CN111951440A - Control method and device of invisible door, terminal equipment and medium - Google Patents

Control method and device of invisible door, terminal equipment and medium Download PDF

Info

Publication number
CN111951440A
CN111951440A CN202010855516.XA CN202010855516A CN111951440A CN 111951440 A CN111951440 A CN 111951440A CN 202010855516 A CN202010855516 A CN 202010855516A CN 111951440 A CN111951440 A CN 111951440A
Authority
CN
China
Prior art keywords
door
outdoor
door opening
invisible
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010855516.XA
Other languages
Chinese (zh)
Inventor
胡展坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yagu Intelligent Technology Co ltd
Original Assignee
Shenzhen Yagu Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yagu Intelligent Technology Co ltd filed Critical Shenzhen Yagu Intelligent Technology Co ltd
Priority to CN202010855516.XA priority Critical patent/CN111951440A/en
Publication of CN111951440A publication Critical patent/CN111951440A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • EFIXED CONSTRUCTIONS
    • E06DOORS, WINDOWS, SHUTTERS, OR ROLLER BLINDS IN GENERAL; LADDERS
    • E06BFIXED OR MOVABLE CLOSURES FOR OPENINGS IN BUILDINGS, VEHICLES, FENCES OR LIKE ENCLOSURES IN GENERAL, e.g. DOORS, WINDOWS, BLINDS, GATES
    • E06B5/00Doors, windows, or like closures for special purposes; Border constructions therefor
    • E06B5/10Doors, windows, or like closures for special purposes; Border constructions therefor for protection against air-raid or other war-like action; for other protective purposes
    • E06B5/11Doors, windows, or like closures for special purposes; Border constructions therefor for protection against air-raid or other war-like action; for other protective purposes against burglary
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The application is applicable to the technical field of furniture, and provides a control method, a control device, terminal equipment and a medium for an invisible door, wherein the method comprises the following steps: when an outdoor door opening signal is monitored, the identity recognition device is exposed; the identity recognition device is adopted to carry out identity verification on an outdoor user, and if the identity verification is passed, the invisible door is opened; detecting an outdoor condition when an indoor opening door signal is monitored; and determining whether to open the invisible door according to the outdoor condition. By the method, the invisible door can be controlled more conveniently, and a personal space with safety and privacy is provided for a user.

Description

Control method and device of invisible door, terminal equipment and medium
Technical Field
The application belongs to the technical field of furniture, and particularly relates to a control method and device of an invisible door, terminal equipment and a medium.
Background
At present, in home decoration, the decoration style of the whole living room can be influenced by the installation of the door, in some cases, people do not want other people to enter the private space of the people, and the position of the door can make the position of the room more obvious, so that an invisible door can be adopted.
However, the safety of the existing invisible door is not strong, and the door is inconvenient to open and close. People pay more and more attention to privacy and safety of personal space, and the current invisible door cannot meet the requirement.
Disclosure of Invention
The embodiment of the application provides a control method and device for an invisible door, terminal equipment and a medium, which can enable a user to control the invisible door more conveniently and provide a more private and safe space for the user.
In a first aspect, an embodiment of the present application provides a method for controlling a hidden door, including:
when an outdoor door opening signal is monitored, the identity recognition device is exposed;
the identity recognition device is adopted to carry out identity verification on an outdoor user, and if the identity verification is passed, the invisible door is opened;
detecting an outdoor condition when an indoor opening door signal is monitored;
and determining whether to open the invisible door according to the outdoor condition.
In a second aspect, an embodiment of the present application provides a control device for a hidden door, including:
the outdoor door opening signal monitoring module is used for exposing the identity recognition device when an outdoor door opening signal is monitored;
the outdoor door opening module is used for carrying out identity authentication on an outdoor user by adopting the identity recognition device, and opening the invisible door if the identity authentication is passed;
the indoor door opening signal monitoring module is used for detecting the outdoor condition when an indoor door opening signal is monitored;
and the indoor door opening judging module is used for determining whether to open the invisible door according to the outdoor condition.
In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor, when executing the computer program, implements the method according to the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product, which, when run on a terminal device, causes the terminal device to execute the method described in the first aspect.
Compared with the prior art, the embodiment of the application has the advantages that: in the embodiment of the application, if a user needs to enter the room from the outdoor, the user needs to trigger an outdoor door opening signal, then the invisible door can expose the identity recognition device from the invisible door cabinet body, identity verification is carried out on the user, and the invisible door can be opened only after the identity verification of the user passes; if the user wants to go from indoor to outdoor, need trigger indoor signal of opening the door, then the outdoor human detection device of stealthy door detects outdoor situation, if the indoor preset within range nobody when, just can open stealthy door. In the application, the security of the private space is ensured through identity authentication; the identity recognition device of the invisible door is hidden in the cabinet body, so that other people cannot easily guess the position of the invisible door, and the space privacy is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a control method for a hidden door according to an embodiment of the present disclosure;
FIG. 2 is a schematic view of a hidden door provided in the second embodiment of the present application;
FIG. 3(a) is a schematic view showing the identity recognition device being hidden and installed inside the invisible door when the invisible door is in a closed state;
FIG. 3(b) is a schematic diagram of the identification device after being raised to a designated position when the user triggers an outdoor door opening signal;
FIG. 4(a) is a schematic view of the opening of the invisible door as seen from the outdoor direction;
FIG. 4(b) is a schematic view of the opening of the invisible door as seen from the indoor direction;
fig. 5 is a schematic flowchart of a control method for a hidden door according to a third embodiment of the present application;
fig. 6 is a schematic structural diagram of a control device of a hidden door according to a fourth embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal device according to a fifth embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Fig. 1 is a schematic flowchart of a method for controlling a hidden door according to an embodiment of the present application, where as shown in fig. 1, the method includes:
s101, when an outdoor door opening signal is monitored, the identity recognition device is exposed.
The method in the embodiment is applied to the invisible door, and can be specifically executed by a control device in the invisible door. The invisible door body can be in the shape of a wine cabinet, a bookcase and the like, and is kept consistent with surrounding cabinet bodies in home decoration, so that other people can not know where the door is, and the privacy of the space is guaranteed.
The identity recognition device can be hidden in the body of the invisible door, and is used for verifying the identity of a person when the person enters the door from the outside. Generally, the identity recognition device can be hidden in the cabinet body of the invisible door, and when a user triggers an outdoor door opening signal, the identity recognition device can be exposed to the user.
Specifically, the invisible door may include an outdoor door opening wake-up device for detecting whether a user triggers a door opening signal. Specifically, when the outdoor door opening wake-up device detects that the knocking sound is continuous, the outdoor door opening signal can be generated. The continuous tapping sound may be tapping sounds detected a preset number of times within a preset time. Of course, the outdoor door opening signal may also be triggered by other possible ways, for example, when it is detected that the user rotates a certain part on the cabinet body of the invisible door, the outdoor door opening signal is generated.
The outdoor door opening awakening device can send an outdoor door opening signal to the control device, and the control device sends an instruction to the identity recognition device according to the received outdoor door opening signal to enable the identity recognition device to be exposed. For example, the identity recognition device can be hidden in the cabinet body when the invisible door is closed, and can be lifted to a specified position after receiving an instruction so as to be exposed to a user, thereby completing identity verification of the user.
And S102, performing identity authentication on the outdoor user by adopting the identity recognition device, and opening the invisible door if the identity authentication is passed.
Specifically, the identity recognition device may use technologies such as iris recognition and face recognition to recognize the identity of the user. For example, the user may input his or her iris or face in the identity recognition device in advance, and when performing the identity verification, the identity recognition device collects the iris or face of the outdoor person, and then compares the iris or face with the iris or face stored in advance, and if the iris or face is the same as the iris or face stored in advance, it indicates that the outdoor person is the user of the hidden door, and opens the hidden door.
Specifically, after the identity authentication is passed, the identity recognition device can send information of successful identity authentication to the control device of the invisible door, after the control device of the invisible door receives the information of successful identity authentication, the control device of the invisible door can send a door opening instruction to the door opening and closing device of the invisible door, and after the door opening and closing device receives the door opening instruction, the invisible door is opened.
In addition, after the invisible door is opened for the preset time, the anti-pinch device of the invisible door can detect whether people exist in the door closing area of the invisible door, and if the door closing area is detected to be unmanned, the invisible door can be closed.
And S103, detecting the outdoor condition when the indoor opening door signal is monitored.
Specifically, when a user is indoors and wants to go out, the user can directly press a switch on the invisible door, so that an indoor door opening signal is generated and sent to the control device; the control device sends a detection instruction to the outdoor human body detection device of the invisible door when receiving an indoor door opening signal, and the outdoor human body detection device detects whether a person exists in an outdoor preset range after receiving the detection instruction.
And S104, determining whether to open the invisible door or not according to the outdoor condition.
Specifically, if no one is in the outdoor, the invisible door is opened, and if someone is in the outdoor, prompt information can be generated, and a prompt lamp is adopted to prompt the user that someone is in the outdoor.
In addition, the invisible door can comprise an emergency door opening device, when a user presses the emergency door opening device, the control device can directly send an instruction to the door opening and closing device to open the invisible door, and outdoor conditions do not need to be detected.
In the embodiment, when the user stands outdoors, the identity recognition can be triggered by a specific action, and for strangers, the invisible door cannot be found, so that the privacy of the space is guaranteed; when entering the room from the outside, the user needs to perform identity authentication, and when going from the room to the outside, whether someone is in the room or not needs to be detected before the door is opened, so that the safety of the space is guaranteed. This embodiment is through carrying out intelligent control to stealthy door for stealthy use of door becomes convenient.
Fig. 2 is a schematic view of a stealth door provided in the second embodiment of the present application, and as shown in fig. 2, the stealth door includes: the device comprises an outdoor human body detection device 1, a prompting device 2, an emergency device 3, an indoor door opening awakening device 4, an anti-pinch device 5, an identity recognition device 6, a door closing device 7, an outdoor door opening awakening device 8 and a hidden door body 9.
The outdoor human body detection device is used for detecting outdoor conditions when the invisible door is opened indoors. Specifically, outdoor human detection device can adopt the millimeter wave radar, installs at stealthy door top, when needing indoor walking outdoor, detects whether someone is in outdoor certain within range to can be when someone outdoors, choose not to open stealthy door, thereby make other people not know stealthy door's specific position, ensured the privacy in space.
The prompting device is used for prompting the outdoor person of a user, can adopt the LED prompting lamp, is installed in the indoor direction of the invisible door, and indicates the outdoor person when the prompting lamp is on.
The emergency device is used for opening the invisible door by a user in an emergency. The emergency device can be a key switch and is arranged in the indoor direction of the invisible door, and when a user presses the emergency device, the door can be opened directly no matter whether someone is outdoors or not.
The indoor door opening awakening device is used for monitoring whether a user needs to open the door from the indoor space. The indoor door opening awakening device can be a key switch and is installed in the indoor direction of the invisible door, when a user presses the key switch, the user indicates that the user wants to open the invisible door from the indoor space at the moment, an indoor door opening signal is generated, the indoor door opening signal is transmitted to the outdoor human body detection device, the outdoor human body detection device is triggered to detect the outdoor situation, and therefore whether the door is opened or not is judged.
Above-mentioned anti-pinch device can avoid the user to be pressed from both sides when closing the door. Anti-pinch device can adopt infrared detection, installs in stealthy door side, detects whether the region of closing the door is someone, and when the region of closing the door has the people, can select to stop closing the door.
The identity recognition device is used for verifying the identity of an entering person when the person enters the room from the outside. The identity recognition device can adopt the technologies of iris recognition, face recognition and the like, is hidden and installed in the middle of the invisible door and is used for confirming the identity of a user, and when the identity recognition is needed, the identity recognition device rises to a specified position. FIG. 3(a) is a schematic view showing the identity recognition device being hidden and installed inside the invisible door when the invisible door is in a closed state; fig. 3(b) is a schematic diagram of the identification device after being lifted to a designated position when the user triggers an outdoor door opening signal.
The door opening and closing device is used for automatically opening and closing the invisible door. The door opening and closing device can adopt an intelligent spring, has a self-locking function, is installed at the bottom of a movable part of the invisible door, is used for electrically opening and closing the invisible door, and can adopt the anti-pinch device to detect whether a person is in a door closing area or not after the invisible door is opened and the preset time is separated, and if the person is not in the door closing area, the invisible door can be closed. FIG. 4(a) is a schematic view of the opening of the invisible door as seen from the outdoor direction; fig. 4(b) is a schematic view showing the opening of the hidden door as seen from the indoor direction.
The outdoor door opening awakening device is used for detecting whether a user needs to open the door from the outdoor. The outdoor door opening awakening can adopt knocking or other modes, and is invisibly arranged in the middle of the invisible door and used for sending a door opening signal.
The invisible door body can be in the shape of a wine cabinet, a bookcase and the like, and is consistent with the peripheral cabinet body, so that most people cannot recognize where the invisible door is.
In another possible implementation, the invisible door may further include a control device for processing all signals and actions. The outdoor door opening awakening device, the identity recognition device, the door opening and closing device, the outdoor human body detection device, the prompting device, the emergency device and the anti-pinch device are respectively connected with the control device. Specifically, after the outdoor door opening awakening device detects that the user triggers an outdoor door opening signal, the outdoor door opening signal is sent to the control device, the control device sends an identity verification instruction to the identity recognition device after receiving the outdoor door opening signal, the identity recognition device is lifted to a specified position after receiving the identity verification instruction, user information is collected for identity verification, an identity verification result is sent to the control device, if the control device receives information that the identity verification passes, the control device sends a door opening instruction to the door opening and closing device, the door opening and closing device opens the invisible door after receiving the door opening and closing instruction, and the invisible door is closed when the anti-pinch device detects that no person is in a door closing area; if the control device receives the information of the authentication failure, the control device does not need to process the information, keeps the invisible door in a closed state, and can also send an instruction to the identity recognition device to perform authentication again.
When the indoor door opening awakening device monitors that the user triggers an indoor door opening signal, the indoor door opening signal is sent to the control device, the control device can send a detection instruction to the outdoor human body detection device after receiving the indoor door opening signal, and the outdoor human body detection device detects whether a person is in an outdoor preset range or not after receiving the detection instruction and sends a detection result to the control device. If the detection result received by the control device is that someone is outdoors, sending prompt information to the prompt device, and after receiving the prompt information, the prompt device lights up a prompt lamp to inform a user that someone is outdoors, and the invisible door keeps a closed state; the control device receives a detection result that the door is not closed outdoors, and sends a door opening instruction to the door opening and closing device, and the door opening and closing device opens the invisible door after receiving the door opening and closing instruction and closes the invisible door when the anti-pinch device detects that no person is in the door closing area.
Fig. 5 is a schematic flowchart of a method for controlling a hidden door according to a third embodiment of the present application, where as shown in fig. 5, the method includes:
when the invisible door monitors an outdoor opening signal, the identity recognition equipment is adopted to verify the identity of outdoor personnel, if the identity verification is passed, the door is opened, whether the door can be closed or not is judged after the door is opened, and when the door can be closed, the invisible door is closed, and whether the opening signal exists or not is continuously monitored; and when the identity verification fails, keeping the invisible door in a closed state, and continuously monitoring whether a door opening signal exists or not.
When an indoor door opening signal is monitored, detecting whether a person is outdoors, if the person is outdoors, reminding an indoor user that the person is outdoors, and continuously monitoring whether the door opening signal exists; if no person is detected outdoors, the invisible door is opened, whether a person is in a door closing area is detected after the invisible door is opened, if no person is detected, the invisible door can be closed, and whether a door opening signal exists is monitored continuously.
Fig. 6 is a schematic structural diagram of a control device for a hidden door according to a fourth embodiment of the present application, and as shown in fig. 6, the control device includes:
the outdoor door opening signal monitoring module 61 is used for exposing the identity recognition device when an outdoor door opening signal is monitored;
the outdoor door opening module 62 is used for performing identity authentication on an outdoor user by using the identity recognition device, and if the identity authentication is passed, the invisible door is opened;
an indoor door opening signal monitoring module 63, configured to detect an outdoor condition when an indoor door opening signal is monitored;
and an indoor door opening judging module 64, configured to determine whether to open the invisible door according to the outdoor condition.
The outdoor door opening signal monitoring module 61 includes: :
the outdoor door opening signal generation submodule is used for generating an outdoor door opening signal if the outdoor door opening awakening device is adopted to monitor knocking sound for a preset number of times;
and the identity recognition device lifting submodule is used for sending the outdoor door opening signal to the identity recognition device so as to indicate the identity recognition device to be lifted to a specified position.
The outdoor door opening module 62 includes:
the acquisition submodule is used for receiving the identification information of the outdoor user through the identification device;
the identity authentication submodule is used for comparing the identity identification information with pre-stored identified identity information, and if the identified identity information which is the same as the identity identification information exists, the identity authentication passes;
and the door opening instruction sending submodule is used for sending a door opening instruction to the door opening and closing device so as to open the invisible door.
The indoor door opening signal monitoring module 63 includes:
the indoor door opening signal generation submodule is used for generating an indoor door opening signal if the indoor door opening awakening device is adopted to detect a door opening instruction of an indoor user;
and the detection submodule is used for sending the indoor door opening signal to the outdoor human body existence detection device so as to indicate that the outdoor human body detection device detects whether a person exists in an outdoor preset range.
The indoor door opening determination module 64 includes:
the prompting submodule is used for controlling the invisible door to keep a closed state and generating prompting information if people exist in the outdoor preset range;
and the outdoor door opening submodule is used for opening the invisible door if no one is in the outdoor preset range.
The above-mentioned device still includes:
and the emergency door opening module is used for opening the invisible door when an emergency door opening signal is detected, and the emergency door opening signal is triggered by an emergency door opening button of the invisible door.
The above-mentioned device still includes:
the door closing detection module is used for detecting whether a person exists in a door closing area of the invisible door when the invisible door is in an opening state and continues for a preset time length;
and the door closing module is used for closing the invisible door if the door closing area is unmanned.
Fig. 7 is a schematic structural diagram of a terminal device according to a fifth embodiment of the present application. As shown in fig. 7, the terminal device 7 of this embodiment includes: at least one processor 70 (only one shown in fig. 7), a memory 71, and a computer program 72 stored in the memory 71 and executable on the at least one processor 70, the processor 70 implementing the steps in any of the various method embodiments described above when executing the computer program 72.
The terminal device may include, but is not limited to, a processor 70, a memory 71. Those skilled in the art will appreciate that fig. 7 is only an example of the terminal device 7, and does not constitute a limitation to the terminal device 7, and may include more or less components than those shown, or combine some components, or different components, for example, and may further include input/output devices, network access devices, and the like.
The processor 70 may be a Central Processing Unit (CPU), and the processor 70 may be other general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 71 may in some embodiments be an internal storage unit of the terminal device 7, such as a hard disk or a memory of the terminal device 7. In other embodiments, the memory 71 may also be an external storage device of the terminal device 7, such as a plug-in hard disk provided on the terminal device 7, a smart card (SMC), a Secure Digital (SD) card, a flash card (FlashCard), and so on. Further, the memory 71 may also include both an internal storage unit and an external storage device of the terminal device 7. The memory 71 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 71 may also be used to temporarily store data that has been output or is to be output.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a terminal device, enables the terminal device to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/terminal apparatus, a recording medium, computer memory, Read-only memory (ROM), random-access memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A method of controlling a concealed door, comprising:
when an outdoor door opening signal is monitored, the identity recognition device is exposed;
the identity recognition device is adopted to carry out identity verification on an outdoor user, and if the identity verification is passed, the invisible door is opened;
detecting an outdoor condition when an indoor opening door signal is monitored;
and determining whether to open the invisible door according to the outdoor condition.
2. The method of claim 1, wherein the invisible door comprises an outdoor door opening wake-up device, and wherein the revealing of the identification device when the outdoor door opening signal is monitored comprises:
if the outdoor door opening awakening device is adopted to monitor the knocking sound of the preset times, an outdoor door opening signal is generated;
and sending the outdoor door opening signal to an identity recognition device to indicate the identity recognition device to be lifted to a specified position.
3. The method of claim 1, wherein the invisible door comprises a door opening and closing device, and the step of authenticating an outdoor user by using the identification device and opening the invisible door if the authentication is passed comprises:
receiving identification information of an outdoor user through the identification device;
comparing the identity identification information with pre-stored identified identity information, and if the identified identity information which is the same as the identity identification information exists, passing identity identification verification;
and sending a door opening instruction to the door opening and closing device so as to open the invisible door.
4. The method of claim 1, wherein the invisible door comprises an indoor door opening wake-up device and an outdoor human presence detection device, and the detecting the outdoor condition when the indoor door opening signal is monitored comprises:
if the indoor door opening awakening device is adopted to detect a door opening instruction of an indoor user, an indoor door opening signal is generated;
and sending the indoor door opening signal to the outdoor human body existence detection device to indicate the outdoor human body detection device to detect whether a person exists in an outdoor preset range.
5. The method of claim 4, wherein said determining whether to open the invisible door based on the outdoor condition comprises:
if people exist in the outdoor preset range, controlling the invisible door to keep a closed state and generating prompt information;
and if no person is in the outdoor preset range, opening the invisible door.
6. The method of claim 1, further comprising:
and when an emergency door opening signal is detected, opening the invisible door, wherein the emergency door opening signal is triggered by an emergency door opening button of the invisible door.
7. The method of any one of claims 1-6, further comprising:
when the invisible door is in an opening state and continues for a preset time length, detecting whether a person exists in a door closing area of the invisible door;
and if no person is in the door closing area, closing the invisible door.
8. A control device for a concealed door, comprising:
the outdoor door opening signal monitoring module is used for exposing the identity recognition device when an outdoor door opening signal is monitored;
the outdoor door opening module is used for carrying out identity authentication on an outdoor user by adopting the identity recognition device, and opening the invisible door if the identity authentication is passed;
the indoor door opening signal monitoring module is used for detecting the outdoor condition when an indoor door opening signal is monitored;
and the indoor door opening judging module is used for determining whether to open the invisible door according to the outdoor condition.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202010855516.XA 2020-08-24 2020-08-24 Control method and device of invisible door, terminal equipment and medium Pending CN111951440A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010855516.XA CN111951440A (en) 2020-08-24 2020-08-24 Control method and device of invisible door, terminal equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010855516.XA CN111951440A (en) 2020-08-24 2020-08-24 Control method and device of invisible door, terminal equipment and medium

Publications (1)

Publication Number Publication Date
CN111951440A true CN111951440A (en) 2020-11-17

Family

ID=73360129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010855516.XA Pending CN111951440A (en) 2020-08-24 2020-08-24 Control method and device of invisible door, terminal equipment and medium

Country Status (1)

Country Link
CN (1) CN111951440A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689590A (en) * 2021-09-08 2021-11-23 北京京东乾石科技有限公司 Access control system, method and device, and computer readable medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689590A (en) * 2021-09-08 2021-11-23 北京京东乾石科技有限公司 Access control system, method and device, and computer readable medium
CN113689590B (en) * 2021-09-08 2023-09-26 北京京东乾石科技有限公司 Access control system, method and device and computer readable medium

Similar Documents

Publication Publication Date Title
US11282314B2 (en) Systems and methods for controlling access to physical space
CN108412315B (en) Intelligent door lock warning system and control method thereof
US11527118B2 (en) Smart lock and method for automatically locking smart lock
US7856558B2 (en) Biometric verification and duress detection system and method
US20190063140A1 (en) Garage door authentication and automation
CN105629762B (en) The control device and method of smart home
CN111691764B (en) Household intelligent door lock and control method thereof
CN108600202A (en) A kind of information processing method and device, computer readable storage medium
KR101617872B1 (en) Alert method and system of fingerprint reader
CN108301698A (en) A kind of intelligence door system and its control method
CN109594858A (en) A kind of unlocking monitoring method of intelligent monitoring safe-guard door lock
CN103806789A (en) Intelligent safety box with iris recognition function
CN111951440A (en) Control method and device of invisible door, terminal equipment and medium
US11961349B1 (en) Biometric authentication for security sensor bypass
CN202976292U (en) Face recognition entrance door system
CN209912036U (en) Face identification security entrance guard all-in-one
CN112352408A (en) Intruder detection method and device
CN107065579A (en) The management method and system of a kind of smart home
CN111273556A (en) Household control method and device and door lock
CN208089020U (en) A kind of intelligence door system
KR20050106339A (en) Door lock providing multiple authentication
TWI729657B (en) Security system
CN108870660A (en) Intelligent regulating system for central air-conditioning
CA2629271C (en) A biometric verification and duress detection system and method
TWI735121B (en) Security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination