CN112002036A - Method and system for managing room based on linkage of sensor and intelligent lock - Google Patents

Method and system for managing room based on linkage of sensor and intelligent lock Download PDF

Info

Publication number
CN112002036A
CN112002036A CN201910380018.1A CN201910380018A CN112002036A CN 112002036 A CN112002036 A CN 112002036A CN 201910380018 A CN201910380018 A CN 201910380018A CN 112002036 A CN112002036 A CN 112002036A
Authority
CN
China
Prior art keywords
behavior information
target
constraint
user
room
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910380018.1A
Other languages
Chinese (zh)
Other versions
CN112002036B (en
Inventor
张家宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Software Co Ltd
Original Assignee
Hangzhou Ezviz Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Software Co Ltd filed Critical Hangzhou Ezviz Software Co Ltd
Priority to CN201910380018.1A priority Critical patent/CN112002036B/en
Publication of CN112002036A publication Critical patent/CN112002036A/en
Application granted granted Critical
Publication of CN112002036B publication Critical patent/CN112002036B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure provides a method and a system for managing rooms based on linkage of a sensor and an intelligent lock, and belongs to the technical field of computers. The method comprises the following steps: the server can obtain behavior information of a user to which the target room belongs, can judge whether the behavior information meets constraint conditions, if the behavior information meets the constraint conditions according to the behavior information, determines a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and then sends a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode. By adopting the method and the system, a method for managing the room based on linkage of the sensor and the intelligent lock is provided.

Description

Method and system for managing room based on linkage of sensor and intelligent lock
Technical Field
The disclosure relates to the technical field of computers, in particular to a room management method and system based on linkage of a sensor and an intelligent lock.
Background
At present, house renting is a common thing, house owners can rent own houses to tenants, and after the houses are rented to the tenants, how to manage the houses is a very difficult thing. Particularly, in the actual management of large-scale low-priced rented houses or public rented houses, the situation that a user violates a management rule, for example, public property is not kept bad, a fire is caused repeatedly by using a high-power electric appliance by an individual user, and the like is often encountered, and a manager lacks an effective technical management or constraint means to constrain the non-compliance behavior of the tenant, can only rely on artificial propaganda education and warning, and cannot effectively eliminate potential safety hazards in a management space. Therefore, it is urgently needed to provide a method and a system for managing rooms, which can reduce the management cost of a manager, improve the management efficiency and the safety of the managed rooms.
Disclosure of Invention
In order to solve the problems in the prior art, the embodiments of the present disclosure provide a method and system for managing a room based on linkage of a sensor and an intelligent lock. The technical scheme is as follows:
in a first aspect, a method of managing a room is provided, the method comprising:
acquiring behavior information of a user to which a target room belongs;
if the behavior information meets the constraint condition according to the behavior information, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode;
and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for instructing the intelligent lock to execute the target constraint mode.
Optionally, the method further includes:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
In this way, the user of the target room can be notified in a timely manner.
Optionally, the acquiring the behavior information of the user in the target room includes:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
Optionally, the determining that the behavior information satisfies a constraint condition according to the behavior information includes:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
Optionally, the acquiring the behavior information of the user in the target room includes:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
Optionally, the determining that the behavior information satisfies a constraint condition according to the behavior information includes:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
Optionally, the determining that the behavior information satisfies a constraint condition according to the behavior information includes:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
Optionally, the determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relationship between the behavior information and the constraint mode includes:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
Optionally, the target constraint mode includes delaying unlocking for a third time period when an unlocking instruction is detected within a second time period when the intelligent lock receives the start of the target constraint mode, and playing a voice prompt message.
In a second aspect, an intelligent room management system based on sensor and intelligent lock linkage is provided, the system comprising:
the sensor is used for acquiring behavior information of a user in a target room or a public area to which the target room belongs;
the server is used for configuring and storing the corresponding relation between behavior information and a constraint mode in advance, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode;
and the intelligent lock is used for executing a target constraint mode according to the received constraint instruction sent by the server.
In a third aspect, there is provided an apparatus for managing a room, the apparatus comprising:
the acquisition module is used for acquiring behavior information of a user to which the target room belongs;
the determining module is used for determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode if the behavior information meets the constraint condition according to the behavior information;
and the sending module is used for sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode.
Optionally, the sending module is further configured to:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
Optionally, the obtaining module is configured to:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
Optionally, the determining module is configured to:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
Optionally, the obtaining module is configured to:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
Optionally, the determining module is configured to:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
Optionally, the determining module is configured to:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
Optionally, the determining module is configured to:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
Optionally, the target constraint mode includes delaying unlocking for a third time period when an unlocking instruction is detected within a second time period when the intelligent lock receives the start of the target constraint mode, and playing a voice prompt message.
In a fourth aspect, there is provided a server comprising a processor and a memory, the memory having stored therein at least one instruction, the instruction being loaded and executed by the processor to implement the method of managing a room as described in the first aspect above.
In a fifth aspect, there is provided a computer readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to implement the method of managing a room as described in the first aspect above.
The beneficial effects brought by the technical scheme provided by the embodiment of the disclosure at least comprise:
in the embodiment of the disclosure, the server may obtain behavior information of a user to which the target room belongs, may determine whether the behavior information satisfies the constraint condition, and if it is determined that the behavior information satisfies the constraint condition according to the behavior information, determine a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode, and then send a constraint instruction to the intelligent lock of the target room, where the constraint instruction is used to instruct the intelligent lock to execute the target constraint mode. In this way, the constraint mode corresponding to the user can be determined based on the behavior information of the user, and each room is managed based on the constraint mode, so that the method for managing the rooms is provided. In addition, because a large amount of manpower is not needed to be configured to manage the rooms, the management cost of a manager can be reduced, and the rooms are managed intelligently, so that the management efficiency and the safety of the managed rooms can be improved.
Drawings
FIG. 1 is a diagram of a system for managing a room provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of an intelligent lock provided by an embodiment of the present disclosure;
FIG. 3 is a flow chart of sending an unlock password provided by an embodiment of the present disclosure;
FIG. 4 is a flow chart illustrating one manner of managing a room provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of a room with sensors provided by an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of a common area setup camera provided by an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of an apparatus for managing a room according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
The embodiment of the disclosure provides a room management method based on linkage of a sensor and an intelligent lock, an execution main body of the method can be a server, the server can be a background server of an application program for managing a room, the server can be provided with a processor, a memory, a transceiver and the like, the processor can be used for processing in a room management process, the memory can be used for storing data required in the room management process and data generated in the room management process, and the transceiver can be used for receiving and sending the data.
Before implementation, an application scenario of the embodiment of the present disclosure is first introduced:
as shown in fig. 1, the server is connected to a terminal of a manager and connected to a plurality of gateway devices (which may also be referred to as network boxes), each gateway device is connected to a plurality of intelligent locks, and a door of each room is configured with one intelligent lock. For the intelligent lock in any room, a user in the room to which the intelligent lock belongs sets an opening password (the opening password comprises a fingerprint, a digital password and the like) of the intelligent lock on a terminal of a manager, the terminal of the manager sends the opening password of the intelligent lock and the number of the intelligent lock to a server, the server can use the number of the intelligent lock, the gateway equipment to which the intelligent lock is accessed is found in the corresponding relation between the number of the intelligent lock and the gateway equipment, and then the number of the intelligent lock and the opening password of the intelligent lock are sent to the gateway equipment. After the gateway equipment receives the intelligent lock, the serial number of the intelligent lock can be used for determining the intelligent lock to which the opening password of the intelligent lock belongs, and then the opening password of the intelligent lock is sent to the determined intelligent lock.
As shown in fig. 2, the intelligent lock includes a front panel and a rear panel, after the rear panel of the intelligent lock receives the opening password sent by the gateway device, a main control MCU (Microcontroller Unit) of the rear panel can send the opening password to the front panel through a Serial port, after the front panel receives the opening password, the front panel can send the opening password to a storage area through a Serial Peripheral Interface (SPI), and send the data of the fingerprint to the fingerprint module through a Universal Asynchronous Receiver/Transmitter (URAT), and the fingerprint module stores the data of the fingerprint.
The follow-up user can open the door of room with opening the password, in addition, the mode of opening the door can also have the mode of punching a door card, face identification mode etc..
The server and the gateway device communicate with each other via ethernet, and the gateway device and the smart lock communicate with each other via Sub1g (Sub1g also called wireless 433, a wireless communication technology with a frequency of about 433 MHz). The back panel of intelligence lock is located the back of intelligence lock, the back of room door in the room promptly, and the front panel of intelligence lock is located the front of intelligence lock, the front of room door in the room promptly. The front panel of intelligence lock can be provided with input panel for input password, and can also be provided with the camera, be used for carrying out face identification, can also be provided with the card inductor, be used for detecting the door card.
It should be noted that, besides the verification of the door opening right, any other operation related to the user data is not supported locally by the intelligent lock, so that it can be ensured that the intelligent lock can be configured only by a manager, and the security can be improved.
In addition, as shown in fig. 3, the embodiment of the present disclosure further provides a communication flow diagram of the server issuing an opening password (which may be referred to as user data) of the smart lock to the smart lock.
Step 301, the server sends user data to the gateway device.
Step 302, the gateway device compresses the user data, and sends the user data to the back panel of the intelligent lock in packets.
Step 303, the back panel of the intelligent lock sends response information to the gateway device.
Step 304, the back panel of the smart lock sends the user data to the front panel of the smart lock.
Step 305, the front panel of the intelligent lock sends a response message to the rear panel of the intelligent lock.
In step 306, the front panel of the smart lock processes the user data (stores the user data in a storage area, etc.).
The embodiment of the present disclosure provides a method for managing a room based on linkage of a sensor and an intelligent lock, as shown in fig. 4, a processing flow of the method may be as follows:
step 401, behavior information of a user to which the target room belongs is obtained.
Wherein, the target room is any room managed by the server configuration.
In implementation, the server may receive the behavior information of the user through the gateway device, or determine the behavior information of the user in the target room by receiving the content sent by the gateway device. The behavior information of the user of the target room may be acquired by:
the first method is as follows: the intelligent lock of the target room is opened by opening the password every time, the intelligent lock sends an unlocking message to the gateway device, the unlocking message comprises opening time, the number of the password used for opening the intelligent lock (the number is used for indicating an unlocking mode, and whether a door card is swiped or a digital password is input, and the like), and the server records behavior information of the user as entering the target room at the opening time after receiving the information.
The second method comprises the following steps: and acquiring the behavior information of the target user according to the detection result sent by the sensor arranged in the target room or the public area to which the target room belongs.
In an implementation, as shown in fig. 5, at least one sensor is disposed in the target room, the at least one sensor may include a smoke sensor, a noise sensor, and the like, the smoke sensor may be used to detect whether smoke exists in the target room in real time, and the noise sensor may be used to detect whether the decibel of the loud sound in the target room exceeds a target value in real time, and the like. The at least one sensor establishes connection with the gateway device, and transmits the detection result and the number of the sensor to the server when the at least one sensor detects the user behavior meeting the report condition (here, the sensor may transmit the detection result and the number of the sensor to the gateway device, and the gateway device transmits the detection result and the number of the sensor to the server).
The server may receive the detection result and the number of the sensor, and may then use the detection result to determine the behavior information of the user. For example, if the value detected by the smoke sensor in the room is greater than the preset value, the behavior information of the user is that the user is smoking smoke, or burning objects, etc. Then, the number of the sensor is used to determine the room corresponding to the number, and the behavior information of the user is stored corresponding to the number of the room.
It should be noted that, corresponding to the reporting condition of the smoke sensor, the value detected by the smoke sensor in the room may be greater than a preset value. The reporting condition corresponding to the noise sensor may be that decibels of sounds detected by the noise sensor in the room exceed a target value.
In addition, a sensor may be disposed in a public area to which the target room belongs, and the disposed sensor may be a smoke sensor, a noise sensor, or the like, and may be configured to detect behavior information of a user in the public area. For example, the value detected by the smoke sensor in the public area is greater than a preset value, which indicates that a person is suspected to be smoking, and the detection result can be sent to the server and the detection time point can be sent. The server can acquire image information shot by the camera in the area where the smoke sensor is located at the detection time point, identify the image, determine whether the user belonging to the target room performs smoking, and determine that the behavior information of the user is smoking in a public area if the user belonging to the target room performs smoking.
And thirdly, acquiring behavior information of the target user according to image information sent by a camera arranged in the public area where the target room belongs.
Wherein the public area comprises the outside of the target room and is located on a necessary path when entering the target room. For example, the common area is the area from the door of the target room to the elevator, i.e. the stairwell, the corridor and the doorway of the unit to which the target room belongs, etc.
In practice, as shown in fig. 6, a camera is provided in the common area to which the target room belongs, and the camera can capture images within the range of view angles.
The camera can send the image shot by the camera to the connected gateway equipment according to a target period (which can be set to 1 hour and the like), and simultaneously send the identification of the camera, and after the gateway equipment receives the image and the identification of the camera, the gateway equipment can send the received image and the identification of the camera to the server. After the server receives the image, the identification of the camera can be stored corresponding to the received image. The server may recognize the received images and recognize behavior information of the user among the continuously photographed images. After recognizing that someone performs the second type of behavior (the second type of behavior may be to dump garbage in a public area, paint walls of corridors in the public area, etc.), the face performing the second type of behavior may be further recognized. And when the face is detected, comparing the face with face images in a stored user face library, and if the face images in the user face library are compared, determining a target room corresponding to the detected face based on the corresponding relation between each face image in the user face library and the room.
Or after the camera shoots the image, the image can be identified, if the camera is an intelligent camera, that is, the user in the image and the behavior information of the user can be identified, the face of the user can be compared with the stored face image of the user face library, the number of the user to which the face in the image belongs is determined, and the target room corresponding to the face in the image is determined by using the number. And then sending the behavior information of the user and the number of the target room corresponding to the face to the connected gateway equipment. After receiving the information, the gateway device may send the received behavior information of the user and the number of the target room to which the user belongs to the server. After receiving the number, the server may store the number of the target room in correspondence with the behavior information of the user.
In addition, even if the camera is a smart camera, in order that the server can store the image taken by the camera, the camera may transmit the taken image to the gateway device, and transmit the image to the server via the gateway device for storage.
Step 402, if the behavior information is determined to meet the constraint condition according to the behavior information, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode.
In implementation, after the server acquires the behavior information of the user in the target room, it may be determined whether the behavior information of the user satisfies the constraint condition, and if the behavior information of the user satisfies the constraint condition, the server may acquire a corresponding relationship between the stored behavior information and the constraint mode, and determine a target constraint mode corresponding to the behavior information of the user.
Optionally, there are various ways to determine whether the behavior information of the user satisfies the constraint condition, and several possible ways are given below:
the first method is as follows: and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets the constraint condition.
Wherein the first type of behavior includes the presence of smoke in the target room, the volume of the target room exceeding a target decibel, and the like.
In implementation, after the server acquires the behavior information of the user, if the behavior information is that the user performs a first type of behavior in the target room, it may be determined that the behavior information of the user satisfies the constraint condition.
The second method comprises the following steps: and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
In implementation, after the server acquires the behavior information, if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, it may be determined that the behavior information satisfies the constraint condition.
It should be noted that the second category of actions may include dumping rubbish in the public area, painting walls of corridors in the public area, smoking in the public area, and the like.
The third method comprises the following steps: and if the behavior information is that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets the constraint condition.
In practice, it is possible for certain types of rooms to be uniformly assigned to certain persons, for the persons to use exclusively, and not to be rented to others, or not to be inhabited for a long time.
After the intelligent lock is successfully unlocked every time, an unlocking notification is sent to the server, the unlocking time is carried, the server can count the unlocking time interval between the current time point and the last unlocking time, whether the time interval is greater than a first time length or not is judged, if the time interval is greater than the first time length, it can be determined that the target room is not occupied by people in the target time length, and it can be determined that the behavior information meets the constraint condition.
Optionally, as shown in table one, the corresponding relationship between the behavior information and the constraint mode may be as follows:
watch 1
Figure BDA0002053064920000091
Figure BDA0002053064920000101
Optionally, in order to better constrain the behavior of the user, the following process may be performed:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets the constraint condition; and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
In implementation, the server may count the number of times that the behavior information of the user satisfies the constraint condition, and then determine a target trigger level corresponding to the behavior information of the user according to a corresponding relationship between the number range and the trigger level.
And then acquiring the corresponding relation among the stored behavior information, the trigger level and the constraint mode, and searching a target constraint mode corresponding to the behavior information of the user and the target trigger level together in the corresponding relation. For example, the behavior information of the user is: throwing garbage in the public area by 50 points at 13 days 2019.1.20, throwing garbage in the public area by 50 points at 8 days 2019.1.21 by the user, so that the times that the behavior information of the user meets the constraint condition is 2, the trigger level is high, the user behavior information is used for throwing garbage in the public area, and the target constraint mode is determined
In this way, the user experience can be better in consideration of the number of times that the behavior information of the user satisfies the constraint condition. For example, when the user throws garbage in a public area for the first time, the trigger level is low, the target constraint mode is voice prompt, when the user throws garbage in the public area for the second time, the unlocking can be delayed and the voice prompt is performed with the trigger level being medium, and when the number of throwing garbage in the public area exceeds a certain number, the trigger level is high, the user can directly prompt that the unlocking cannot be performed, and please contact a manager.
In addition, if the behavior information of the user does not satisfy the constraint condition, the constraint processing is not performed.
Step 403, sending a constraint instruction to the intelligent lock of the door of the target room.
In implementation, after the server determines the target constraint mode corresponding to the behavior information of the user, the server may determine the number of the target room to which the user belongs, and then determine the number of the smart lock of the target room by using the number. And after receiving the number, the gateway equipment determines that the number is sent to the intelligent lock, and can forward the constraint instruction to the intelligent lock.
After receiving the target constraint mode, the intelligent lock can determine the target constraint mode and execute the target constraint mode by using the number of the target constraint mode in the constraint instruction.
It should be noted that, the corresponding relationship between the constraint mode and the number may be stored in the intelligent lock, and the number of the constraint mode may be directly used subsequently to determine the constraint mode.
Optionally, in order to timely notify the user that the own behavior is to be restricted, the following processing may be performed:
and sending a target message to a related mobile terminal of the user or a login terminal of a registered account of the user, wherein the target message is used for indicating that the user has violation behaviors and a target constraint mode.
In implementation, after determining that the behavior information of the user meets the target constraint mode, the server may acquire an associated mobile terminal of the user, which may be a terminal to which a reserved mobile phone number belongs, and send a target message to the associated mobile terminal, or may acquire a registration account when the user registers an application program and send a target message to a login terminal of the registration account, where the target message is used to indicate an illegal behavior of the user and the target constraint mode executed by the smart lock.
Optionally, the target constraint mode may include delaying unlocking for a third time period when an unlocking instruction is detected within a second time period from when the intelligent lock receives the target constraint mode, and playing a voice prompt message.
In an implementation, the second time period and the third time period may be preset (the second time period may be counted in days, and the third time period may be counted in minutes), and stored in the server. The server can inform the intelligent lock of the constraint mode in advance, and the intelligent lock can store the constraint mode. When the constraint instruction is subsequently received, the target constraint mode corresponding to the constraint instruction can be determined.
When the intelligent lock detects a fingerprint unlocking instruction, the intelligent lock can be matched with the prestored fingerprint, if the fingerprint input by the current user is the same as the prestored fingerprint, unlocking is determined, but due to the existence of a target constraint mode, unlocking is delayed for a third time, and voice prompt information is played and used for indicating the reason of unsuccessful unlocking.
When the intelligent lock detects a card swiping unlocking instruction, the intelligent lock can be matched with a pre-stored chip identifier, if the currently detected chip identifier is the same as the pre-stored chip identifier, unlocking can be determined, but due to the existence of a target constraint mode, unlocking can be performed for a third time, and voice prompt information is played and used for indicating the reason of unsuccessful unlocking.
When the intelligent lock detects the input of the digital password, the intelligent lock can be matched with the prestored digital password, if the current input detected digital password is the same as the prestored digital password, unlocking can be determined, but the unlocking can be delayed for a third time period due to the existence of a target constraint mode, and voice prompt information is played and used for indicating the reason of unsuccessful unlocking.
For example, the third time period may be 5 minutes, and when the behavior information is to throw trash in the public area, the voice message may be "because you throw trash in the public area, this please wait five minutes for entering the room".
It should be noted that the behavior information is matched with the voice prompt information, and the voice prompt information is used for prompting the reason for executing the target constraint mode.
In addition, in the embodiment of the present disclosure, as shown in table two, when the behavior information of the user satisfies the constraint condition, the server may record the corresponding relationship between the behavior information of the user, the room number of the user, the occurrence time, and the constraint mode. Thus, the management of the server can be facilitated. For example, the behavior information is that smoke exists, the room number is 601, the occurrence time is 2019.3.18 days 17 hours 50 minutes, the constraint mode is that the intelligent lock delays unlocking for a third time period and sends voice prompt information when detecting an unlocking instruction within a second time period after receiving the constraint mode sent by the server.
Watch two
Figure BDA0002053064920000121
In the embodiment of the disclosure, the server may obtain behavior information of a user in a target room, may determine whether the behavior information satisfies a constraint condition, and if it is determined that the behavior information satisfies the constraint condition according to the behavior information, determine a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode, and then send a constraint instruction to the smart lock in the target room, where the constraint instruction is used to instruct the smart lock to execute the target constraint mode. In this way, the constraint mode corresponding to the user can be determined based on the behavior information of the user, and each room is managed based on the constraint mode, so that the method for managing the rooms is provided.
Based on the same technical concept, the embodiment of the present disclosure also provides an apparatus for managing a room, as shown in fig. 7, the apparatus including:
an obtaining module 710, configured to obtain behavior information of a user to which a target room belongs;
a determining module 720, configured to determine, if it is determined that the behavior information satisfies a constraint condition according to the behavior information, a target constraint mode corresponding to the behavior information of the user according to a correspondence between the behavior information and the constraint mode;
a sending module 730, configured to send a constraint instruction to the smart lock in the target room, where the constraint instruction is used to instruct the smart lock to execute the target constraint mode.
Optionally, the sending module 730 is further configured to:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
Optionally, the obtaining module 710 is configured to:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
Optionally, the determining module 720 is configured to:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
Optionally, the obtaining module 710 is configured to:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
Optionally, the obtaining module 710 is configured to:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
Optionally, the obtaining module 710 is configured to:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
Optionally, the determining module 720 is configured to:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
In the embodiment of the disclosure, the server may obtain behavior information of a user to which the target room belongs, may determine whether the behavior information satisfies the constraint condition, and if it is determined that the behavior information satisfies the constraint condition according to the behavior information, determine a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode, and then send a constraint instruction to the intelligent lock of the target room, where the constraint instruction is used to instruct the intelligent lock to execute the target constraint mode. In this way, the constraint mode corresponding to the user can be determined based on the behavior information of the user, and each room is managed based on the constraint mode, so that the method for managing the rooms is provided.
It should be noted that: in the above embodiment, when the device for managing a room manages a room, only the division of the functional modules is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. In addition, the device for managing a room and the method for managing a room provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 8 is a schematic structural diagram of a server according to an embodiment of the present invention, where the server 800 may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 801 and one or more memories 802, where the memory 802 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 801 to implement the method steps for determining a management room.
The embodiment of the present disclosure further provides a server, which includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for managing a room as described above.
The disclosed embodiments also provide a computer-readable storage medium having at least one instruction stored therein, the instruction being loaded and executed by a processor to implement the method for managing a room as described above.
An embodiment of the present disclosure further provides an intelligent room management system, including:
the sensor is used for acquiring behavior information of a user in a target room or a public area to which the target room belongs;
the server is used for configuring and storing the corresponding relation between behavior information and a constraint mode in advance, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode;
and the intelligent lock is used for executing a target constraint mode according to the received constraint instruction sent by the server.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (10)

1. A method of managing a room, the method comprising:
acquiring behavior information of a user to which a target room belongs;
if the behavior information meets the constraint condition according to the behavior information, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode;
and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for instructing the intelligent lock to execute the target constraint mode.
2. The method of claim 1, further comprising:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
3. The method according to claim 1 or 2, wherein the obtaining of the behavior information of the user to which the target room belongs comprises:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
4. The method of claim 3, wherein the determining that the behavior information satisfies a constraint condition according to the behavior information comprises:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
5. The method according to claim 1 or 2, wherein the obtaining of the behavior information of the user to which the target room belongs comprises:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
6. The method of claim 5, wherein the determining that the behavior information satisfies a constraint condition according to the behavior information comprises:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
7. The method according to claim 1 or 2, wherein the determining that the behavior information satisfies a constraint condition according to the behavior information comprises:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
8. The method according to claim 1 or 2, wherein the determining the target constraint mode corresponding to the behavior information of the user according to the corresponding relationship between the behavior information and the constraint mode comprises:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
9. The method according to claim 1, wherein the target constraint mode comprises delaying unlocking for a third time period and playing a voice prompt message when an unlocking instruction is detected within a second time period from when the intelligent lock receives the target constraint mode.
10. An intelligent room management system, the system comprising:
the sensor is used for acquiring behavior information of a user in a target room or a public area to which the target room belongs;
the server is used for configuring and storing the corresponding relation between behavior information and a constraint mode in advance, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode;
and the intelligent lock is used for executing a target constraint mode according to the received constraint instruction sent by the server.
CN201910380018.1A 2019-05-08 2019-05-08 Method and system for managing room based on linkage of sensor and intelligent lock Active CN112002036B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910380018.1A CN112002036B (en) 2019-05-08 2019-05-08 Method and system for managing room based on linkage of sensor and intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910380018.1A CN112002036B (en) 2019-05-08 2019-05-08 Method and system for managing room based on linkage of sensor and intelligent lock

Publications (2)

Publication Number Publication Date
CN112002036A true CN112002036A (en) 2020-11-27
CN112002036B CN112002036B (en) 2022-12-02

Family

ID=73461204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910380018.1A Active CN112002036B (en) 2019-05-08 2019-05-08 Method and system for managing room based on linkage of sensor and intelligent lock

Country Status (1)

Country Link
CN (1) CN112002036B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6745168B1 (en) * 1998-01-28 2004-06-01 Fujitsu Limited Intention achievement information processing apparatus
CN101344980A (en) * 2008-08-21 2009-01-14 中国工商银行股份有限公司 Safety detection system and method for ATM equipment
EP2290628A1 (en) * 2009-08-25 2011-03-02 Aldi Einkauf GmbH & Co. oHG Method for video monitoring areas
CN103101534A (en) * 2011-11-11 2013-05-15 沃尔沃汽车公司 Vehicle safety system and method
CN103899156A (en) * 2014-04-09 2014-07-02 东莞安尔发智能科技股份有限公司 Door lock extensive application implementation method and door lock extensive application implementation system
CN105046966A (en) * 2015-05-08 2015-11-11 天津大学 System and method for automatically detecting illegal parking behaviors in drop-off areas
CN105184912A (en) * 2015-07-15 2015-12-23 深圳市物联锁科技有限公司 Intelligent lock monitoring system based on Internet of Things and intelligent lock
CN107391995A (en) * 2017-07-31 2017-11-24 北京小米移动软件有限公司 Unlock operation processing method and device
CN107561229A (en) * 2017-10-25 2018-01-09 智能(厦门)传感器有限公司 A kind of intelligent smoking detection alarm detecting system and detection method
CN107742336A (en) * 2017-09-19 2018-02-27 深圳市几米软件有限公司 A kind of data transmission method and terminal device for being used to share bicycle smart lock
CN107808437A (en) * 2017-11-27 2018-03-16 上海正之智能科技有限公司 Smart lock and the house lease management system including the smart lock
CN108154418A (en) * 2017-12-22 2018-06-12 刘志东 A kind of self-service system of renting a house
CN108447158A (en) * 2018-03-27 2018-08-24 杭州睿沃科技有限公司 Dorm management system and its method
CN207909218U (en) * 2018-02-05 2018-09-25 指链智能信息科技(深圳)有限公司 A kind of intelligent management system rented a house for public affairs
CN109063874A (en) * 2018-08-03 2018-12-21 合肥德高信息科技有限公司 A kind of Hospitality management system
CN109413369A (en) * 2017-08-17 2019-03-01 孟思宏 A kind of monitor video intellectual analysis early warning platform
CN109525391A (en) * 2018-10-14 2019-03-26 浙江鸿利锁业有限公司 A kind of method that server is synchronous with lockset information security
CN109714639A (en) * 2018-12-28 2019-05-03 广州华多网络科技有限公司 Violation processing method, device, server and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6745168B1 (en) * 1998-01-28 2004-06-01 Fujitsu Limited Intention achievement information processing apparatus
CN101344980A (en) * 2008-08-21 2009-01-14 中国工商银行股份有限公司 Safety detection system and method for ATM equipment
EP2290628A1 (en) * 2009-08-25 2011-03-02 Aldi Einkauf GmbH & Co. oHG Method for video monitoring areas
CN103101534A (en) * 2011-11-11 2013-05-15 沃尔沃汽车公司 Vehicle safety system and method
CN103899156A (en) * 2014-04-09 2014-07-02 东莞安尔发智能科技股份有限公司 Door lock extensive application implementation method and door lock extensive application implementation system
CN105046966A (en) * 2015-05-08 2015-11-11 天津大学 System and method for automatically detecting illegal parking behaviors in drop-off areas
CN105184912A (en) * 2015-07-15 2015-12-23 深圳市物联锁科技有限公司 Intelligent lock monitoring system based on Internet of Things and intelligent lock
CN107391995A (en) * 2017-07-31 2017-11-24 北京小米移动软件有限公司 Unlock operation processing method and device
CN109413369A (en) * 2017-08-17 2019-03-01 孟思宏 A kind of monitor video intellectual analysis early warning platform
CN107742336A (en) * 2017-09-19 2018-02-27 深圳市几米软件有限公司 A kind of data transmission method and terminal device for being used to share bicycle smart lock
CN107561229A (en) * 2017-10-25 2018-01-09 智能(厦门)传感器有限公司 A kind of intelligent smoking detection alarm detecting system and detection method
CN107808437A (en) * 2017-11-27 2018-03-16 上海正之智能科技有限公司 Smart lock and the house lease management system including the smart lock
CN108154418A (en) * 2017-12-22 2018-06-12 刘志东 A kind of self-service system of renting a house
CN207909218U (en) * 2018-02-05 2018-09-25 指链智能信息科技(深圳)有限公司 A kind of intelligent management system rented a house for public affairs
CN108447158A (en) * 2018-03-27 2018-08-24 杭州睿沃科技有限公司 Dorm management system and its method
CN109063874A (en) * 2018-08-03 2018-12-21 合肥德高信息科技有限公司 A kind of Hospitality management system
CN109525391A (en) * 2018-10-14 2019-03-26 浙江鸿利锁业有限公司 A kind of method that server is synchronous with lockset information security
CN109714639A (en) * 2018-12-28 2019-05-03 广州华多网络科技有限公司 Violation processing method, device, server and storage medium

Also Published As

Publication number Publication date
CN112002036B (en) 2022-12-02

Similar Documents

Publication Publication Date Title
CN104966344B (en) A kind of security access control system based on video
CN109243026B (en) Visitor management method and system
US10909792B2 (en) Scalable systems and methods for monitoring and concierge service
CN104021362B (en) Gate inhibition's early warning system based on image dynamic object recognition and pre-warning and control method
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
CN106157505A (en) One is illegally entered the room alarm method and device
CN104967825A (en) Gatekeeper electronic dog system
CN102176746A (en) Intelligent monitoring system used for safe access of local cell region and realization method thereof
CN108174142A (en) A kind of long-range control locking method locked based on intelligent doorbell and intelligent cloud, system
CN108600202A (en) A kind of information processing method and device, computer readable storage medium
CN110390785A (en) A kind of smart home security inter-linked controlling method, device, medium and terminal device
CN103354006A (en) Networking alarm service system and hardware equipment arrangement method thereof
CN101826226A (en) Intelligent entrance guard control method and device
CN112927408A (en) Visitor visiting processing method and device
CN111724514A (en) Cloud access control system based on AI intelligent sound box application and implementation method
CN107131607A (en) Monitoring method, device, system and air-conditioning based on air-conditioning
CN113160472A (en) Intelligent management method, device, system, equipment and medium for community access control
CN114338585A (en) Message pushing method and device, storage medium and electronic device
CN110021091B (en) Access control system control method, access control system and access control and video monitoring linkage system
CN206656471U (en) Air-conditioning and the monitoring system based on air-conditioning
CN112002036B (en) Method and system for managing room based on linkage of sensor and intelligent lock
CN111915765A (en) Personnel safety monitoring method and system based on intelligent lock and sensor linkage
CN115065812B (en) Real-time monitoring method based on user behavior and related equipment
CN115661994A (en) UWB technology-based access control method and device and terminal equipment
CN105264483A (en) Web portal for managing premise security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant