closed.
In one possible implementation, the method further includes:
and if the feedback information is second feedback information and first notification information sent by the second electronic equipment is received, controlling the door lock state through the first electronic equipment according to the first notification information, wherein the first notification information is used for indicating a specific mode of controlling the door lock state by the first electronic equipment.
In a possible implementation manner, the recognizing, according to the received face information, the identity of the user corresponding to the face information includes:
querying in a first target user information database according to the received face information;
and if the user information corresponding to the face information exists in the first target user information database, determining that the user corresponding to the face information is the first target user.
In a possible implementation manner, after the identifying the identity of the user corresponding to the face information according to the received face information, the method further includes:
and if the user corresponding to the face information is a first target user, sending a second operation instruction to the first electronic equipment, and unlocking the door lock through the first electronic equipment, wherein the second operation instruction is used for indicating the first electronic equipment to control the door lock to be unlocked.
In a possible implementation manner, after the identifying the identity of the user corresponding to the face information according to the received face information, the method further includes:
and if the user corresponding to the face information is a second target user, playing an alarm prompt, wherein the second target user is a user who is prohibited from entering.
In a possible implementation manner, after the playing the alert prompt if the user corresponding to the face information is the second target user, the method further includes:
and sending second notification information to the second electronic equipment, wherein the second notification information is used for prompting the user that the suspicious person appears.
In one possible implementation, the notification message is a short message.
In a possible implementation manner, after the playing the alert prompt if the user corresponding to the face information is the second target user, the method further includes:
and sending a call request to a fourth electronic device, and sending image data or video data including the face information of the target second user to the fourth electronic device, wherein the fourth electronic device is an electronic device arranged at a security mechanism.
In one aspect, there is provided an apparatus for controlling a device, the apparatus including:
the information receiving module is used for receiving face information sent by first electronic equipment, and the first electronic equipment is electronic equipment arranged on a controlled door;
the identification module is used for identifying the identity of the user corresponding to the face information according to the received face information;
the sending module is used for sending the face information to a second electronic device if the user corresponding to the face information is not a first target user, wherein the first target user is a user authorized to enter the electronic device, and the second electronic device is a portable electronic device bound with a third electronic device;
and the instruction receiving module is used for receiving the operation instruction fed back by the second electronic equipment and responding to the operation instruction to control the state of the door lock through the first electronic equipment.
In a possible implementation manner, the sending module is further configured to send a prompt message to the second electronic device, where the prompt message is used to prompt a user that a visitor visits and ask the user whether to call the user corresponding to the face information;
the information receiving module is further configured to receive feedback information sent by the second electronic device, where the feedback information is used to indicate whether to talk with the second electronic device.
In one possible implementation, the apparatus further includes:
the communication module is used for communicating with the second electronic equipment through the first electronic equipment if the feedback information is first feedback information, and the first feedback information is used for indicating that the user agrees to communicate with the user corresponding to the face information;
the sending module is further configured to send a first operation instruction to the first electronic device if the feedback information is second feedback information, where the second feedback information is used to instruct a user to reject the call made by the user corresponding to the face information, and the first operation instruction is used to instruct the first electronic device to keep the door lock closed.
In one possible implementation, the apparatus further includes:
and the control module is used for controlling the state of the door lock through the first electronic equipment according to the first notification information if the feedback information is second feedback information and first notification information sent by the second electronic equipment is received, wherein the first notification information is used for indicating a specific mode of controlling the state of the door lock by the first electronic equipment.
In one possible implementation, the apparatus further includes:
the query module is used for querying in the first target user information database according to the received face information;
and the determining module is used for determining that the user corresponding to the face information is the first target user if the user information corresponding to the face information exists in the first target user information database.
In a possible implementation manner, the sending module is further configured to send a second operation instruction to the first electronic device if the user corresponding to the facial information is a first target user, and the door lock is unlocked through the first electronic device, where the second operation instruction is used to instruct the first electronic device to control the door lock to be unlocked.
In one possible implementation, the apparatus further includes:
and the playing module is used for playing an alarm prompt if the user corresponding to the face information is a second target user, wherein the second target user is a user who is forbidden to enter.
In a possible implementation manner, the sending module is further configured to send a second notification message to the second electronic device, where the second notification message is used to prompt the user that a suspicious person appears.
In one possible implementation, the notification message is a short message.
In a possible implementation manner, the sending module is further configured to send a call request to a fourth electronic device, and send image data or video data including the face information of the target second user to the fourth electronic device, where the fourth electronic device is an electronic device disposed at a security institution.
In one aspect, an electronic device is provided and includes one or more processors and one or more memories having at least one program code stored therein, the program code being loaded into and executed by the one or more processors to implement operations performed by the device control method.
In one aspect, a computer-readable storage medium having at least one program code stored therein is provided, the program code being loaded and executed by a processor to implement operations performed by the apparatus control method.
The scheme includes that the face information sent by the first electronic device is received, the identity of a user corresponding to the face information is recognized according to the received face information, if the user corresponding to the face information is not a first target user with an access authority, the face information is sent to the second electronic device, and the user of the second electronic device determines whether to open a door or not.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic diagram of an implementation environment of an apparatus control method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of an apparatus control method provided in an embodiment of the present disclosure;
fig. 3 is a flowchart of a device control method provided by an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an apparatus control device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
The following explains the related art and terms to which the present disclosure relates:
natural Language Processing (NLP): is an important direction in the fields of computer science and artificial intelligence. Natural language processing can implement various theories and methods for efficient communication between a human and a computer using natural language, which simply means that a machine understands the meaning of a human speaking.
Face recognition: face recognition is a biometric technology for identity recognition based on facial feature information of a person. A series of related technologies, also commonly called face recognition and face recognition, are used to collect images or video streams containing faces by using a camera or a video camera, automatically detect and track the faces in the images, and then perform face recognition on the detected faces.
Fig. 1 is a schematic diagram of an implementation environment of an apparatus control method provided in an embodiment of the present disclosure, and referring to fig. 1, the implementation environment includes: a first electronic device 101, a second electronic device 102, a third electronic device 103.
The first electronic device 101 may be an intelligent device with a face recognition function, such as an electronic device with a control function and the like disposed on a controlled door, the first electronic device 101 may communicate with the second electronic device 102 and the third electronic device 103 through a wired network or a wireless network, the first electronic device 101 may detect an identity of a user outside the door through a camera assembly, a communication assembly and the like disposed on the controlled door, and then send face information in the acquired image or video to the third electronic device 103, and receive a control instruction of the third electronic device 103, and control a door lock of the controlled door in response to the control instruction.
The second electronic device 102 may be at least one of a smartphone, a tablet, an e-book reader, an MP3 player, an MP4 player, a laptop, and the like. The second electronic device 102 may communicate with the first electronic device 101 and the third electronic device 103 through a wired network or a wireless network, the second electronic device 102 may receive various types of information sent by the third electronic device 103, may also perform a voice call or a video call with the first electronic device 101, and the second electronic device 102 may receive notification information sent by the third electronic device 103, and may also send the notification information to the third electronic device 103.
The third electronic device 103 may be an intelligent device with audio receiving and playing functions, such as a smart speaker. The third electronic device 103 may communicate with the first electronic device 101 and the second electronic device 102 through a wired network or a wireless network, the third electronic device 103 may receive the face information transmitted by the first electronic device 101, recognize the identity of the user according to the received face information, and the third electronic device 103 may also transmit information to the second electronic device 102, transmit an operation instruction to the first electronic device 101, and the like.
The first electronic device 101, the second electronic device 102, and the third electronic device 103 may all refer to one of the plurality of electronic devices, and the embodiment is illustrated by the first electronic device 101, the second electronic device 102, and the third electronic device 103. Those skilled in the art will appreciate that the various electronic devices described above may be more or less numerous. For example, the number of the electronic devices may be only a few, or the number of the electronic devices may be tens or hundreds, or more, and the number and the type of the electronic devices are not limited in the embodiments of the present disclosure.
Fig. 2 is a flowchart of a device control method provided in an embodiment of the present disclosure, which may be applied to a third electronic device, and referring to fig. 2, the method includes:
201. the method comprises the steps of receiving face information sent by first electronic equipment, wherein the first electronic equipment is electronic equipment arranged on a controlled door.
202. And according to the received face information, identifying the identity of the user corresponding to the face information.
203. And if the user corresponding to the face information is not the first target user, sending the face information to a second electronic device, wherein the first target user is a user authorized to enter, and the second electronic device is a portable electronic device bound with a third electronic device.
204. And receiving an operation instruction fed back by the second electronic equipment, and responding to the operation instruction, and controlling the door lock state through the first electronic equipment.
According to the scheme provided by the embodiment of the disclosure, the face information sent by the first electronic device is received, the identity of the user corresponding to the face information is identified according to the received face information, if the user corresponding to the face information is not the first target user with the access authority, the face information is sent to the second electronic device, and the user of the second electronic device determines whether to open the door or not, so that after the operation instruction fed back by the second electronic device and used for indicating whether to open the door is received, the door lock state is controlled through the first electronic device, when the identity of the user corresponding to the face information cannot be determined, the user determines whether to open the door through the second electronic device, the condition that a visitor can normally enter the door is ensured, and the user experience is improved.
In a possible implementation manner, after the sending the face information to the second electronic device if the user corresponding to the face information is not the first target user, the method further includes:
sending prompt information to the second electronic device, wherein the prompt information is used for prompting a user that a visitor visits and inquiring whether the user corresponding to the face information calls or not;
and receiving feedback information sent by the second electronic equipment, wherein the feedback information is used for indicating whether to communicate with the second electronic equipment.
In a possible implementation manner, after receiving the feedback information sent by the second electronic device, the method further includes:
if the feedback information is first feedback information, the first electronic equipment is communicated with the second electronic equipment, and the first feedback information is used for indicating that a user agrees to communicate with the user corresponding to the face information;
and if the feedback information is second feedback information, sending a first operation instruction to the first electronic device, wherein the second feedback information is used for indicating a user to refuse to communicate with the user corresponding to the face information, and the first operation instruction is used for indicating the first electronic device to keep the door lock closed.
In one possible implementation, the method further includes:
and if the feedback information is second feedback information and first notification information sent by the second electronic equipment is received, controlling the door lock state through the first electronic equipment according to the first notification information, wherein the first notification information is used for indicating a specific mode of controlling the door lock state by the first electronic equipment.
In a possible implementation manner, the recognizing, according to the received face information, the identity of the user corresponding to the face information includes:
querying in a first target user information database according to the received face information;
and if the user information corresponding to the face information exists in the first target user information database, determining that the user corresponding to the face information is the first target user.
In a possible implementation manner, after the identifying the identity of the user corresponding to the face information according to the received face information, the method further includes:
and if the user corresponding to the face information is a first target user, sending a second operation instruction to the first electronic equipment, and unlocking the door lock through the first electronic equipment, wherein the second operation instruction is used for indicating the first electronic equipment to control the door lock to be unlocked.
In a possible implementation manner, after the identifying the identity of the user corresponding to the face information according to the received face information, the method further includes:
and if the user corresponding to the face information is a second target user, playing an alarm prompt, wherein the second target user is a user who is prohibited from entering.
In a possible implementation manner, after the playing the alert prompt if the user corresponding to the face information is the second target user, the method further includes:
and sending second notification information to the second electronic equipment, wherein the second notification information is used for prompting the user that the suspicious person appears.
In one possible implementation, the notification message is a short message.
In a possible implementation manner, after the playing the alert prompt if the user corresponding to the face information is the second target user, the method further includes:
and sending a call request to a fourth electronic device, and sending image data or video data including the face information of the target second user to the fourth electronic device, wherein the fourth electronic device is an electronic device arranged at a security mechanism.
Fig. 2 is a basic flow chart of the present disclosure, and the following further explains a scheme provided by the present disclosure based on a specific implementation manner, and fig. 3 is a flow chart of an apparatus control method provided by an embodiment of the present disclosure, referring to fig. 3, the method includes:
301. the method comprises the steps that first electronic equipment acquires face information of a user outside a door, and the first electronic equipment is electronic equipment arranged on a controlled door.
It should be noted that the first electronic device may be disposed on the controlled door, a camera assembly may be further disposed in or connected to the first electronic device, and the first electronic device may record a video or take a picture through the camera assembly, so as to obtain the facial information of the user outdoors.
302. And the first electronic equipment sends the acquired face information to the third electronic equipment.
In a possible implementation manner, the user may bind the first electronic device and the third electronic device in advance, and then the first electronic device may directly send the acquired face information to the bound third electronic device.
In another possible implementation manner, the first electronic device may determine the third electronic device through an indoor positioning map, determine the electronic device located in the living room as the third electronic device, and then send the acquired face information to the third electronic device. Generally, the third electronic device is generally located in a living room, and thus, the first electronic device may determine which electronic device is the third electronic device according to a position of each electronic device in the room, and optionally, the first electronic device may also perform determination of the third electronic device in other manners, which is not limited in this disclosure.
The third electronic device may be a smart speaker or the like, and the third electronic device may have an indoor positioning function, so that the first electronic device determines the third electronic device according to the position of the third electronic device. The indoor positioning function is to realize position positioning in an indoor environment, and is mainly integrated by multiple technologies such as wireless communication, base station positioning, inertial navigation positioning and the like to form a set of indoor position positioning system, so as to realize position monitoring of personnel, objects and the like in an indoor space, for example, an indoor positioning system can be integrated in a third electronic device such as an intelligent sound box and the like, so that the indoor positioning function can be realized.
It should be noted that, an interface protocol may be preset between each two of the first electronic device, the second electronic device, and the third electronic device, so that the first electronic device, the second electronic device, and the third electronic device can communicate with each other, and the information transmission rate is improved.
303. The third electronic equipment receives the face information sent by the first electronic equipment.
304. The third electronic device identifies the identity of the user corresponding to the face information according to the received face information, if the user corresponding to the face information is the first target user, step 305 is executed, and if the user corresponding to the face information is not the first target user, step 306 is executed, and the first target user is a user authorized to enter.
It should be noted that the third electronic device may maintain a user identity information database, where the face information of the first target user, that is, the face information of the authorized user, may be stored in the user identity information database.
In a possible implementation manner, the third electronic device may identify, according to the face information stored in the user identity information database, the identity of the user corresponding to the received face information, to determine whether the user corresponding to the face information is the first target user. Whether the user corresponding to the face information is the first target user or not is identified, when the user corresponding to the face information is the first target user, the door lock can be opened by directly controlling the first electronic equipment, other electronic equipment is not needed to confirm, the visitor can be ensured to enter in time, equipment loss is reduced, unlocking response time is shortened, and user experience is improved.
It should be noted that the user identity information database may further store face information of a second target user, where the second target user may be a user who has been prohibited from entering, or a user who is a criminal suspect wanted by a related public security organization or a user who is set as a suspicious person by a property organization. The third electronic device may identify the identity of the user corresponding to the received facial information according to information stored in the user identity information database after identifying that the user corresponding to the facial information is not the first target user, to determine whether the user corresponding to the facial information is the second target user, if the user corresponding to the facial information is the second target user, the third electronic device may play an alarm prompt, and may further send second notification information to the second electronic device, the second electronic device may be a portable electronic device bound to the third electronic device, the second notification information is used to prompt the user that a suspicious person appears, the second notification information may be a short message, the third electronic device may also send a call request to the fourth electronic device, and send image data or video data including the facial information of the target second user to the fourth electronic device, the fourth electronic device may be an electronic device provided at a security agency.
305. And the third electronic equipment sends a second operation instruction to the first electronic equipment, the door lock is opened through the first electronic equipment, and the second operation instruction is used for indicating the first electronic equipment to control the door lock to be opened and ending.
In a possible implementation manner, if the user corresponding to the face information is the first target user, the third electronic device may send the second operation instruction to the first electronic device to control the first electronic device to unlock the door lock, and the third electronic device may also send the second operation instruction to the second electronic device to control the first electronic device to unlock the door lock.
In another possible implementation manner, after recognizing that the user corresponding to the face information is the first target user, the third electronic device may send identification passing information to the first electronic device, and after receiving the identification passing information, the first electronic device may automatically open the door lock.
It should be noted that, after the first electronic device unlocks the door lock, the second electronic device may send the unlocked information to the third electronic device, and after the third electronic device receives the unlocked information, the third electronic device may play a voice message preset by the user, for example, "xxx, you good! Welcome home! "or" welcome X! "and the like. The third electronic device may also send a prompt to the second electronic device to prompt the user that the user has authorized the user to enter the premises. By sending the prompt message to the second electronic device, the user can know the entering condition of the personnel at home in time, and the safety and the user experience are improved.
The voice information may be set by the user on the third electronic device, or may be set by the user remotely through the second electronic device.
306. And the third electronic equipment sends the face information to second electronic equipment, wherein the second electronic equipment is portable electronic equipment bound with the third electronic equipment.
It should be noted that, for most of the visitors, the first user information database may not store the face information of the visitors, and the third electronic device may send the face information to the second electronic device, so that the user using the second electronic device confirms the identity of the user corresponding to the face information, thereby avoiding the situation that the visitor cannot enter the second electronic device in time when the owner is not at home, and improving the user experience.
307. And the third electronic equipment sends prompt information to the second electronic equipment, wherein the prompt information is used for prompting the user that the visitor visits and inquiring whether the user corresponding to the face information calls or not.
It should be noted that, the third electronic device may execute the step 305 and the step 306 at the same time, or may execute the step 305 first and then execute the step 306, which is not limited in this disclosure.
308. The second electronic equipment receives the face information and the prompt information sent by the third electronic equipment.
In one possible implementation, after receiving the facial information, the second electronic device may display the received facial information on the visual interface. In addition, the second electronic device may play the received prompt information after receiving the prompt information, for example, the second electronic device may generate audio data used for representing the prompt information according to the received prompt information, and optionally, the second electronic device may further select audio data corresponding to the prompt information from stored audio data according to the received prompt information, and play the prompt information based on the obtained audio data.
It should be noted that, after receiving the prompt message, the second electronic device may detect a usage state of the second electronic device, and if the usage state of the second electronic device is that the output device is accessed, the second electronic device may play the prompt message through the accessed output device, and if the usage state of the second electronic device is that the output device is not accessed, the second electronic device may directly play the prompt message through a player. The output device may be a headphone, or may be other types of output devices, which is not limited in this disclosure.
309. And the second electronic equipment sends feedback information to the third electronic equipment according to the operation triggered by the user.
In a possible implementation manner, a user can select whether to communicate with a user corresponding to the face information on the visual interface according to the face information displayed on the visual interface and the played prompt information, and when detecting an operation triggered by the user, the second electronic device can generate feedback information corresponding to different operations according to the specific operation selected by the user, and send the feedback information to the third electronic device.
310. The third electronic device receives feedback information sent by the second electronic device, if the feedback information is second feedback information, step 311 is executed, if the feedback information is first feedback information, step 312 is executed, the first feedback information is used for indicating that the user agrees to communicate with the user corresponding to the facial information, and the second feedback information is used for indicating that the user refuses to communicate with the user corresponding to the facial information.
It should be noted that the feedback information may be divided into first feedback information and second feedback information, and after receiving the feedback information sent by the second electronic device, the third electronic device may execute a corresponding operation according to a specific type of the feedback information.
311. And the third electronic equipment sends a first operation instruction to the first electronic equipment, responds to the first operation instruction, controls the state of the door lock through the first electronic equipment, and the first operation instruction is used for indicating the first electronic equipment to keep the door lock closed and ending.
In a possible implementation manner, if the feedback information is the second feedback information, the third electronic device may send a first operation instruction to the first electronic device, and after receiving the first operation instruction, the first electronic device keeps the door lock closed in response to the first operation instruction.
In another possible implementation manner, if the feedback information is second feedback information, the third electronic device may send a first operation instruction to the second electronic device, and the second electronic device forwards the first operation instruction to the first electronic device, and after receiving the first operation instruction, the first electronic device responds to the first operation instruction to keep the door lock closed.
312. The third electronic device communicates with the second electronic device through the first electronic device.
It should be noted that the first electronic device may have at least one of a voice call function and a video call function, and be used for making a call with the second electronic device.
In a possible implementation manner, after receiving the first feedback information, the third electronic device may send a call establishment request to the first electronic device, and after receiving the call establishment request, the first electronic device may establish a call connection with the second electronic device, so that the user may communicate with the user corresponding to the face information located outdoors through the second electronic device, so that the user may determine the identity of the user corresponding to the face information according to the call content, and determine whether to open the door according to the result of the determination.
It should be noted that, the step 312 is an optional step, and the user may also trigger a corresponding operation to control whether the door lock is opened or not according to the face information received by the second electronic device directly without communicating with the visitor.
313. And the second electronic equipment detects the operation triggered by the user after the call and generates a corresponding operation instruction.
In a possible implementation manner, a user may trigger a corresponding operation on a visual interface of the second electronic device, and the second electronic device may generate a corresponding operation instruction after detecting the operation triggered by the user. For example, if the user determines that the user corresponding to the face information is a known person after the call and can enter the house, the door opening button may be triggered on the visual interface of the second electronic device, the second electronic device may generate a corresponding door opening instruction according to the triggering operation of the user, if the user determines that the user corresponding to the face information is not a known person and cannot enter the house after the call, the door opening prevention button may be triggered on the visual interface of the second electronic device, and the second electronic device may generate a corresponding door opening rejection instruction according to the triggering operation of the user.
314. And the second electronic equipment sends the operation instruction to the third electronic equipment.
315. The third electronic equipment receives the operation instruction fed back by the second electronic equipment, and responds to the operation instruction, and the door lock state is controlled through the first electronic equipment.
In a possible implementation manner, after receiving the operation instruction fed back by the second electronic device, the third electronic device may execute a corresponding operation according to a specific type of the operation instruction. For example, if the third electronic device receives a first operation instruction, the first operation instruction may be forwarded to the first electronic device, the first electronic device may keep the door lock closed in response to the received first operation instruction, if the third electronic device receives a second operation instruction, the second operation instruction may be forwarded to the first electronic device, and the first electronic device may open the door lock in response to the received second operation instruction.
In step 314, the second electronic device may also directly send the operation instruction to the first electronic device, and the first electronic device may directly control the door lock state according to the received instruction.
According to the scheme provided by the embodiment of the disclosure, after the face is obtained through the first electronic device, the face information can be sent to the third electronic device, the third electronic device identifies the identity of the user corresponding to the face information according to the received face information, when the third electronic device identifies the identity of the user, the face information and the prompt information can be sent to the second electronic device, the second electronic device remotely controls the state of the door lock according to the received face information and the prompt information, when the identity of the user corresponding to the face information cannot be determined, the user determines whether to open the door through the second electronic device, it is ensured that a visitor can normally enter the door, and user experience is improved.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
Fig. 4 is a schematic structural diagram of an apparatus control device provided in an embodiment of the present disclosure, and referring to fig. 4, the apparatus includes:
the information receiving module 401 is configured to receive face information sent by a first electronic device, where the first electronic device is an electronic device disposed on a controlled door;
the identification module 402 is configured to identify, according to the received face information, an identity of a user corresponding to the face information;
a sending module 403, configured to send the face information to a second electronic device if the user corresponding to the face information is not a first target user, where the first target user is a user authorized to enter, and the second electronic device is a portable electronic device bound to a third electronic device;
and the instruction receiving module 404 is configured to receive an operation instruction fed back by the second electronic device, and control the state of the door lock through the first electronic device in response to the operation instruction.
The device provided by the embodiment of the disclosure identifies the identity of a user corresponding to face information by receiving the face information sent by the first electronic device, and sends the face information to the second electronic device if the user corresponding to the face information is not the first target user with the access right, and the user of the second electronic device determines whether to open the door, so that after receiving an operation instruction which is fed back by the second electronic device and used for indicating whether to open the door, the device responds to the operation instruction, controls the state of the door lock through the first electronic device, and can determine whether to open the door through the second electronic device when the identity of the user corresponding to the face information cannot be determined, thereby ensuring that a visitor can normally enter and improving user experience.
In a possible implementation manner, the sending module 403 is further configured to send a prompt message to the second electronic device, where the prompt message is used to prompt the user that a visitor visits and ask the user whether to call the user corresponding to the face information;
the information receiving module 401 is further configured to receive feedback information sent by the second electronic device, where the feedback information is used to indicate whether to talk with the second electronic device.
In one possible implementation, the apparatus further includes:
the communication module is used for communicating with the second electronic equipment through the first electronic equipment if the feedback information is first feedback information, and the first feedback information is used for indicating that the user agrees to communicate with the user corresponding to the face information;
the sending module 403 is further configured to send a first operation instruction to the first electronic device if the feedback information is second feedback information, where the second feedback information is used to instruct a user to reject the call made by the user corresponding to the face information, and the first operation instruction is used to instruct the first electronic device to keep the door lock closed.
In one possible implementation, the apparatus further includes:
and the control module is used for controlling the state of the door lock through the first electronic equipment according to the first notification information if the feedback information is second feedback information and first notification information sent by the second electronic equipment is received, wherein the first notification information is used for indicating a specific mode of controlling the state of the door lock by the first electronic equipment.
In one possible implementation, the apparatus further includes:
the query module is used for querying in the first target user information database according to the received face information;
and the determining module is used for determining that the user corresponding to the face information is the first target user if the user information corresponding to the face information exists in the first target user information database.
In a possible implementation manner, the sending module 403 is further configured to send a second operation instruction to the first electronic device if the user corresponding to the face information is a first target user, and unlock the door lock through the first electronic device, where the second operation instruction is used to instruct the first electronic device to control the door lock to be unlocked.
In one possible implementation, the apparatus further includes:
and the playing module is used for playing an alarm prompt if the user corresponding to the face information is a second target user, wherein the second target user is a user who is forbidden to enter.
In a possible implementation manner, the sending module 403 is further configured to send a second notification message to the second electronic device, where the second notification message is used to prompt the user that a suspicious person appears.
In one possible implementation, the notification message is a short message.
In a possible implementation manner, the sending module 403 is further configured to send a call request to a fourth electronic device, and send image data or video data including the facial information of the target second user to the fourth electronic device, where the fourth electronic device is an electronic device disposed at a security institution.
It should be noted that: in the device control apparatus provided in the foregoing embodiment, when controlling the first electronic device, only the division of the functional modules is illustrated, and in practical applications, the above functions may be distributed by different functional modules according to needs, that is, the internal structure of the electronic device may be divided into different functional modules to complete all or part of the above described functions. In addition, the device control apparatus and the device control method provided in the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure. The electronic device 500 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. The electronic device 500 may also be referred to by other names as user equipment, portable electronic device, laptop electronic device, desktop electronic device, and so on.
In general, the electronic device 500 includes: one or more processors 501 and one or more memories 502.
The processor 501 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. The processor 501 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 501 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 501 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, processor 501 may also include an AI (Artificial Intelligence) processor for processing computational operations related to machine learning.
Memory 502 may include one or more computer-readable storage media, which may be non-transitory. Memory 502 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 502 is used to store at least one program code for execution by the processor 501 to implement the device control method provided by the method embodiments in the present disclosure.
In some embodiments, the electronic device 500 may further optionally include: a peripheral interface 503 and at least one peripheral. The processor 501, memory 502 and peripheral interface 503 may be connected by a bus or signal lines. Each peripheral may be connected to the peripheral interface 503 by a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 504, display screen 505, camera 506, audio circuitry 507, positioning components 508, and power supply 509.
The peripheral interface 503 may be used to connect at least one peripheral related to I/O (Input/Output) to the processor 501 and the memory 502. In some embodiments, the processor 501, memory 502, and peripheral interface 503 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 501, the memory 502, and the peripheral interface 503 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 504 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 504 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 504 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 504 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 504 may communicate with other electronic devices via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: metropolitan area networks, various generation mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the rf circuit 504 may further include NFC (Near Field Communication) related circuits, which are not limited by this disclosure.
The display screen 505 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 505 is a touch display screen, the display screen 505 also has the ability to capture touch signals on or over the surface of the display screen 505. The touch signal may be input to the processor 501 as a control signal for processing. At this point, the display screen 505 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display screen 505 may be one, providing the front panel of the electronic device 500; in other embodiments, the display screens 505 may be at least two, respectively disposed on different surfaces of the electronic device 500 or in a folded design; in still other embodiments, the display 505 may be a flexible display disposed on a curved surface or on a folded surface of the electronic device 500. Even more, the display screen 505 can be arranged in a non-rectangular irregular figure, i.e. a shaped screen. The Display screen 505 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), and other materials.
The camera assembly 506 is used to capture images or video. Optionally, camera assembly 506 includes a front camera and a rear camera. Generally, a front camera is disposed on a front panel of an electronic apparatus, and a rear camera is disposed on a rear surface of the electronic apparatus. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 506 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
Audio circuitry 507 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 501 for processing, or inputting the electric signals to the radio frequency circuit 504 to realize voice communication. For stereo capture or noise reduction purposes, the microphones may be multiple and disposed at different locations of the electronic device 500. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 501 or the radio frequency circuit 504 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, audio circuitry 507 may also include a headphone jack.
The positioning component 508 is used to locate the current geographic location of the electronic device 500 for navigation or LBS (location based Service). The positioning component 508 may be a positioning component based on the GPS (global positioning System) in the united states, the beidou System in china, the graves System in russia, or the galileo System in the european union.
The power supply 509 is used to power the various components in the electronic device 500. The power source 509 may be alternating current, direct current, disposable or rechargeable. When power supply 509 includes a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, the electronic device 500 also includes one or more sensors 510. The one or more sensors 510 include, but are not limited to: acceleration sensor 511, gyro sensor 512, pressure sensor 513, fingerprint sensor 514, optical sensor 515, and proximity sensor 516.
The acceleration sensor 511 may detect the magnitude of acceleration on three coordinate axes of a coordinate system established with the electronic device 500. For example, the acceleration sensor 511 may be used to detect components of the gravitational acceleration in three coordinate axes. The processor 501 may control the display screen 505 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 511. The acceleration sensor 511 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 512 may detect a body direction and a rotation angle of the electronic device 500, and the gyro sensor 512 may cooperate with the acceleration sensor 511 to acquire a 3D motion of the user on the electronic device 500. The processor 501 may implement the following functions according to the data collected by the gyro sensor 512: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
The pressure sensor 513 may be disposed on a side bezel of the electronic device 500 and/or underneath the display screen 505. When the pressure sensor 513 is disposed on the side frame of the electronic device 500, the holding signal of the user to the electronic device 500 can be detected, and the processor 501 performs left-right hand recognition or shortcut operation according to the holding signal collected by the pressure sensor 513. When the pressure sensor 513 is disposed at the lower layer of the display screen 505, the processor 501 controls the operability control on the UI interface according to the pressure operation of the user on the display screen 505. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 514 is used for collecting a fingerprint of the user, and the processor 501 identifies the identity of the user according to the fingerprint collected by the fingerprint sensor 514, or the fingerprint sensor 514 identifies the identity of the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, the processor 501 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying, and changing settings, etc. The fingerprint sensor 514 may be disposed on the front, back, or side of the electronic device 500. When a physical button or vendor Logo is provided on the electronic device 500, the fingerprint sensor 514 may be integrated with the physical button or vendor Logo.
The optical sensor 515 is used to collect the ambient light intensity. In one embodiment, the processor 501 may control the display brightness of the display screen 505 based on the ambient light intensity collected by the optical sensor 515. Specifically, when the ambient light intensity is high, the display brightness of the display screen 505 is increased; when the ambient light intensity is low, the display brightness of the display screen 505 is reduced. In another embodiment, processor 501 may also dynamically adjust the shooting parameters of camera head assembly 506 based on the ambient light intensity collected by optical sensor 515.
A proximity sensor 516, also known as a distance sensor, is typically disposed on the front panel of the electronic device 500. The proximity sensor 516 is used to capture the distance between the user and the front of the electronic device 500. In one embodiment, when the proximity sensor 516 detects that the distance between the user and the front surface of the electronic device 500 gradually decreases, the processor 501 controls the display screen 505 to switch from the bright screen state to the dark screen state; when the proximity sensor 516 detects that the distance between the user and the front surface of the electronic device 500 becomes gradually larger, the processor 501 controls the display screen 505 to switch from the breath screen state to the bright screen state.
Those skilled in the art will appreciate that the configuration shown in fig. 5 is not intended to be limiting of the electronic device 500 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
In an exemplary embodiment, there is also provided a computer-readable storage medium, such as a memory, including program code executable by a processor to perform the device control method in the above-described embodiments. For example, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact Disc Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by hardware associated with program code, and the program may be stored in a computer readable storage medium, where the above mentioned storage medium may be a read-only memory, a magnetic or optical disk, etc.
The foregoing is considered as illustrative of the embodiments of the disclosure and is not to be construed as limiting thereof, and any modifications, equivalents, improvements and the like made within the spirit and principle of the disclosure are intended to be included within the scope of the disclosure.

Claims (13)

1. An apparatus control method, characterized in that the method comprises:
receiving face information sent by first electronic equipment, wherein the first electronic equipment is electronic equipment arranged on a controlled door;
according to the received face information, identifying the identity of the user corresponding to the face information;
if the user corresponding to the face information is not a first target user, sending the face information to a second electronic device, wherein the first target user is a user authorized to enter, and the second electronic device is a portable electronic device bound with a third electronic device;
and receiving an operation instruction fed back by the second electronic equipment, and responding to the operation instruction, and controlling the state of the door lock through the first electronic equipment.
2. The method according to claim 1, wherein after the sending the face information to the second electronic device if the user corresponding to the face information is not the first target user, the method further comprises:
sending prompt information to the second electronic equipment, wherein the prompt information is used for prompting a visitor to visit a user and inquiring whether the user corresponding to the face information calls or not;
and receiving feedback information sent by the second electronic equipment, wherein the feedback information is used for indicating whether to communicate with the second electronic equipment.
3. The method of claim 2, wherein after receiving the feedback information sent by the second electronic device, the method further comprises:
if the feedback information is first feedback information, the first electronic equipment is communicated with the second electronic equipment, and the first feedback information is used for indicating that a user agrees to communicate with the user corresponding to the face information;
and if the feedback information is second feedback information, sending a first operation instruction to the first electronic equipment, wherein the second feedback information is used for indicating a user to refuse to communicate with the user corresponding to the face information, and the first operation instruction is used for indicating the first electronic equipment to keep the door lock closed.
4. The method of claim 3, further comprising:
and if the feedback information is second feedback information and first notification information sent by the second electronic equipment is received, controlling the state of the door lock through the first electronic equipment according to the first notification information, wherein the first notification information is used for indicating a specific mode of controlling the state of the door lock by the first electronic equipment.
5. The method of claim 1, wherein the identifying, according to the received facial information, the identity of the user corresponding to the facial information comprises:
querying in a first target user information database according to the received face information;
and if the user information corresponding to the face information exists in the first target user information database, determining that the user corresponding to the face information is the first target user.
6. The method according to claim 1, wherein after identifying the identity of the user corresponding to the face information according to the received face information, the method further comprises:
and if the user corresponding to the face information is a first target user, sending a second operation instruction to the first electronic equipment, and unlocking the door lock through the first electronic equipment, wherein the second operation instruction is used for indicating the first electronic equipment to control the door lock to be unlocked.
7. The method according to claim 1, wherein after identifying the identity of the user corresponding to the face information according to the received face information, the method further comprises:
and if the user corresponding to the face information is a second target user, playing an alarm prompt, wherein the second target user is a user who is forbidden to enter.
8. The method of claim 7, wherein after playing an alert prompt if the user corresponding to the facial information is the second target user, the method further comprises:
and sending second notification information to the second electronic equipment, wherein the second notification information is used for prompting the user that suspicious people appear.
9. The method of claim 4 or 8, wherein the notification message is a short message.
10. The method of claim 8, wherein after playing an alert prompt if the user corresponding to the facial information is the second target user, the method further comprises:
and sending a call request to fourth electronic equipment, and sending image data or video data including the face information of the target second user to the fourth electronic equipment, wherein the fourth electronic equipment is electronic equipment arranged at a security mechanism.
11. An apparatus control device, characterized in that the device comprises:
the information receiving module is used for receiving face information sent by first electronic equipment, and the first electronic equipment is electronic equipment arranged on a controlled door;
the identification module is used for identifying the identity of the user corresponding to the face information according to the received face information;
the sending module is used for sending the face information to a second electronic device if a user corresponding to the face information is not a first target user, wherein the first target user is a user authorized to enter the electronic device, and the second electronic device is a portable electronic device bound with a third electronic device;
and the instruction receiving module is used for receiving an operation instruction fed back by the second electronic equipment and responding to the operation instruction to control the state of the door lock through the first electronic equipment.
12. An electronic device, comprising one or more processors and one or more memories having at least one program code stored therein, the program code being loaded and executed by the one or more processors to implement operations performed by the device control method of any of claims 1 to 10.
13. A computer-readable storage medium having at least one program code stored therein, the program code being loaded and executed by a processor to implement the operations performed by the device control method according to any one of claims 1 to 10.
CN202010253940.7A 2020-04-02 2020-04-02 Device control method, device, electronic device and computer-readable storage medium Pending CN111583484A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010253940.7A CN111583484A (en) 2020-04-02 2020-04-02 Device control method, device, electronic device and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010253940.7A CN111583484A (en) 2020-04-02 2020-04-02 Device control method, device, electronic device and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN111583484A true CN111583484A (en) 2020-08-25

Family

ID=72124245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010253940.7A Pending CN111583484A (en) 2020-04-02 2020-04-02 Device control method, device, electronic device and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN111583484A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939193A (en) * 2016-06-22 2016-09-14 武汉市天晨翔云数据有限公司 Authorization and encryption method for controlling blacklist setting of intelligent lock
CN106412083A (en) * 2016-10-29 2017-02-15 深圳智乐信息科技有限公司 Method and system for visitor to control smart home
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN108259277A (en) * 2016-12-28 2018-07-06 中科创达软件股份有限公司 The sharing method and system of mobile terminal communication information based on smart home device
CN108711208A (en) * 2018-05-21 2018-10-26 中兴智能视觉大数据技术(湖北)有限公司 A kind of big data access control system and its management method
CN109523678A (en) * 2018-12-10 2019-03-26 百度在线网络技术(北京)有限公司 The exchange method and device of intelligent entrance guard
CN110232760A (en) * 2019-06-13 2019-09-13 珠海格力电器股份有限公司 Intelligent sound box, intelligent door lock, server, unlocking system and its method for unlocking
CN110557741A (en) * 2019-08-05 2019-12-10 华为技术有限公司 terminal interaction method and terminal
US10537195B1 (en) * 2017-02-16 2020-01-21 Alarm.Com Incorporated Secured package holder device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939193A (en) * 2016-06-22 2016-09-14 武汉市天晨翔云数据有限公司 Authorization and encryption method for controlling blacklist setting of intelligent lock
CN106412083A (en) * 2016-10-29 2017-02-15 深圳智乐信息科技有限公司 Method and system for visitor to control smart home
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN108259277A (en) * 2016-12-28 2018-07-06 中科创达软件股份有限公司 The sharing method and system of mobile terminal communication information based on smart home device
US10537195B1 (en) * 2017-02-16 2020-01-21 Alarm.Com Incorporated Secured package holder device
CN108711208A (en) * 2018-05-21 2018-10-26 中兴智能视觉大数据技术(湖北)有限公司 A kind of big data access control system and its management method
CN109523678A (en) * 2018-12-10 2019-03-26 百度在线网络技术(北京)有限公司 The exchange method and device of intelligent entrance guard
CN110232760A (en) * 2019-06-13 2019-09-13 珠海格力电器股份有限公司 Intelligent sound box, intelligent door lock, server, unlocking system and its method for unlocking
CN110557741A (en) * 2019-08-05 2019-12-10 华为技术有限公司 terminal interaction method and terminal

Similar Documents

Publication Publication Date Title
CN110336720B (en) Equipment control method and equipment
CN108874496B (en) Application management method, device, terminal, server and storage medium
CN113496426A (en) Service recommendation method, electronic device and system
CN111402844A (en) Song chorusing method, device and system
CN113196732B (en) Cross-device authentication method and related device
CN113879924A (en) Elevator control method, elevator control device, electronic equipment and storage medium
CN114090140A (en) Interaction method between devices based on pointing operation and electronic device
CN106343694A (en) Luggage case safety monitoring method and luggage case safety monitoring device
CN110808021A (en) Audio playing method, device, terminal and storage medium
CN115035187A (en) Sound source direction determining method, device, terminal, storage medium and product
CN108810276A (en) A kind of method and mobile terminal of face recognition
CN110570123B (en) Resource information management method, system and device based on block chain
CN111047328B (en) Mobile payment method, device, system and storage medium
CN111583484A (en) Device control method, device, electronic device and computer-readable storage medium
CN114475520A (en) Automobile control method and device and computer storage medium
CN114078582A (en) Method, device, terminal and storage medium for associating service information
CN112468838A (en) Live broadcast room management method, system, device, equipment and storage medium
CN112765571A (en) Authority management method, system, device, server and storage medium
CN112132472A (en) Resource management method and device, electronic equipment and computer readable storage medium
CN114816600A (en) Session message display method, device, terminal and storage medium
CN113495770A (en) Method, device, terminal and storage medium for displaying application page
CN112015612A (en) Method and device for acquiring stuck information
CN110580754A (en) Face authentication method, device and system
CN111049970B (en) Method and device for operating equipment, electronic equipment and medium
CN107690029A (en) Terminal control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200825