CN110992626A - Security method based on air conditioner and security air conditioner - Google Patents

Security method based on air conditioner and security air conditioner Download PDF

Info

Publication number
CN110992626A
CN110992626A CN201911173522.0A CN201911173522A CN110992626A CN 110992626 A CN110992626 A CN 110992626A CN 201911173522 A CN201911173522 A CN 201911173522A CN 110992626 A CN110992626 A CN 110992626A
Authority
CN
China
Prior art keywords
data
house
entrant
security
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911173522.0A
Other languages
Chinese (zh)
Inventor
谭志凯
古汤汤
寇晖
屠璐琼
蔡广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Original Assignee
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aux Air Conditioning Co Ltd, Ningbo Aux Electric Co Ltd filed Critical Aux Air Conditioning Co Ltd
Priority to CN201911173522.0A priority Critical patent/CN110992626A/en
Publication of CN110992626A publication Critical patent/CN110992626A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Abstract

The invention provides a security protection method and a security protection air conditioner based on an air conditioner, which are characterized in that on the basis of the existing air conditioner with a camera, functions of security protection and other identification control are added, the practicability and the utilization rate of the air conditioner are improved, the air conditioner and the security protection are combined to ensure that the security protection is good in concealment and high in early warning accuracy, and the security protection method comprises the following steps: the camera collects face data of a house owner and stores the face data into the first memory; when the processor detects an entrant, matching the face data of the entrant with the face data stored in the first memory, and if the matching is successful, ending the process; if the matching fails, sending an alarm signal to the intelligent terminal; the intelligent terminal receives the alarm signal, prompts a house owner to verify the alarm signal and sends a verification result to the processor; the processor grades the identity of the entrant according to the verification result and discriminates and processes the entrant according to different identities.

Description

Security method based on air conditioner and security air conditioner
Technical Field
The invention relates to the technical field of air conditioners, in particular to a security method based on an air conditioner and a security air conditioner.
Background
Along with the improvement of the living standard of people and the improvement of safety precaution consciousness, safety protection is more and more deep into the mind, and the use of the household security system in enterprises and families is more and more common.
The air conditioner in the prior art becomes a standard configuration of each family, cameras are arranged on air conditioners of various models and used for detecting and identifying human body gestures or postures so as to execute corresponding control instructions, but the air conditioner only utilizes the identification function of the cameras, and the security function is more and more emphasized along with the increase of life quality and wealth of people, but the utilization of the air conditioner in the prior art is insufficient.
Disclosure of Invention
In order to solve the problems, the invention provides a security protection method based on an air conditioner and a security protection air conditioner.
A security protection method based on an air conditioner is provided with a camera, a processor and a memory, and specifically comprises the following steps:
s100, a camera collects face data of a house owner and stores the face data into a first memory;
step S200, when the processor detects an entrant, matching the face data of the entrant with the face data stored in the first memory, and if the matching is successful, ending the process; if the matching fails, sending an alarm signal to the intelligent terminal;
step S300, the intelligent terminal receives the alarm signal, prompts a house owner to verify the alarm signal and sends a verification result to the processor;
step S400, the processor grades the identity of the entrant according to the verification result and discriminates and processes the entrant according to different identities of the entrants.
Further, the users corresponding to the face data stored in the first storage are all house owners.
Further, the alarm signal contains the face data of the entrant and the time of entry.
Further, the step S300 includes: when the house owner receives the alarm signal, the intelligent terminal prompts the house owner to verify whether the entrant is the allowed entrant.
Further, the step S400 includes: if the verification result is 'no', the invader is marked as an 'invader', the network is alarmed, and the house owner is prompted whether to store the face data of the invader in the second memory, the invader with the face data stored in the second memory can be alarmed automatically by the processor when the house owner enters the house.
Further, the step S400 includes: if the verification result is "yes", the entrant is marked as "visitor", and the visitor's face data is stored in the third memory to obtain temporary permission to enter the house.
Further, if the visitor enters the house many times and the house owner confirms as the visitor, the temporary permission for the visitor to enter the house may be extended.
Further, the step S400 includes: if the verification results fed back by the intelligent terminals are inconsistent, the entrant is marked as a visitor, the face data of the visitor is stored in the third memory, and the processing result is sent to the intelligent terminal with the verification result of 'no'.
Further, the homeowner may change the identity of the entrant.
Further, if there are a plurality of house owners, the intruder is set as a visitor, and the consent of more than half of the house owners is required; setting an intruder or visitor as a house owner requires the consent of all the house owners.
The security method has the advantages of good confidentiality and high safety through the hierarchical management of entrants.
The invention also provides a security air conditioner, which is characterized by comprising the following components:
the camera is used for collecting face data of a user;
the processor is used for matching face data, sending an alarm signal to the intelligent terminal, grading the identity of an entrant according to a verification result fed back by the intelligent terminal, and performing differential processing according to the identity of the entrant;
a first memory for storing facial data of a homeowner;
a second memory for storing face data of an intruder;
a third memory to store face data of a guest.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a security method based on an air conditioner;
fig. 2 is a schematic diagram of a security air conditioner.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example 1
A security protection method based on an air conditioner is provided with a camera, a processor and a memory, and specifically comprises the following steps:
and step S100, the camera collects the face data of the house owner and stores the face data into the first memory.
And the users corresponding to the face data stored in the first storage are all house owners.
The face data of the house owner can be collected when the air conditioner is installed, and the face data of the house owner can be actively input in the using process.
Step S200, when the processor detects an entrant, matching the face data of the entrant with the face data stored in the first memory, and if the matching is successful, ending the process; and if the matching fails, sending an alarm signal to the intelligent terminal.
The alarm signal contains information such as the face data and the entry time of the entering person.
And step S300, the intelligent terminal receives the alarm signal, prompts a house owner to verify the alarm signal and sends a verification result to the processor.
When the house owner receives the alarm signal, the intelligent terminal prompts the house owner to verify whether the entrant is the allowed entrant.
Step S400, the processor grades the identity of the entrant according to the verification result and discriminates and processes the entrant according to different identities of the entrants.
If the verification result is 'no', namely the entrance is not allowed by the house owner, the entrance is marked as an 'intruder', the networking alarm is given, and the house owner is prompted whether to store the face data of the intruder into the second memory;
the processor will automatically alert when an intruder, having face data stored in the second memory, enters the premises.
If the verification result is "yes", i.e. an entrant allowed by the house owner, the entrant is marked as a "visitor" and the visitor's facial data is stored in the third memory to obtain temporary permission to enter the house.
The temporary permission for the visitor to enter the house may be extended if the visitor enters the house multiple times and the house owner confirms the visitor.
For example, the validity period of the temporary permission is 0.5-1 day; the temporary permission for the visitor to enter the house for the first time is 0.5 day, and if the visitor enters the house for multiple times and the house owner confirms the visitor, the valid period of the temporary permission for the visitor to enter the house is prolonged to 1 day.
If the verification results fed back by the intelligent terminals are inconsistent, the entrant is marked as a visitor, the face data of the visitor is stored in the third memory, and the processing result is sent to the intelligent terminal with the verification result of 'no'.
The house owner may change the identity of the intruder, for example by setting the intruder as a visitor or house owner, or setting the visitor as a house owner.
If the number of the house owners is multiple, the intruders are set as visitors, and the consent of more than half of the house owners is needed; the intruder or visitor is set as the house owner, and the consent of all the house owners is required.
The intelligent terminal can be a mobile phone, an IPAD or a mobile computer.
Through the hierarchical management of entrants, the security is good and the safety is high.
Example 2
A security air conditioner includes:
the camera is used for collecting face data of a user;
the processor is used for matching the face data, sending an alarm signal to the intelligent terminal, grading the identity of the entrant according to a verification result fed back by the intelligent terminal, and performing differential processing according to the identity of the entrant;
a first memory for storing facial data of a homeowner;
a second memory for storing face data of the intruder;
and a third memory for storing the face data of the visitor.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the security air conditioner disclosed in embodiment 2, since it corresponds to the security method based on the air conditioner disclosed in embodiment 1, the description is relatively simple, and for relevant points, refer to the description of the method part.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (11)

1. The security and protection method based on the air conditioner is characterized in that the air conditioner is provided with a camera, a processor and a memory, and specifically comprises the following steps:
s100, a camera collects face data of a house owner and stores the face data into a first memory;
step S200, when the processor detects an entrant, matching the face data of the entrant with the face data stored in the first memory, and if the matching is successful, ending the process; if the matching fails, sending an alarm signal to the intelligent terminal;
step S300, the intelligent terminal receives the alarm signal, prompts a house owner to verify the alarm signal and sends a verification result to the processor;
step S400, the processor grades the identity of the entrant according to the verification result and discriminates and processes the entrant according to different identities of the entrants.
2. The air-conditioning-based security method as recited in claim 1, wherein the users corresponding to the facial data stored in the first storage are house owners.
3. The air-conditioner-based security method as claimed in claim 1, wherein the alarm signal includes face data of an entering person and an entering time.
4. The air-conditioner-based security method according to claim 1, wherein the step S300 includes: when the house owner receives the alarm signal, the intelligent terminal prompts the house owner to verify whether the entrant is the allowed entrant.
5. The air-conditioner-based security method according to claim 1, wherein the step S400 comprises: if the verification result is 'no', the invader is marked as an 'invader', the network is alarmed, and the house owner is prompted whether to store the face data of the invader in the second memory, the invader with the face data stored in the second memory can be alarmed automatically by the processor when the house owner enters the house.
6. The air-conditioner-based security method according to claim 1, wherein the step S400 comprises: if the verification result is "yes", the entrant is marked as "visitor", and the visitor's face data is stored in the third memory to obtain temporary permission to enter the house.
7. The air conditioner-based security method as recited in claim 7, wherein the temporary right of the visitor to enter the house is extended if the visitor enters the house many times and the house owner confirms as the visitor.
8. The air-conditioner-based security method according to claim 1, wherein the step S400 comprises: if the verification results fed back by the intelligent terminals are inconsistent, the entrant is marked as a visitor, the face data of the visitor is stored in the third memory, and the processing result is sent to the intelligent terminal with the verification result of 'no'.
9. The air-conditioning-based security method as recited in claim 1, wherein the owner of the house can change the identity of the entrant.
10. The air-conditioning-based security method as recited in claim 8, wherein if there are a plurality of house owners, the intruder is set as a visitor, and approval of more than half of the house owners is required; setting an intruder or visitor as a house owner requires the consent of all the house owners.
11. The utility model provides a security protection air conditioner which characterized in that includes:
the camera is used for collecting face data of a user;
the processor is used for matching face data, sending an alarm signal to the intelligent terminal, grading the identity of an entrant according to a verification result fed back by the intelligent terminal, and performing differential processing according to the identity of the entrant;
a first memory for storing facial data of a homeowner;
a second memory for storing face data of an intruder;
a third memory to store face data of a guest.
CN201911173522.0A 2019-11-26 2019-11-26 Security method based on air conditioner and security air conditioner Pending CN110992626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911173522.0A CN110992626A (en) 2019-11-26 2019-11-26 Security method based on air conditioner and security air conditioner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911173522.0A CN110992626A (en) 2019-11-26 2019-11-26 Security method based on air conditioner and security air conditioner

Publications (1)

Publication Number Publication Date
CN110992626A true CN110992626A (en) 2020-04-10

Family

ID=70087090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911173522.0A Pending CN110992626A (en) 2019-11-26 2019-11-26 Security method based on air conditioner and security air conditioner

Country Status (1)

Country Link
CN (1) CN110992626A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096546A (en) * 2014-05-08 2015-11-25 青岛海尔空调电子有限公司 Cloud air condition based security and protection method and cloud air condition
CN206438851U (en) * 2016-12-21 2017-08-25 深圳大学 Intelligent remote alarm for door lock
WO2017200849A1 (en) * 2016-05-19 2017-11-23 Scenera, Inc. Scene marking
CN207409102U (en) * 2017-11-14 2018-05-25 三峡大学 A kind of safety monitoring system based on image identification
CN108806155A (en) * 2018-06-29 2018-11-13 仁怀市云侠网络科技有限公司 Security-protecting and monitoring method based on Internet of Things
CN110232793A (en) * 2019-06-26 2019-09-13 李木星 Recognition of face intelligent alarm system and its control method
CN110443923A (en) * 2019-08-06 2019-11-12 金陵科技学院 A kind of hotel's method for managing security based on artificial intelligence

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096546A (en) * 2014-05-08 2015-11-25 青岛海尔空调电子有限公司 Cloud air condition based security and protection method and cloud air condition
WO2017200849A1 (en) * 2016-05-19 2017-11-23 Scenera, Inc. Scene marking
CN206438851U (en) * 2016-12-21 2017-08-25 深圳大学 Intelligent remote alarm for door lock
CN207409102U (en) * 2017-11-14 2018-05-25 三峡大学 A kind of safety monitoring system based on image identification
CN108806155A (en) * 2018-06-29 2018-11-13 仁怀市云侠网络科技有限公司 Security-protecting and monitoring method based on Internet of Things
CN110232793A (en) * 2019-06-26 2019-09-13 李木星 Recognition of face intelligent alarm system and its control method
CN110443923A (en) * 2019-08-06 2019-11-12 金陵科技学院 A kind of hotel's method for managing security based on artificial intelligence

Similar Documents

Publication Publication Date Title
US10389739B2 (en) System, method, and computer program for detecting regular and irregular events associated with various entities
Hussein et al. Smart door system for home security using raspberry pi3
CN109887144A (en) A kind of visitor's recognition methods, device and computer readable storage medium
CN106097508B (en) A kind of access control system and method based on certificate or certificate two dimensional code
US10657742B1 (en) Verified access to a monitored property
US10909792B2 (en) Scalable systems and methods for monitoring and concierge service
JP2001338295A (en) Identity authenticating system based on biological information
US20200162701A1 (en) Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects
US10943442B1 (en) Customized notifications based on device characteristics
CN110415469A (en) A kind of home furnishings intelligent antitheft security system based on Internet of Things
US20210240150A1 (en) Facilitating automating home control
CN109410386A (en) Unlocking processing method and processing device, storage medium, processor
WO2020135079A1 (en) Method and device for opening electronic gate, and server
CN108022335B (en) Access control method and device and access control system
CN110992626A (en) Security method based on air conditioner and security air conditioner
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN113112658A (en) Access control system based on intelligent vision big data
US10742939B1 (en) Security video data processing systems and methods
US10740447B2 (en) Using biometric user-specific attributes
CN112735015A (en) Community management method, device, machine readable medium and equipment
CN112115809A (en) Visitor matching method and device based on nearest neighbor algorithm
Marafa Internet of Thing (IoT) Smart Home Systems: Conceptual Ethical Framework for Malaysian Developers
CN112949397A (en) Object access control method and control system in target area and terminal
CN112785765A (en) Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform
CN113202353A (en) Control method and control device for intelligent door lock and intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination