Background
The existing lodging modes of the net-book house comprise short renting houses, long renting apartments, low renting houses, lodging in residents and the like. Due to the special properties of the cyber-contracting rooms, cleaning personnel, management personnel, passengers and the like may have the authority of opening doors. Because the number of people who can open the door is large, the situation that people enter a room without permission exists, and safety problems are easily caused.
In order to solve the above problems, the chinese patent with publication number CN106338928A discloses a method and a device for detecting the status of an access door, the method comprises the following steps: monitoring an unlocking verification process and a door opening action; when the unlocking verification process and the door opening action are monitored successively, judging that the current door entering state is achieved; and when only the door opening action is monitored, judging that the current door is in the door-out state.
According to the scheme, the door entering state and the door exiting state can be effectively distinguished and recorded through monitoring of door opening actions, the condition that personnel enter a room without permission can be effectively reduced, and the personnel can trace back to determine the occurrence time when safety problems occur. However, when no passenger is in the room, cleaning personnel and the like may bypass the platform by using normal cleaning opportunities to invite friends to live and the like, which is difficult to identify and supervise at present and has certain potential safety hazards.
Therefore, a system and a method for identifying abnormal use status of a cyber-contracting room, which can supervise the use of the room, are needed.
Disclosure of Invention
The invention provides a system and a method for identifying abnormal use states of a network contract room, which can supervise the use of the room.
In order to solve the technical problem, the present application provides the following technical solutions:
the utility model provides a net appointment room user state unusual identification system, includes intelligent lock for gather authentication information and verify when the user enters the door, unblock door after verifying to pass, still include:
the electronic peephole is used for starting when the door is opened and acquiring video information;
the server is used for acquiring video information from the electronic peep hole, carrying out face recognition based on the video information, judging whether a specific person exists in the user entering the room, if so, judging whether the user cannot determine the identity, if so, marking the user as a following person, and generating abnormal information of the person when the user entering the room comprises the specific person and the following person.
The basic scheme principle and the beneficial effects are as follows:
in this scheme, through the cooperation of intelligent lock and electron cat eye, can carry out video information's collection when the user gets into the room, the server can accurately judge whether have specific personnel and accompany personnel according to video information. For example, a specific person is a cleaning person, under normal conditions, one room only needs one cleaning person to work, and other irrelevant persons cannot be brought into the room during working. By generating the abnormal information of the personnel, subsequent management personnel can conveniently acquire and process the abnormal information. In conclusion, the scheme can effectively supervise the use of the room.
Further, the server is also used for calculating the residence time of the specific personnel and the accompanying personnel entering the room, and when the residence time is greater than a first time threshold value, residence time abnormal information is generated.
When a specific person is a cleaning person, the normal cleaning work time is relatively fixed, for example, 40 minutes, and when the residence time of the cleaning person and other irrelevant persons in a room is far more than 40 minutes, the cleaning person may enter the room after opening the door by using the self authority of the cleaning person. By generating the retention time abnormal information, the behavior can be found in time, and subsequent management personnel can process the behavior in time conveniently.
Furthermore, the intelligent door lock is also used for recording door opening state information, and the door opening state information comprises inward opening and outward opening.
It is convenient to know from which side the door is opened.
Further, the server is also used for acquiring door opening state information from the intelligent door lock; when the door opening state information is opened after a specific person enters a room independently, and the face recognition shows that the identity user cannot be determined to enter the room, the server marks the identity user as a company.
When a specific person is a cleaning person, the situation that the cleaning person enters a room in advance and other irrelevant persons arrive later and the cleaning person opens the door for the cleaning person to help the cleaning person to enter the room can also occur, and the optimal scheme can effectively identify the situation.
Further, the system also comprises a management terminal used for acquiring abnormal information of personnel and abnormal information of the residence time from the server.
The management personnel can conveniently know the personnel abnormal information and the stay time abnormal information in time through the management terminal.
Furthermore, the management terminal is also used for inputting the face recognition data of a specific person and storing the face recognition data in the server.
The server can accurately identify specific personnel when the face is identified.
Further, the authentication information includes one or more of bluetooth information, password information, and NFC information.
Further, the first time threshold is 2-5 hours.
Further, the server is also used for obtaining order information of the passenger, wherein the order information comprises check-in time, check-in duration and a call placing mobile phone model.
A method for recognizing the abnormal use state of a network contract house uses the abnormal use state recognition system of the network contract house.
In this scheme, through the cooperation of intelligent lock and electron cat eye, can carry out video information's collection when the user gets into the room, the server can accurately judge whether have specific personnel and accompany personnel according to video information. For example, a specific person is a cleaning person, under normal conditions, one room only needs one cleaning person to work, and other irrelevant persons cannot be brought into the room during working. The normal cleaning work time is relatively fixed, for example, 40 minutes, when the stay time of cleaning personnel and other irrelevant personnel in a room is far more than 40 minutes, the cleaning personnel can open the door by utilizing the authority of the cleaning personnel, and then the irrelevant personnel can live in the room. By generating the stay time abnormality information, such behavior can be found in time. In conclusion, the scheme can effectively supervise the use of the room.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
As shown in fig. 1, the system for recognizing abnormal use status of a cyber-contracting room of the embodiment includes an intelligent door lock, an electronic peephole, a server and a management terminal.
The intelligent door lock is used for collecting authentication information and verifying when a user enters the door, and unlocking the door after the verification is passed. The authentication information includes one or more of bluetooth information, password information, and NFC information, and in this embodiment, the password information is used.
The intelligent door lock is also used for recording the door opening state information, and the door opening state information comprises inward opening and outward opening. When the verification is carried out firstly, the door opening action is detected and the current state is judged to be outward opening; when only the door opening action is detected, the door is judged to be opened inwards.
And the electronic peephole is used for starting when the door is opened and acquiring video information.
The management terminal is also used for inputting the face recognition data of a specific person and storing the face recognition data in the server. In this embodiment, the specific person is a cleaner.
The server is used for acquiring video information from the electronic peephole and door opening state information from the intelligent door lock, carrying out face recognition based on the video information and face recognition data of specific personnel, judging whether the specific personnel exist in the users entering the room, if so, judging whether the users can not determine identities, and if so, marking the users as accompanying personnel;
when the door opening state information is opened after a specific person enters a room independently, and the face recognition shows that the identity user cannot be determined to enter the room, the server marks the identity user as a company.
The server is also used for generating the person abnormality information when the user entering the room includes a specific person and accompanying persons.
The server is also used for calculating the residence time of the specific personnel and accompanying personnel entering the room, and generating residence time abnormity information when the residence time is greater than a first time threshold value. The first time threshold is 2-5 hours, in this example 5 hours.
The management terminal is also used for acquiring abnormal information of personnel and abnormal information of residence time from the server.
The method for identifying the abnormal use state of the cyber-contracting room in the embodiment uses the system for identifying the abnormal use state of the cyber-contracting room.
Example two
The difference between the present embodiment and the first embodiment is that the cyber-contracting room includes a kitchen, a dining room, a living room, a toilet, a bedroom, etc. In the system for identifying abnormal use state of the network contract house in the embodiment, the server is further used for acquiring order information of the passenger, wherein the order information comprises check-in time, check-in duration and a call placing mobile phone model. The server also matches the mobile phone weight MP in a preset database according to the mobile phone model. The preset database can be a related website for receiving and recording the information of the digital product in the internet, and can also be a related shopping website for selling the digital product.
The server also sends passenger-specific authentication information to the mobile phone of the passenger based on the order information, the intelligent door lock is used for sending the collected passenger-specific authentication information to the server, and the server judges that the passenger lives in based on the passenger-specific authentication information sent by the intelligent door lock.
Still include camera, first intelligence callus on the sole and second intelligence callus on the sole, first intelligence callus on the sole embeds has weight sensor and bluetooth chip, and weight sensor is used for gathering weight information, and the bluetooth chip is connected with intelligent lock bluetooth, and the bluetooth chip is used for sending weight information to intelligent lock, and intelligent lock still is used for sending weight information to the server. The second intelligent foot pad is the same as the first intelligent foot pad in structure. The first intelligent foot pad is placed outside a doorway of a net-shaped house, and the second intelligent foot pad is placed at a doorway of a toilet;
the camera is installed in the dining room, and the camera is used for gathering the image information of dining room desktop. In order to ensure privacy, a text prompt of 'camera is arranged at the table top of the dining room', and the area which can be shot is marked on the tablecloth by using images.
The server is used for collecting the total weight MG of the passenger and the baggage entering the room based on the first intelligent foot pad when the passenger first enters the room, and the server is also used for collecting the change weight MX0 of entering and exiting the room each time based on the first intelligent foot pad when the passenger enters the room. The change weight MX0 is obtained from the difference between the weight information when going out of the room and the weight information when going into the room. For example, when the user leaves the door, the user returns to twist the commodities, and the difference is positive, namely the weight of the newly added commodities; of course, the difference may be negative, since there are cases where the article is taken out and not brought back.
The server is used for collecting the changing weight MW0 of each entrance and exit of the toilet during the passenger check-in period based on the second intelligent foot pad. Can be used for correcting weight change caused by consumption of washing products.
The server is also used for acquiring image information of the camera, identifying food in the image based on the image information, and acquiring the corresponding weight MS of the food based on the food information base. The food information base can adopt data in shopping websites such as Taobao and Jingdong. Can be used for correcting weight variation caused by eaten food.
The server is also used for acquiring the total weight MZ of the passenger and the luggage which leave the room finally based on the first intelligent foot pad after the passenger leaves the room. The server is also used for calculating the total variable weight MX1 of the entering and exiting rooms according to the variable weight MX0 of the entering and exiting rooms at each time; the server is also used for calculating the total weight MW1 of the change in the toilet according to the weight MW0 of the change in the toilet.
The server is also used for calculating the weight difference value MA after the passenger exits, and the calculation formula is as follows:
MA=MG-(MZ+MW1+MX1+MS)
the server is also used for judging whether the difference between the weight difference value MA and the weight MP of the mobile phone is positive and smaller than a threshold value, and if so, judging that the mobile phone is suspected to be left.
When the special authentication information for the passengers is password information, the server is also used for timing from the departure of the passengers, and the door opening passwords are not changed within the first preset time. The first preset time is 10-60 minutes. In this embodiment, the criterion for the departure of the passenger is that the weight information of the first intelligent foot pad is zero.
When the special authentication information of the passenger is Bluetooth information or NFC information, the server is further used for starting timing when the passenger leaves, acquiring the emerging weight MD of the first intelligent foot pad within second preset time, judging whether the emerging weight MD is equal to the total weight MZ of the passenger and the luggage which leave the room at last, and if so, unlocking the door by the intelligent door lock. The second preset time is 5-15 minutes.
In this scheme, through the cooperation of camera, first intelligent callus on the sole and second intelligence callus on the sole, can be when the passenger leaves the room, whether the control forgets article, especially cell-phone. And timing is started when the passenger leaves, the door opening password is not changed within the preset time, and the passenger can conveniently return to take back the mobile phone after finding the mobile phone is left. For the passenger unlocked by the Bluetooth or NFC, the passenger cannot use the Bluetooth or NFC for unlocking due to the fact that the mobile phone is left in the room, but the total weight MZ of the passenger and the luggage which leave the room at last is equal to the emerging weight MD, and the passenger can be judged to return to take the mobile phone, unlock the door and be convenient for the passenger to enter the room to take the mobile phone. For passengers with short check-in days and few access times, the accuracy rate of detecting the mobile phone remaining is higher.
In this embodiment, the method for identifying the abnormal use state of the cyber-contracting room uses the system for identifying the abnormal use state of the cyber-contracting room.
The above are merely examples of the present invention, and the present invention is not limited to the field related to this embodiment, and the common general knowledge of the known specific structures and characteristics in the schemes is not described herein too much, and those skilled in the art can know all the common technical knowledge in the technical field before the application date or the priority date, can know all the prior art in this field, and have the ability to apply the conventional experimental means before this date, and those skilled in the art can combine their own ability to perfect and implement the scheme, and some typical known structures or known methods should not become barriers to the implementation of the present invention by those skilled in the art in light of the teaching provided in the present application. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.