CN111915765A - Personnel safety monitoring method and system based on intelligent lock and sensor linkage - Google Patents

Personnel safety monitoring method and system based on intelligent lock and sensor linkage Download PDF

Info

Publication number
CN111915765A
CN111915765A CN201910380577.2A CN201910380577A CN111915765A CN 111915765 A CN111915765 A CN 111915765A CN 201910380577 A CN201910380577 A CN 201910380577A CN 111915765 A CN111915765 A CN 111915765A
Authority
CN
China
Prior art keywords
detection data
behavior type
target
target room
belongs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910380577.2A
Other languages
Chinese (zh)
Inventor
张家宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Software Co Ltd
Original Assignee
Hangzhou Ezviz Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Software Co Ltd filed Critical Hangzhou Ezviz Software Co Ltd
Priority to CN201910380577.2A priority Critical patent/CN111915765A/en
Publication of CN111915765A publication Critical patent/CN111915765A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Abstract

The disclosure provides a personnel safety monitoring method and system based on intelligent lock and sensor linkage, and belongs to the technical field of computers. The method comprises the following steps: the method comprises the steps of obtaining detection data of a person corresponding to a target room, determining a behavior type of the detection data of the person according to the detection data of the person, determining a target protection mode corresponding to the behavior type of the detection data according to a corresponding relation between the behavior type and the protection mode and the behavior type of the detection data if the behavior type meets a target trigger condition, and controlling to execute the target protection mode. By adopting the method and the device, the safety of personnel can be improved.

Description

Personnel safety monitoring method and system based on intelligent lock and sensor linkage
Technical Field
The disclosure relates to the technical field of computers, in particular to a personnel safety monitoring method and system based on intelligent lock and sensor linkage.
Background
At present, a house is rented frequently, a house owner can rent the house of the house to a tenant, and after the house is rented to the tenant, in order to ensure the safety of the tenant, a manager can only check the house by visiting every day, so that the management efficiency is low. Particularly, in some public rental houses or residential areas, members of a large number of tenants can also have important monitoring personnel such as the old, children and patients with inconvenient actions, and the important monitoring personnel often face the situation that the important monitoring personnel are alone at home for a period of time or even for a long time, and the personal safety problem of the important monitoring personnel is increasingly prominent. Currently, there is a lack of timely and effective technical means and systems to secure the safety of these people at home alone.
Disclosure of Invention
In order to solve the problem of low management efficiency, the embodiment of the disclosure provides a method and a system for monitoring personnel safety based on linkage of an intelligent lock and a sensor. The technical scheme is as follows:
in a first aspect, a method for personnel safety monitoring is provided, the method comprising:
acquiring detection data of personnel corresponding to a target room;
determining the behavior type of the detection data of the personnel according to the detection data of the personnel;
if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs;
and controlling the target protection mode to be executed.
Optionally, the determining, according to the detection data of the person, the behavior type to which the detection data of the person belongs includes: if the detection data of the personnel is that the intelligent lock is opened through a target unlocking mode at a first time point, the target room corresponds to a first identifier in a first time interval, and a first user to which the target unlocking mode belongs does not appear in a picture shot by a camera in a public area to which the target room belongs after the first time point, determining that the behavior type to which the detection data of the personnel belongs is a first behavior type;
wherein the first identifier is used for indicating that no activity information exists in the target room, the age of the first user is greater than a first value, the date to which the first time point belongs and the date to which the first time interval belongs are separated by a target value day, and the date to which the first time point belongs is earlier than the date to which the first time interval belongs.
Optionally, the controlling the target protection mode includes:
and sending notification information to a login terminal or a related mobile terminal of a contact account corresponding to the target room record, and sending a first instruction to the intelligent lock of the target room, wherein the first instruction is used for indicating the intelligent lock to enter an unlocking state.
Optionally, the determining, according to the detection data of the person, the behavior type to which the detection data of the person belongs includes:
if the detection data of the person is that the intelligent lock is unlocked from the target room and locked, and the target room corresponds to a second identifier after the intelligent lock is locked, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
Optionally, the controlling the target protection mode includes:
and sending notification information to a login terminal or an associated mobile terminal of the contact account corresponding to the target room record, and sending a second instruction to the intelligent lock of the target room, wherein the second instruction is used for indicating that the intelligent lock enters a door locking state.
Optionally, the determining, according to the detection data of the person, the behavior type to which the detection data of the person belongs includes:
and if the detection data of the person is that a second user is included in the picture shot by the camera outside the window of the target room and the second user is not the same as a third user corresponding to the target room record, determining that the behavior type to which the detection data of the person belongs is a second behavior type.
Optionally, the determining, according to the detection data of the person, the behavior type to which the detection data of the person belongs includes:
if the detection data of the person is that the intelligent lock of the target room is damaged and the target room corresponds to the second identifier after the intelligent lock is damaged, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
Optionally, the controlling the target protection mode includes:
and sending notification information to a login terminal or an associated mobile terminal of the contact account recorded corresponding to the target room, and sending a third instruction to the intelligent lock of the target room, wherein the third instruction is used for indicating the intelligent lock to enter a door locking state and sending voice prompt information.
Optionally, the determining, according to the detection data of the person, the behavior type to which the detection data of the person belongs includes:
if the detection data of the person is that a camera in a public area to which the target room belongs shoots a picture containing a fourth user when the intelligent lock of the target room is locked, the camera does not shoot the picture containing the fourth user before the first time of the day after the intelligent lock is locked, and the age of the fourth user is greater than a second numerical value or less than a third numerical value, determining that the behavior type to which the detection data of the person belongs is a third behavior type;
wherein the fourth user is a user of the target room.
In a second aspect, there is provided an apparatus for personal safety monitoring, the apparatus comprising:
the acquisition module is used for acquiring detection data of personnel corresponding to the target room;
the determining module is used for determining the behavior type of the detection data of the personnel according to the detection data of the personnel; if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs;
and the control module is used for controlling and executing the target protection mode.
Optionally, the determining module is configured to:
if the detection data of the personnel is that the intelligent lock is opened through a target unlocking mode at a first time point, the target room corresponds to a first identifier in a first time interval, and a first user to which the target unlocking mode belongs does not appear in a picture shot by a camera in a public area to which the target room belongs after the first time point, determining that the behavior type to which the detection data of the personnel belongs is a first behavior type;
wherein the first identifier is used for indicating that no activity information exists in the target room, the age of the first user is greater than a first value, the date to which the first time point belongs and the date to which the first time interval belongs are separated by a target value day, and the date to which the first time point belongs is earlier than the date to which the first time interval belongs.
Optionally, the control module is configured to:
and sending notification information to a login terminal or a related mobile terminal of a contact account corresponding to the target room record, and sending a first instruction to the intelligent lock of the target room, wherein the first instruction is used for indicating the intelligent lock to enter an unlocking state.
Optionally, the determining module is configured to:
if the detection data of the person is that the intelligent lock is unlocked from the target room and locked, and the target room corresponds to a second identifier after the intelligent lock is locked, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
Optionally, the control module is configured to:
and sending notification information to a login terminal or an associated mobile terminal of the contact account corresponding to the target room record, and sending a second instruction to the intelligent lock of the target room, wherein the second instruction is used for indicating that the intelligent lock enters a door locking state.
Optionally, the determining module is configured to:
and if the detection data of the person is that a second user is included in the picture shot by the camera outside the window of the target room and the second user is not the same as a third user corresponding to the target room record, determining that the behavior type to which the detection data of the person belongs is a second behavior type.
Optionally, the determining module is configured to:
if the detection data of the person is that the intelligent lock of the target room is damaged and the target room corresponds to the second identifier after the intelligent lock is damaged, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
Optionally, the control module is configured to:
and sending notification information to a login terminal or an associated mobile terminal of the contact account recorded corresponding to the target room, and sending a third instruction to the intelligent lock of the target room, wherein the third instruction is used for indicating the intelligent lock to enter a door locking state and sending voice prompt information.
Optionally, the determining module is configured to:
if the detection data of the person is that a camera in a public area to which the target room belongs shoots a picture containing a fourth user when the intelligent lock of the target room is locked, the camera does not shoot the picture containing the fourth user before the first time of the day after the intelligent lock is locked, and the age of the fourth user is greater than a second numerical value or less than a third numerical value, determining that the behavior type to which the detection data of the person belongs is a third behavior type;
wherein the fourth user is a user of the target room.
In a third aspect, a server is provided, which comprises a processor and a memory, wherein the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for monitoring personnel safety as described in the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, in which at least one instruction is stored, the instruction being loaded and executed by a processor to implement the method for personnel safety monitoring according to the first aspect.
In a fifth aspect, a system for personnel safety monitoring is provided, the system comprising:
sensor and intelligence lock for:
acquiring detection data of personnel corresponding to a target room;
a server to:
acquiring detection data of personnel corresponding to a target room from the sensor and the intelligent lock;
determining the behavior type of the detection data of the personnel according to the detection data of the personnel;
if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs;
and controlling the target protection mode to be executed. .
The beneficial effects brought by the technical scheme provided by the embodiment of the disclosure at least comprise:
the server can obtain detection data of a person corresponding to the target room, determine a behavior type to which the detection data of the person belongs according to the detection data of the person, determine a target protection mode corresponding to the behavior type to which the detection data belongs according to a correspondence between the behavior type and the protection mode and the behavior type to which the detection data belongs if the behavior type meets a target trigger condition, and then control to execute the target protection mode. Therefore, when the behavior type of the detected data meets the target trigger condition, the protection mode can be determined, the execution of the protection mode is controlled, the protection of rooms and residents can be automatically realized, and the safety of the residents can be improved.
Drawings
FIG. 1 is a system diagram of personnel safety monitoring provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of an intelligent lock provided by an embodiment of the present disclosure;
FIG. 3 is a flow chart of sending an unlock password provided by an embodiment of the present disclosure;
FIG. 4 is a flow chart illustrating a manner of monitoring personnel safety provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of a room with sensors provided by an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of a common area setup camera provided by an embodiment of the present disclosure;
FIG. 7 is a schematic structural diagram of an apparatus for monitoring personnel safety provided by an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
The embodiment of the disclosure provides a personnel safety monitoring method based on linkage of an intelligent lock and a sensor, an execution main body of the method can be a server, the server can be a background server of an application program of personnel safety monitoring, a processor, a memory, a transceiver and the like can be arranged in the server, the processor can be used for processing the personnel safety monitoring process, the memory can be used for storing data required and generated in the personnel safety monitoring process, and the transceiver can be used for receiving and sending the data.
Before implementation, an application scenario of the embodiment of the present disclosure is first introduced:
as shown in fig. 1, the server is connected to a terminal of a manager and connected to a plurality of gateway devices (which may also be referred to as network boxes), each gateway device is connected to a plurality of intelligent locks, and a door of each room is configured with one intelligent lock. For the intelligent lock in any room, a user in the room to which the intelligent lock belongs sets an unlocking mode of the intelligent lock (the unlocking mode comprises a fingerprint mode, a digital password mode, a door card swiping mode, a face recognition mode and the like) on a terminal of a manager, the terminal of the manager sends the unlocking mode of the intelligent lock and the number of the intelligent lock to a server, the server can use the number of the intelligent lock, the gateway equipment to which the intelligent lock is accessed is found in the corresponding relation between the number of the intelligent lock and the gateway equipment, and then the number of the intelligent lock and the unlocking mode of the intelligent lock are sent to the gateway equipment. After the gateway equipment receives the intelligent lock unlocking request, the serial number of the intelligent lock can be used for determining the intelligent lock to which the unlocking mode of the intelligent lock belongs, and then the unlocking mode of the intelligent lock is sent to the determined intelligent lock.
As shown in fig. 2, the intelligent lock includes front panel and rear panel, after the unlocking mode that gateway equipment sent was received to the rear panel of intelligent lock, the main control MCU (Microcontroller Unit) of rear panel can send the unlocking mode to the front panel through the Serial port, after the front panel received, main control MCU through the front panel, the unlocking mode is sent and is stored to the storage area through SPI (Serial Peripheral Interface), and with the data of fingerprint, send for the fingerprint module through URAT (Universal Asynchronous Receiver Transmitter/Transmitter, Universal Asynchronous Receiver Transmitter), the data of fingerprint module is saved.
The subsequent user can open the room door of the room by using the unlocking mode.
The server and the gateway device communicate with each other via ethernet, and the gateway device and the smart lock communicate with each other via Sub1g (Sub1g also called wireless 433, a wireless communication technology with a frequency of about 433 MHz). The back panel of intelligence lock is located the back of intelligence lock, the back of room door in the room promptly, and the front panel of intelligence lock is located the front of intelligence lock, the front of room door in the room promptly. The front panel of intelligence lock can be provided with input panel for input password, and can also be provided with the camera, be used for carrying out face identification, can also be provided with the card inductor, be used for detecting the door card.
It should be noted that, besides the verification of the door opening right, any other operation related to the user data is not supported locally by the intelligent lock, so that it can be ensured that the intelligent lock can be configured only by a manager, and the security can be improved.
In addition, as shown in fig. 3, the embodiment of the present disclosure further provides a communication flow diagram of an unlocking manner (which may be referred to as user data) in which the server issues the smart lock to the smart lock.
Step 301, the server sends user data to the gateway device.
Step 302, the gateway device compresses the user data, and sends the user data to the back panel of the intelligent lock in packets.
Step 303, the back panel of the intelligent lock sends response information to the gateway device.
Step 304, the back panel of the smart lock sends the user data to the front panel of the smart lock.
Step 305, the front panel of the intelligent lock sends a response message to the rear panel of the intelligent lock.
In step 306, the front panel of the smart lock processes the user data (stores the user data in a storage area, etc.).
The embodiment of the present disclosure provides a method for monitoring personnel safety, as shown in fig. 4, a processing flow of the method may be as follows:
step 401, acquiring detection data of a person corresponding to a target room.
In an implementation, a detection device is disposed in the target room, the detection device including at least one sensor and at least one camera. As shown in fig. 5, at least one sensor may be disposed within the target room and establish a connection with the gateway device, the at least one sensor may include an infrared sensor or the like. As shown in fig. 6, the camera may be disposed outside a window of the target room, and may be disposed in a common area corresponding to the target room, with a connection being established with a gateway device of the target room. The public area includes outside the target room and is located on the requisite route to enter the target room. For example, the common area is the area from the door of the target room to the elevator, i.e. the stairwell, the corridor and the doorway of the unit to which the target room belongs, etc.
The detection device of the target room can detect data every moment and send the detection data to the server through the connected gateway device. For example, the infrared sensor may detect activity information in a room, and transmit the detected activity information (i.e., detection data) to the server. The camera may also send the captured image to the server.
In addition, the detection device of the target room may further include an intelligent lock, and if the intelligent lock detects that the lock is picked, the lock is unlocked, or the like, the message (i.e., the detection data) may be sent to the server, and if the lock is unlocked, the message carries the number, the occurrence time point, the unlocking manner used, or the like of the intelligent lock, and if the lock is picked, the message carries the number, the occurrence time point, or the like of the intelligent lock.
It should be noted that the infrared sensor may continuously emit infrared rays outwards, receive reflected infrared rays, and determine a time difference between the emitted infrared rays and the received infrared rays, if the time differences between two adjacent times are different for some infrared rays with the same emission direction, it is indicated that an object is moving in the target room, and if the time differences between two adjacent times are the same for all infrared rays with the same emission direction, it is indicated that no object is moving in the target room. The infrared sensor may directly send each determined time difference between the emission of the infrared ray and the reception of the infrared ray (i.e., detection data) to the server, or may directly send an identifier that an object is moving (i.e., there is activity information, and the detection data is the second identifier) or an identifier that no object is moving (i.e., there is no activity information, and the detection data is the first identifier) to the server.
It should be noted that, if the camera does not have the function of intelligently recognizing the image, the captured image (i.e., the detection data) and the camera identifier may be directly transmitted to the server, and if the camera has the function of intelligently recognizing the image, the content in the captured image may be directly recognized, and the recognized content (the recognized face image, i.e., the detection data) and the camera identifier may be transmitted to the server (the reason for transmitting the camera identifier is to enable the server to determine the position of the camera).
It should be noted that, when the camera and the sensor transmit the detection data, an identifier may also be transmitted to the server, so as to determine the positions of the camera and the sensor. Here, if the cameras are cameras of a common area, it is possible to find a plurality of rooms corresponding to the cameras.
In addition, in fig. 5, a camera may also be provided in the target room for security.
The server can receive the detection data sent by the sensor and the intelligent lock, so that the server can obtain the detection data of the personnel corresponding to the target room.
Step 402, determining the behavior type of the detection data of the person according to the detection data of the person.
Wherein the behavior types may include: children/old people do not return, the old people have accidents, are suspected to enter a room for theft and the like.
In implementation, after the server acquires the detection data of the person, the server may determine the behavior type to which the detection data of the person belongs, by using the detection data of the person.
Alternatively, for different detection data, the process of determining the behavior type may be as follows:
the first condition is as follows: and if the detection data of the personnel is that the intelligent lock is opened through a target unlocking mode at a first time point, a target room corresponds to a first identifier in a first time interval, and a first user to which the target unlocking mode belongs does not appear in a picture shot by a camera in a public area to which the target room belongs after the first time point, determining that the behavior type to which the detection data of the personnel belongs is a first behavior type.
The first identification is used for indicating that no activity information exists in the target room, the age of the first user is greater than a first numerical value, the date to which the first time point belongs and the date to which the first time interval belongs are separated by a target numerical value day, and the date to which the first time point belongs is earlier than the date to which the first time interval belongs. The first time interval and the first value may be set and stored in the server, the target value may be 1, and the like.
In implementation, the detection data sent by the intelligent lock includes that the intelligent lock is opened to enter a target room through a target unlocking mode at a first time point, and the detection data sent by the infrared sensor includes a first identifier corresponding to the target room in a first time interval, where the first identifier is used to indicate that no activity information exists in the target room. And after the first time point, if the first user does not appear in the picture shot by the camera in the public area to which the target room belongs (which indicates that the first user does not go out of the room), it may be determined that the behavior type to which the detection data of the person belongs is the first behavior type, and the first behavior type may be an accident of the old.
It should be noted that, in the first case, the scenario described is that after the first user (the age of the first user is larger) in the target room enters the room on the first day, no activity information is detected even late on the first day after the target numerical day, and it can be determined that the first user is unexpected.
It should be further noted that, the process of identifying whether the first user leaves the room may be: if the smart lock does not detect the opening, it may be determined that the first user has not walked out of the target room, if the smart lock detects the opening, an image in the public area may be recognized, if a face image is recognized, the face image may be compared in a user face library, a face image matching the recognized face image may be determined, a user who belongs to the user may be determined using the matching face image, it is determined whether the first user is the target room, if the first user is, it may be determined that the first user has walked out of the target room, and if the first user is not, it may be determined that the first user has not walked out of the target room.
Case two: and if the detection data of the personnel is that the intelligent lock is unlocked from the target room and locked, and the target room corresponds to a second identifier after the intelligent lock is locked, determining that the behavior type to which the detection data of the personnel belongs is a second behavior type, wherein the second identifier is used for indicating that the activity information exists in the target room.
In implementation, if the server acquires the detection data from the smart lock, the smart lock is unlocked from the target room and then locked. After that, the detection data sent by the server from the infrared sensor is a second identifier of activity information in the target room, so that the server can determine that the behavior type to which the detection data of the person belongs is a second behavior type, and the second behavior type is suspected burglary.
It should be noted that, in the second case, the scenario described is that after the user in the target room leaves the room, people still move in the room, which indicates that a stranger enters the room.
Optionally, in the second case, in order to make the determination result more accurate, it may be determined that the smart lock is unlocked from inside the target room from the detection data acquired by the camera in the public area, and then when the smart lock is locked, the user who detects the target room moves out of the target room (this may be obtained by identifying the image captured by the camera).
And in the third case, if the detection data of the person is that the second user is included in the picture shot by the camera outside the window of the target room and the second user is not the same as the third user recorded in the corresponding target room, determining that the behavior type to which the detection data of the person belongs is the second behavior type.
In implementation, the detection data is that the second user is included in the picture taken by the camera outside the window of the target room, and the second user is not the same person as the third user recorded in the corresponding target room, so that the behavior type to which the detection data of the person belongs can be determined to be the second behavior type, and the second behavior type is suspected burglary.
The process of determining the detection data is as follows: the server can acquire the shot image from a camera arranged outside the window, recognize the acquired image, determine that a person (which may be called a second user) enters the target room from the window of the target room, acquire a picture of a third user recorded in the corresponding target room, compare the picture of the second user with the picture of the third user in the acquired image, and determine that the second user is not the same as the third user when the similarity is smaller than a certain value.
In the third scenario, another person enters the room through the window.
If the detection data of the person is that the intelligent lock of the target room is damaged and the target room corresponds to the second identifier after the intelligent lock is damaged, determining that the behavior type to which the detection data of the person belongs is the second behavior type; wherein the second identifier is used to indicate that activity information is present in the target room.
In implementation, when the smart lock detects that the smart lock is not opened by using the preset target unlocking mode, a message that the smart lock is damaged (i.e. picking the lock) can be sent to the server. If the detected data obtained from the smart lock is a message that the smart lock is broken, it may be determined that the smart lock is broken. And determining the message sending time, wherein after the time, the detection data sent by the infrared sensor of the target room is a second identifier with activity information in the target room, and the behavior type to which the detection data of the person belongs can be determined to be a second behavior type, and the second behavior type is suspected burglary.
In the fourth scenario, another person breaks the smart lock of the target room and enters the room.
In case five, if the detection data of the person is that the camera in the public area to which the target room belongs shoots the picture containing the fourth user when the intelligent lock of the target room is locked, the camera does not shoot the picture containing the fourth user before the first time of the day after the intelligent lock is locked, and the age of the fourth user is greater than the second numerical value or less than the third numerical value, determining that the behavior type to which the detection data of the person belongs is the third behavior type; wherein the fourth user is a user of the target room.
The second value and the third value may be preset, the second value may be 70, the third value may be 12, the first time may be preset, and the first time may be 22 o' clock.
In implementation, the server acquires the detection data from the smart lock that the smart lock is unlocked from the target room, and then closes, so that the time point when the smart lock is unlocked can be acquired, and the detection data (i.e., the captured image) sent by the camera in the public area is a picture containing the fourth user. The process of determining the picture containing the fourth user is: and identifying the image shot by the camera in the public area, identifying the person in the image, if the person is identified, comparing the image with a user face library recorded in the corresponding target room to determine whether the comparison is successful, and if the comparison is successful, determining that the image contains the picture of the fourth user. The age of the record corresponding to this person (which may be subsequently referred to as a fourth user) may then be looked up.
If the age exceeds the second value or is smaller than the third value, whether the intelligent lock is opened in a target unlocking mode before the first time of the day when the intelligent lock is opened can be further determined from the detection data sent by the intelligent lock. If the intelligent lock is opened, the detection data (namely, the shot image) of the camera in the public area can be acquired, people in the image are identified, the people in the image are identified, if the people are identified, the comparison can be carried out with the photo of a fourth user, if the people are not the same person, the behavior type of the detection data of the people is determined to be a third behavior type, and the third behavior type is not returned by children/old people.
In addition, if the same person is present, subsequent processing may not be performed.
It should be noted that, in the scenario of the fifth case, the old or the child does not go home very late in the day after going out.
In addition, for the detection data that is not matched to the above-described first behavior type, second behavior type, or third behavior type, it may be determined collectively as the fourth behavior type.
Step 403, if the behavior type meets the target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relationship between the behavior type and the protection mode and the behavior type to which the detection data belongs.
In implementation, the server may determine whether the target trigger condition is satisfied using the determined behavior type, and if the target trigger condition is satisfied, may obtain a correspondence between the stored behavior type and the protection mode, and in the correspondence, determine a target protection mode corresponding to the behavior type to which the detection data belongs.
It should be noted that, the determination of whether the target trigger condition is met is generally based on whether people or things in the target room are threatened.
It should be further noted that, the above determining whether the behavior type satisfies the target trigger condition may be performed as follows: the target triggering condition corresponds to a behavior type set, and if the determined behavior type belongs to the behavior type set, the determined behavior type is determined to meet the target triggering condition.
Optionally, in the embodiment of the present disclosure, as shown in table one, a correspondence between the behavior type and the protection mode is further provided.
Watch 1
Figure BDA0002053242510000121
In step 404, control executes the target protection mode.
In an implementation, after the server determines the target protection mode, it may control the execution of the target protection mode.
In step 404, different processes may be performed corresponding to different cases in step 402, which may be as follows:
in response to the above case one, the processing of step 404 may be as follows:
and sending notification information to a login terminal or a related mobile terminal of the contact account recorded in the corresponding target room, and sending a first instruction to the intelligent lock of the target room, wherein the first instruction is used for indicating the intelligent lock to enter an unlocking state.
In an implementation, a contact account is registered when a user lives in a target room. The server may determine a contact account corresponding to the target room record, and send a notification message to the contact account login terminal or the associated mobile terminal, where the notification message is used to indicate that the target room is suspected to be in a coma. And the number of the smart lock of the target room can be determined, the gateway device connected with the smart lock is determined by using the number, and a first instruction is sent to the gateway device and carries the number of the smart lock of the target room. After receiving the command, the gateway device may forward the first command to the smart lock of the target room using the number of the smart lock.
After the intelligent lock in the target room receives the first instruction, the intelligent lock can be controlled to enter an unlocking state, the unlocking state means that the intelligent lock is in an unlocking state, and the target room can be accessed without using a target unlocking mode, so that other people can conveniently enter the target room to cure a coma user.
In addition, in the above case, the first instruction may also be used to instruct the intelligent voice prompt, and the voice prompt is used to prompt the target room that someone needs to be treated.
In addition, the server can also send a notification message to a terminal used by a manager, wherein the notification message is used for indicating that the target room is suspected to be in a coma, and the manager can check the coma in time.
Corresponding to the second case, the processing of step 404 may be as follows:
and sending notification information to a login terminal or an associated mobile terminal of the contact account recorded corresponding to the target room, and sending a second instruction to the intelligent lock of the target room, wherein the second instruction is used for indicating that the intelligent lock enters a door locking state.
In an implementation, a contact account is registered when a user lives in a target room. The server may determine a contact account recorded in the corresponding target room, and send a notification message to a login terminal of the contact account, where the notification message is used to indicate that the target room is suspected of having someone entering the target room. And the number of the smart lock of the target room can be determined, the gateway device connected with the smart lock is determined by using the number, and a second instruction is sent to the gateway device and carries the number of the smart lock of the target room. After receiving the command, the gateway device may forward the second command to the smart lock of the target room using the number of the smart lock.
After receiving the second instruction, the intelligent lock of the target room can be controlled to enter a door locking state, wherein the door locking state means that the intelligent lock is in a locking state, and the target room can be accessed only by using a target unlocking mode.
In addition, the server can also send a notification message to a terminal used by a manager, wherein the notification message is used for indicating that the target room is suspected of entering the room, and the manager can check the room in time.
Corresponding to the above case three and case four, the process of step 404 may be as follows:
and sending notification information to a login terminal or a related mobile terminal of the contact account recorded in the corresponding target room, and sending a third instruction to the intelligent lock of the target room, wherein the third instruction is used for indicating the intelligent lock to enter a door locking state and sending voice prompt information.
In an implementation, a contact account is registered when a user lives in a target room. The server may determine a contact account corresponding to the target room record, and send a notification message to a login terminal or an associated mobile terminal of the contact account, where the notification message is used to indicate that the target room is suspected of having someone to enter. And the number of the smart lock of the target room can be determined, the gateway device connected with the smart lock is determined by using the number, and a third instruction is sent to the gateway device and carries the number of the smart lock of the target room. After receiving the third instruction, the gateway device may forward the third instruction to the smart lock of the target room by using the number of the smart lock.
After receiving the third instruction, the intelligent lock in the target room can be controlled to enter a door locking state and send out voice prompt information, the door locking state indicates that the intelligent lock is in a locking state, the target room can be accessed only by using a target unlocking mode, and the voice prompt information is used for prompting that the target room has the entry of the intelligent lock and asking whether the target room is a bad person or not.
In addition, the server can also send a notification message to a terminal used by a manager, wherein the notification message is used for indicating that the target room is suspected of entering the room, and the manager can check the room in time.
Corresponding to the fifth case, the process of step 404 may be as follows:
and sending notification information to a login terminal or an associated mobile terminal of the contact account recorded in the corresponding target room.
When the user lives in the target room, a contact account is registered. The server can determine a contact account corresponding to the target room record, and send a notification message to a login terminal or an associated mobile terminal of the contact account, wherein the notification message is used for indicating whether the old people or children are lost or not.
In addition, for the above cases one to five, the server may record and record the point in time when the occurrence occurred. The method can record the corresponding relation between the behavior type, the room number, the occurrence time point and the protection mode, and can also record the trigger level, wherein the trigger level is lower when the old or the child is lost, and the trigger level is higher when the old is in a coma and other people enter the door.
In addition, in the embodiment of the present disclosure, if a camera is disposed in the target room, when activity information of the target room is detected, the detection may also be performed using an image captured by the camera. That is, if there is a person image in the captured image, it is determined that there is activity information, and if there is no person image in the captured image, it is determined that there is no activity information.
It should be noted that the first user, the third user, and the fourth user are all users of the target room, and may be the same user or different users, and the addition of "first", "second", and "third" is merely used for distinguishing descriptions.
In the embodiment of the disclosure, the server may obtain detection data of a person corresponding to the target room, determine a behavior type to which the detection data of the person belongs according to the detection data of the person, determine a target protection mode corresponding to the behavior type to which the detection data belongs according to a correspondence between the behavior type and the protection mode and the behavior type to which the detection data belongs if the behavior type satisfies a target trigger condition, and then control to execute the target protection mode. Therefore, when the behavior type of the detected data meets the target trigger condition, the protection mode can be determined, the execution of the protection mode is controlled, the protection of rooms and residents can be automatically realized, and the safety of the residents can be improved.
Based on the same technical concept, the embodiment of the present disclosure further provides an apparatus for personnel safety monitoring, as shown in fig. 7, the apparatus includes:
an obtaining module 710, configured to obtain detection data of a person corresponding to a target room;
a determining module 720, configured to determine, according to the detection data of the person, a behavior type to which the detection data of the person belongs; if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs;
and a control module 730, configured to control execution of the target protection mode.
Optionally, the determining module 720 is configured to:
if the detection data of the personnel is that the intelligent lock is opened through a target unlocking mode at a first time point, the target room corresponds to a first identifier in a first time interval, and a first user to which the target unlocking mode belongs does not appear in a picture shot by a camera in a public area to which the target room belongs after the first time point, determining that the behavior type to which the detection data of the personnel belongs is a first behavior type;
wherein the first identifier is used for indicating that no activity information exists in the target room, the age of the first user is greater than a first value, the date to which the first time point belongs and the date to which the first time interval belongs are separated by a target value day, and the date to which the first time point belongs is earlier than the date to which the first time interval belongs.
Optionally, the control module 730 is configured to:
and sending notification information to a login terminal or a related mobile terminal of a contact account corresponding to the target room record, and sending a first instruction to the intelligent lock of the target room, wherein the first instruction is used for indicating the intelligent lock to enter an unlocking state.
Optionally, the determining module 720 is configured to:
if the detection data of the person is that the intelligent lock is unlocked from the target room and locked, and the target room corresponds to a second identifier after the intelligent lock is locked, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
Optionally, the control module 730 is configured to:
and sending notification information to a login terminal or an associated mobile terminal of the contact account corresponding to the target room record, and sending a second instruction to the intelligent lock of the target room, wherein the second instruction is used for indicating that the intelligent lock enters a door locking state.
Optionally, the determining module 720 is configured to:
and if the detection data of the person is that a second user is included in the picture shot by the camera outside the window of the target room and the second user is not the same as a third user corresponding to the target room record, determining that the behavior type to which the detection data of the person belongs is a second behavior type.
Optionally, the determining module 720 is configured to:
if the detection data of the person is that the intelligent lock of the target room is damaged and the target room corresponds to the second identifier after the intelligent lock is damaged, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
Optionally, the control module 730 is configured to:
and sending notification information to a login terminal or an associated mobile terminal of the contact account recorded corresponding to the target room, and sending a third instruction to the intelligent lock of the target room, wherein the third instruction is used for indicating the intelligent lock to enter a door locking state and sending voice prompt information.
Optionally, the determining module 720 is configured to:
if the detection data of the person is that a camera in a public area to which the target room belongs shoots a picture containing a fourth user when the intelligent lock of the target room is locked, the camera does not shoot the picture containing the fourth user before the first time of the day after the intelligent lock is locked, and the age of the fourth user is greater than a second numerical value or less than a third numerical value, determining that the behavior type to which the detection data of the person belongs is a third behavior type;
wherein the fourth user is a user of the target room.
In the embodiment of the disclosure, the server may obtain detection data of a person corresponding to the target room, determine a behavior type to which the detection data of the person belongs according to the detection data of the person, determine a target protection mode corresponding to the behavior type to which the detection data belongs according to a correspondence between the behavior type and the protection mode and the behavior type to which the detection data belongs if the behavior type satisfies a target trigger condition, and then control to execute the target protection mode. Therefore, when the behavior type of the detected data meets the target trigger condition, the protection mode can be determined, the execution of the protection mode is controlled, the protection of rooms and residents can be automatically realized, and the safety of the residents can be improved.
It should be noted that: in the device for monitoring personnel safety provided by the above embodiment, only the division of the above functional modules is taken as an example for the monitoring of personnel safety, and in practical application, the above function distribution can be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the device for monitoring personnel safety provided by the above embodiment and the method embodiment for monitoring personnel safety belong to the same concept, and the specific implementation process thereof is detailed in the method embodiment and is not described herein again.
Fig. 8 is a schematic structural diagram of a server according to an embodiment of the present invention, where the server 800 may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 801 and one or more memories 802, where the memory 802 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 801 to implement the method steps of monitoring the personal security.
The embodiment of the present disclosure further provides a server, where the server includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for monitoring personal safety as described above.
The embodiment of the present disclosure also provides a computer-readable storage medium, in which at least one instruction is stored, where the instruction is loaded and executed by a processor to implement the method for monitoring personnel safety as described above.
The embodiment of the present disclosure further provides a system for monitoring personnel safety, the system includes:
sensor and intelligence lock for: acquiring detection data of personnel corresponding to a target room;
a server to: acquiring detection data of personnel corresponding to a target room from the sensor and the intelligent lock; determining the behavior type of the detection data of the personnel according to the detection data of the personnel; if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs; and controlling the target protection mode to be executed.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (10)

1. A method of personnel safety monitoring, the method comprising:
acquiring detection data of personnel corresponding to a target room;
determining the behavior type of the detection data of the personnel according to the detection data of the personnel;
if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs;
and controlling the target protection mode to be executed.
2. The method according to claim 1, wherein the determining the behavior type to which the detection data of the person belongs according to the detection data of the person comprises:
if the detection data of the personnel is that the intelligent lock is opened through a target unlocking mode at a first time point, the target room corresponds to a first identifier in a first time interval, and a first user to which the target unlocking mode belongs does not appear in a picture shot by a camera in a public area to which the target room belongs after the first time point, determining that the behavior type to which the detection data of the personnel belongs is a first behavior type;
wherein the first identifier is used for indicating that no activity information exists in the target room, the age of the first user is greater than a first value, the date to which the first time point belongs and the date to which the first time interval belongs are separated by a target value day, and the date to which the first time point belongs is earlier than the date to which the first time interval belongs.
3. The method of claim 2, wherein the controlling performs the target protection mode, comprising:
and sending notification information to a login terminal or a related mobile terminal of a contact account corresponding to the target room record, and sending a first instruction to the intelligent lock of the target room, wherein the first instruction is used for indicating the intelligent lock to enter an unlocking state.
4. The method according to claim 1, wherein the determining the behavior type to which the detection data of the person belongs according to the detection data of the person comprises:
if the detection data of the person is that the intelligent lock is unlocked from the target room and locked, and the target room corresponds to a second identifier after the intelligent lock is locked, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
5. The method of claim 4, wherein the controlling performs the target protection mode, comprising:
and sending notification information to a login terminal or an associated mobile terminal of the contact account corresponding to the target room record, and sending a second instruction to the intelligent lock of the target room, wherein the second instruction is used for indicating that the intelligent lock enters a door locking state.
6. The method according to claim 1, wherein the determining the behavior type to which the detection data of the person belongs according to the detection data of the person comprises:
and if the detection data of the person is that a second user is included in the picture shot by the camera outside the window of the target room and the second user is not the same as a third user corresponding to the target room record, determining that the behavior type to which the detection data of the person belongs is a second behavior type.
7. The method according to claim 1, wherein the determining the behavior type to which the detection data of the person belongs according to the detection data of the person comprises:
if the detection data of the person is that the intelligent lock of the target room is damaged and the target room corresponds to the second identifier after the intelligent lock is damaged, determining that the behavior type to which the detection data of the person belongs is a second behavior type;
wherein the second identifier is used to indicate that activity information is present in the target room.
8. The method of claim 6 or 7, wherein the controlling performs the target protection mode, comprising:
and sending notification information to a login terminal or an associated mobile terminal of the contact account recorded corresponding to the target room, and sending a third instruction to the intelligent lock of the target room, wherein the third instruction is used for indicating the intelligent lock to enter a door locking state and sending voice prompt information.
9. The method according to claim 1, wherein the determining the behavior type to which the detection data of the person belongs according to the detection data of the person comprises:
if the detection data of the person is that a camera in a public area to which the target room belongs shoots a picture containing a fourth user when the intelligent lock of the target room is locked, the camera does not shoot the picture containing the fourth user before the first time of the day after the intelligent lock is locked, and the age of the fourth user is greater than a second numerical value or less than a third numerical value, determining that the behavior type to which the detection data of the person belongs is a third behavior type;
wherein the fourth user is a user of the target room.
10. A system for personnel safety monitoring, the system comprising:
sensor and intelligence lock for:
acquiring detection data of personnel corresponding to a target room;
a server to:
acquiring detection data of personnel corresponding to a target room from the sensor and the intelligent lock;
determining the behavior type of the detection data of the personnel according to the detection data of the personnel;
if the behavior type meets a target triggering condition, determining a target protection mode corresponding to the behavior type to which the detection data belongs according to the corresponding relation between the behavior type and the protection mode and the behavior type to which the detection data belongs;
and controlling the target protection mode to be executed.
CN201910380577.2A 2019-05-08 2019-05-08 Personnel safety monitoring method and system based on intelligent lock and sensor linkage Pending CN111915765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910380577.2A CN111915765A (en) 2019-05-08 2019-05-08 Personnel safety monitoring method and system based on intelligent lock and sensor linkage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910380577.2A CN111915765A (en) 2019-05-08 2019-05-08 Personnel safety monitoring method and system based on intelligent lock and sensor linkage

Publications (1)

Publication Number Publication Date
CN111915765A true CN111915765A (en) 2020-11-10

Family

ID=73242035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910380577.2A Pending CN111915765A (en) 2019-05-08 2019-05-08 Personnel safety monitoring method and system based on intelligent lock and sensor linkage

Country Status (1)

Country Link
CN (1) CN111915765A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112735015A (en) * 2020-12-25 2021-04-30 重庆中科云从科技有限公司 Community management method, device, machine readable medium and equipment
CN114301959A (en) * 2022-01-04 2022-04-08 北京电信规划设计院有限公司 Monitoring linkage control method for intelligent lock of rental housing

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201003317Y (en) * 2006-10-30 2008-01-09 熊家伟 Intelligent anti-theft lock
CN104574573A (en) * 2013-10-16 2015-04-29 国家电网公司 Safe handling method for intelligent lock and intelligent lock
CN105118123A (en) * 2015-08-26 2015-12-02 王伟 Intelligent door device and intelligent community system
CN205582056U (en) * 2016-04-05 2016-09-14 深圳市汇海威视科技有限公司 Door lock system
CN205644856U (en) * 2016-05-23 2016-10-12 上海咖浦智能科技有限公司 Safety anti -theft system of wisdom family
CN106023347A (en) * 2016-01-27 2016-10-12 西安盈姆电子信息科技有限公司 Empty-nest elderly entry-access control system
CN106815545A (en) * 2015-11-27 2017-06-09 罗伯特·博世有限公司 Behavior analysis system and behavior analysis method
CN107248212A (en) * 2017-06-08 2017-10-13 深圳消费物联科技有限公司 A kind of intelligent lock system and its method for unlocking based on NFC
CN108198292A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of domestic monitoring method based on intelligent cloud lock, system
CN108804165A (en) * 2018-05-25 2018-11-13 李昭强 A kind of information processing method, device and storage medium based on user's unlocking behavioural analysis
CN109102613A (en) * 2018-08-31 2018-12-28 广州洪荒智能科技有限公司 A kind of Community Watch method based on recognition of face

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201003317Y (en) * 2006-10-30 2008-01-09 熊家伟 Intelligent anti-theft lock
CN104574573A (en) * 2013-10-16 2015-04-29 国家电网公司 Safe handling method for intelligent lock and intelligent lock
CN105118123A (en) * 2015-08-26 2015-12-02 王伟 Intelligent door device and intelligent community system
CN106815545A (en) * 2015-11-27 2017-06-09 罗伯特·博世有限公司 Behavior analysis system and behavior analysis method
CN106023347A (en) * 2016-01-27 2016-10-12 西安盈姆电子信息科技有限公司 Empty-nest elderly entry-access control system
CN205582056U (en) * 2016-04-05 2016-09-14 深圳市汇海威视科技有限公司 Door lock system
CN205644856U (en) * 2016-05-23 2016-10-12 上海咖浦智能科技有限公司 Safety anti -theft system of wisdom family
CN107248212A (en) * 2017-06-08 2017-10-13 深圳消费物联科技有限公司 A kind of intelligent lock system and its method for unlocking based on NFC
CN108198292A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of domestic monitoring method based on intelligent cloud lock, system
CN108804165A (en) * 2018-05-25 2018-11-13 李昭强 A kind of information processing method, device and storage medium based on user's unlocking behavioural analysis
CN109102613A (en) * 2018-08-31 2018-12-28 广州洪荒智能科技有限公司 A kind of Community Watch method based on recognition of face

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112735015A (en) * 2020-12-25 2021-04-30 重庆中科云从科技有限公司 Community management method, device, machine readable medium and equipment
CN112735015B (en) * 2020-12-25 2023-04-25 重庆中科云从科技有限公司 Community management method, device, machine-readable medium and equipment
CN114301959A (en) * 2022-01-04 2022-04-08 北京电信规划设计院有限公司 Monitoring linkage control method for intelligent lock of rental housing
CN114301959B (en) * 2022-01-04 2023-06-27 北京电信规划设计院有限公司 Intelligent lock monitoring linkage control method for integrated renting house

Similar Documents

Publication Publication Date Title
CN206515931U (en) A kind of face identification system
US11222495B2 (en) Scalable systems and methods for monitoring and concierge service
CN108198292A (en) A kind of domestic monitoring method based on intelligent cloud lock, system
KR100893905B1 (en) Method and system for managing entrance using biometrics
US20060090079A1 (en) Voice authenticated alarm exit and entry interface system
CN104021362B (en) Gate inhibition's early warning system based on image dynamic object recognition and pre-warning and control method
JP2022533885A (en) Vehicle door control method, vehicle, system, electronic device and storage medium
CN102663846A (en) Intelligent visitor management system based on android operating platform and control method thereof
CN104573457A (en) Intelligent gate control system and method based on cloud platform
CN212276476U (en) Intelligent door lock
EP3886420B1 (en) Intercom system for collective housing
KR102328402B1 (en) Smart door look control system and method
CN110002290B (en) Elevator access control method and device, storage medium and electronic equipment
CN111915765A (en) Personnel safety monitoring method and system based on intelligent lock and sensor linkage
CN108320359A (en) A kind of city Internet of Things wisdom gate inhibition and safety-protection system
CN105976469A (en) Intelligent doorkeeper management system with robot and application thereof
KR101526142B1 (en) The door lock control system and method using smart phone
CN111292454A (en) Intelligent identity access control identification system and method
CN111179487A (en) Intelligent door lock and intelligent door lock system
CN111119597A (en) Control method and device of safety lock tongue
CN112735015A (en) Community management method, device, machine readable medium and equipment
CN218848821U (en) Prevent lock networking system of renting
CN106157417A (en) A kind of iris identification method, device, smart lock and intelligent identifying system
CN111210546A (en) Access control management method and system realized by intelligent lock
CN105957192A (en) Access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination