CN111698134A - Analysis method and system of remote control instruction, computer equipment and readable storage medium - Google Patents

Analysis method and system of remote control instruction, computer equipment and readable storage medium Download PDF

Info

Publication number
CN111698134A
CN111698134A CN202010477418.7A CN202010477418A CN111698134A CN 111698134 A CN111698134 A CN 111698134A CN 202010477418 A CN202010477418 A CN 202010477418A CN 111698134 A CN111698134 A CN 111698134A
Authority
CN
China
Prior art keywords
control instruction
risk
score
classification
risk classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010477418.7A
Other languages
Chinese (zh)
Inventor
彭碧波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xingluo Intelligent Technology Co Ltd
Original Assignee
Xingluo Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xingluo Intelligent Technology Co Ltd filed Critical Xingluo Intelligent Technology Co Ltd
Priority to CN202010477418.7A priority Critical patent/CN111698134A/en
Publication of CN111698134A publication Critical patent/CN111698134A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/281Exchanging configuration information on appliance services in a home automation network indicating a format for calling an appliance service function in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention provides a method, a system, computer equipment and a computer readable storage medium for analyzing a remote control instruction, which comprise the following steps: receiving a remote control instruction input by a user, and determining to execute risk classification expected to exist in the control instruction according to the control instruction; determining the priority of the risk classification, and calculating a risk score corresponding to the risk classification with the highest priority according to the control instruction; and determining whether to execute the control instruction according to the risk score. The method can reduce various losses caused to users under the conditions that the server side or the control equipment is cracked and the communication protocols at the two ends are forged by the man-in-the-middle.

Description

Analysis method and system of remote control instruction, computer equipment and readable storage medium
Technical Field
The invention relates to the technical field of instruction control, in particular to a method and a system for analyzing a remote control instruction, computer equipment and a readable storage medium.
Background
The existing intelligent home protection can enhance protection in the aspects of data security and authority control from the server end and the central control end, but if the server or equipment is cracked, the communication protocols at the two ends are forged by an intermediary, and various losses can be caused to users.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method, a system, a computer device and a readable storage medium for analyzing a remote control instruction, so as to solve the defect that a communication protocol is forged by a man-in-the-middle to cause loss to a user in the prior art.
In order to realize the purpose, the following technical scheme is adopted:
the invention provides a method for analyzing a remote control instruction, which comprises the following steps:
receiving a remote equipment control instruction input by a user, and determining risk classification expected to exist in the execution of the control instruction according to the control instruction;
determining the priority of the risk classification, and calculating a risk score corresponding to the risk classification with the highest priority according to the control instruction;
and determining whether to execute the control instruction according to the risk score.
Wherein the executing of the risk classification expected to exist according to the control instruction specifically includes:
analyzing the control instruction to obtain relevant control information of the control instruction, wherein the control information comprises one of the execution time of the control instruction, the equipment for executing the control instruction and a corresponding control parameter;
acquiring external environment factors when the control instruction is executed, wherein the external environment factors comprise at least one of weather information and temperature information when the control instruction is executed and whether a user exists in a room where the equipment is located;
and determining the risk classification expected to exist when the control instruction executes the control instruction according to the related control information and the external environment information.
Wherein the risk classification comprises: no risk, privacy disclosure, health impact, property loss, and life safety.
Wherein, the calculating the risk score corresponding to the risk classification with the highest priority according to the control instruction specifically includes:
determining a weight coefficient corresponding to the highest priority risk classification and executing a severity level of the control instruction in the highest priority risk classification;
calculating the risk score according to the weight coefficient and the severity level.
Wherein said calculating said risk score according to said weight coefficient and said severity level specifically comprises:
R=T*W+L
wherein R is a risk score, T is a risk base score, W is a weight coefficient corresponding to the risk classification, and L is a score corresponding to the severity grade.
Wherein the determining whether to execute the control instruction according to the risk score specifically includes:
and judging whether the risk score is larger than a first threshold and smaller than a second threshold, if so, sending an alarm prompt instruction, and if so, sending an instruction for not executing the remote control instruction.
A second aspect of the present invention provides a system for analyzing a remote control command, including:
the receiving unit is used for receiving a remote equipment control instruction input by a user;
a risk classification determining unit, configured to determine, according to the control instruction, a risk classification expected to exist when executing the control instruction;
the risk score determining unit is used for determining the priority of the risk classification and calculating the risk score corresponding to the risk classification with the highest priority according to the control instruction;
and the processing unit is used for determining whether to execute the control instruction according to the risk score.
Wherein the risk classification determining unit is specifically configured to:
analyzing the control instruction to obtain relevant control information of the control instruction, wherein the control information comprises one of the execution time of the control instruction, the equipment for executing the control instruction and a corresponding control parameter;
acquiring external environment factors when the control instruction is executed, wherein the external environment factors comprise at least one of weather information and temperature information when the control instruction is executed and whether a user exists in a room where the equipment is located;
and determining the risk classification expected to exist when the control instruction executes the control instruction according to the related control information and the external environment information.
Wherein the risk classification comprises: no risk, privacy disclosure, health impact, property loss, and life safety.
Wherein the risk score determining unit is specifically configured to:
determining a weight coefficient corresponding to the highest priority risk classification and executing a severity level of the control instruction in the highest priority risk classification;
calculating the risk score according to the weight coefficient and the severity level.
Wherein said calculating said risk score according to said weight coefficient and said severity level specifically comprises:
R=T*W+L
wherein R is a risk score, T is a risk base score, W is a weight coefficient corresponding to the risk classification, and L is a score corresponding to the severity grade.
Wherein the processing unit is specifically configured to:
and judging whether the risk score is larger than a first threshold and smaller than a second threshold, if so, sending an alarm prompt instruction, and if so, sending an instruction for not executing the remote control instruction.
A third aspect of the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a computer device, carries out the aforementioned method steps.
A fourth aspect of the invention provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the computer program to cause the computer device to perform the steps of the method.
The invention has the beneficial effects that: according to the method for analyzing the equipment control instruction, the user instruction is received, the risk classification expected to exist in the control instruction is determined according to the user instruction, the priority of the risk classification is determined, the risk score corresponding to the risk classification with the highest priority is calculated according to the control instruction, and whether the control instruction is executed or not is determined according to the risk score. The method can reduce various losses caused to users under the conditions that the server side or the control equipment is cracked and the communication protocols at the two ends are forged by the man-in-the-middle.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope of the present invention.
Fig. 1 is a schematic flowchart illustrating a method for analyzing a remote control command according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of an analysis system of a remote control command according to a second embodiment of the present invention.
Detailed Description
Hereinafter, various embodiments of the present invention will be described more fully. The invention is capable of various embodiments and of modifications and variations therein. However, it should be understood that: there is no intention to limit various embodiments of the invention to the specific embodiments disclosed herein, but on the contrary, the intention is to cover all modifications, equivalents, and/or alternatives falling within the spirit and scope of various embodiments of the invention.
Hereinafter, the terms "includes" or "may include" used in various embodiments of the present invention indicate the presence of disclosed functions, operations, or elements, and do not limit the addition of one or more functions, operations, or elements. Furthermore, as used in various embodiments of the present invention, the terms "comprises," "comprising," "includes," "including," "has," "having" and their derivatives are intended to mean that the specified features, numbers, steps, operations, elements, components, or combinations of the foregoing, are only meant to indicate that a particular feature, number, step, operation, element, component, or combination of the foregoing, is not to be understood as first excluding the existence of, or adding to the possibility of, one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the invention, the expression "a or/and B" includes any or all combinations of the words listed simultaneously, e.g., may include a, may include B, or may include both a and B.
Expressions (such as "first", "second", and the like) used in various embodiments of the present invention may modify various constituent elements in various embodiments, but may not limit the respective constituent elements. For example, the above description does not limit the order and/or importance of the elements described. The foregoing description is for the purpose of distinguishing one element from another. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present invention.
It should be noted that: in the present invention, unless otherwise explicitly stated or defined, the terms "mounted," "connected," "fixed," and the like are to be construed broadly, e.g., as being fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium; there may be communication between the interiors of the two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the present invention, it should be understood by those skilled in the art that the terms indicating an orientation or a positional relationship herein are based on the orientations and the positional relationships shown in the drawings and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the device or the element referred to must have a specific orientation, be constructed in a specific orientation and operate, and thus, should not be construed as limiting the present invention.
The terminology used in the various embodiments of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the present invention. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
An embodiment of the present invention provides a method for analyzing a remote control instruction, as shown in fig. 1, the method includes the following steps:
and S1, receiving a remote control instruction input by a user, and determining risk classification expected to exist when the control instruction is executed according to the control instruction.
In a specific embodiment, the risk classification may include 5 categories, respectively no risk, privacy disclosure, health impact, property loss, life safety, and the like.
In a specific embodiment, the risk classification expected to exist when the control instruction is executed is determined according to at least one of a time period for execution of the control instruction, devices that the control instruction is expected to control, the number of devices, and external factors when the control instruction is executed.
Specifically, the time period for executing the control instruction may be divided into day or night, or may be divided into morning, noon or night.
Specifically, the devices to be controlled by the control command may include various smart home devices such as curtains, windows, smart speakers, electric heaters, doors, and the like.
Specifically, the external factors when executing the control instruction specifically include: weather, temperature, whether a person is present at home, whether a device is in a room, etc. when the instruction is executed.
For example, if there is no risk in closing the window covering, the risk of closing the window covering is classified as no risk. For example, if the window covering is opened for a period of time of day, such as nine am, then no risk is considered and the risk is classified as no risk, and if after 10 pm, someone is at rest in the home and the window covering is opened in the bedroom, then there may be a risk of privacy leakage.
Taking the example of opening or closing a window, such as closing a window, a risk is classified as risk-free since there may be no risk in closing a window in general. In the case of a storm, a thunderstorm, a typhoon, a hail, or other related abnormal weather disasters, there is a serious risk of property loss, and thus the risk is classified as property loss.
And S2, determining the priority of the risk classification, and calculating the risk score corresponding to the risk classification with the highest priority according to the control instruction.
In one embodiment, the priority order of risk classification from high to low is: life safety, property loss, health influence and privacy disclosure.
In a specific embodiment, the weight coefficient of each risk classification and the severity level corresponding to each risk classification are determined, for example, according to the order of the priority levels of the risk classifications from high to low, the weight coefficient set by each risk classification may be different, for example, the weight coefficient corresponding to life safety is 3, the weight coefficient of property loss is 2, the weight coefficient affecting health is 1, the weight coefficient of privacy disclosure is 0, the severity level of each risk classification is determined, for example, for each risk classification, the severity level may be classified into four levels of light, normal, severe and high risk, and the corresponding grade score is set for each level. For example, the grade is a mild case, the grade score is 5, the grade is a normal case, the grade score is 10, the grade is a severe case, the grade score is 15, the grade is a critical case, and the grade score is 20.
In a specific embodiment, the calculating a risk score corresponding to the highest-priority risk classification according to the control instruction specifically includes: analyzing the control instruction to obtain relevant control information of the control instruction, wherein the control information comprises one of the execution time of the control instruction, the equipment for executing the control instruction and a corresponding control parameter; acquiring external environment factors when the control instruction is executed, wherein the external environment factors comprise at least one of weather information and temperature information when the control instruction is executed and whether a user exists in a room where the equipment is located; and determining the risk classification expected to exist when the control instruction executes the control instruction according to the related control information and the external environment information.
More specifically, the formula for calculating the risk score is:
R=T*W+L
wherein R is a risk score, T is a risk base score, W is a weight coefficient corresponding to the risk classification, and L is a score corresponding to the severity grade.
And S3, determining whether to execute the control command according to the risk score.
Specifically, whether the risk score is larger than a first threshold and smaller than a second threshold is judged, if yes, an alarm prompt instruction is sent, and if not, the control instruction is not executed.
Wherein the first threshold is 30 minutes, and the second threshold is 50 minutes. I.e. the risk score is alerted when it is greater than 30 points and marked as inappropriate for execution if it exceeds 50 points.
The method of the present embodiment will be described below by taking the opening and closing of the window covering as an example. Closing the curtain: there is no risk of closing the window shade in the normal case, with a risk rating score of 0. Opening the curtain: the time period is day, such as nine o 'clock early to six o' clock late, there is no risk, and the risk level score is 0. The time period is the rest time from ten points later to eight points earlier, and the bedroom curtain is contained in the opened curtain, so that the risk of serious privacy disclosure exists, and the risk grade score is 15. If the bedroom blinds are not included, but the 2/3 blinds are all open, there is a risk of general privacy disclosure, with a risk rating score of 10.
The method of the present embodiment is described below by taking remote control of a window as an example. When the window is closed, there is no risk in the normal case, and therefore there is no risk, and the risk rating score is 0. Opening of the window: if no one is at home when the window is opened, the risk of slight property loss exists, and the risk grade score is 45. When the window is opened, if the local weather is related to abnormal weather disasters such as storm, thunderstorm, typhoon, hail and the like, the risk of serious property loss exists, and the risk equivalent score is 55.
The method of the present embodiment is described below by taking remote control of a door as an example. Closing the door: there is generally no risk in closing, and the risk rating score is 0. Opening the door: there is a high risk of property loss and a slight life safety risk, risk class 65.
The method of the present embodiment is illustrated below by taking remote control of an electric heater as an example. If the family is a person, the temperature is adjusted to be a common value without risk, and the risk grade score is 0. If nobody is at home, there is a common risk of property loss with a risk rating score of 50. If the regulated temperature value is abnormally high, there is a risk of serious property loss, risk rating score 55.
The method of the present embodiment is described below by taking remote control of a home surveillance camera as an example. When the family monitoring camera is closed, the risk of serious property loss exists, and the risk grade score is 55. And acquiring an image, wherein the risk is revealed in the normal daytime, and the risk grade score is 10. The method comprises the steps of obtaining images, and in the late night time period, the risk of high-risk privacy disclosure and the risk of common property loss, and the risk grade score is 50.
According to the method for analyzing the equipment control instruction, the user instruction is received, the risk classification expected to exist in the control instruction is determined according to the user instruction, the priority of the risk classification is determined, the risk score corresponding to the risk classification with the highest priority is calculated according to the control instruction, and whether the control instruction is executed or not is determined according to the risk score. The method can reduce various losses caused to users under the conditions that the server end or the control equipment is cracked and the communication protocols at the two ends are forged by the man-in-the-middle
Based on the first embodiment of the present invention, the second embodiment of the present invention provides an analysis system for a device control instruction, as shown in fig. 2, where the system 1 includes: a receiving unit 10, configured to receive a remote device control instruction input by a user; a risk classification determining unit 11, configured to determine, according to the control instruction, a risk classification expected to exist when executing the control instruction; a risk score determining unit 12, configured to determine the priority of the risk classification, and calculate a risk score corresponding to the risk classification with the highest priority according to the control instruction; and the processing unit 13 is used for determining whether to execute the control instruction according to the risk score.
Wherein, the risk classification determining unit 11 is specifically configured to: analyzing the control instruction to obtain relevant control information of the control instruction, wherein the control information comprises one of the execution time of the control instruction, the equipment for executing the control instruction and a corresponding control parameter; acquiring external environment factors when the control instruction is executed, wherein the external environment factors comprise at least one of weather information and temperature information when the control instruction is executed and whether a user exists in a room where the equipment is located; and determining the risk classification expected to exist when the control instruction executes the control instruction according to the related control information and the external environment information.
Wherein the risk classification comprises: no risk, privacy disclosure, health impact, property loss, and life safety.
Wherein, the risk score determining unit 12 is specifically configured to: determining a weight coefficient corresponding to the highest priority risk classification and executing a severity level of the control instruction in the highest priority risk classification; calculating the risk score according to the weight coefficient and the severity level.
Wherein said calculating said risk score according to said weight coefficient and said severity level specifically comprises:
R=T*W+L
wherein R is a risk score, T is a risk base score, W is a weight coefficient corresponding to the risk classification, and L is a score corresponding to the severity grade.
Wherein, the processing unit 13 is specifically configured to: and judging whether the risk score is larger than the threshold value of the risk classification with the highest priority, if so, not executing the control instruction, otherwise, executing the control instruction.
Based on the first embodiment of the present invention, the third embodiment of the present invention provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to make the computer device execute the steps of the foregoing method.
Based on the first embodiment of the present invention, a computer-readable storage medium is provided in a fourth embodiment of the present invention, and a computer program is stored thereon, where the computer program is executed by a computer device to implement the foregoing method steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
The above-described embodiments are merely illustrative of several embodiments of the present invention, which are described in more detail and detail, but are not to be construed as limiting the scope of the present invention. It should be noted that, for those skilled in the art, other various changes and modifications can be made according to the above-described technical solutions and concepts, and all such changes and modifications should fall within the protection scope of the present invention.

Claims (14)

1. A method for analyzing remote control commands, comprising:
receiving a remote control instruction input by a user, and determining to execute risk classification expected to exist in the control instruction according to the control instruction;
determining the priority of the risk classification, and calculating a risk score corresponding to the risk classification with the highest priority according to the control instruction;
and determining whether to execute the control instruction according to the risk score.
2. The analysis method according to claim 1, wherein said performing a risk classification that the control instruction is expected to present according to the control instruction specifically comprises:
analyzing the control instruction to obtain relevant control information of the control instruction, wherein the control information comprises one of the execution time of the control instruction, the equipment for executing the control instruction and a corresponding control parameter;
acquiring external environment factors when the control instruction is executed, wherein the external environment factors comprise at least one of weather information and temperature information when the control instruction is executed and whether a user exists in a room where the equipment is located;
and determining the risk classification expected to exist when the control instruction executes the control instruction according to the related control information and the external environment information.
3. The analysis method according to claim 2, wherein the risk classification comprises:
no risk, privacy disclosure, health impact, property loss, and life safety.
4. The analysis method according to claim 3, wherein the calculating a risk score corresponding to the highest priority risk classification according to the control instruction specifically comprises:
determining a weight coefficient corresponding to the highest priority risk classification and executing a severity level of the control instruction in the highest priority risk classification;
calculating the risk score according to the weight coefficient and the severity level.
5. The analysis method according to claim 4, wherein said calculating said risk score according to said weight coefficients and said severity level comprises in particular:
R=T*W+L
wherein R is a risk score, T is a risk base score, W is a weight coefficient corresponding to the risk classification, and L is a score corresponding to the severity grade.
6. The analysis method according to claim 5, wherein the determining whether to execute the control instruction according to the risk score specifically comprises:
and judging whether the risk score is larger than a first threshold and smaller than a second threshold, if so, sending an alarm prompt instruction, and if so, sending an instruction for not executing the remote control instruction.
7. A system for analyzing remote control commands, comprising:
the receiving unit is used for receiving a remote equipment control instruction input by a user;
a risk classification determining unit, configured to determine, according to the control instruction, a risk classification expected to exist when executing the control instruction;
the risk score determining unit is used for determining the priority of the risk classification and calculating the risk score corresponding to the risk classification with the highest priority according to the control instruction;
and the processing unit is used for determining whether to execute the control instruction according to the risk score.
8. The system according to claim 7, wherein the risk classification determining unit is specifically configured to:
analyzing the control instruction to obtain relevant control information of the control instruction, wherein the control information comprises one of the execution time of the control instruction, the equipment for executing the control instruction and a corresponding control parameter;
acquiring external environment factors when the control instruction is executed, wherein the external environment factors comprise at least one of weather information and temperature information when the control instruction is executed and whether a user exists in a room where the equipment is located;
and determining the risk classification expected to exist when the control instruction executes the control instruction according to the related control information and the external environment information.
9. The system of claim 8, wherein the risk classification comprises:
no risk, privacy disclosure, health impact, property loss, and life safety.
10. The system according to claim 9, wherein the risk score determining unit is specifically configured to:
determining a weight coefficient corresponding to the highest priority risk classification and executing a severity level of the control instruction in the highest priority risk classification;
calculating the risk score according to the weight coefficient and the severity level.
11. The system according to claim 10, wherein said calculating the risk score according to the weight coefficient and the severity level comprises in particular:
R=T*W+L
wherein R is a risk score, T is a risk base score, W is a weight coefficient corresponding to the risk classification, and L is a score corresponding to the severity grade.
12. The system of claim 11, wherein the processing unit is specifically configured to:
and judging whether the risk score is larger than a first threshold and smaller than a second threshold, if so, sending an alarm prompt instruction, and if so, sending an instruction for not executing the remote control instruction.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a computer device, carries out the method steps of any one of the preceding claims 1 to 6.
14. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor executes the computer program to cause the computer device to perform the steps of the method of any of claims 1 to 6.
CN202010477418.7A 2020-05-29 2020-05-29 Analysis method and system of remote control instruction, computer equipment and readable storage medium Pending CN111698134A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010477418.7A CN111698134A (en) 2020-05-29 2020-05-29 Analysis method and system of remote control instruction, computer equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010477418.7A CN111698134A (en) 2020-05-29 2020-05-29 Analysis method and system of remote control instruction, computer equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN111698134A true CN111698134A (en) 2020-09-22

Family

ID=72478928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010477418.7A Pending CN111698134A (en) 2020-05-29 2020-05-29 Analysis method and system of remote control instruction, computer equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN111698134A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108776861A (en) * 2018-04-27 2018-11-09 中国铁路总公司 Railway Communication safety risk estimating method and device
CN110430393A (en) * 2019-07-13 2019-11-08 恒大智慧科技有限公司 A kind of monitoring method and system
CN110593707A (en) * 2019-08-08 2019-12-20 广汽蔚来新能源汽车科技有限公司 Tail gate control method, device and system, computer equipment and storage medium
CN110588642A (en) * 2018-06-13 2019-12-20 本田技研工业株式会社 Vehicle control device, vehicle control method, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108776861A (en) * 2018-04-27 2018-11-09 中国铁路总公司 Railway Communication safety risk estimating method and device
CN110588642A (en) * 2018-06-13 2019-12-20 本田技研工业株式会社 Vehicle control device, vehicle control method, and storage medium
CN110430393A (en) * 2019-07-13 2019-11-08 恒大智慧科技有限公司 A kind of monitoring method and system
CN110593707A (en) * 2019-08-08 2019-12-20 广汽蔚来新能源汽车科技有限公司 Tail gate control method, device and system, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US11017480B2 (en) Identifying property usage type based upon smart sensor data
US11823281B2 (en) Systems and methods for assigning damage caused by an insurance-related event
US11391479B2 (en) HVAC service performance
EP3339987A1 (en) Adaptive modeling method and system for mpc-based building energy control
JP4639842B2 (en) Equipment monitoring and control system
US20140201315A1 (en) Home sensor data gathering for neighbor notification purposes
US20140258497A1 (en) Management system for automatic door apparatus
CN111698134A (en) Analysis method and system of remote control instruction, computer equipment and readable storage medium
US20200135008A1 (en) Building alarm system with bayesian event classification
US20240013652A1 (en) Auto-configuring of battery operated devices in a premises security system
US20220057761A1 (en) Smart window control device, smart window control method, and smart window control program
CN114167742B (en) Edge data processing method, device, computer equipment and storage medium
CN112462089A (en) Method and device for calibrating state of electronic door, electronic door and readable storage medium
CN114613032B (en) Method, system and computer equipment for detecting safety state of line valve chamber
CN109634318A (en) Capping unit and temperature monitoring method, device are divided in digital room
US20210224932A1 (en) Automatic estate management with internet of things devices
CN114553619B (en) Intelligent bedroom wood-plastic door based on Internet of things and control method thereof
CN116326976B (en) Controllable multilayer wisdom (window) curtain of degree of opening and shutting
KR20180014602A (en) Method and apparatus for profiling a pattern of resident by analyzing event log
CN117523773B (en) Intelligent log cabin anomaly detection method and system
CN113160534A (en) Method, equipment and storage medium for alarming abnormity of intelligent access control system
Prabha et al. Enhancing Residential Security with AI-Powered Intrusion Detection Systems
Grant et al. Developing Summer Comfort Design Guidance
CN116168475A (en) Intelligent access control method and system
CN116311714A (en) Method and system for preventing false alarm of intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200922