CN106953784B - Indoor environment intrusion detection method in smart home - Google Patents

Indoor environment intrusion detection method in smart home Download PDF

Info

Publication number
CN106953784B
CN106953784B CN201710161333.6A CN201710161333A CN106953784B CN 106953784 B CN106953784 B CN 106953784B CN 201710161333 A CN201710161333 A CN 201710161333A CN 106953784 B CN106953784 B CN 106953784B
Authority
CN
China
Prior art keywords
node
lqi
value
zigbee
coordinator node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710161333.6A
Other languages
Chinese (zh)
Other versions
CN106953784A (en
Inventor
曾宪威
李扬汉
林廷玮
陈奕纶
毛秀华
曹茶连
蔡情情
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhikeda Xiamen Technology Co ltd
Original Assignee
Zhikeda Xiamen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhikeda Xiamen Technology Co ltd filed Critical Zhikeda Xiamen Technology Co ltd
Priority to CN201710161333.6A priority Critical patent/CN106953784B/en
Publication of CN106953784A publication Critical patent/CN106953784A/en
Application granted granted Critical
Publication of CN106953784B publication Critical patent/CN106953784B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

The invention belongs to the technical field of intelligent home furnishing, and provides a method and a system for detecting indoor environment intrusion in the intelligent home furnishing, wherein the method comprises the steps of selecting at least one coordinator node and a plurality of terminal nodes from a plurality of deployed wireless network nodes in an intelligent home furnishing system according to an indoor deployment position; under the condition of no interference, each terminal node sends a data frame to the coordinator node at regular time, so that the coordinator node takes the latest and regularly acquired LQI value as an LQI safety reference value; each terminal node periodically sends data frames to the coordinator node in real time, so that the coordinator node compares the LQI value acquired in real time with the LQI safety reference value, and sends intrusion alarm information when the difference value exceeds a certain threshold value. The intrusion detection method provided by the invention does not need to additionally increase hardware deployment, can quickly and effectively carry out indoor intrusion detection under the condition of not changing the conventional intelligent household deployment, and has high accuracy.

Description

Indoor environment intrusion detection method in smart home
Technical Field
The invention belongs to the technical field of intelligent home furnishing, and particularly relates to a method and a system for detecting indoor environment invasion in the intelligent home furnishing.
Background
The intelligent home connects various devices (such as audio and video devices, lighting systems, curtain control, air conditioner control, security systems, digital cinema systems, audio and video servers, video cabinet systems, network home appliances and the like) in the home together through the Internet of things technology, and provides multiple functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environment monitoring, heating and ventilation control, infrared forwarding, programmable timing control and the like. Compared with the common home, the intelligent home has the traditional living function, integrates the functions of building, network communication, information household appliance and equipment automation, provides an all-around information interaction function, and even saves funds for various energy expenses.
In the existing intelligent furniture system, for indoor safety protection, a set of special alarms is generally deployed, for example, infrared sensing alarms are adopted. However, the existing alarm has high cost on one hand, and the cost is not borne by many common users particularly in the maintenance stage; on the other hand, the installation and deployment of the alarm are also very inconvenient because redesign, wiring, installation and the like are needed in the original intelligent furniture system.
Disclosure of Invention
Aiming at the problems existing in the current intelligent household intrusion detection, the invention provides an indoor environment intrusion detection method in an intelligent household, which comprises the following steps:
in the intelligent home system, at least one coordinator node and a plurality of terminal nodes are selected from a plurality of deployed wireless network nodes according to the indoor deployment position;
under the condition of no interference, each terminal node sends a data frame to a coordinator node at regular time so that the coordinator node collects the LQI value of each terminal node sending the data frame at regular time, and the coordinator node takes the latest and regularly collected LQI value as an LQI safety reference value;
each terminal node periodically sends a data frame to a coordinator node in real time, so that the coordinator node periodically collects the LQI value of the data frame sent by each terminal node in real time, the coordinator node compares the LQI value collected in real time with an LQI safety reference value, and when the difference value exceeds a certain threshold value, intrusion alarm information is sent out.
Further, the method also comprises selecting a routing node from a plurality of deployed wireless network nodes for assisting the communication between the coordinator node and the terminal node.
Further, the air conditioner is provided with a fan,
Figure BDA0001248632420000021
where n represents the transmitted data packet, m represents the number of successfully received packets, q represents the number of CRC check failed packets, lqisLQI value indicating the number of successfully received packets, LQIerrorLQI value indicating the number of unsuccessfully received packets, LQIlostLQI value indicating the number of lost packets.
Further, the wireless network nodes adopt a ZigBee wireless transmission protocol.
Further, in the smart home system, at least one coordinator node and a plurality of terminal nodes are selected from the deployed wireless network nodes according to an indoor deployment location, including:
selecting a ZigBee node of a position center as a coordinator node according to a topological structure of a plurality of deployed ZigBee nodes;
then, the ZigBee coordinator node is used as a center, partitioning is carried out by taking 40 degrees as a unit, an indoor area is divided into 9 areas, and one ZigBee node is selected in each area to serve as a terminal node.
Further, if no ZigBee node exists in a certain area, a ZigBee node is selected in each of two adjacent areas and is used as a ZigBee auxiliary node in the area.
Further, when judging whether an invasion condition exists in an area without the ZigBee node, comparing and comprehensively judging the LQI value acquired by the ZigBee auxiliary nodes in two adjacent areas in real time with the LQI safety reference value acquired by the ZigBee auxiliary nodes at regular time.
The invention also provides an indoor environment intrusion detection system in the smart home, which comprises: at least one coordinator node and a plurality of terminal nodes;
each terminal node is used for sending data frames to the coordinator node at fixed time and periodically sending the data frames to the coordinator node in real time under the condition of no interference;
the coordinator node is used for regularly acquiring the LQI value of each terminal node for sending the data frame under the condition of no interference, and taking the latest regularly acquired LQI value as an LQI safety reference value;
the coordinator node is further configured to periodically acquire, in real time, an LQI value of each terminal node that transmits a data frame, compare the periodically acquired LQI value with an LQI security reference value, and send intrusion alarm information when a difference value exceeds a certain threshold value.
Further, the method also comprises a routing node selected from a plurality of deployed wireless network nodes, and the routing node is used for assisting the communication between the coordinator node and the terminal node.
Furthermore, the coordinator node and the terminal nodes adopt a ZigBee wireless transmission protocol, the coordinator node is located at the central position of a plurality of deployed ZigBee node topological structures, and the terminal nodes are located in 9 areas which are divided by taking the ZigBee coordinator node as the center and taking 40 degrees as a unit.
The invention provides a method and a system for detecting indoor environment intrusion in smart home, which have the following technical effects: the indoor intrusion detection system can be rapidly deployed without increasing hardware equipment or damaging the existing deployed intelligent home environment, and the intrusion detection is accurate and reliable through actual test verification.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an indoor environment intrusion detection method in smart home according to the present invention;
fig. 2 is a schematic diagram of home deployment using the method for detecting indoor environment intrusion in smart home provided by the present invention;
FIG. 3 is a network topology diagram of an indoor environment intrusion detection system in a smart home according to the present invention;
fig. 4 is a schematic diagram of classroom deployment using the method for detecting indoor environment intrusion in smart homes according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a method for detecting indoor environment intrusion in smart home, which comprises the following steps of:
s101, in an intelligent home system, at least one coordinator node and a plurality of terminal nodes are selected from a plurality of deployed wireless network nodes according to indoor deployment positions; the wireless network node is an internet of things terminal node in an intelligent home, and can be a television, a curtain, a multi-door sound, an air conditioner, a refrigerator and other intelligent home appliances.
Step S103, under the condition of no interference, each terminal node sends a data frame to a coordinator node at regular time, so that the coordinator node collects link quality indicator (LQI value for short) of each terminal node sending the data frame at regular time, and the coordinator node takes the latest and regularly collected LQI value as an LQI safety reference value;
in this step, the formula for calculating LQI is
Figure BDA0001248632420000051
Where n denotes a transmitted packet and m denotes successNumber of received packets, q number of CRC check failed packets lqisLQI value indicating the number of successfully received packets, LQIerrorLQI value indicating the number of unsuccessfully received packets, LQIlostLQI value indicating the number of lost packets.
And step S105, each terminal node periodically transmits a data frame to a coordinator node in real time, so that the coordinator node periodically acquires the LQI value of the data frame transmitted by each terminal node in real time, the coordinator node compares the LQI value acquired in real time with an LQI safety reference value, and when the difference value exceeds a certain threshold value, intrusion alarm information is transmitted.
According to the indoor environment intrusion detection method in the intelligent home, whether an indoor intrusion phenomenon exists is judged by monitoring the change of the LQI through the deployment hardware environment of the existing intelligent home. The monitoring method for judging whether the intrusion is caused is mainly based on that the LQI value is maintained in a stable state in an unmanned and closed indoor space, the LQI changes when people intrude, and the value is compared with the value in the stable state of the LQI value so as to make a monitoring method capable of judging whether the intrusion is caused. The method is simple to deploy, high in accuracy and capable of being rapidly and widely popularized and applied to smart homes.
The method provided by the invention is preferably applied to the ZigBee wireless transmission protocol, and is especially suitable for being applied to an intelligent home system because the ZigBee has the advantages of being most power-saving, the largest network node, the lowest cost and the like, and is specially designed for a low-cost and multi-node low-power-consumption network. Fig. 2 shows a simple indoor deployment case provided by the method of the present invention. And judging whether the middle area has an invasion phenomenon or not by detecting the change of the LQI between the ZigBee coordinator and the ZigBee terminal node.
In specific implementation, if the indoor environment is complex and there are many deployed network nodes, a routing node may be selected from the deployed wireless network nodes, as shown in fig. 3, where the routing node is used to assist the coordinator node in communicating with the terminal node.
Preferably, when the coordinator node and the terminal node are selected, as shown in fig. 3, the ZigBee node of the location center is selected as the coordinator node according to the topology structure of the deployed plurality of ZigBee nodes;
then, the ZigBee coordinator node is used as a center, partitioning is carried out by taking 40 degrees as a unit, an indoor area is divided into 9 areas, and one ZigBee node is selected in each area to serve as a terminal node. Since the LQI is found to be most stable in a sector coverage range below 40 ° in a plurality of test studies, it is most suitable to perform 360-degree seamless coverage by dividing into 9 regions in units of 40 °.
In specific implementation, if there is no ZigBee node in a certain region (as shown in fig. 3), one ZigBee node is selected in each of two adjacent regions and is simultaneously used as a ZigBee auxiliary node of the region, and when it is determined that there is an intrusion in the region without a ZigBee node, the LQI value acquired in real time by the ZigBee auxiliary nodes in the two adjacent regions is compared with the LQI safety reference value acquired at regular time, and the comprehensive determination is performed. Therefore, even if the area does not cover the ZigBee node, the comparison and judgment can be carried out by means of the LQI values acquired by the adjacent areas and the LQI safety reference values acquired at regular time, and in order to increase reliability, the ZigBee nodes of the left and right adjacent areas are selected, and the comprehensive comparison and judgment can be more accurate. For example, the judgment condition may be set such that two LQI value changes of left and right adjacent ZigBee nodes must satisfy a preset threshold at the same time, or an intrusion phenomenon may be judged as long as one of the two LQI value changes satisfies the preset threshold, which is not limited herein, and the judgment rule may be selected according to the wireless network condition of time and the deployment of the nodes.
The invention also provides an indoor environment intrusion detection system in smart home, as shown in fig. 3, comprising: at least one coordinator node and a plurality of terminal nodes;
each terminal node is used for sending data frames to the coordinator node at fixed time and periodically sending the data frames to the coordinator node in real time under the condition of no interference;
the coordinator node is used for regularly acquiring the LQI value of each terminal node for sending the data frame under the condition of no interference, and taking the latest regularly acquired LQI value as an LQI safety reference value;
the coordinator node is further configured to periodically acquire, in real time, an LQI value of each terminal node that transmits a data frame, compare the periodically acquired LQI value with an LQI security reference value, and send intrusion alarm information when a difference value exceeds a certain threshold value.
Preferably, the method further comprises a routing node selected from a plurality of deployed wireless network nodes, for assisting the communication between the coordinator node and the terminal node.
Preferably, the coordinator node and the terminal node adopt a ZigBee wireless transmission protocol, the coordinator node is located at a central position of a deployed topology structure of a plurality of ZigBee nodes, and the terminal node is located in 9 regions divided by the ZigBee coordinator node as a center according to a unit of 40 °.
The inventor also performed verification in a classroom, the deployment scenario is shown in fig. 4, and the test is divided into three cases, which are: the experiment is a door opening and closing influence LQI value test, five minutes are carried out in each experiment, the LQI value is displayed once every second, and the three conditions are divided into the following three conditions:
the first condition is as follows: the door is opened from the outside of the classroom, the door is closed inside, the door is opened from the inside of the classroom after 30 seconds, the door is closed outside, and people can stand still after entering the classroom and leaving the classroom. Tests show that when the door is opened, the door is closed after the door enters a classroom (a person enters the classroom and stands still), and the door is opened again after 30 seconds, the door leaves the classroom and is closed (the person leaves the classroom and stands still), the LQI value can be maintained at a level when no action is performed, but the LQI value can be changed as long as the door is opened and closed and someone enters and exits, and the system can send alarm information.
It can be seen from this experiment that the LQI value decreases when a person goes from outside the classroom into the classroom, whereas the LQI value increases, and when the door is opened, the LQI value does not necessarily decrease or may increase, and whether the person is in the classroom or not has a large influence on the LQI value.
Case two: the classroom door is opened from the outside and enters the interior, and the classroom door bypasses the middle of the coordinator node and the terminal node and then is opened and closed. Tests show that after the door is opened, a person walks into a classroom, goes out and closes the door through the space between the coordinator node and the terminal node, and the system can send alarm information because the person walks and is greatly interfered and the LQI value has obvious fluctuation.
When a person walks, the LQI value is not fixed, and when the person walks out of a classroom, the LQI value tends to be fixed, which is obvious, so that whether the person invades or not can be judged through the change of the LQI value.
Case three: the door is closed 15 seconds after the door is opened in the classroom, and people stand at a fixed point and do not move. Tests show that when the door is closed after 15 seconds in a classroom (the person stands still at a fixed point), the person stands still, only the door is opened and closed, the LQI has no special change, and only has obvious fluctuation at the moment of opening and closing the door, while the difference of the LQI values is the influence of the opening and closing of the door and the angle of the opened door, so that the pure opening and closing of the door has no great influence on the LQI value.
From the above three tests, it was also verified that the LQI value changes significantly in the indoor environment as long as intrusion occurs. Access intrusion is also readily monitored by means of the method and system of one of the present invention.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (4)

1. An indoor environment intrusion detection method in smart home is characterized by comprising the following steps:
in the intelligent home system, at least one coordinator node and a plurality of terminal nodes are selected from a plurality of deployed wireless network nodes according to the indoor deployment position;
under the condition of no interference, each terminal node sends a data frame to a coordinator node at regular time so that the coordinator node collects the LQI value of each terminal node sending the data frame at regular time, and the coordinator node takes the latest and regularly collected LQI value as an LQI safety reference value;
each terminal node periodically sends a data frame to a coordinator node in real time so that the coordinator node periodically collects the LQI value of the data frame sent by each terminal node in real time, the coordinator node compares the LQI value collected in real time with an LQI safety reference value, and when the difference value exceeds a certain threshold value, intrusion alarm information is sent;
the wireless network nodes adopt a ZigBee wireless transmission protocol;
in the smart home system, at least one coordinator node and a plurality of terminal nodes are selected from a plurality of deployed wireless network nodes according to an indoor deployment position, and the method comprises the following steps:
selecting a ZigBee node of a position center as a coordinator node according to a topological structure of a plurality of deployed ZigBee nodes;
then partitioning by taking a ZigBee coordinator node as a center and 40 degrees as a unit, dividing an indoor area into 9 areas, and selecting a ZigBee node in each area as a terminal node;
if no ZigBee node exists in a certain area, selecting a ZigBee node in two adjacent areas respectively and simultaneously using the selected ZigBee node as a ZigBee auxiliary node of the area.
2. The method according to claim 1, further comprising selecting a routing node from a plurality of deployed wireless network nodes for assisting the coordinator node in communicating with the terminal node.
3. The method for detecting the intrusion of the indoor environment into smart home according to claim 1,
Figure FFW0000022244650000021
where n represents the transmitted data packet, m represents the number of successfully received packets, q represents the number of CRC check failed packets, lqisLQI value indicating the number of successfully received packets, LQIerrorIndicating the failureLQI value of received packet number, LQIlostLQI value indicating the number of lost packets.
4. The method for detecting the indoor environment intrusion in the smart home according to claim 1, wherein when judging whether there is an intrusion situation in an area without ZigBee nodes, the method performs a comprehensive judgment by comparing an LQI value acquired in real time by ZigBee auxiliary nodes in two adjacent areas with an LQI safety reference value acquired at regular time.
CN201710161333.6A 2017-03-17 2017-03-17 Indoor environment intrusion detection method in smart home Active CN106953784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710161333.6A CN106953784B (en) 2017-03-17 2017-03-17 Indoor environment intrusion detection method in smart home

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710161333.6A CN106953784B (en) 2017-03-17 2017-03-17 Indoor environment intrusion detection method in smart home

Publications (2)

Publication Number Publication Date
CN106953784A CN106953784A (en) 2017-07-14
CN106953784B true CN106953784B (en) 2021-09-10

Family

ID=59472533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710161333.6A Active CN106953784B (en) 2017-03-17 2017-03-17 Indoor environment intrusion detection method in smart home

Country Status (1)

Country Link
CN (1) CN106953784B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068349B (en) * 2018-07-12 2021-08-06 重庆邮电大学 Indoor intrusion detection method based on small sample iterative migration
CN112649813B (en) * 2020-12-15 2022-02-08 北京星天地信息科技有限公司 Method for indoor safety inspection of important place, inspection equipment, robot and terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104678770A (en) * 2015-01-23 2015-06-03 小米科技有限责任公司 Displacement accident detection method and system
CN105451235A (en) * 2015-11-13 2016-03-30 大连理工大学 Wireless sensor network intrusion detection method based on background updating

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8490156B2 (en) * 2008-05-13 2013-07-16 At&T Mobility Ii Llc Interface for access management of FEMTO cell coverage
CN101340292A (en) * 2008-08-07 2009-01-07 上海交通大学 Invasion detection method of radio self-organization network
CN102238658A (en) * 2010-04-30 2011-11-09 北京三星通信技术研究有限公司 Method for supporting reselection of gateway nodes
CN102137425A (en) * 2011-02-24 2011-07-27 华为技术有限公司 Link-quality-evaluating method and device
CN103166809A (en) * 2011-12-15 2013-06-19 中国移动通信集团湖南有限公司 Monitoring station deploying method and device
US9330548B2 (en) * 2014-02-25 2016-05-03 Fermitron Inc. Wireless perimeter intrusion detection system
CN104093202B (en) * 2014-07-02 2017-11-17 南京信息工程大学 A kind of environment self-adaption without device target localization method
CN106297114B (en) * 2015-06-26 2018-07-31 奇点新源国际技术开发(北京)有限公司 A kind of invader detection method and device
CN106470438A (en) * 2015-08-20 2017-03-01 中兴通讯股份有限公司 A kind of node selecting method and device
CN105307175A (en) * 2015-09-22 2016-02-03 绍兴文理学院 Method for selecting IDA (intrusion detection agent) start strategies of wireless sensor network
CN105761460B (en) * 2016-04-21 2018-07-10 珠海市埃帝尔软件技术有限公司 A kind of comprehensive integrated safety precaution analysis alarm system and method
CN106231552B (en) * 2016-08-02 2019-09-27 南京信息工程大学 A kind of noncooperative target localization method based on hybrid mode

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104678770A (en) * 2015-01-23 2015-06-03 小米科技有限责任公司 Displacement accident detection method and system
CN105451235A (en) * 2015-11-13 2016-03-30 大连理工大学 Wireless sensor network intrusion detection method based on background updating

Also Published As

Publication number Publication date
CN106953784A (en) 2017-07-14

Similar Documents

Publication Publication Date Title
US9990822B2 (en) Intruder detection using a wireless service mesh network
US10275263B2 (en) Emergency video camera system
US11388266B2 (en) Universal protocol translator
EP3059719B1 (en) Cloud-based alarm system with alarm monitoring and reporting
US9940798B2 (en) Alarm arming with open entry point
US11410539B2 (en) Internet of things (IoT) based integrated device to monitor and control events in an environment
US11869321B2 (en) Blending inputs and multiple communication channels
CN106953784B (en) Indoor environment intrusion detection method in smart home
KR20170017867A (en) Maintaining routing information
KR101906880B1 (en) Method of providing Motion sensing based on parametric perturbation of wireless LAN
CN104036623A (en) Method for correcting false data information alarm
US10187402B2 (en) Network intrusion mitigation
KR20220095764A (en) Disaster judgment system based on IoT platform
CN111045338A (en) Whole-house intelligent home system based on super chain
EP3881299A1 (en) Alarm system detector for door or window
A Khalifa et al. IoT-Network Automation System Design and Implementation Simulation for Smart Home Applications
WO2023126347A1 (en) Security monitoring systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant