CN113645344A - Message processing method, device and storage medium - Google Patents

Message processing method, device and storage medium Download PDF

Info

Publication number
CN113645344A
CN113645344A CN202111194768.3A CN202111194768A CN113645344A CN 113645344 A CN113645344 A CN 113645344A CN 202111194768 A CN202111194768 A CN 202111194768A CN 113645344 A CN113645344 A CN 113645344A
Authority
CN
China
Prior art keywords
message
information
audio
preset
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111194768.3A
Other languages
Chinese (zh)
Other versions
CN113645344B (en
Inventor
崔伟
霍胜利
沈皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Imilab Technology Co Ltd
Original Assignee
Shanghai Chuangmi Technology Co ltd
Beijing Chuangmizhihui Iot Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuangmi Technology Co ltd, Beijing Chuangmizhihui Iot Technology Co ltd filed Critical Shanghai Chuangmi Technology Co ltd
Priority to CN202111194768.3A priority Critical patent/CN113645344B/en
Publication of CN113645344A publication Critical patent/CN113645344A/en
Application granted granted Critical
Publication of CN113645344B publication Critical patent/CN113645344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • H04M1/6505Recording arrangements for recording a message from the calling party storing speech in digital form
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B3/00Audible signalling systems; Audible personal calling systems
    • G08B3/10Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
    • G08B3/1008Personal calling arrangements or devices, i.e. paging systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure provides a message processing method, message processing equipment and a storage medium. Wherein, the method comprises the following steps: under the condition that the target trigger information meets the preset condition, detecting whether the first equipment executes preset operation or not; under the condition that the preset operation is not executed, the first equipment enters a message leaving state and obtains message leaving information; under the condition that a message confirmation instruction is detected, at least sending the message information to second equipment; detecting whether the message information is consulted or not in response to a starting operation aiming at the intelligent assembly; and under the condition that the message is not consulted, presenting preset prompt information in the second equipment to prompt a user to check the message.

Description

Message processing method, device and storage medium
Technical Field
The disclosure relates to the field of internet of things and intelligent security, in particular to a message processing method, intelligent security equipment and a storage medium.
Background
At present, intelligent security equipment can provide richer and richer user experience, so that the intelligent security equipment is more and more favored by users; however, the existing intelligent security equipment related to message information often cannot prompt the owner timely and effectively, and user experience is reduced.
Disclosure of Invention
The present disclosure provides a message processing method, device and storage medium to at least solve the above-mentioned technical problems.
In a first aspect, the present disclosure provides a message processing method applied to an intelligent security device, where the intelligent security device includes: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; the method comprises the following steps:
detecting whether a preset operation is executed or not under the condition that the target trigger information meets a preset condition;
under the condition that the preset operation is not executed, the first equipment enters a message leaving state and obtains message leaving information;
responding to a message confirmation instruction, and at least sending the message information to the second equipment;
detecting whether the message information is consulted or not in response to a starting operation aiming at the intelligent assembly;
and under the condition that the message is not referred to, presenting preset prompt information in the second equipment to prompt a user to view the message information.
In one possible implementation manner, the method further includes:
responding to the trigger operation aiming at the sounding component to obtain the target trigger information;
And sending the target trigger information to a mobile terminal associated with the intelligent security equipment.
In one possible implementation manner, the detecting whether a preset operation has been performed includes:
detecting whether a starting operation for the intelligent component exists;
detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
In a possible implementation manner, the entering, by the first device, a message leaving state includes:
an audio processing component of the first device plays message prompt information; alternatively, the first and second electrodes may be,
and the display component of the first device displays first preset multimedia information.
In one possible implementation manner, the method further includes:
a message leaving interface is presented in a display component of the first device;
wherein, the message information acquisition comprises at least one of the following modes:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
And responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
In one possible implementation, the method further includes:
and under the condition that the message confirmation instruction is not detected, responding to a modification operation, and modifying the message information so as to update the message information.
In one possible implementation manner, the method further includes:
and sending the message information to a mobile terminal associated with the intelligent security equipment so as to look up the message information in the mobile terminal.
In a possible implementation manner, the detecting whether the message information is referred to includes:
and detecting whether the consulting completion information sent after the mobile terminal consults the message information is received.
In one possible implementation manner, the method further includes:
after the message information is successfully sent, shielding the message information in the first equipment; alternatively, the first and second electrodes may be,
and after the message information is successfully sent, shielding relevant operation aiming at the message information in the first equipment.
In a possible implementation manner, before the first device enters the message leaving state, the method further includes:
Under the condition that the preset operation is not executed, the first equipment enters an intelligent conversation state and plays a conversation prompt audio;
collecting a reply audio for the dialog prompt audio;
determining whether the first device enters a message leaving state based on the reply audio.
In one possible implementation manner, the determining whether the first device enters a message leaving state based on the reply audio includes:
determining the visiting intention of a target body corresponding to the reply audio at least based on the audio content of the reply audio;
and playing second preset multimedia information under the condition that the visiting intention of the target body is determined to meet a first preset intention condition.
In one possible implementation manner, the determining whether the first device enters a message leaving state based on the reply audio includes:
determining the visiting intention of a target body corresponding to the reply audio at least based on the audio content of the reply audio;
in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, the first device performs at least one of:
playing third preset multimedia information;
and entering a message leaving state.
In one possible implementation, the method further includes:
after the reply audio is collected, the first equipment collects images to obtain a target image containing the target body;
identifying the biological characteristics of a target body in the target image to obtain the biological characteristic information of the target body;
identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target;
wherein the determining the visiting intention of the target body corresponding to the reply audio at least based on the audio content of the reply audio comprises:
and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
In a second aspect, the present disclosure provides an intelligent security device, including: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; wherein the content of the first and second substances,
the first device is used for detecting whether preset operation is executed or not under the condition that the target trigger information meets preset conditions; entering a message leaving state and acquiring message leaving information under the condition that the preset operation is not executed; responding to a message confirmation instruction, and at least sending the message information to the second equipment;
Second equipment, is used for responding to the start-up operation to the stated intelligent assembly, detect the stated message information has already consulted; and when the situation that the message is not referred is detected, presenting preset prompt information to prompt a user to view the message.
In a possible implementation manner, the first device is further configured to obtain the target trigger information in response to a trigger operation for a sound generation component; and sending the target trigger information to a mobile terminal associated with the intelligent security equipment.
In a possible implementation manner, the first device is further configured to detect whether a start operation for the intelligent component exists; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
In a possible implementation manner, the first device is further configured to play message-leaving prompt information based on an audio processing component set by the first device; or, displaying the first preset multimedia information based on a display component arranged by the user.
In a possible implementation manner, the first device is further configured to present a message leaving interface in a display component provided by the first device;
And, further for performing at least one of the following:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
In a possible implementation manner, the first device is further configured to modify the message information in response to a modification operation to update the message information, when the message confirmation instruction is not detected.
In a possible implementation manner, the first device is further configured to send the message information to a mobile terminal associated with the intelligent security device, so that the message information is referred to the mobile terminal; alternatively, the first and second electrodes may be,
the second equipment is further used for sending the message information to the mobile equipment associated with the intelligent security equipment, so that the message information can be conveniently looked up in the mobile terminal.
In a possible implementation manner, the first device is further configured to detect whether a review completion message sent after the mobile terminal reviews the message information is received; alternatively, the first and second electrodes may be,
The second device is further configured to detect whether the review completion information sent after the mobile terminal reviews the message information is received.
In a possible implementation manner, the first device is further configured to shield the message information after the message information is successfully sent; or after the message information is successfully sent, shielding the relevant operation aiming at the message information.
In a possible implementation manner, the first device is further configured to enter an intelligent dialog state and play a dialog prompt audio if the preset operation is not executed; collecting a reply audio for the dialog prompt audio; determining whether the first device enters a message leaving state based on the reply audio;
alternatively, the first and second electrodes may be,
the first device is also used for entering an intelligent conversation state and playing a conversation prompt audio under the condition that the preset operation is not executed; collecting a reply audio for the dialog prompt audio; the second device is further configured to determine whether the first device enters a message leaving state based on the reply audio. In a possible implementation manner, the first device is further configured to determine, based on at least audio content of the reply audio, an intention of visiting of a target body to which the reply audio corresponds; playing second preset multimedia information under the condition that the visiting intention of the target body is determined to meet a first preset intention condition; alternatively, the first and second electrodes may be,
The second device is further configured to determine, based on at least the audio content of the reply audio, a visiting intention of a target corresponding to the reply audio, and trigger the first device to play second preset multimedia information when it is determined that the visiting intention of the target meets a first preset intention condition.
In a possible implementation manner, the first device is further configured to determine, based on at least audio content of the reply audio, an intention of visiting of a target body to which the reply audio corresponds; in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, performing at least one of: playing third preset multimedia information; entering a message leaving state;
alternatively, the first and second electrodes may be,
the second device is further used for determining the visiting intention of the target body corresponding to the reply audio at least based on the audio content of the reply audio; determining that the visiting intention of the target body meets a second preset intention condition; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of: playing third preset multimedia information; and entering a message leaving state.
In a possible implementation manner, the first device is further configured to perform image acquisition after acquiring the reply audio to obtain a target image including the target volume; identifying the biological characteristics of a target body in the target image to obtain the biological characteristic information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
In a possible implementation manner, the first device is further configured to, after the reply audio is acquired, perform image acquisition by the first device to obtain a target image including the target volume;
the second device is further configured to identify a biometric feature of a target body in the target image, so as to obtain biometric feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
In a third aspect, the present disclosure provides an intelligent security device, including: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; the intelligent security equipment further comprises a controller, wherein the controller is used for controlling the first equipment and the second equipment; wherein the content of the first and second substances,
the controller is used for detecting whether preset operation is executed or not under the condition that the target trigger information meets preset conditions; under the condition that the preset operation is not executed, triggering the first equipment to enter a message leaving state;
the first equipment is used for entering a message leaving state and acquiring message leaving information; responding to a message confirmation instruction, and at least sending the message information to the controller;
the controller is further configured to send the message information to the second device at least after receiving the message information; detecting whether the message information is consulted or not in response to a starting operation for the intelligent component; under the condition that the second device is not referred to, triggering the second device to present preset prompt information;
the second device is further configured to present the preset prompt message to prompt the user to view the message.
In a possible implementation manner, the first device is further configured to obtain the target trigger information in response to a trigger operation for a sound generation component, and send the target trigger information to the controller;
the controller is further configured to send the target trigger information to the mobile terminal associated with the intelligent security device.
In one possible implementation manner, the controller is configured to detect whether a start operation for the intelligent component exists; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
In a possible implementation manner, the first device is further configured to play message-leaving prompt information based on an audio processing component set by the first device; or, displaying the first preset multimedia information based on a display component arranged by the user.
In a possible implementation manner, the controller is further configured to trigger a display component of the first device to present a message leaving interface after the first device is triggered to enter a message leaving state;
the first device is further configured to present a message interface and execute at least one of the following modes:
Responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
In a possible implementation manner, the first device is further configured to modify the message information in response to a modification operation to update the message information, when the message confirmation instruction is not detected.
In a possible implementation manner, the controller is further configured to send the message information to a mobile terminal associated with the intelligent security device, so that the message information is referred to the mobile terminal.
In a possible implementation manner, the controller is further configured to detect whether a review completion message sent after the mobile terminal reviews the message information is received.
In a possible implementation manner, the first device is further configured to shield the message information after the message information is successfully sent; alternatively, the first and second electrodes may be,
And after the message information is successfully sent, shielding the relevant operation aiming at the message information.
In a possible implementation manner, the controller is further configured to trigger the first device to enter an intelligent dialog state if the preset operation is not performed;
the first equipment is also used for entering an intelligent conversation state and playing a conversation prompt audio; collecting a reply audio for the dialog prompt audio;
the controller is further configured to determine whether the first device enters a message leaving state based on the reply audio.
In a possible implementation manner, the controller is further configured to determine, based on at least audio content of the reply audio, an intention of visiting of a target body to which the reply audio corresponds; and under the condition that the visiting intention of the target body meets a first preset intention condition, triggering the first equipment to play second preset multimedia information.
In a possible implementation manner, the controller is further configured to determine, based on at least audio content of the reply audio, an intention of visiting of a target body to which the reply audio corresponds; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of:
Playing third preset multimedia information; and entering a message leaving state.
In a possible implementation manner, the first device is further configured to perform image acquisition after acquiring the reply audio to obtain a target image including the target volume;
the controller is further configured to identify a biometric feature of a target body in the target image to obtain biometric feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
In a fourth aspect, the present disclosure provides an intelligent security device, including:
one or more processors;
a memory communicatively coupled to the one or more processors;
one or more computer programs, wherein the one or more computer programs are stored in the memory, and when the one or more computer programs are executed by the smart security device, the smart security device is caused to perform the method provided by the first aspect.
In a fifth aspect, the present disclosure provides a computer-readable storage medium storing computer instructions that, when executed on a computer, cause the computer to perform the method provided by the first aspect.
The technical scheme provided by the disclosure at least comprises the following beneficial effects: according to the scheme, the intelligent component can be started when the intelligent component is detected, and the message information is not looked up, the user is prompted to look up the message information in time, so that the intellectualization of the intelligent security equipment is further improved, the user experience is enriched, and meanwhile, the user experience is also improved.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic view illustrating an implementation flow of a message processing method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an intelligent security device in a specific example according to an embodiment of the present disclosure;
fig. 3 is a first structural diagram of an intelligent security device in a specific example according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a second intelligent security device in a specific example according to an embodiment of the present disclosure;
Fig. 5 is a schematic structural diagram three of the intelligent security device in a specific example according to an embodiment of the present disclosure.
Detailed Description
The present disclosure will be described in further detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements, circuits, etc., that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
The scheme of the application provides a message processing method, which is applied to intelligent security equipment, wherein the intelligent security equipment comprises: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device.
It should be noted that the first device and the second device may be determined based on actual scene requirements, for example, both of the first device and the second device are electronic devices having a wireless communication function, a voice call function, an audio/video acquisition function, a display function, an intelligent conversation function, and the like; or, an electronic device having one or more functions (i.e., at least one function) described above; certainly, in practical application, the functions of the first device and the second device may be the same or different, and the scheme of the application is not limited thereto and may be set based on the scene requirements.
Specifically, as shown in fig. 1, the message processing method based on the intelligent security device specifically includes:
step S101: and detecting whether a preset operation is executed or not under the condition that the target trigger information meets a preset condition. For example, the first device detects whether it has executed a preset operation when determining that the target trigger information satisfies a preset condition.
In one possible implementation, the target trigger information may be obtained as follows; the method specifically comprises the following steps: and responding to the trigger operation aiming at the sounding component to obtain the target trigger information. For example, the first device obtains the target trigger information in response to a trigger operation for the sound generating component. Therefore, false triggering is avoided, for example, the message leaving state is entered by the false triggering, and a foundation is laid for fitting the actual demand and improving the user experience.
In this application scheme, the sound production subassembly is arranged in realizing reminding the function, among the practical application, the sound production subassembly can specifically be doorbell, alarm etc..
Further, the target trigger information may specifically be a ringing duration of a sounding component (such as a doorbell or an alarm), or a triggering frequency, and the like, which is not limited by the scheme of the present application. Correspondingly, the preset condition required to be met by the target trigger information can also be set based on the actual requirement; it should be noted that, in practical applications, the setting of the preset condition may be completed by setting the intelligent security device before the intelligent security device leaves a factory, or may be completed by a user after the intelligent security device leaves the factory, and the scheme of the present application is not limited to this.
Further, after the target trigger information is obtained, the target trigger information can be sent to the mobile terminal associated with the intelligent security device, for example, the first device sends the target trigger information to the mobile terminal associated with the intelligent security device, so that a master can check the outdoor situation at the mobile terminal conveniently, and the user experience is improved.
In an actual scene, the first device and the mobile terminal achieve information interaction through a cloud end, for example, the first device detects a trigger operation for a sounding component (such as a doorbell), sends ringing prompt information to the cloud end, and sends the ringing prompt information to the mobile terminal through the cloud end, so that a user, such as a host, can timely know that a visitor exists outside a door. Certainly, in order to avoid disturbing the user, a sending mechanism may also be set, for example, the ring alert information is sent to the mobile terminal only when the condition is met; for example, in an example, when the target trigger information meets a preset condition, the ring alert information is sent to the cloud, and the ring alert information is sent to the mobile terminal through the cloud. The present invention is only exemplary, and in practical applications, other sending mechanisms may also be set, which is not limited by the present application. Correspondingly, the target trigger information can also be sent to the mobile terminal associated with the intelligent security device based on a cloud.
In a possible implementation manner, the detecting whether the preset operation has been executed may specifically include: detecting whether a starting operation for the intelligent component exists; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
Here, in a case where a voice call with the mobile terminal is not received, it is considered that the preset operation is not performed. That is, in a case where it is determined that there is no start-up operation for the smart component and a voice call with the mobile terminal is not received, it is considered that the preset operation is not performed.
For example, the first device detects whether there is a start operation for the intelligent component, and detects whether a voice call with the mobile terminal is received when it is determined that there is no start operation for the intelligent component. Here, in practical applications, the execution subject for detecting whether there is a start operation for the intelligent component may also be a second device, that is, the second device detects whether there is a start operation for the intelligent component and then transmits a detection result to the first device, so that the first device triggers a subsequent operation.
That is to say, in the present application, under the condition that it is determined that the target trigger information satisfies the preset condition, it is detected whether the intelligent component has a start operation, and under the condition that it is determined that the intelligent component has no start operation, it is detected whether the voice call with the mobile terminal is received. For example, the intelligent component is specifically an intelligent door lock, and at this time, the first device, when determining that the target trigger information meets the preset condition, first detects whether a start operation, such as an opening operation, exists in the intelligent door lock, so as to determine whether the owner has a door opening action; and then detecting whether a voice call with the mobile terminal is received or not under the condition that the intelligent assembly is detected not to be started. Therefore, false triggering is avoided, for example, the message leaving state is entered by the false triggering, and a foundation is laid for fitting the actual demand and improving the user experience.
Correspondingly, when the intelligent door lock is determined to have the starting operation state, the intelligent door lock is prevented from entering a message leaving state, and the process is ended. Therefore, the message leaving state is prevented from being triggered by mistake, and the intellectualization is further improved.
For example, after pressing N times, for example, triple door ringing, if the intelligent component, for example, the intelligent door lock still does not start the operation, for example, after not opening the door action, then detect whether receive with mobile terminal's voice call, so, avoid the spurious triggering to get into the state of leaving a message for on this application scheme can satisfy the basis of user's scene demand, richen user experience, and then promote user experience.
Here, it should be noted that, in practical applications, the detecting whether the voice call with the mobile terminal is received may be understood as whether the voice call with the mobile terminal is completed, and the specific steps include: the first device responds to a call request operation (initiated by a visitor), sends a voice call request to the mobile terminal, and after the mobile terminal and the first device establish connection and carry out call based on the voice call request, the first device can think that the voice call with the mobile terminal is received or the voice call with the mobile terminal is completed.
Certainly, in practical application, the voice call request initiated to the mobile terminal may also be initiated by the second device; at this time, the first device responds to a call request operation (initiated by a visitor), sends the call request operation to the second device, so as to send a voice call request to the mobile terminal through the second device, and performs voice call through the first device after the mobile terminal establishes a connection with the second device, at this time, it can be considered that the voice call with the mobile terminal is received, or the voice call with the mobile terminal is completed.
Otherwise, if the mobile terminal does not answer the call or the connection is not successfully established, the mobile terminal can be considered to not receive the voice call with the mobile terminal.
Step S102: and under the condition that the preset operation is not executed, the first equipment enters a message leaving state and obtains message leaving information. For example, the first device enters a message leaving state and obtains message leaving information when determining that the preset operation is not executed.
In a possible implementation manner, the entering of the message leaving state by the first device may specifically include:
and the audio processing component of the first device plays message prompt information, such as playing pre-recorded audio information, leaving a message by a host, and the like. Or, the display component of the first device displays preset multimedia information, for example, displays a text, a picture, a video, or the like on the display screen, so as to prompt the visitor to enter a message leaving state, and a message leaving operation can be performed.
In a possible implementation manner, after the first device enters a message leaving state, a message leaving interface is presented in a display component (such as a touch screen) of the first device; therefore, the visitor can conveniently leave a message. Correspondingly, the message information may be obtained in at least one of the following manners, specifically including:
the first method is as follows: and responding to the user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text. For example, the first device displays a text input interface in response to a user operation on a first key in the message interface to obtain a message text.
That is, in this method, the message information is in the form of text. Of course, the left message text can be a directly obtained text input result; or based on text obtained after a voice message of a user, such as a visitor, is converted.
The second method comprises the following steps: and responding to the user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video. For example, video acquisition is performed based on an acquisition component included in the first device to acquire a message video. Here, in a specific example, the first device triggers, in response to a user operation on a second key in the message interface, a capture component included in the first device to capture a video to obtain a message video. That is, in this method, the message information is in the form of a video.
The third method comprises the following steps: and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio. For example, audio acquisition is performed based on an acquisition component included in the first device to acquire message audio. Here, in a specific example, the first device triggers, in response to a user operation on a third key in the message interface, a capture component included in the first device to capture audio, so as to obtain message audio. That is, in this method, the message information is in the form of audio.
Here, the first key, the second key, and the third key may be virtual keys, and certainly, may also be physical keys, which is not limited in the present application.
In practical application, the three modes can be selected alternatively, for example, only message text or only message video or only message audio; of course, any two or more of the three may be used, and the present disclosure is not limited thereto.
In a possible implementation manner, in order to facilitate a visitor to operate message information, in the solution of the present application, in response to a modification operation, the message information is modified to update the message information when the message confirmation instruction is not detected. For example, the first device modifies the message information in response to a modification operation to update the message information when the message confirmation instruction is not detected. That is, before the message is not confirmed, the message information may be modified, for example, to add content, delete content, or even delete the message information. Therefore, different requirements of the user are met, and the user experience is further improved.
Step S103: and responding to a message confirmation instruction, and at least sending the message information to the second equipment. For example, the first device at least sends the message information to the second device in response to a message confirmation instruction.
In a possible implementation manner, the message information is sent to the second device and also sent to the mobile terminal according to the scheme of the application, specifically, the message information is sent to the mobile terminal associated with the intelligent security device, so that the message information is looked up in the mobile terminal. For example, the first device sends the message information to a mobile terminal, so as to look up the message information in the mobile terminal; that is to say, the first device not only sends the message information to the second device, but also sends the message information to the mobile terminal, for example, the message information is sent to the mobile terminal through the cloud, so that the message information is convenient for a host to remotely check.
Certainly, in practical applications, after the message information is sent to the second device, the second device may also send the message information to the mobile terminal, and specifically, the second device sends the message information to the mobile device associated with the intelligent security device, so as to refer to the message information in the mobile terminal; at the moment, the first equipment does not need a communication function, and a foundation is laid for saving the cost of the first equipment. It should be noted that, because the first device and the second device are both disposed in the intelligent security device, the communication between the first device and the second device can be implemented without a wireless communication function, for example, the communication can be implemented through a physical connection line.
Step S104: and responding to the starting operation aiming at the intelligent assembly, and detecting whether the message information is consulted. For example, the second device detects whether the message information is referred to in response to a start operation for the smart component. Here, the start-up operation may be specifically an on operation or an off operation.
In a possible implementation manner, the detecting whether the message information is referred to may specifically include: and detecting whether the consulting completion information sent after the mobile terminal consults the message information is received. That is to say, in practical application, the user can check the message at the mobile terminal, and at this time, the message is fed back after the check is completed, so as to avoid the error prompt of the message. Here, in the present application, the detection subject may be a first device or a second device; specifically, the second device detects whether the review completion information sent after the mobile terminal reviews the message information is received, at this time, the device communicating with the mobile terminal is mainly the second device, for example, the second device sends the message information to the mobile terminal through a cloud, and at the same time, detects whether the review completion information sent after the mobile terminal reviews the message information is received. Or, in another example, the first device detects whether the review completion information sent after the mobile terminal reviews the message information is received, at this time, a device in communication with the mobile terminal is mainly the first device, for example, the first device sends the message information to the mobile terminal through a cloud, and simultaneously detects whether the review completion information sent after the mobile terminal reviews the message information is received, and then synchronizes to the second device after receiving the review completion information, so that the second device determines whether to prompt the user to review the message information.
Correspondingly, after the first device or the second device determines that the consulting completion information sent by the mobile terminal after consulting the message information is received, the second device does not need to execute the reminding process; otherwise, a reminding process is executed, so that repeated reminding can be effectively avoided, and the user experience is further improved.
In a possible implementation manner, after the message information is successfully sent, the message information is shielded in the first device; for example, after the first device successfully sends the message information, the message information is shielded, that is, the message information is not displayed any more, so that the modification or withdrawal operation of the visitor is avoided, and the message privacy is ensured to the maximum extent. Or after the message information is successfully sent, shielding relevant operations for the message information in the first device, for example, although the message information is shown in the first device at this time, relevant operations cannot be performed on the first information, for example, relevant operations such as viewing and modifying the message information are not responded. Therefore, the modification or withdrawal operation of the visitor is avoided, and the privacy of the left message is ensured to the maximum extent.
Step S105: and under the condition that the message is not referred to, presenting preset prompt information in the second equipment to prompt a user to view the message information. For example, when the second device determines that the message is not referred to, the second device presents preset prompt information to prompt the user to view the message.
In a possible implementation manner, the preset prompt information may specifically be message information, for example, the message information is played, or preset prompt audio is played to prompt the user to check the message information, so that the user is timely and effectively prompted to check the message information, and user experience is improved.
The scheme of the application is further described in detail by combining specific examples; for example, taking the smart door as an example, as shown in fig. 2, the first surface is an outer surface of a door body of the smart door and corresponds to an outdoor space, and the second surface is an inner surface of the door body and corresponds to an indoor space; based on this, first equipment, also the outer equipment of door sets up on the surface of a body, and corresponding to outdoors, can supply visitor's message to use etc. the basic function that needs to possess can include: voice call function, collection function, display function, etc., for example, the outdoor equipment includes: the system comprises an auxiliary screen with a touch function, an outdoor camera, an outdoor MIC, an outdoor receiver and an outdoor doorbell button; the second equipment, also interior equipment sets up in the internal surface of a body, and is corresponding to indoor, can supply owner to look over outdoor condition etc. and the function that needs possess includes: the mobile terminal comprises a display function, a voice playing function, a communication function and the like, for example, the in-door equipment specifically comprises a main screen with a touch function, an in-door receiver and in-door Wi-Fi. The above is merely exemplary, and in practical applications, the setting may be based on requirements of an actual scene, and the present application is not limited to this.
Further, the intelligent door also comprises an intelligent door lock. The equipment is connected in the AND gate through the wiring to the outdoor equipment, and intelligent lock is connected in the AND gate through the wiring, and the router is connected through Wi-Fi to the equipment in, so, can carry out equipment binding with the APP end of mobile terminal (like the cell-phone) to in communicate.
When a visitor presses a doorbell, the in-door equipment sends a message to the APP end of the mobile phone through Wi-Fi, and the out-door equipment and the in-door equipment play door ring tones at the same time. After the visitor pressed the cubic doorbell, if the smart lock did not have the start-up operation, and did not initiate voice conversation with cell-phone APP end, in other words, under the visitor did not carry out voice conversation with owner's outdoor equipment, then triggered outdoor equipment and carried out voice broadcast, the suggestion visitor can leave a message, and outdoor equipment's screen lights simultaneously.
Furthermore, the visitor can input characters through a touch screen of the outdoor equipment; of course, after the input is finished, the character content can be deleted or modified; after confirming that no mistake is found, the message text is submitted, the submitted message text can be synchronized to the display screen of the indoor equipment, and meanwhile, the message text can be pushed to the APP end of the mobile phone.
Or the visitor can also press a voice message key on a touch screen of the outdoor equipment to carry out voice message leaving, and after the message leaving is finished, operations such as playback, deletion and the like can be supported; and after confirming that the message voice is correct, submitting the message voice, synchronizing the message voice to a display screen of the indoor equipment after the message voice is submitted, and simultaneously pushing the message voice to an APP (application) end of the mobile phone, wherein the message voice can not be played back and withdrawn outdoors.
Or the visitor can click the video message key on the touch screen of the outdoor equipment, at the moment, the image of the camera of the outdoor equipment is projected onto the outdoor screen, and the visitor can carry out video message. The left message video supports operations such as playback and deletion; and after confirming that the message is correct, submitting the message, synchronizing the message video to a display screen of the indoor equipment after the message is submitted, and simultaneously pushing the message video to an APP (application) end of the mobile phone, wherein the message can not be played back and withdrawn outdoors.
Further, if the owner does not check the messages through the APP end of the mobile phone, the intelligent door lock is started, for example, when the door is opened, a receiver of the indoor equipment immediately plays a prompt to remind the owner of the messages which are not checked, and therefore the owner is ensured not to miss the messages, and timeliness of the messages is guaranteed.
In a specific example of the scheme of the application, the intelligent security device can not only provide a message leaving function, but also realize intelligent voice conversation; specifically, before the first device enters the message leaving state, the method further includes: under the condition that the preset operation is not executed, for example, under the condition that it is determined that the starting operation for the intelligent component does not exist and the voice call with the mobile terminal is not received, the first device enters an intelligent conversation state and plays a conversation prompt audio; collecting a reply audio for the dialog prompt audio; determining whether the first device enters a message leaving state based on the reply audio.
That is to say, the first device enters an intelligent conversation state when it is determined that the start operation for the intelligent component does not exist and the voice call with the mobile terminal is not received, plays a conversation prompt audio, collects a reply audio for the conversation prompt audio, and determines whether the first device enters a message leaving state based on the reply audio.
Certainly, in practical applications, after the first device collects a reply audio for the dialog prompt audio, the reply audio is sent to the second device, and the second device determines whether to trigger the first device to enter a message leaving state based on the reply audio, in other words, the second device is a main device, and the data processing capability of the second device is better than that of the first device.
In a specific example, the second device stores an intelligent dialogue model, and after the first device enters the intelligent dialogue state, the intelligent dialogue model stored in the second device is called, so that the intelligent dialogue with the visitor is completed. Here, the reply audio collected by the first device is the audio output by the visitor during the intelligent conversation.
Therefore, the intention of the visitor is analyzed in the intelligent conversation process, the intellectualization of the intelligent security equipment is further improved, and a foundation is laid for further improving the user experience.
In another specific example of the scheme of the application, the determining whether the first device enters the message leaving state based on the reply audio specifically includes the following steps:
the first method is as follows: determining the visiting intention of a target body (namely a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; and under the condition that the visiting intention of the target body meets a first preset intention condition, for example, the visitor is determined to be a suspected thief, and at the moment, second preset multimedia information, such as warning contents such as alarm sound and the like, is played to remind and drive. Accordingly, at this time, the first device does not need to enter a message leaving state.
It should be noted that, in this manner, the determination of the visiting intention may be performed by the first device, or may be performed by the second device, specifically, the first device determines the visiting intention of a target body (i.e., a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; playing second preset multimedia information under the condition that the visiting intention of the target body is determined to meet a first preset intention condition; or the second device determines the visiting intention of a target body (namely a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; and under the condition that the visiting intention of the target body meets a first preset intention condition, triggering the first equipment to play second preset multimedia information.
The second method comprises the following steps: determining the visiting intention of a target body (namely a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, the first device performs at least one of: playing third preset multimedia information; and entering a message leaving state. For example, when the visitor is determined to be a salesperson or courier, the first device may only play third preset multimedia information (e.g., a pre-recorded audio of the host), so as to prompt the visitor that the host is not at home, and the data or courier may be placed at a designated location, etc. Or, the first device directly enters a message leaving state so that the visitor leaves a message. Or, the first device not only plays third preset multimedia information (for example, audio pre-recorded by a host, etc.), but also enters a message leaving state, so that the visitor leaves a message.
In a similar manner, in this manner, the determination of the visiting intention may be performed by the first device, or may be performed by the second device, specifically, the first device determines the visiting intention of the target body (i.e. the visitor) corresponding to the reply audio at least based on the audio content of the reply audio; in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, performing at least one of: and playing the third preset multimedia information and entering a message leaving state. Or the second device determines the visiting intention of a target body (namely a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of: playing third preset multimedia information; and entering a message leaving state.
It should be noted that the preset intention condition may be set based on the specific requirements of the scene, and the scheme of the present application is not limited thereto.
In another specific example of the scheme of the application, the visitor intention analysis may be performed in such a manner that, specifically, after the reply audio is acquired, the first device performs image acquisition to obtain a target image including the target body; identifying the biological characteristics of a target body in the target image to obtain the biological characteristic information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; wherein the above-mentioned determining the visiting intention of the target body corresponding to the reply audio at least based on the audio content of the reply audio comprises: and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
In this example, the determination of the feature information and the determination of the visiting intention may be performed by a first device or a second device, specifically, after the first device performs image acquisition to obtain a target image including the target body, the biometric feature of the target body in the target image is directly identified to obtain the biometric information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
Or after the first device performs image acquisition to obtain a target image containing the target body, sending the target image to a second device, and identifying the biological features of the target body in the target image by the second device to obtain the biological feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body. It can be understood that, in this scenario, the second device is the master device, and the processing capability thereof is superior to that of the first device, and at this time, the first device only needs to perform simple audio/video acquisition, data transmission and display functions, thereby laying a foundation for reducing the cost of the first device.
Of course, it should be noted that after the first device enters the message leaving state, if the visitor does not need to leave a message, the first device may be directly triggered to close the message leaving state.
Like this, because this application scheme and intelligent component have carried out the linkage, can have the start-up operation when detecting intelligent component, and under the condition that the message information was not looked up, in time indicate the user to look up the message information, so, further promote the intellectuality of intelligent security equipment, richened user experience, simultaneously, also promoted user experience. Moreover, the scheme of the application fully considers convenience, such as supporting operations of modifying and withdrawing the message information. Meanwhile, privacy is also fully considered, for example, messages can be left in a text message mode, so that the risk of message information leakage is effectively avoided, and the privacy of the messages is effectively ensured.
Fig. 3 is a schematic structural diagram of an intelligent security device in a specific example according to an embodiment of the present disclosure. As shown in fig. 3, the intelligent security device includes: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; wherein the content of the first and second substances,
The first device 301 is configured to detect whether a preset operation has been performed or not when the target trigger information satisfies a preset condition; entering a message leaving state and acquiring message leaving information under the condition that the preset operation is not executed; responding to a message confirmation instruction, and at least sending the message information to the second equipment;
a second device 302 configured to detect whether the message information has been referred to in response to a start operation for the intelligent component; and when the situation that the message is not referred is detected, presenting preset prompt information to prompt a user to view the message.
In a specific example of the present disclosure, the first device is further configured to obtain the target trigger information in response to a trigger operation for the sound generating component; and sending the target trigger information to a mobile terminal associated with the intelligent security equipment.
In a specific example of the present solution, the first device is further configured to detect whether there is a start operation for the smart component; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
In a specific example of the scheme of the application, the first device is further configured to play message-leaving prompt information based on an audio processing component set by the first device; or, displaying the first preset multimedia information based on a display component arranged by the user.
In a specific example of the scheme of the application, the first device is further configured to present a message leaving interface in a display component provided by the first device;
and, further for performing at least one of the following:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
In a specific example of the solution of the present application, the first device is further configured to modify the message information in response to a modification operation in a case that the message confirmation instruction is not detected, so as to update the message information.
In a specific example of the scheme of the application, the first device is further configured to send the message information to a mobile terminal associated with the intelligent security device, so that the message information is referred to the mobile terminal; alternatively, the first and second electrodes may be,
the second equipment is further used for sending the message information to the mobile equipment associated with the intelligent security equipment, so that the message information can be conveniently looked up in the mobile terminal.
In a specific example of the solution of the present application, the first device is further configured to detect whether a review completion message sent after the mobile terminal reviews the message information is received; alternatively, the first and second electrodes may be,
the second device is further configured to detect whether the review completion information sent after the mobile terminal reviews the message information is received.
In a specific example of the solution of the present application, the first device is further configured to shield the message information after the message information is successfully sent; or after the message information is successfully sent, shielding the relevant operation aiming at the message information.
In a specific example of the scheme of the application, the first device is further configured to enter an intelligent dialog state and play a dialog prompt audio if the preset operation is not executed; collecting a reply audio for the dialog prompt audio; determining whether the first device enters a message leaving state based on the reply audio;
alternatively, the first and second electrodes may be,
the first device is also used for entering an intelligent conversation state and playing a conversation prompt audio under the condition that the preset operation is not executed; collecting a reply audio for the dialog prompt audio; the second device is further configured to determine whether the first device enters a message leaving state based on the reply audio. In a possible implementation manner, the first device is further configured to determine, based on at least audio content of the reply audio, an intention of visiting of a target body to which the reply audio corresponds; playing second preset multimedia information under the condition that the visiting intention of the target body is determined to meet a first preset intention condition; alternatively, the first and second electrodes may be,
The second device is further configured to determine, based on at least the audio content of the reply audio, a visiting intention of a target corresponding to the reply audio, and trigger the first device to play second preset multimedia information when it is determined that the visiting intention of the target meets a first preset intention condition.
In a specific example of the application solution, the first device is further configured to determine, based on at least audio content of the reply audio, an intention of visiting of a target body to which the reply audio corresponds; in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, performing at least one of: playing third preset multimedia information; entering a message leaving state;
alternatively, the first and second electrodes may be,
the second device is further used for determining the visiting intention of the target body corresponding to the reply audio at least based on the audio content of the reply audio; determining that the visiting intention of the target body meets a second preset intention condition; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of: playing third preset multimedia information; and entering a message leaving state.
In a specific example of the application scheme, the first device is further configured to perform image acquisition after acquiring the reply audio to obtain a target image including the target volume; identifying the biological characteristics of a target body in the target image to obtain the biological characteristic information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
In a specific example of the application scheme, the first device is further configured to, after the reply audio is acquired, perform image acquisition by the first device to obtain a target image including the target volume;
the second device is further configured to identify a biometric feature of a target body in the target image, so as to obtain biometric feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
Here, the above method embodiments may be referred to for the related description based on the above device, and are not described herein again.
Like this, because this application scheme and intelligent component have carried out the linkage, can have the start-up operation when detecting intelligent component, and under the condition that the message information was not looked up, in time indicate the user to look up the message information, so, further promote the intellectuality of intelligent security equipment, richened user experience, simultaneously, also promoted user experience. Moreover, the scheme of the application fully considers convenience, such as supporting operations of modifying and withdrawing the message information. Meanwhile, privacy is also fully considered, for example, messages can be left in a text message mode, so that the risk of message information leakage is effectively avoided, and the privacy of the messages is effectively ensured.
Fig. 4 is a schematic structural diagram of a second intelligent security device in a specific example according to an embodiment of the present disclosure; as shown in fig. 4, the intelligent security device includes: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; the intelligent security equipment further comprises a controller, wherein the controller is used for controlling the first equipment and the second equipment; wherein the content of the first and second substances,
The controller 401 is configured to detect whether a preset operation has been performed or not when the target trigger information meets a preset condition; under the condition that the preset operation is not executed, triggering the first equipment to enter a message leaving state;
the first device 402 is configured to enter a message leaving state and obtain message leaving information; responding to a message confirmation instruction, and at least sending the message information to the controller;
the controller is further configured to send the message information to the second device at least after receiving the message information; detecting whether the message information is consulted or not in response to a starting operation for the intelligent component; under the condition that the second device is not referred to, triggering the second device to present preset prompt information;
the second device 403 is further configured to present the preset prompting information to prompt the user to view the message information.
It should be noted that, in practical applications, the controller manages and controls the first device and the second device, and the processing capability of the controller is superior to that of the first device and the second device, so that a foundation is laid for reducing the cost of the first device and the cost of the second device.
In a specific example, the first device and the second device communicate through the controller, so that the controller is convenient to control and manage the first device and the second device; of course, the first device and the second device may also communicate directly, for example, after the first device responds to a message confirmation instruction, the message information may be directly sent to the second device without forwarding by the controller. In practical applications, the setting can be based on practical requirements, and the scheme of the present application is not limited in this respect.
Of course, it should be noted that in practical applications, the controller may be an electronic device independent from the first device and the second device, or may be integrated into the first device or the second device, which is not limited in this application. For example, after the controller is integrated in the second device, the second device may be regarded as a master device, and manages and controls the first device, and in this case, all the functions performed by the controller may be understood as being performed by the second device in the present application.
Or, after the controller is integrated in the first device, the first device may be regarded as a master device, and manages and controls the second device, and in this case, in this application, all the functions executed by the controller may be understood as being executed by the first device.
In a specific example of the scheme of the application, the first device is further configured to obtain the target trigger information in response to a trigger operation for a sound generating component, and send the target trigger information to the controller; therefore, false triggering is avoided, for example, the message leaving state is entered by the false triggering, and a foundation is laid for fitting the actual requirement and improving the user experience.
Correspondingly, the controller is further configured to send the target trigger information to the mobile terminal associated with the intelligent security device. Therefore, the owner can conveniently find the outdoor condition at the mobile terminal, and the user experience is improved.
In an actual scene, the controller and the mobile terminal realize information interaction through a cloud end, for example, the first device detects a trigger operation for a sounding component (such as a doorbell), and the controller sends ringing prompt information to the cloud end so as to send the ringing prompt information to the mobile terminal, so that a user, such as a host, can timely know that a visitor exists outside a door. Certainly, in order to avoid disturbing the user, a sending mechanism may also be set, for example, the ring alert information is sent to the mobile terminal only when the condition is met; for example, in an example, when the target trigger information meets a preset condition, the ring alert information is sent to the cloud, and the ring alert information is sent to the mobile terminal through the cloud. The present invention is only exemplary, and in practical applications, other sending mechanisms may also be set, which is not limited by the present application. Correspondingly, the target trigger information may also be sent by the controller to the mobile terminal associated with the intelligent security device based on a cloud.
In a specific example of the present disclosure, the controller is configured to detect whether there is a start operation for the smart component; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component. That is to say, in the present application, under the condition that it is determined that the target trigger information satisfies the preset condition, it is detected whether the intelligent component has a start operation, and under the condition that it is determined that the intelligent component has no start operation, it is detected whether the voice call with the mobile terminal is received. For example, the intelligent component is specifically an intelligent door lock, and at this time, the controller first detects whether a start operation, such as an opening operation, exists in the intelligent door lock when it is determined that the target trigger information meets a preset condition, so as to determine whether a door opening action exists in an owner; and then detecting whether a voice call with the mobile terminal is received or not under the condition that the intelligent assembly is detected not to be started. Therefore, false triggering is avoided, for example, the message leaving state is entered by the false triggering, and a foundation is laid for fitting the actual demand and improving the user experience.
Here, in a case where a voice call with the mobile terminal is not received, it is considered that the preset operation is not performed. That is, in a case where it is determined that there is no start-up operation for the smart component and a voice call with the mobile terminal is not received, it is considered that the preset operation is not performed.
Correspondingly, when the intelligent door lock is determined to have the starting operation state, the intelligent door lock is prevented from entering a message leaving state, and the process is ended. Therefore, the message leaving state is prevented from being triggered by mistake, and the intellectualization is further improved.
Here, it should be noted that, in practical applications, the detecting whether the voice call with the mobile terminal is received may be understood as whether the voice call with the mobile terminal is completed, and the specific steps include: the first device responds to a call request operation (initiated by a visitor), sends a voice call request to the mobile terminal through the controller, establishes connection between the mobile terminal and the controller based on the voice call request, and after the call is carried out through the first device, the controller can think that the voice call with the mobile terminal is received or the voice call with the mobile terminal is completed.
Otherwise, if the mobile terminal does not answer the call or the connection is not successfully established, the mobile terminal can be considered to not receive the voice call with the mobile terminal.
In a specific example of the scheme of the application, the first device is further configured to play message-leaving prompt information based on an audio processing component set by the first device; or, displaying the first preset multimedia information based on a display component arranged by the user.
In a specific example of the scheme of the application, the controller is further configured to trigger a display component of the first device to present a message leaving interface after the first device is triggered to enter a message leaving state;
the first device is further configured to present a message interface and execute at least one of the following modes:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
In a specific example of the solution of the present application, the first device is further configured to modify the message information in response to a modification operation in a case that the message confirmation instruction is not detected, so as to update the message information.
In a concrete example of this application scheme, this application scheme not only sends the message information to the second equipment, still can send to mobile terminal, specifically, the controller still is used for with the message information sends to the mobile terminal that intelligent security equipment is correlated with, so that look up among the mobile terminal the message information. At the moment, the first equipment and the second equipment do not need a communication function, and a foundation is laid for saving the cost of the first equipment and the cost of the second equipment. It should be noted that, because the first device, the second device and the controller are all disposed in the intelligent security device, the communication among the three devices can be implemented without a wireless communication function, for example, the communication can be implemented through a physical connection line.
In a specific example of the solution of the present application, the controller is further configured to detect whether a review completion message sent after the mobile terminal reviews the message information is received.
That is to say, in practical application, the user can check the message at the mobile terminal, and at this time, the message is fed back after the check is completed, so as to avoid the error prompt of the message. Here, in the present application, the detection subject is a controller; in other words, the device communicating with the mobile terminal is mainly a controller, for example, the controller sends the message to the mobile terminal through the cloud, and detects whether the review completion information sent after the mobile terminal reviews the message is received.
Correspondingly, after the controller determines that the consulting completion information sent by the mobile terminal after consulting the message information is received, the second device does not need to execute a reminding process; otherwise, a reminding process is executed, so that repeated reminding can be effectively avoided, and the user experience is further improved.
In a specific example of the solution of the present application, the first device is further configured to shield the message information after the message information is successfully sent; or after the message information is successfully sent, shielding the relevant operation aiming at the message information.
In a specific example of the scheme of the application, the controller is further configured to trigger the first device to enter an intelligent dialogue state if the preset operation is not executed;
the first equipment is also used for entering an intelligent conversation state and playing a conversation prompt audio; collecting a reply audio for the dialog prompt audio;
the controller is further configured to determine whether the first device enters a message leaving state based on the reply audio.
Specifically, before the first device enters a message leaving state, the controller triggers the first device to enter an intelligent conversation state and plays a conversation prompt audio when determining that the preset operation is not executed, for example, when determining that the starting operation for the intelligent component does not exist and a voice call with the mobile terminal is not received; collecting a reply audio for the dialog prompt audio; and the controller determines whether the first device enters a message leaving state based on the reply audio.
That is to say, under the condition that it is determined that there is no start operation for the intelligent component and no voice call with the mobile terminal is received, the first device enters an intelligent conversation state, plays a conversation prompt audio, and collects a reply audio for the conversation prompt audio, so that the controller can determine whether the first device enters a message leaving state based on the reply audio.
In one embodiment, the controller stores an intelligent dialogue model, and the intelligent dialogue model stored in the controller is called after the first device enters the intelligent dialogue state, so as to complete the intelligent dialogue with the visitor. Here, the reply audio collected by the first device is the audio output by the visitor during the intelligent conversation.
Therefore, the intention of the visitor is analyzed in the intelligent conversation process, the intellectualization of the intelligent security equipment is further improved, and a foundation is laid for further improving the user experience.
In a specific example of the scheme of the application, the determining whether the first device enters the message leaving state based on the reply audio specifically includes the following steps:
The first method is as follows: the controller also determines the visiting intention of a target body (namely a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; under the condition that the visiting intention of the target body meets a first preset intention condition, for example, the visitor is determined to be a suspected thief, at the moment, the first device is triggered to play second preset multimedia information, for example, alarm contents such as alarm sound and the like, so as to remind and drive. Accordingly, at this time, the first device does not need to enter a message leaving state.
The second method comprises the following steps: the controller also determines the visiting intention of a target body (namely a visitor) corresponding to the reply audio at least based on the audio content of the reply audio; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of: playing third preset multimedia information; and entering a message leaving state. For example, when the controller determines that the visitor is a salesperson or courier, the first device may play only a third preset multimedia message (e.g., a pre-recorded audio of the host), so as to prompt the visitor that the host is not at home, and place the material or courier at a designated location, etc. Or, the first device directly enters a message leaving state so that the visitor leaves a message. Or, the first device not only plays third preset multimedia information (for example, audio pre-recorded by a host, etc.), but also enters a message leaving state, so that the visitor leaves a message.
It should be noted that the preset intention condition may be set based on the specific requirements of the scene, and the scheme of the present application is not limited thereto.
In a specific example of the application scheme, the first device is further configured to perform image acquisition after acquiring the reply audio to obtain a target image including the target volume;
the controller is further configured to identify a biometric feature of a target body in the target image to obtain biometric feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
Of course, it should be noted that in the solution of the present application, after the first device enters the message leaving state, if the visitor does not need to leave a message, the first device may be directly triggered to close the message leaving state.
Here, the above method embodiments may be referred to for the related description based on the above device, and are not described herein again.
Like this, because this application scheme and intelligent component have carried out the linkage, can have the start-up operation when detecting intelligent component, and under the condition that the message information was not looked up, in time indicate the user to look up the message information, so, further promote the intellectuality of intelligent security equipment, richened user experience, simultaneously, also promoted user experience. Moreover, the scheme of the application fully considers convenience, such as supporting operations of modifying and withdrawing the message information. Meanwhile, privacy is also fully considered, for example, messages can be left in a text message mode, so that the risk of message information leakage is effectively avoided, and the privacy of the messages is effectively ensured.
It should be noted that, in the embodiment of the present disclosure, the division of each functional unit is schematic, and is only one logical functional division, and there may be another division manner in actual implementation. Each functional unit in the embodiments of the present disclosure may be integrated into one processing unit, each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method provided by the embodiments of the present disclosure. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
Fig. 5 is a schematic structural diagram three of the intelligent security device in a specific example according to an embodiment of the present disclosure. As shown in fig. 5, the intelligent security device includes: a memory 510 and a processor 520, the memory 510 having stored therein computer programs that are executable on the processor 520. The number of the memory 510 and the processor 520 may be one or more. The memory 510 may store one or more computer programs that, when executed by the smart security device, cause the smart security device to perform the methods provided by the above-described method embodiments.
This intelligent security equipment still includes:
the communication interface 530 is used for communicating with an external device to perform data interactive transmission.
If the memory 510, the processor 520, and the communication interface 530 are implemented independently, the memory 510, the processor 520, and the communication interface 530 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.
Optionally, in an implementation, if the memory 510, the processor 520, and the communication interface 530 are integrated on a chip, the memory 510, the processor 520, and the communication interface 530 may complete communication with each other through an internal interface.
The embodiment of the present disclosure also provides a computer-readable storage medium, which stores computer instructions, and when the computer instructions are run on a computer, the computer is caused to execute the method provided by the above method embodiment.
The embodiment of the present disclosure further provides a computer program product, where the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer may implement the method provided by the above method embodiment.
The embodiment of the disclosure also provides a chip, which is coupled with the memory, and is used for implementing the method provided by the embodiment of the method.
It should be understood that the processor may be a Central Processing Unit (CPU), other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or any conventional processor or the like. It is noted that the processor may be a processor supporting an Advanced reduced instruction set machine (ARM) architecture.
Further, optionally, the memory may include a read-only memory and a random access memory, and may further include a nonvolatile random access memory. The memory may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may include a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can include Random Access Memory (RAM), which acts as external cache Memory. By way of example, and not limitation, many forms of RAM are available. For example, Static Random Access Memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data rate Synchronous Dynamic Random Access Memory (DDR SDRAM), Enhanced SDRAM (ESDRAM), SLDRAM (SLDRAM), and Direct RAMBUS RAM (DR RAM).
In the above embodiments, the implementation may be wholly or partly realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the disclosure to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, bluetooth, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others. Notably, the computer-readable storage media referred to in this disclosure may be non-volatile storage media, in other words, non-transitory storage media.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
In the description of the embodiments of the present disclosure, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present disclosure. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
In the description of the embodiments of the present disclosure, "/" indicates an OR meaning, for example, A/B may indicate A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
In the description of the embodiments of the present disclosure, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the embodiments of the present disclosure, "a plurality" means two or more unless otherwise specified.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, and any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (42)

1. A message processing method is characterized by being applied to intelligent security equipment, wherein the intelligent security equipment comprises the following steps: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; the method comprises the following steps:
detecting whether a preset operation is executed or not under the condition that the target trigger information meets a preset condition;
Under the condition that the preset operation is not executed, the first equipment enters a message leaving state and obtains message leaving information;
responding to a message confirmation instruction, and at least sending the message information to the second equipment;
detecting whether the message information is consulted or not in response to a starting operation aiming at the intelligent assembly;
and under the condition that the message is not referred to, presenting preset prompt information in the second equipment to prompt a user to view the message information.
2. The method of claim 1, further comprising:
responding to the trigger operation aiming at the sounding component to obtain the target trigger information;
and sending the target trigger information to a mobile terminal associated with the intelligent security equipment.
3. The method of claim 2, wherein the detecting whether a preset operation has been performed comprises:
detecting whether a starting operation for the intelligent component exists;
detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
4. The method of claim 1, wherein the first device entering a message state comprises:
An audio processing component of the first device plays message prompt information; alternatively, the first and second electrodes may be,
and the display component of the first device displays first preset multimedia information.
5. The method of claim 1 or 4, further comprising:
a message leaving interface is presented in a display component of the first device;
wherein, the message information acquisition comprises at least one of the following modes:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
6. The method of claim 5, further comprising:
and under the condition that the message confirmation instruction is not detected, responding to a modification operation, and modifying the message information so as to update the message information.
7. The method of claim 1, further comprising:
and sending the message information to a mobile terminal associated with the intelligent security equipment so as to look up the message information in the mobile terminal.
8. The method of claim 7, wherein the detecting whether the message information has been consulted comprises:
and detecting whether the consulting completion information sent after the mobile terminal consults the message information is received.
9. The method of claim 1 or 7, further comprising:
after the message information is successfully sent, shielding the message information in the first equipment; alternatively, the first and second electrodes may be,
and after the message information is successfully sent, shielding relevant operation aiming at the message information in the first equipment.
10. The method of claim 1, wherein before the first device enters a message state, the method further comprises:
under the condition that the preset operation is not executed, the first equipment enters an intelligent conversation state and plays a conversation prompt audio;
collecting a reply audio for the dialog prompt audio;
determining whether the first device enters a message leaving state based on the reply audio.
11. The method of claim 10, wherein the determining whether the first device enters a message-leaving state based on the reply audio comprises:
determining the visiting intention of a target body corresponding to the reply audio at least based on the audio content of the reply audio;
And playing second preset multimedia information under the condition that the visiting intention of the target body is determined to meet a first preset intention condition.
12. The method of claim 10, wherein the determining whether the first device enters a message-leaving state based on the reply audio comprises:
determining the visiting intention of a target body corresponding to the reply audio at least based on the audio content of the reply audio;
in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, the first device performs at least one of:
playing third preset multimedia information;
and entering a message leaving state.
13. The method according to claim 11 or 12, characterized in that the method further comprises:
after the reply audio is collected, the first equipment collects images to obtain a target image containing the target body;
identifying the biological characteristics of a target body in the target image to obtain the biological characteristic information of the target body;
identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target;
wherein the determining the visiting intention of the target body corresponding to the reply audio at least based on the audio content of the reply audio comprises:
And performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
14. The utility model provides an intelligent security equipment which characterized in that includes: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; wherein the content of the first and second substances,
the first device is used for detecting whether preset operation is executed or not under the condition that the target trigger information meets preset conditions; entering a message leaving state and acquiring message leaving information under the condition that the preset operation is not executed; responding to a message confirmation instruction, and at least sending the message information to the second equipment;
second equipment, is used for responding to the start-up operation to the stated intelligent assembly, detect the stated message information has already consulted; and when the situation that the message is not referred is detected, presenting preset prompt information to prompt a user to view the message.
15. The smart security device according to claim 14, wherein the first device is further configured to obtain the target trigger information in response to a trigger operation for a sound generation component; and sending the target trigger information to a mobile terminal associated with the intelligent security equipment.
16. The intelligent security device according to claim 15, wherein the first device is further configured to detect whether there is a start operation for the intelligent component; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
17. The intelligent security device according to claim 14, wherein the first device is further configured to play message prompt information based on an audio processing component provided by the first device; or, displaying the first preset multimedia information based on a display component arranged by the user.
18. The intelligent security device according to claim 14 or 17, wherein the first device is further configured to present a message interface in a display component provided in the first device;
and, further for performing at least one of the following:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
19. The intelligent security device according to claim 18, wherein the first device is further configured to modify the message information in response to a modification operation to update the message information when the message confirmation instruction is not detected.
20. The intelligent security device according to claim 14, wherein the first device is further configured to send the message information to a mobile terminal associated with the intelligent security device, so that the message information is referred to the mobile terminal; alternatively, the first and second electrodes may be,
the second equipment is further used for sending the message information to the mobile equipment associated with the intelligent security equipment, so that the message information can be conveniently looked up in the mobile terminal.
21. The intelligent security device according to claim 20, wherein the first device is further configured to detect whether a review completion message sent after the mobile terminal reviews the message information is received; alternatively, the first and second electrodes may be,
the second device is further configured to detect whether the review completion information sent after the mobile terminal reviews the message information is received.
22. The intelligent security device according to claim 14 or 20, wherein the first device is further configured to mask the message information after the message information is successfully sent; or after the message information is successfully sent, shielding the relevant operation aiming at the message information.
23. The intelligent security device according to claim 14, wherein the first device is further configured to enter an intelligent dialogue state and play a dialogue prompt audio if the preset operation is not performed; collecting a reply audio for the dialog prompt audio; determining whether the first device enters a message leaving state based on the reply audio;
alternatively, the first and second electrodes may be,
the first device is also used for entering an intelligent conversation state and playing a conversation prompt audio under the condition that the preset operation is not executed; collecting a reply audio for the dialog prompt audio; the second device is further configured to determine whether the first device enters a message leaving state based on the reply audio.
24. The intelligent security device according to claim 23, wherein the first device is further configured to determine, based on at least audio content of the reply audio, an intention of visit of a target corresponding to the reply audio; playing second preset multimedia information under the condition that the visiting intention of the target body is determined to meet a first preset intention condition; alternatively, the first and second electrodes may be,
the second device is further configured to determine, based on at least the audio content of the reply audio, a visiting intention of a target corresponding to the reply audio, and trigger the first device to play second preset multimedia information when it is determined that the visiting intention of the target meets a first preset intention condition.
25. The intelligent security device according to claim 23, wherein the first device is further configured to determine, based on at least audio content of the reply audio, an intention of visit of a target corresponding to the reply audio; in a case where it is determined that the visiting intention of the target body satisfies a second preset intention condition, performing at least one of: playing third preset multimedia information; entering a message leaving state;
alternatively, the first and second electrodes may be,
the second device is further used for determining the visiting intention of the target body corresponding to the reply audio at least based on the audio content of the reply audio; determining that the visiting intention of the target body meets a second preset intention condition; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of: playing third preset multimedia information; and entering a message leaving state.
26. The intelligent security device according to claim 24 or 25, wherein the first device is further configured to perform image acquisition after acquiring the reply audio to obtain a target image including the target object; identifying the biological characteristics of a target body in the target image to obtain the biological characteristic information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
27. The intelligent security device according to claim 24 or 25, wherein the first device is further configured to perform image acquisition by the first device after acquiring the reply audio, so as to obtain a target image including the target body;
the second device is further configured to identify a biometric feature of a target body in the target image, so as to obtain biometric feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
28. The utility model provides an intelligent security equipment which characterized in that includes: the device comprises a first device arranged on a first surface and a second device arranged on a second surface, wherein the second surface corresponds to the first surface, and the first device is connected with the second device; the intelligent security equipment further comprises a controller, wherein the controller is used for controlling the first equipment and the second equipment; wherein the content of the first and second substances,
the controller is used for detecting whether preset operation is executed or not under the condition that the target trigger information meets preset conditions; under the condition that the preset operation is not executed, triggering the first equipment to enter a message leaving state;
The first equipment is used for entering a message leaving state and acquiring message leaving information; responding to a message confirmation instruction, and at least sending the message information to the controller;
the controller is further configured to send the message information to the second device at least after receiving the message information; detecting whether the message information is consulted or not in response to a starting operation for the intelligent component; under the condition that the second device is not referred to, triggering the second device to present preset prompt information;
the second device is further configured to present the preset prompt message to prompt the user to view the message.
29. The intelligent security device of claim 28,
the first device is further used for responding to the triggering operation aiming at the sounding component, obtaining the target triggering information and sending the target triggering information to the controller;
the controller is further configured to send the target trigger information to the mobile terminal associated with the intelligent security device.
30. The smart security device of claim 29, wherein the controller is configured to detect whether a start operation for the smart component exists; detecting whether a voice call with the mobile terminal is received in the case that it is determined that there is no start-up operation for the smart component.
31. The intelligent security device of claim 28,
the first equipment is also used for playing message prompt information based on the audio processing component arranged by the first equipment; or, displaying the first preset multimedia information based on a display component arranged by the user.
32. The intelligent security device according to claim 28 or 31,
the controller is further configured to trigger a display component of the first device to present a message leaving interface after the first device is triggered to enter a message leaving state;
the first device is further configured to present a message interface and execute at least one of the following modes:
responding to user operation of a first key in the message leaving interface, and displaying a text input interface to obtain a message leaving text;
responding to user operation of a second key in the message leaving interface, and performing video acquisition to obtain a message leaving video;
and responding to the user operation aiming at the third key in the message leaving interface, and performing audio acquisition to obtain message leaving audio.
33. The intelligent security device according to claim 32, wherein the first device is further configured to modify the message information in response to a modification operation to update the message information when the message confirmation instruction is not detected.
34. The intelligent security device of claim 28, wherein the controller is further configured to send the message information to a mobile terminal associated with the intelligent security device, so as to refer to the message information in the mobile terminal.
35. The intelligent security device of claim 34, wherein the controller is further configured to detect whether review completion information sent after the mobile terminal reviews the message information is received.
36. The intelligent security device according to claim 28 or 34, wherein the first device is further configured to mask the message information after the message information is successfully sent; alternatively, the first and second electrodes may be,
and after the message information is successfully sent, shielding the relevant operation aiming at the message information.
37. The intelligent security device of claim 28, wherein the controller is further configured to trigger the first device to enter an intelligent dialogue state if the preset operation is not performed;
the first equipment is also used for entering an intelligent conversation state and playing a conversation prompt audio; collecting a reply audio for the dialog prompt audio;
The controller is further configured to determine whether the first device enters a message leaving state based on the reply audio.
38. The smart security device according to claim 37, wherein the controller is further configured to determine an intention of visit of a target corresponding to the reply audio based on at least audio content of the reply audio; and under the condition that the visiting intention of the target body meets a first preset intention condition, triggering the first equipment to play second preset multimedia information.
39. The smart security device according to claim 37, wherein the controller is further configured to determine an intention of visit of a target corresponding to the reply audio based on at least audio content of the reply audio; in the event that it is determined that the target's intent to visit satisfies a second preset intent condition, triggering the first device to perform at least one of:
playing third preset multimedia information; and entering a message leaving state.
40. The intelligent security device according to claim 38 or 39, wherein the first device is further configured to perform image acquisition after acquiring the reply audio to obtain a target image including the target body;
The controller is further configured to identify a biometric feature of a target body in the target image to obtain biometric feature information of the target body; identifying the voiceprint characteristics of the reply audio to obtain the voiceprint characteristic information of the target; and performing weighting processing on the biological characteristic information, the voiceprint characteristic information and the audio content of the reply audio of the target body based on a preset weight to determine the visiting intention of the target body.
41. The utility model provides an intelligent security equipment which characterized in that includes:
one or more processors;
a memory communicatively coupled to the one or more processors;
one or more computer programs, wherein the one or more computer programs are stored in the memory, which when executed by the smart security device, cause the smart security device to perform the method of any of claims 1-13.
42. A computer-readable storage medium having stored thereon computer instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 13.
CN202111194768.3A 2021-10-14 2021-10-14 Message processing method, device and storage medium Active CN113645344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111194768.3A CN113645344B (en) 2021-10-14 2021-10-14 Message processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111194768.3A CN113645344B (en) 2021-10-14 2021-10-14 Message processing method, device and storage medium

Publications (2)

Publication Number Publication Date
CN113645344A true CN113645344A (en) 2021-11-12
CN113645344B CN113645344B (en) 2022-01-07

Family

ID=78426789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111194768.3A Active CN113645344B (en) 2021-10-14 2021-10-14 Message processing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN113645344B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116156270A (en) * 2021-11-23 2023-05-23 成都极米科技股份有限公司 Information broadcasting control method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504793A (en) * 2014-12-19 2015-04-08 天津市亚安科技股份有限公司 Intelligent door safety control system and method based on video service
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN206283600U (en) * 2016-12-08 2017-06-27 广东赛翼智能科技股份有限公司 Internet visual entrance guard intercommunication management system
CN107741698A (en) * 2017-10-24 2018-02-27 珠海格力电器股份有限公司 The inter-linked controlling method of intelligent appliance and access control equipment, device and system
WO2019028058A1 (en) * 2017-07-31 2019-02-07 SkyBell Technologies, Inc. Doorbell communication systems and methods
CN110324586A (en) * 2019-07-25 2019-10-11 北京疯景科技有限公司 A kind of message leaving method of visual door control system
CN112770054A (en) * 2021-01-06 2021-05-07 深圳市芯中芯科技有限公司 Intelligent doorbell system and application method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504793A (en) * 2014-12-19 2015-04-08 天津市亚安科技股份有限公司 Intelligent door safety control system and method based on video service
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN206283600U (en) * 2016-12-08 2017-06-27 广东赛翼智能科技股份有限公司 Internet visual entrance guard intercommunication management system
WO2019028058A1 (en) * 2017-07-31 2019-02-07 SkyBell Technologies, Inc. Doorbell communication systems and methods
CN107741698A (en) * 2017-10-24 2018-02-27 珠海格力电器股份有限公司 The inter-linked controlling method of intelligent appliance and access control equipment, device and system
CN110324586A (en) * 2019-07-25 2019-10-11 北京疯景科技有限公司 A kind of message leaving method of visual door control system
CN112770054A (en) * 2021-01-06 2021-05-07 深圳市芯中芯科技有限公司 Intelligent doorbell system and application method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116156270A (en) * 2021-11-23 2023-05-23 成都极米科技股份有限公司 Information broadcasting control method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113645344B (en) 2022-01-07

Similar Documents

Publication Publication Date Title
CN105843615B (en) Notification message processing method and device
CN110650129B (en) Account login method and device and computer readable storage medium
CN106209800B (en) Equipment Authority sharing method and apparatus
CN106469054B (en) Notification message control method and device and terminal
JP6149163B2 (en) WI-FI network connection method, apparatus, program, and recording medium
US20110041072A1 (en) Authentication and personal content transmission method for sharing personal contents and display apparatus and server thereof
CN104462296B (en) File management method and device and terminal
KR101735755B1 (en) Method and apparatus for prompting device connection
CN107741869A (en) The startup method, apparatus and terminal device of application program
CN106203167A (en) Application rights management method and device
CN105930213A (en) Application running method and apparatus
CN113645344B (en) Message processing method, device and storage medium
WO2022262229A1 (en) Livestreaming task assignment method and apparatus
CN110852163A (en) Binding method and device
CN107632835B (en) Application installation method and device
CN106528247B (en) Data refreshing method and device
CN110764847B (en) User information processing method, device, electronic equipment and storage medium
JP2017520877A (en) SEARCH METHOD, SEARCH DEVICE, PROGRAM, AND RECORDING MEDIUM
CN104780256A (en) Address book management method and device and intelligent terminal
CN110913276B (en) Data processing method, device, server, terminal and storage medium
CN108829473B (en) Event response method, device and storage medium
WO2020024436A1 (en) Method and system for updating user information, and server
KR20180081640A (en) Method and device for pushing user information
CN111241134B (en) Data processing method and device
CN110113256B (en) Information interaction method and device, server, user terminal and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Room 410-1, floor 4, building 1, courtyard 10, North Longyu street, Changping District, Beijing 100085

Patentee after: Beijing chuangmizhihui IOT Technology Co.,Ltd.

Patentee after: Shanghai chuangmi Shulian Intelligent Technology Development Co.,Ltd.

Address before: Room 410-1, floor 4, building 1, courtyard 10, North Longyu street, Changping District, Beijing 100085

Patentee before: Beijing chuangmizhihui IOT Technology Co.,Ltd.

Patentee before: SHANGHAI CHUANGMI TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230607

Address after: Room 001a, 11 / F, building 1, 588 Zixing Road, Minhang District, Shanghai, 200241

Patentee after: Shanghai chuangmi Shulian Intelligent Technology Development Co.,Ltd.

Address before: Room 410-1, floor 4, building 1, courtyard 10, North Longyu street, Changping District, Beijing 100085

Patentee before: Beijing chuangmizhihui IOT Technology Co.,Ltd.

Patentee before: Shanghai chuangmi Shulian Intelligent Technology Development Co.,Ltd.