CN112002036B - Method and system for managing room based on linkage of sensor and intelligent lock - Google Patents
Method and system for managing room based on linkage of sensor and intelligent lock Download PDFInfo
- Publication number
- CN112002036B CN112002036B CN201910380018.1A CN201910380018A CN112002036B CN 112002036 B CN112002036 B CN 112002036B CN 201910380018 A CN201910380018 A CN 201910380018A CN 112002036 B CN112002036 B CN 112002036B
- Authority
- CN
- China
- Prior art keywords
- behavior information
- target
- user
- constraint
- room
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000001514 detection method Methods 0.000 claims description 23
- 239000000779 smoke Substances 0.000 claims description 14
- 230000006399 behavior Effects 0.000 description 171
- 238000007726 management method Methods 0.000 description 18
- 239000010813 municipal solid waste Substances 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 230000015654 memory Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 6
- 230000000391 smoking effect Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 4
- 230000003111 delayed effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000003973 paint Substances 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
Abstract
The disclosure provides a method and a system for managing rooms based on linkage of a sensor and an intelligent lock, and belongs to the technical field of computers. The method comprises the following steps: the server can obtain behavior information of a user to which the target room belongs, can judge whether the behavior information meets constraint conditions, if the behavior information meets the constraint conditions according to the behavior information, determines a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and then sends a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode. By adopting the method and the system, a method for managing the room based on linkage of the sensor and the intelligent lock is provided.
Description
Technical Field
The disclosure relates to the technical field of computers, in particular to a room management method and system based on linkage of a sensor and an intelligent lock.
Background
At present, house renting is a common thing, house owners can rent own houses to tenants, and after the houses are rented to the tenants, how to manage the houses is a very difficult thing. Particularly, in the actual management of large-scale low-priced rented houses or public rented houses, the situation that a user violates a management rule, for example, public property is not kept bad, a fire is caused repeatedly by using a high-power electric appliance by an individual user, and the like is often encountered, and a manager lacks an effective technical management or constraint means to constrain the non-compliance behavior of the tenant, can only rely on artificial propaganda education and warning, and cannot effectively eliminate potential safety hazards in a management space. Therefore, it is urgently needed to provide a method and a system for managing rooms, which can reduce the management cost of a manager, improve the management efficiency and the safety of the managed rooms.
Disclosure of Invention
In order to solve the problems in the prior art, the embodiments of the present disclosure provide a method and system for managing a room based on linkage of a sensor and an intelligent lock. The technical scheme is as follows:
in a first aspect, a method of managing a room is provided, the method comprising:
acquiring behavior information of a user to which a target room belongs;
if the behavior information is determined to meet the constraint condition according to the behavior information, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode;
and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for instructing the intelligent lock to execute the target constraint mode.
Optionally, the method further includes:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
In this way, the user of the target room can be notified in a timely manner.
Optionally, the acquiring the behavior information of the user in the target room includes:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
Optionally, the determining, according to the behavior information, that the behavior information satisfies a constraint condition includes:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
Optionally, the acquiring the behavior information of the user in the target room includes:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
Optionally, the determining, according to the behavior information, that the behavior information satisfies a constraint condition includes:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
Optionally, the determining, according to the behavior information, that the behavior information satisfies a constraint condition includes:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
Optionally, the determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relationship between the behavior information and the constraint mode includes:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
Optionally, the target constraint mode includes delaying unlocking for a third time period when an unlocking instruction is detected within a second time period when the intelligent lock receives the start of the target constraint mode, and playing a voice prompt message.
In a second aspect, an intelligent room management system based on sensor and intelligent lock linkage is provided, the system comprising:
the sensor is used for acquiring behavior information of a user in a target room or a public area to which the target room belongs;
the server is used for configuring and storing the corresponding relation between behavior information and a constraint mode in advance, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode;
and the intelligent lock is used for executing a target constraint mode according to the received constraint instruction sent by the server.
In a third aspect, there is provided an apparatus for managing a room, the apparatus comprising:
the acquisition module is used for acquiring behavior information of a user to which the target room belongs;
the determining module is used for determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode if the behavior information meets the constraint condition according to the behavior information;
and the sending module is used for sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode.
Optionally, the sending module is further configured to:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
Optionally, the obtaining module is configured to:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
Optionally, the determining module is configured to:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
Optionally, the obtaining module is configured to:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
Optionally, the determining module is configured to:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
Optionally, the determining module is configured to:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
Optionally, the determining module is configured to:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
Optionally, the target constraint mode includes delaying unlocking for a third time period when an unlocking instruction is detected within a second time period when the intelligent lock receives the start of the target constraint mode, and playing a voice prompt message.
In a fourth aspect, there is provided a server comprising a processor and a memory, the memory having stored therein at least one instruction, the instruction being loaded and executed by the processor to implement the method of managing a room as described in the first aspect above.
In a fifth aspect, there is provided a computer readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to implement the method of managing a room as described in the first aspect above.
The beneficial effects brought by the technical scheme provided by the embodiment of the disclosure at least comprise:
in the embodiment of the disclosure, the server may obtain behavior information of a user to which the target room belongs, may determine whether the behavior information satisfies the constraint condition, and if it is determined that the behavior information satisfies the constraint condition according to the behavior information, determine a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode, and then send a constraint instruction to the intelligent lock of the target room, where the constraint instruction is used to instruct the intelligent lock to execute the target constraint mode. In this way, the constraint mode corresponding to the user can be determined based on the behavior information of the user, and each room is managed based on the constraint mode, so that the method for managing the rooms is provided. In addition, because a large amount of manpower is not needed to be configured to manage the rooms, the management cost of a manager can be reduced, and the rooms are managed intelligently, so that the management efficiency and the safety of the managed rooms can be improved.
Drawings
FIG. 1 is a diagram of a system for managing a room provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of an intelligent lock provided by an embodiment of the present disclosure;
FIG. 3 is a flowchart of sending an unlock password provided by an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart diagram of one way of managing a room provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of a room with sensors provided by an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of a common area setup camera provided by an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of an apparatus for managing a room according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
The embodiment of the disclosure provides a room management method based on linkage of a sensor and an intelligent lock, an execution main body of the method can be a server, the server can be a background server of an application program for managing a room, the server can be provided with a processor, a memory, a transceiver and the like, the processor can be used for processing in a room management process, the memory can be used for storing data required in the room management process and data generated in the room management process, and the transceiver can be used for receiving and sending the data.
Before implementation, an application scenario of the embodiment of the present disclosure is first introduced:
as shown in fig. 1, the server is connected to a terminal of a manager and connected to a plurality of gateway devices (which may also be referred to as network boxes), each gateway device is connected to a plurality of intelligent locks, and a door of each room is configured with one intelligent lock. For the intelligent lock in any room, a user in the room to which the intelligent lock belongs sets an opening password (the opening password comprises a fingerprint, a digital password and the like) of the intelligent lock on a terminal of a manager, the terminal of the manager sends the opening password of the intelligent lock and the number of the intelligent lock to a server, the server can use the number of the intelligent lock, the gateway equipment to which the intelligent lock is connected is found in the corresponding relation between the number of the intelligent lock and the gateway equipment, and then the number of the intelligent lock and the opening password of the intelligent lock are sent to the gateway equipment. After the gateway equipment receives the intelligent lock, the serial number of the intelligent lock can be used for determining the intelligent lock to which the opening password of the intelligent lock belongs, and then the opening password of the intelligent lock is sent to the determined intelligent lock.
As shown in fig. 2, the intelligent lock includes a front panel and a rear panel, after the rear panel of the intelligent lock receives the opening password sent by the gateway device, a main control MCU (Microcontroller Unit) of the rear panel can send the opening password to the front panel through a Serial port, after the front panel receives the opening password, the front panel can send the opening password to a storage area through a Serial Peripheral Interface (SPI), and send the data of the fingerprint to the fingerprint module through a Universal Asynchronous Receiver/Transmitter (URAT), and the fingerprint module stores the data of the fingerprint.
The follow-up user can open the door of room with opening the password, in addition, the mode of opening the door can also have the mode of punching a door card, face identification mode etc..
The server and the gateway device communicate with each other via ethernet, and the gateway device and the smart lock communicate with each other via Sub1g (Sub 1g is also called wireless 433, and the frequency is about 433MHz wireless communication technology). The back panel of intelligence lock is located the back of intelligence lock, the back of door in the room promptly, and the front panel of intelligence lock is located the front of intelligence lock, the front of door in the room promptly. The front panel of intelligence lock can be provided with input panel for input password, and can also be provided with the camera, be used for carrying out face identification, can also be provided with the card inductor, be used for detecting the door card.
It should be noted that, besides the verification of the door opening right, any other operation related to the user data is not supported locally by the intelligent lock, so that it can be ensured that the intelligent lock can be configured only by a manager, and the security can be improved.
In addition, as shown in fig. 3, the embodiment of the present disclosure further provides a communication flow diagram of the server issuing an opening password (which may be referred to as user data) of the smart lock to the smart lock.
Step 301, the server sends user data to the gateway device.
Step 302, the gateway device compresses the user data, and sends the user data to the back panel of the intelligent lock in packets.
Step 303, the back panel of the intelligent lock sends response information to the gateway device.
Step 304, the back panel of the smart lock sends the user data to the front panel of the smart lock.
Step 305, the front panel of the intelligent lock sends a response message to the rear panel of the intelligent lock.
In step 306, the front panel of the smart lock processes the user data (stores the user data in a storage area, etc.).
The embodiment of the present disclosure provides a method for managing a room based on linkage of a sensor and an intelligent lock, as shown in fig. 4, a processing flow of the method may be as follows:
Wherein, the target room is any room managed by the server configuration.
In implementation, the server may receive the behavior information of the user through the gateway device, or determine the behavior information of the user in the target room by receiving the content sent by the gateway device. The behavior information of the user of the target room may be acquired by:
the first method is as follows: the intelligent lock of the target room is opened by opening the password every time, the intelligent lock sends an unlocking message to the gateway device, the unlocking message comprises opening time, the number of the password used for opening the intelligent lock (the number is used for indicating an unlocking mode, and whether a door card is swiped or a digital password is input, and the like), and the server records behavior information of the user as entering the target room at the opening time after receiving the information.
The second method comprises the following steps: and acquiring the behavior information of the target user according to the detection result sent by the sensor arranged in the target room or the public area to which the target room belongs.
In an implementation, as shown in fig. 5, the target room is provided with at least one sensor, which may include a smoke sensor, a noise sensor, etc., the smoke sensor may be used to detect whether smoke is present in the target room in real time, the noise sensor may be used to detect whether the decibels of the loud sound in the target room exceed a target value in real time, etc. The at least one sensor establishes connection with the gateway device, and when the at least one sensor detects a user behavior meeting a reporting condition, the at least one sensor transmits a detection result and a number of the sensor to the server (here, the sensor may transmit the detection result and the number of the sensor to the gateway device, and the gateway device transmits the detection result and the number of the sensor to the server).
The server may receive the detection result and the number of the sensor, and may then use the detection result to determine the behavior information of the user. For example, if the value detected by the smoke sensor in the room is greater than the preset value, the behavior information of the user is that the user is smoking smoke, or burning objects, etc. Then, the number of the sensor is used to determine the room corresponding to the number, and the behavior information of the user is stored corresponding to the number of the room.
It should be noted that, corresponding to the reporting condition of the smoke sensor, the value detected by the smoke sensor in the room may be greater than a preset value. The reporting condition corresponding to the noise sensor may be that decibels of sounds detected by the noise sensor in the room exceed a target value.
In addition, a sensor may also be provided in the public area to which the target room belongs, and the provided sensor may be a smoke sensor, a noise sensor, or the like, and may be used to detect behavior information of a user in the public area. For example, the value detected by the smoke sensor in the public area is greater than a preset value, which indicates that a person is suspected to be smoking, and the detection result can be sent to the server and the detection time point can be sent. The server can acquire image information shot by the camera in the area where the smoke sensor is located at the detection time point, identify the image, determine whether the user belonging to the target room performs smoking, and determine that the behavior information of the user is smoking in a public area if the user belonging to the target room performs smoking.
And thirdly, acquiring behavior information of the target user according to image information sent by a camera arranged in the public area where the target room belongs.
Wherein the public area comprises the outside of the target room and is located on a necessary path when entering the target room. For example, the common area is the area from the door of the target room to the elevator, i.e. the stairwell, the corridor and the doorway of the unit to which the target room belongs, etc.
In practice, as shown in fig. 6, a camera is provided in the common area to which the target room belongs, and the camera can capture images within the range of view angles.
The camera can send the image shot by the camera to the connected gateway equipment according to a target period (which can be set to 1 hour and the like), and simultaneously send the identification of the camera, and after the gateway equipment receives the image and the identification of the camera, the gateway equipment can send the received image and the identification of the camera to the server. After the server receives the image, the identification of the camera can be stored corresponding to the received image. The server may recognize the received images and recognize behavior information of the user among the continuously photographed images. After recognizing that someone performs the second type of behavior (the second type of behavior may be to dump garbage in a public area, paint walls of corridors in the public area, etc.), the face performing the second type of behavior may be further recognized. And when the face is detected, comparing the face with face images in a stored user face library, and if the face images in the user face library are compared, determining a target room corresponding to the detected face based on the corresponding relation between each face image in the user face library and the room.
Or after the camera shoots the image, the image can be identified, if the camera is an intelligent camera, that is, the user in the image and the behavior information of the user can be identified, the face of the user can be compared with the stored face image of the user face library, the number of the user to which the face in the image belongs is determined, and the target room corresponding to the face in the image is determined by using the number. And then sending the behavior information of the user and the number of the target room corresponding to the face to the connected gateway equipment. After receiving the information, the gateway device may send the received behavior information of the user and the number of the target room to which the user belongs to the server. After receiving the number, the server may store the number of the target room in correspondence with the behavior information of the user.
In addition, even if the camera is a smart camera, in order that the server can store the image taken by the camera, the camera may transmit the taken image to the gateway device, and transmit it to the server via the gateway device for storage.
In implementation, after the server acquires the behavior information of the user in the target room, it may be determined whether the behavior information of the user satisfies the constraint condition, and if the behavior information of the user satisfies the constraint condition, the server may acquire a corresponding relationship between the stored behavior information and the constraint mode, and determine a target constraint mode corresponding to the behavior information of the user.
Optionally, there are various ways to determine whether the behavior information of the user satisfies the constraint condition, and several possible ways are given below:
the method I comprises the following steps: and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets the constraint condition.
Wherein the first type of behavior includes the presence of smoke in the target room, the volume of the target room exceeding a target decibel, and the like.
In implementation, after the server acquires the behavior information of the user, if the behavior information is that the user performs a first type of behavior in the target room, it may be determined that the behavior information of the user satisfies the constraint condition.
The second method comprises the following steps: and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
In implementation, after the server acquires the behavior information, if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, it may be determined that the behavior information satisfies the constraint condition.
It should be noted that the second category of actions may include dumping rubbish in the public area, painting walls of corridors in the public area, smoking in the public area, and the like.
The third method comprises the following steps: and if the behavior information is that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets the constraint condition.
In practice, it is possible for certain types of rooms to be uniformly assigned to certain persons, for the persons to use exclusively, and not to be rented to others, or not to be inhabited for a long time.
After the intelligent lock is successfully unlocked each time, an unlocking notice is sent to the server, the unlocking time is carried, the server can count the unlocking time interval between the current time point and the last unlocking time, then whether the time interval is longer than a first time length or not is judged, if the time interval is longer than the first time length, it can be determined that a target room is not occupied in the target time length, and it can be determined that the behavior information meets the constraint condition.
Optionally, as shown in table one, the corresponding relationship between the behavior information and the constraint mode may be as follows:
watch 1
Optionally, in order to better constrain the behavior of the user, the following process may be performed:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets the constraint condition; and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
In implementation, the server may count the number of times that the behavior information of the user satisfies the constraint condition, and then determine a target trigger level corresponding to the behavior information of the user according to a corresponding relationship between the number range and the trigger level.
And then acquiring the corresponding relation among the stored behavior information, the trigger level and the constraint mode, and searching a target constraint mode corresponding to the behavior information of the user and the target trigger level together in the corresponding relation. For example, the behavior information of the user is: throwing garbage in the public area 50 times at 2019.1.20 date 13, throwing garbage in the public area 50 times at 2019.1.21 date 8, so that the number of times that the behavior information of the user meets the constraint condition is 2, the trigger level is high, the user behavior information is used for throwing garbage in the public area, and the target constraint mode is determined
In this way, the user experience can be better in consideration of the number of times that the behavior information of the user satisfies the constraint condition. For example, when the user throws garbage in a public area for the first time, the trigger level is low, the target constraint mode is voice prompt, when the user throws garbage in the public area for the second time, the unlocking can be delayed and the voice prompt is performed with the trigger level being medium, and when the number of throwing garbage in the public area exceeds a certain number, the trigger level is high, the user can directly prompt that the unlocking cannot be performed, and please contact a manager.
In addition, if the behavior information of the user does not satisfy the constraint condition, the constraint processing is not performed.
In implementation, after the server determines the target constraint mode corresponding to the behavior information of the user, the server may determine the number of the target room to which the user belongs, and then determine the number of the smart lock of the target room by using the number. And after receiving the number, the gateway equipment determines that the number is sent to the intelligent lock, and can forward the constraint instruction to the intelligent lock.
After receiving the target constraint mode, the intelligent lock can determine the target constraint mode and execute the target constraint mode by using the number of the target constraint mode in the constraint instruction.
It should be noted that, the corresponding relationship between the constraint mode and the number may be stored in the intelligent lock, and the number of the constraint mode may be directly used subsequently to determine the constraint mode.
Optionally, in order to timely notify the user that the own behavior is to be restricted, the following processing may be performed:
and sending a target message to a relevant mobile terminal of the user or a login terminal of a registered account of the user, wherein the target message is used for indicating that the user has an illegal behavior and a target constraint mode.
In implementation, after determining that the behavior information of the user meets the target constraint mode, the server may acquire an associated mobile terminal of the user, which may be a terminal to which a reserved mobile phone number belongs, and send a target message to the associated mobile terminal, or may acquire a registration account when the user registers an application program and send a target message to a login terminal of the registration account, where the target message is used to indicate an illegal behavior of the user and the target constraint mode executed by the smart lock.
Optionally, the target constraint mode may include delaying unlocking for a third time period when an unlocking instruction is detected within a second time period from when the intelligent lock receives the target constraint mode, and playing a voice prompt message.
In an implementation, the second time period and the third time period may be preset (the second time period may be counted in days, and the third time period may be counted in minutes), and stored in the server. The server can inform the intelligent lock of the constraint mode in advance, and the intelligent lock can store the constraint mode. When the constraint instruction is subsequently received, the target constraint mode corresponding to the constraint instruction can be determined.
When the intelligent lock detects a fingerprint unlocking instruction, the intelligent lock can be matched with the prestored fingerprint, if the fingerprint input by the current user is the same as the prestored fingerprint, unlocking is determined, but due to the existence of a target constraint mode, unlocking is delayed for a third time, and voice prompt information is played and used for indicating the reason of unsuccessful unlocking.
When the intelligent lock detects a card swiping unlocking instruction, the intelligent lock can be matched with a pre-stored chip identifier, if the currently detected chip identifier is the same as the pre-stored chip identifier, unlocking can be determined, but due to the existence of a target constraint mode, unlocking can be performed for a third time, and voice prompt information is played and used for indicating the reason of unsuccessful unlocking.
When the intelligent lock detects the input of the digital password, the intelligent lock can be matched with the prestored digital password, if the current input detected digital password is the same as the prestored digital password, unlocking can be determined, but the unlocking can be delayed for a third time period due to the existence of a target constraint mode, and voice prompt information is played and used for indicating the reason of unsuccessful unlocking.
For example, the third time period may be 5 minutes, and when the behavior information is to throw trash in the public area, the voice message may be "because you throw trash in the public area, this please wait five minutes for entering the room".
It should be noted that the behavior information is matched with the voice prompt information, and the voice prompt information is used for prompting the reason for executing the target constraint mode.
In addition, in the embodiment of the present disclosure, as shown in table two, when the behavior information of the user satisfies the constraint condition, the server may record the corresponding relationship between the behavior information of the user, the room number of the user, the occurrence time, and the constraint mode. In this way, server management can be facilitated. For example, the behavior information is that smoke exists, the room number is 601, the occurrence time is 2019.3.18 at 17 hours and 50 minutes, the constraint mode is that the intelligent lock delays unlocking for a third time length and sends voice prompt information when detecting an unlocking instruction within a second time length after receiving the constraint mode sent by the server.
Watch 2
In the embodiment of the disclosure, the server may obtain behavior information of a user in a target room, may determine whether the behavior information satisfies a constraint condition, and if it is determined that the behavior information satisfies the constraint condition according to the behavior information, determine a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode, and then send a constraint instruction to the smart lock in the target room, where the constraint instruction is used to instruct the smart lock to execute the target constraint mode. In this way, the constraint mode corresponding to the user can be determined based on the behavior information of the user, and each room is managed based on the constraint mode, so that the method for managing the rooms is provided.
Based on the same technical concept, the embodiment of the present disclosure also provides an apparatus for managing a room, as shown in fig. 7, the apparatus including:
an obtaining module 710, configured to obtain behavior information of a user to which a target room belongs;
a determining module 720, configured to determine, if it is determined that the behavior information satisfies a constraint condition according to the behavior information, a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode;
a sending module 730, configured to send a constraint instruction to the smart lock in the target room, where the constraint instruction is used to instruct the smart lock to execute the target constraint mode.
Optionally, the sending module 730 is further configured to:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
Optionally, the obtaining module 710 is configured to:
and acquiring the behavior information of the target user according to a detection result sent by a sensor arranged in the target room or a public area to which the target room belongs.
Optionally, the determining module 720 is configured to:
and if the behavior information is that the user performs the first type of behavior in the target room, determining that the behavior information meets a constraint condition.
Optionally, the obtaining module 710 is configured to:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
Optionally, the obtaining module 710 is configured to:
and if the behavior information is that the user performs the second type of behavior in the public area corresponding to the target room, determining that the behavior information meets the constraint condition.
Optionally, the obtaining module 710 is configured to:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
Optionally, the determining module 720 is configured to:
determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets constraint conditions;
and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode.
In the embodiment of the disclosure, the server may obtain behavior information of a user to which the target room belongs, may determine whether the behavior information satisfies the constraint condition, and if it is determined that the behavior information satisfies the constraint condition according to the behavior information, determine a target constraint mode corresponding to the behavior information of the user according to a corresponding relationship between the behavior information and the constraint mode, and then send a constraint instruction to the intelligent lock of the target room, where the constraint instruction is used to instruct the intelligent lock to execute the target constraint mode. In this way, the constraint mode corresponding to the user can be determined based on the behavior information of the user, and each room is managed based on the constraint mode, so that the method for managing the rooms is provided.
It should be noted that: in the above embodiment, when the device for managing a room manages a room, only the division of the functional modules is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. In addition, the device for managing a room and the method for managing a room provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 8 is a schematic structural diagram of a server according to an embodiment of the present invention, where the server 800 may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 801 and one or more memories 802, where at least one instruction is stored in the memory 802, and the at least one instruction is loaded and executed by the processor 801 to implement the method steps for determining a management room described above.
The embodiment of the present disclosure further provides a server, which includes a processor and a memory, where the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the method for managing a room as described above.
The disclosed embodiments also provide a computer-readable storage medium, in which at least one instruction is stored, and the instruction is loaded and executed by a processor to implement the room management method as described above.
An embodiment of the present disclosure further provides an intelligent room management system, including:
the sensor is used for acquiring behavior information of a user in a target room or a public area to which the target room belongs;
the server is used for configuring and storing the corresponding relation between behavior information and a constraint mode in advance, determining a target constraint mode corresponding to the behavior information of the user according to the corresponding relation between the behavior information and the constraint mode, and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for indicating the intelligent lock to execute the target constraint mode;
and the intelligent lock is used for executing a target constraint mode according to the received constraint instruction sent by the server.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
Claims (6)
1. A method of managing a room, the method comprising:
acquiring behavior information of a user to which a target room belongs, wherein the acquiring of the behavior information of the user to which the target room belongs comprises the following steps: acquiring behavior information of the user according to a detection result sent by a smoke sensor and/or a noise sensor arranged in the target room, or determining that the detection result sent by the sensor arranged in the public area is the behavior information of the user if the user is identified to be associated with the detection result sent by the sensor arranged in the public area in an image of the public area at a detection time point corresponding to the detection result sent by the sensor arranged in the public area to which the target room belongs;
if the behavior information of the user belongs to first-class behavior information of the user in the target room, or second-class behavior information of the user in a public area, determining that the behavior information of the user meets constraint conditions, determining a target trigger level corresponding to the behavior information according to the times that the behavior information meets the constraint conditions, and determining a target constraint mode corresponding to the behavior information of the user and the target trigger level together according to the corresponding relation among the behavior information, the trigger level and the constraint mode, wherein the public area is the public area to which the target room belongs;
and sending a constraint instruction to the intelligent lock of the target room, wherein the constraint instruction is used for instructing the intelligent lock to execute the target constraint mode.
2. The method of claim 1, further comprising:
and sending a target message to the associated mobile terminal of the user or the login terminal of the registered account of the user, wherein the target message is used for indicating the existing violation of the user and the target constraint mode executed by the intelligent lock.
3. The method according to claim 1 or 2, wherein the obtaining of the behavior information of the user to which the target room belongs comprises:
and acquiring the behavior information of the target user according to the image information sent by the camera arranged in the public area to which the target room belongs.
4. The method according to claim 1 or 2, wherein the determining that the behavior information satisfies a constraint condition according to the behavior information comprises:
and if the behavior information indicates that the intelligent lock is not unlocked within the first time length, determining that the behavior information meets constraint conditions.
5. The method according to claim 1, wherein the target constraint mode comprises delaying unlocking for a third time period and playing a voice prompt message when an unlocking instruction is detected within a second time period from when the intelligent lock receives the target constraint mode.
6. An intelligent room management system, the system comprising:
the sensor is used for sending a detection result to the server;
the server is used for acquiring behavior information of the user according to detection results sent by a smoke sensor and/or a noise sensor arranged in the target room;
or at a detection time point corresponding to a detection result sent by a sensor arranged in a public area to which the target room belongs, identifying that the user is related to the detection result sent by the sensor arranged in the public area in an image of the public area, and determining that the detection result sent by the sensor arranged in the public area is the behavior information of the user;
the server is further configured to pre-configure and store a corresponding relationship between behavior information and a constraint mode, determine a target trigger level corresponding to the behavior information according to the number of times that the behavior information meets a constraint condition if the behavior information of the user belongs to first-class behavior information of the user in the target room or belongs to second-class behavior information of the user in a public area, determine a target constraint mode corresponding to the behavior information and the target trigger level together according to the corresponding relationship between the behavior information, the trigger level and the constraint mode, and send a constraint instruction to the intelligent lock of the target room, where the constraint instruction is used to instruct the intelligent lock to execute the target constraint mode;
and the intelligent lock is used for executing a target constraint mode according to the received constraint instruction sent by the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910380018.1A CN112002036B (en) | 2019-05-08 | 2019-05-08 | Method and system for managing room based on linkage of sensor and intelligent lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910380018.1A CN112002036B (en) | 2019-05-08 | 2019-05-08 | Method and system for managing room based on linkage of sensor and intelligent lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112002036A CN112002036A (en) | 2020-11-27 |
CN112002036B true CN112002036B (en) | 2022-12-02 |
Family
ID=73461204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910380018.1A Active CN112002036B (en) | 2019-05-08 | 2019-05-08 | Method and system for managing room based on linkage of sensor and intelligent lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112002036B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6745168B1 (en) * | 1998-01-28 | 2004-06-01 | Fujitsu Limited | Intention achievement information processing apparatus |
CN101344980A (en) * | 2008-08-21 | 2009-01-14 | 中国工商银行股份有限公司 | Safety detection system and method for ATM equipment |
CN103899156A (en) * | 2014-04-09 | 2014-07-02 | 东莞安尔发智能科技股份有限公司 | Door lock extensive application implementation method and door lock extensive application implementation system |
CN105046966A (en) * | 2015-05-08 | 2015-11-11 | 天津大学 | System and method for automatically detecting illegal parking behaviors in drop-off areas |
CN105184912A (en) * | 2015-07-15 | 2015-12-23 | 深圳市物联锁科技有限公司 | Intelligent lock monitoring system based on Internet of Things and intelligent lock |
CN107391995A (en) * | 2017-07-31 | 2017-11-24 | 北京小米移动软件有限公司 | Unlock operation processing method and device |
CN107561229A (en) * | 2017-10-25 | 2018-01-09 | 智能(厦门)传感器有限公司 | A kind of intelligent smoking detection alarm detecting system and detection method |
CN107742336A (en) * | 2017-09-19 | 2018-02-27 | 深圳市几米软件有限公司 | A kind of data transmission method and terminal device for being used to share bicycle smart lock |
CN109063874A (en) * | 2018-08-03 | 2018-12-21 | 合肥德高信息科技有限公司 | A kind of Hospitality management system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2290628B1 (en) * | 2009-08-25 | 2017-03-08 | ALDI SÜD Dienstleistungs-GmbH & Co. oHG | Method for video monitoring areas |
EP2591966B1 (en) * | 2011-11-11 | 2019-02-27 | Volvo Car Corporation | Vehicle safety system comprising active and passive safety means |
CN109413369A (en) * | 2017-08-17 | 2019-03-01 | 孟思宏 | A kind of monitor video intellectual analysis early warning platform |
CN107808437A (en) * | 2017-11-27 | 2018-03-16 | 上海正之智能科技有限公司 | Smart lock and the house lease management system including the smart lock |
CN108154418A (en) * | 2017-12-22 | 2018-06-12 | 刘志东 | A kind of self-service system of renting a house |
CN207909218U (en) * | 2018-02-05 | 2018-09-25 | 指链智能信息科技(深圳)有限公司 | A kind of intelligent management system rented a house for public affairs |
CN108447158A (en) * | 2018-03-27 | 2018-08-24 | 杭州睿沃科技有限公司 | Dorm management system and its method |
CN109525391B (en) * | 2018-10-14 | 2021-12-03 | 浙江鸿利锁业有限公司 | Method for safely synchronizing information of server and lockset |
CN109714639B (en) * | 2018-12-28 | 2021-05-21 | 广州华多网络科技有限公司 | Violation processing method, device, server and storage medium |
-
2019
- 2019-05-08 CN CN201910380018.1A patent/CN112002036B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6745168B1 (en) * | 1998-01-28 | 2004-06-01 | Fujitsu Limited | Intention achievement information processing apparatus |
CN101344980A (en) * | 2008-08-21 | 2009-01-14 | 中国工商银行股份有限公司 | Safety detection system and method for ATM equipment |
CN103899156A (en) * | 2014-04-09 | 2014-07-02 | 东莞安尔发智能科技股份有限公司 | Door lock extensive application implementation method and door lock extensive application implementation system |
CN105046966A (en) * | 2015-05-08 | 2015-11-11 | 天津大学 | System and method for automatically detecting illegal parking behaviors in drop-off areas |
CN105184912A (en) * | 2015-07-15 | 2015-12-23 | 深圳市物联锁科技有限公司 | Intelligent lock monitoring system based on Internet of Things and intelligent lock |
CN107391995A (en) * | 2017-07-31 | 2017-11-24 | 北京小米移动软件有限公司 | Unlock operation processing method and device |
CN107742336A (en) * | 2017-09-19 | 2018-02-27 | 深圳市几米软件有限公司 | A kind of data transmission method and terminal device for being used to share bicycle smart lock |
CN107561229A (en) * | 2017-10-25 | 2018-01-09 | 智能(厦门)传感器有限公司 | A kind of intelligent smoking detection alarm detecting system and detection method |
CN109063874A (en) * | 2018-08-03 | 2018-12-21 | 合肥德高信息科技有限公司 | A kind of Hospitality management system |
Also Published As
Publication number | Publication date |
---|---|
CN112002036A (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104966344B (en) | A kind of security access control system based on video | |
CN109243026B (en) | Visitor management method and system | |
US20220092903A1 (en) | Scalable systems and methods for monitoring and concierge service | |
CN104021362B (en) | Gate inhibition's early warning system based on image dynamic object recognition and pre-warning and control method | |
KR102237086B1 (en) | Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology | |
CN106157505A (en) | One is illegally entered the room alarm method and device | |
CN104967825A (en) | Gatekeeper electronic dog system | |
CN108174142A (en) | A kind of long-range control locking method locked based on intelligent doorbell and intelligent cloud, system | |
CN102176746A (en) | Intelligent monitoring system used for safe access of local cell region and realization method thereof | |
CN108600202A (en) | A kind of information processing method and device, computer readable storage medium | |
EP4141583A1 (en) | Device control method and system | |
CN105096546A (en) | Cloud air condition based security and protection method and cloud air condition | |
CN110021091B (en) | Access control system control method, access control system and access control and video monitoring linkage system | |
CN113611032A (en) | Access control management method and system based on face recognition | |
CN103354006A (en) | Networking alarm service system and hardware equipment arrangement method thereof | |
CN113160472A (en) | Intelligent management method, device, system, equipment and medium for community access control | |
CN110390785A (en) | A kind of smart home security inter-linked controlling method, device, medium and terminal device | |
CN101826226A (en) | Intelligent entrance guard control method and device | |
CN110768942B (en) | Identity authentication system | |
CN112927408A (en) | Visitor visiting processing method and device | |
CN111724514A (en) | Cloud access control system based on AI intelligent sound box application and implementation method | |
CN107131607A (en) | Monitoring method, device and system based on air conditioner and air conditioner | |
CN206656471U (en) | Air conditioner and monitoring system based on air conditioner | |
CN112002036B (en) | Method and system for managing room based on linkage of sensor and intelligent lock | |
CN111915765A (en) | Personnel safety monitoring method and system based on intelligent lock and sensor linkage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |