CN112215994A - Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium - Google Patents
Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium Download PDFInfo
- Publication number
- CN112215994A CN112215994A CN202011107806.2A CN202011107806A CN112215994A CN 112215994 A CN112215994 A CN 112215994A CN 202011107806 A CN202011107806 A CN 202011107806A CN 112215994 A CN112215994 A CN 112215994A
- Authority
- CN
- China
- Prior art keywords
- door lock
- person
- visitor
- intelligent
- intelligent anti
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
- H04N7/147—Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
Abstract
The invention discloses a control method of a remote visual intercom intelligent anti-theft door lock, which comprises the following steps: reading the recorded image or audio content of personnel in front of the intelligent anti-theft door lock through an LTE CAT-1 communication module; judging the intention of the personnel according to the behavior of the personnel or the audio content in the recorded image; if the person is a visitor, verifying the control authority of the person according to the stored image or audio; if the verification is passed, sending a door opening instruction to the intelligent anti-theft door lock, and sending an unlocking record to the bound terminal equipment; if the verification fails, a dialing instruction is sent to the intelligent anti-theft door lock, and the intelligent anti-theft door lock sends a visual intercom request to the terminal equipment through the LTE CAT-1 communication module. The intelligent anti-theft door lock is faster and more convenient to control, and is intelligent, humanized and safe.
Description
Technical Field
The invention relates to the technical field of intelligent anti-theft door locks, in particular to a control method and a control system for a remote visual intercom intelligent anti-theft door lock, computer terminal equipment and a storage medium.
Background
In the prior art, home security is always a concern of people, the installation of a door lock is one of main anti-theft measures of people, but most of door locks in the current market do not have intellectualization, cannot identify the identity of a coming person, and cannot actively give an alarm when a person with unknown identity violently unlocks.
Secondly, the intelligent anti-theft door lock of long-range visual intercom generally adopts wiFi as main remote communication means, realizes the long-range visual intercom function of user. However, there is certain distance between the mounted position of general family's intelligence security door lock and the wireless router of family for intelligence security door lock's wiFi signal is weak, can't satisfy the audio and video data transmission demand when intelligence security door lock carries out long-range visual intercom, finally leads to long-range visual intercom to appear that the picture blocks, the sound delays, the condition of long-range visual intercom failure even. The mounted position of general family's intelligence security door lock has certain distance with the wireless router of family for intelligence security door lock's wiFi signal is weak, can't satisfy the audio and video data transmission demand when intelligence security door lock carries out long-range visual talkback, finally leads to long-range visual talkback the appearance picture card pause, sound delay, the condition of the failure of long-range visual talkback even. And the existing intelligent anti-theft door lock inputs a dialing request through keys, so that troubles are caused when a user inconveniently uses hands, the experience is poor, and the humanization is not enough.
Disclosure of Invention
The invention aims to provide a control method of a remote visual intercom intelligent anti-theft door lock, which automatically detects people with unknown identities who intend to break into a room through means of face recognition, voice recognition, abnormal unlocking detection and the like, achieves the aim of automatic anti-theft alarm, and solves the problems that the WiFi signal of the intelligent anti-theft door lock is weak, the audio and video data transmission requirement of the intelligent anti-theft door lock during remote visual intercom cannot be met, and finally the remote visual intercom is blocked by a picture, and a dialing request is input through a key, so that the user experience is poor and the intelligent anti-theft door lock is unsafe.
In order to achieve the above object, an embodiment of the present invention provides a method for controlling a remote visual intercom intelligent security door lock, including the steps of:
reading the recorded image or audio content of a person in front of the intelligent anti-theft door lock through an LTE CAT-1 communication module;
detecting whether an abnormal unlocking signal is sent by the intelligent anti-theft door lock;
judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether an abnormal unlocking instruction exists;
judging whether the person is a normal visitor or not according to the intention of the person;
if the figure is a normal visitor, verifying the identity of the figure and entering an unlocking process;
and if the person is an abnormal visitor, synchronously sending an alarm instruction to an external network through a wireless network device.
In one embodiment, the method further comprises the following steps: judging whether the identity information of the abnormal visitor is stored in a database; if so, changing the abnormal visitor into a normal visitor.
In one embodiment, the determining the intention of the person according to the behavior of the person in the recorded image, the audio content, and whether there is an abnormal unlocking instruction includes: if the face of the person in the recorded video is detected, and the total occurrence time of the person is counted and timed to reach 5 seconds or more, judging that the person has an access intention; if the audio is detected to contain the indication content, judging that the audio has the access intention; if one or more of violent behaviors of the recorded video, violent contents of the audio content and abnormal unlocking signals exist, judging that violent intentions exist; the judging whether the person is a normal visitor according to the intention of the person specifically comprises: judging that the character is a normal visitor according to the access intention of the character; and judging that the character is an abnormal visitor according to the violent intention of the character.
In one embodiment, the unlocking process includes the steps of: if the normal visitor is a visitor, verifying the control authority of the normal visitor according to the stored image or audio; if the verification is passed, sending a door opening instruction to the intelligent anti-theft door lock, and sending an unlocking record to the bound terminal equipment; if the verification fails, a dialing instruction is sent to the intelligent anti-theft door lock, and the intelligent anti-theft door lock sends a visual intercom request to the terminal equipment through the LTE CAT-1 communication module.
In one embodiment, if the normal visitor is a visitor, verifying the control authority of the normal visitor according to the stored image or audio includes: the facial features of the normal visitors in the recorded image are compared and analyzed with the images stored in a database through a set detection model, and whether the normal visitors with access intentions have control authority on the intelligent anti-theft door lock is judged; and carrying out difference comparison analysis on the tone color characteristics of the normal visitor in the recorded audio and the audio stored in the database through a set detection model, and judging whether the intelligent anti-theft door lock has a control authority or not by the normal visitor.
In one embodiment, before the step of sending a dialing instruction to the intelligent security door lock if the verification fails, and the intelligent security door lock sends a visual intercom request to the terminal device through the LTE CAT-1 communication module, the method further includes the steps of: the intelligent anti-theft door lock judges whether terminal equipment bound with the intelligent anti-theft door lock exists or not.
In one embodiment, if the verification fails, a dialing instruction is sent to the intelligent security door lock, including the steps of: if the bound terminal equipment is judged, sending an access short message to the terminal equipment; the terminal equipment also sends a visual intercom request to the intelligent anti-theft door lock through the LTE CAT-1 communication module.
The embodiment of the invention also provides a control system of the remote visual intercom intelligent anti-theft door lock, which is applied to the control method of the remote visual intercom intelligent anti-theft door lock in any embodiment, and the control method comprises the following steps:
the information acquisition module is used for reading the recorded image or audio content of a person in front of the intelligent anti-theft door lock through the LTE CAT-1 communication module;
the abnormality detection module is used for detecting whether the intelligent security door lock sends an abnormal unlocking instruction;
the visitor judging module is used for judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether an abnormal unlocking instruction exists; judging whether the person is a normal visitor or not according to the intention of the person;
the first execution module is used for verifying the identity of the person to enter an unlocking process if the person is a normal visitor;
and the second execution module is used for synchronously sending an alarm instruction to an external network through the wireless network device if the person is an abnormal visitor.
The embodiment of the invention also provides computer terminal equipment which comprises one or more processors and a memory. The memory is coupled to the processor for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors implement the control method of the remote visual intercom intelligent security door lock as in any one of the above embodiments.
The embodiment of the invention also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for controlling the remote visual intercom intelligent security door lock according to any one of the above embodiments is implemented.
According to the control method of the remote visual intercom intelligent anti-theft door lock, disclosed by the embodiment of the invention, people intending to break into an indoor unknown identity are automatically detected by means of face recognition, voice recognition, abnormal unlocking detection and the like, so that the purpose of automatic anti-theft alarm is achieved, the remote visual intercom data stable transmission of the intelligent anti-theft door lock is realized by LTE CAT-1, the problem of insufficient stability when audio and video data are transmitted by the traditional wireless transmission technology of the intelligent anti-theft door lock is solved, and the intelligent anti-theft door lock is controlled by image and voice recognition, so that the intelligent anti-theft door lock is controlled more quickly and conveniently, and is intelligent, humanized and safe.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a control method of a remote visual intercom intelligent security door lock according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a computer terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be understood that the step numbers used herein are for convenience of description only and are not intended as limitations on the order in which the steps are performed.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The terms "comprises" and "comprising" indicate the presence of the described features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The term "and/or" refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, an embodiment of the present invention provides a method for controlling a remote visual intercom intelligent security door lock, including the steps of:
s10, reading the recorded image or audio content of the person in front of the intelligent anti-theft door lock through the LTE CAT-1 communication module;
s20, detecting whether the intelligent anti-theft door lock sends an abnormal unlocking instruction;
s30, judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether an abnormal unlocking instruction exists;
s40, judging whether the character is a normal visitor or not according to the intention of the character;
s51, if the character is a normal visitor, verifying the identity of the character and entering an unlocking process;
and S52, if the character is an abnormal visitor, synchronously sending an alarm instruction to an external network through the wireless network device.
In this embodiment, the intelligent security door lock is in communication connection with a cloud server through the LTE CAT-1 communication module, the cloud server is in communication connection with an intelligent terminal through the internet, and the intelligent security door lock is in communication connection with the intelligent terminal through the LTE CAT-1 communication module; LTE Cat.1 in the LTE CAT-1 communication module can be seamlessly accessed into the existing LTE network, software and hardware do not need to be upgraded aiming at a base station, and the network coverage cost is very low; in the aspect of chip cost, after system optimization, the integration level is higher, the hardware architecture of the module is simpler, the cost of peripheral hardware is lower, communication connection is established through LTE Cat.1, and the problems that signals are weak and connection is not easy to achieve due to distance are avoided.
Specifically, the intelligent anti-theft door lock is provided with an infrared detection module, a circuit of the infrared detection module is independent and is separated from power supplies of other modules of the intelligent anti-theft door lock, the infrared detection module can detect whether a person is at a doorway, and when the person is not detected, the intelligent anti-theft door lock is in a dormant state; when the door is detected to be occupied by a person, the working power supply of the intelligent anti-theft door lock is turned on, the intelligent anti-theft door lock enters a working state, the camera is turned on, the portrait and the voice are collected, and the portrait and the voice are sent to the cloud server. When intelligence security door lock gathers the portrait and records the video, then passes through LTE CAT-1 communication module will record video transmission extremely cloud ware, cloud ware detects whether intelligence security door lock has sent unusual unlocking signal, exceeds the cubic if input wrong password, violently strikes abnormal behavior signals such as intelligence security door lock. And then the cloud server analyzes the image and the audio of the recorded video and judges whether personnel in the video have the intention of access. And judging whether the character is a normal visitor or an abnormal visitor according to the intention of the character in the recorded video. If the visitor is a normal visitor, performing identity authentication, and further performing a normal unlocking flow or a calling flow; if the visitor is an abnormal visitor, an alarm instruction needs to be synchronously sent to an external network through a wireless network device, and an intrusion message is sent to the terminal equipment to remind a house owner of making safety measures, so that the visitor is prevented from being illegally intruded without signs and preparations, and personal and property injuries are caused.
In one embodiment, the method further comprises the following steps: judging whether the identity information of the abnormal visitor is stored in a database; if so, changing the abnormal visitor into a normal visitor.
In this embodiment, after detecting that a person in the recorded video is an abnormal visitor, further determining whether the abnormal visitor is a visitor visited once, comparing image and audio information of the abnormal visitor with visitor information stored in the database, and if detecting historical visit information of the abnormal visitor, changing the abnormal visitor into a normal visitor. And if the historical access information of the abnormal visitor is not detected, the state of the abnormal visitor is not changed.
In one embodiment, the determining the intention of the person according to the behavior of the person in the recorded image, the audio content, and whether there is an abnormal unlocking instruction includes: if the face of the person in the recorded video is detected, and the total occurrence time of the person is counted and timed to reach 5 seconds or more, judging that the person has an access intention; if the audio is detected to contain the indication content, judging that the audio has the access intention; if one or more of violent behaviors of the recorded video, violent contents of the audio content and abnormal unlocking instructions exist, judging that violent intentions exist; the judging whether the person is a normal visitor according to the intention of the person specifically comprises: judging that the character is a normal visitor according to the access intention of the character; and judging that the character is an abnormal visitor according to the violent intention of the character.
In this embodiment, the cloud server receives the recorded video sent by the intelligent security door lock, and analyzes and counts the time of the person appearing in the video and the angle of the person appearing. If the person only passes through the doorway and appears in the video for less than 5 seconds, judging that no access intention exists; if the person only stands back to the doorway, the person is considered to have no access intention; if the cloud server detects the face of the person appearing in the video and the time of the person appearing in the video exceeds 5 seconds, the person is considered to have an access intention; if the cloud server detects that the voice of the video contains indication contents, such as indication contents obviously wanting to unlock, such as 'call', 'dial', 'door open' and 'someone is at home', the video is judged to have the access intention. When the fact that a person in the recorded video has violent behaviors of beating the intelligent security door lock, a door and the like is detected, or the fact that the voice has obvious contents of beating and smashing and the like is detected, or an abnormal unlocking signal sent by the intelligent security door lock is detected, such as signals of multiple password input errors, violent beating detected by the pressure of the intelligent door lock and the like, the abnormal visitor is judged.
In one embodiment, the unlocking process includes the steps of: if the normal visitor is a visitor, verifying the control authority of the normal visitor according to the stored image or audio; if the verification is passed, sending a door opening instruction to the intelligent anti-theft door lock, and sending an unlocking record to the bound terminal equipment; if the verification fails, a dialing instruction is sent to the intelligent anti-theft door lock, and the intelligent anti-theft door lock sends a visual intercom request to the terminal equipment through the LTE CAT-1 communication module.
In this embodiment, the unlocking process includes determining the identity of the normal visitor, if the person is an administrator set in the system and has an unlocking permission, and if the person has the permission, the cloud server directly sends a door opening instruction to the intelligent security door lock to open the door; if the normal visitor is not the administrator set in the system, the cloud server sends a dialing command to the intelligent security door lock, the intelligent security door lock receives the dialing command and directly sends a video request signal to the terminal equipment through the LTE CAT-1 communication module, and a user of the terminal equipment communicates with a visitor after receiving the video request and then determines whether to unlock the system.
In one embodiment, if the normal visitor is a visitor, verifying the control authority of the normal visitor according to the stored image or audio includes: the facial features of the normal visitors in the recorded image are compared and analyzed with the images stored in a database through a set detection model, and whether the normal visitors with access intentions have control authority on the intelligent anti-theft door lock is judged; and carrying out difference comparison analysis on the tone color characteristics of the normal visitor in the recorded audio and the audio stored in the database through a set detection model, and judging whether the intelligent anti-theft door lock has a control authority or not by the normal visitor.
In this embodiment, after detecting that a person in the video has an access intention, the cloud server determines whether the person is a manager with an unlocking authority preset by the system; analyzing and comparing the facial features and the voice features of the person with the portrait and the voice of a manager stored in the cloud server in advance, and if the similarity reaches a preset threshold value, determining that the intelligent anti-theft door lock has unlocking authority; if the situation that similar preset images and voices exist is detected, the situation that the lock is not unlocked is determined, the situation that the lock is a visitor is divided, and a dialing instruction needs to be sent to the intelligent anti-theft door lock.
In one embodiment, before the step of sending the dialing instruction to the intelligent security door lock if the verification fails, and the intelligent security door lock sending the visual intercom request to the terminal device through the LTE CAT-1 communication module, the method further includes the steps of: the intelligent anti-theft door lock judges whether terminal equipment bound with the intelligent anti-theft door lock exists or not.
In this embodiment, when the intelligent security door lock needs to send a visual intercom request to the terminal device, the intelligent door lock needs to detect whether a bound terminal device exists or not, and if not, the intelligent door lock needs to remind the user of dialing failure through voice and needs to manually press a doorbell; and if the bound terminal equipment exists, directly sending the LTE CAT-1 communication module visible intercom request signal to the bound terminal equipment.
In one embodiment, if the verification fails, a dialing instruction is sent to the intelligent security door lock, including the steps of: if the bound terminal equipment is judged, sending an access short message to the terminal equipment; the terminal equipment also sends a visual intercom request to the intelligent anti-theft door lock through the LTE CAT-1 communication module.
In this embodiment, the cloud server verifies that the normal visitor does not have the unlocking authority, and then needs to send a dialing request to the intelligent security door lock, and simultaneously sends an access short message to the terminal device of the administrator of the intelligent security door lock to remind the entrance of someone to access. If the terminal equipment of the intelligent security door lock administrator receives the message prompt that someone visits at the door, but does not receive the visual talkback request of the intelligent security door lock, the terminal equipment can actively send the visual talkback request, and the visual talkback request is sent to the visual talkback module of the intelligent security door lock through the LTE CAT-1 communication module to confirm the purpose of visiting people, so that whether unlocking is carried out or not is determined.
The embodiment of the invention also provides a control system of the remote visual intercom intelligent anti-theft door lock, which is applied to the control method of the remote visual intercom intelligent anti-theft door lock in any embodiment, and the control method comprises the following steps:
the information acquisition module is used for reading the recorded image or audio content of a person in front of the intelligent anti-theft door lock through the LTE CAT-1 communication module;
the abnormality detection module is used for detecting whether the intelligent security door lock sends an abnormal unlocking instruction;
the visitor judging module is used for judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether an abnormal unlocking instruction exists; judging whether the person is a normal visitor or not according to the intention of the person;
the first execution module is used for verifying the identity of the person to enter an unlocking process if the person is a normal visitor;
and the second execution module is used for synchronously sending an alarm instruction to an external network through the wireless network device if the person is an abnormal visitor.
For specific limitations of the control system of the remote visual intercom intelligent security door lock, reference may be made to the above limitations on the control method of the remote visual intercom intelligent security door lock, and details are not described herein again. All modules in the control system of the remote visual intercom intelligent anti-theft door lock can be completely or partially realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The embodiment of the invention has the following beneficial effects:
according to the control method of the remote visual intercom intelligent anti-theft door lock, disclosed by the embodiment of the invention, people intending to break into an indoor unknown identity are automatically detected by means of face recognition, voice recognition, abnormal unlocking detection and the like, so that the purpose of automatic anti-theft alarm is achieved, the remote visual intercom data stable transmission of the intelligent anti-theft door lock is realized by LTE CAT-1, the problem of insufficient stability when audio and video data are transmitted by the traditional wireless transmission technology of the intelligent anti-theft door lock is solved, and the intelligent anti-theft door lock is controlled by image and voice recognition, so that the intelligent anti-theft door lock is controlled more quickly and conveniently, and is intelligent, humanized and safe.
Referring to fig. 2, an embodiment of the invention provides a computer terminal device, which includes one or more processors and a memory. The memory is coupled to the processor and is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement the control method of the remote visual intercom intelligent security door lock as in any one of the above embodiments.
The processor is used for controlling the overall operation of the computer terminal equipment so as to complete all or part of the steps of the control method of the remote visual intercom intelligent anti-theft door lock. The memory is used to store various types of data to support the operation at the computer terminal device, which data may include, for example, instructions for any application or method operating on the computer terminal device, as well as application-related data. The Memory may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
In an exemplary embodiment, the computer terminal Device may be implemented by one or more Application Specific 1 integrated circuits (AS 1C), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor or other electronic components, and is configured to perform the above-mentioned control method for the remote visual intercom intelligent security door lock, and achieve the technical effects consistent with the above-mentioned methods.
In another exemplary embodiment, a computer readable storage medium including program instructions is further provided, and the program instructions when executed by a processor implement the steps of the control method of the remote visual intercom intelligent security door lock in any one of the above embodiments. For example, the computer readable storage medium may be the memory including the program instructions, and the program instructions may be executed by a processor of a computer terminal device to complete the control method of the remote visual intercom intelligent security door lock, and achieve the technical effects consistent with the above method.
The foregoing is a preferred embodiment of the present invention, and it should be noted that it would be apparent to those skilled in the art that various modifications and enhancements can be made without departing from the principles of the invention, and such modifications and enhancements are also considered to be within the scope of the invention.
Claims (10)
1. A control method of a remote visual intercom intelligent anti-theft door lock is characterized by comprising the following steps:
reading the recorded image or audio content of a person in front of the intelligent anti-theft door lock through an LTE CAT-1 communication module;
detecting whether an abnormal unlocking signal is sent by the intelligent anti-theft door lock;
judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether an abnormal unlocking instruction exists;
judging whether the person is a normal visitor or not according to the intention of the person;
if the figure is a normal visitor, verifying the identity of the figure and entering an unlocking process;
and if the person is an abnormal visitor, synchronously sending an alarm instruction to an external network through a wireless network device.
2. The control method of the remote visual intercom intelligent security door lock according to claim 1, further comprising the steps of:
judging whether the identity information of the abnormal visitor is stored in a database;
if so, changing the abnormal visitor into a normal visitor.
3. The control method of the remote visual intercom intelligent security door lock as claimed in claim 2, wherein the method for judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether there is an abnormal unlocking instruction comprises the following steps:
if the face of the person in the recorded video is detected, and the total occurrence time of the person is counted and timed to reach 5 seconds or more, judging that the person has an access intention;
if the audio is detected to contain the indication content, judging that the audio has the access intention;
if one or more of violent behaviors of the recorded video, violent contents of the audio content and abnormal unlocking signals exist, judging that violent intentions exist;
the judging whether the person is a normal visitor according to the intention of the person specifically comprises:
judging that the character is a normal visitor according to the access intention of the character;
and judging that the character is an abnormal visitor according to the violent intention of the character.
4. The control method of the remote visual intercom intelligent security door lock according to claim 3, wherein the unlocking process comprises the steps of:
if the normal visitor is a visitor, verifying the control authority of the normal visitor according to the stored image or audio;
if the verification is passed, sending a door opening instruction to the intelligent anti-theft door lock, and sending an unlocking record to the bound terminal equipment;
if the verification fails, a dialing instruction is sent to the intelligent anti-theft door lock, and the intelligent anti-theft door lock sends a visual intercom request to the terminal equipment through the LTE CAT-1 communication module.
5. The method for controlling the remote visual intercom intelligent security door lock according to claim 4, wherein if the normal visitor is a visitor, the verifying the control authority of the normal visitor according to the stored image or audio comprises:
the facial features of the normal visitors in the recorded image are compared and analyzed with the images stored in a database through a set detection model, and whether the normal visitors with access intentions have control authority on the intelligent anti-theft door lock is judged;
and carrying out difference comparison analysis on the tone color characteristics of the normal visitor in the recorded audio and the audio stored in the database through a set detection model, and judging whether the intelligent anti-theft door lock has a control authority or not by the normal visitor.
6. The method for controlling the remote visual intercom intelligent security door lock according to claim 4, wherein before the verification fails, a dialing instruction is sent to the intelligent security door lock, and the intelligent security door lock sends a visual intercom request to the terminal device through the LTE CAT-1 communication module, the method further comprises the following steps:
the intelligent anti-theft door lock judges whether terminal equipment bound with the intelligent anti-theft door lock exists or not.
7. The control method of the remote visual intercom intelligent security door lock as claimed in claim 6, wherein if the verification fails, a dialing instruction is sent to the intelligent security door lock, comprising the steps of:
if the bound terminal equipment is judged, sending an access short message to the terminal equipment;
the terminal equipment also sends a visual intercom request to the intelligent anti-theft door lock through the LTE CAT-1 communication module.
8. The utility model provides a control system of intelligent burglary-resisting door lock of long-range visual intercom which characterized in that includes:
the information acquisition module is used for reading the recorded image or audio content of a person in front of the intelligent anti-theft door lock through the LTE CAT-1 communication module;
the abnormality detection module is used for detecting whether the intelligent security door lock sends an abnormal unlocking instruction;
the visitor judging module is used for judging the intention of the person according to the behavior of the person in the recorded image, the audio content and whether an abnormal unlocking instruction exists; judging whether the person is a normal visitor or not according to the intention of the person;
the first execution module is used for verifying the identity of the person to enter an unlocking process if the person is a normal visitor;
and the second execution module is used for synchronously sending an alarm instruction to an external network through the wireless network device if the person is an abnormal visitor.
9. A computer terminal device, comprising:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the control method of the remote visual intercom intelligent security door lock as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for controlling the remote visual intercom intelligent security door lock according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011107806.2A CN112215994A (en) | 2020-10-15 | 2020-10-15 | Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011107806.2A CN112215994A (en) | 2020-10-15 | 2020-10-15 | Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112215994A true CN112215994A (en) | 2021-01-12 |
Family
ID=74055438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011107806.2A Pending CN112215994A (en) | 2020-10-15 | 2020-10-15 | Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112215994A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113329275A (en) * | 2021-05-27 | 2021-08-31 | 深圳市威尔健科技发展有限公司 | Instant intercom device based on CAT1 does not have distance limitation |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102097832A (en) * | 2010-10-27 | 2011-06-15 | 国家电网公司 | Charging and battery replacing monitoring system and method based on internet of things |
CN103226854A (en) * | 2013-03-10 | 2013-07-31 | 上海研庆电子有限公司 | Intelligent antitheft access control system |
CN104268963A (en) * | 2014-08-06 | 2015-01-07 | 成都百威讯科技有限责任公司 | Intelligent door lock system, intelligent door lock and intelligent alarm door |
CN104504793A (en) * | 2014-12-19 | 2015-04-08 | 天津市亚安科技股份有限公司 | Intelligent door safety control system and method based on video service |
CN104735424A (en) * | 2015-04-02 | 2015-06-24 | 陈佩珊 | Intelligent doorbell system |
CN106097495A (en) * | 2016-06-03 | 2016-11-09 | 赵树龙 | A kind of intelligent voice control vocal print face authentication door access control system and method |
CN207409102U (en) * | 2017-11-14 | 2018-05-25 | 三峡大学 | A kind of safety monitoring system based on image identification |
CN108877012A (en) * | 2018-07-06 | 2018-11-23 | 江苏腾武信息技术有限公司 | Intelligent caller method and system |
CN110647797A (en) * | 2019-08-05 | 2020-01-03 | 深圳市大拿科技有限公司 | Visitor detection method and device |
-
2020
- 2020-10-15 CN CN202011107806.2A patent/CN112215994A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102097832A (en) * | 2010-10-27 | 2011-06-15 | 国家电网公司 | Charging and battery replacing monitoring system and method based on internet of things |
CN103226854A (en) * | 2013-03-10 | 2013-07-31 | 上海研庆电子有限公司 | Intelligent antitheft access control system |
CN104268963A (en) * | 2014-08-06 | 2015-01-07 | 成都百威讯科技有限责任公司 | Intelligent door lock system, intelligent door lock and intelligent alarm door |
CN104504793A (en) * | 2014-12-19 | 2015-04-08 | 天津市亚安科技股份有限公司 | Intelligent door safety control system and method based on video service |
CN104735424A (en) * | 2015-04-02 | 2015-06-24 | 陈佩珊 | Intelligent doorbell system |
CN106097495A (en) * | 2016-06-03 | 2016-11-09 | 赵树龙 | A kind of intelligent voice control vocal print face authentication door access control system and method |
CN207409102U (en) * | 2017-11-14 | 2018-05-25 | 三峡大学 | A kind of safety monitoring system based on image identification |
CN108877012A (en) * | 2018-07-06 | 2018-11-23 | 江苏腾武信息技术有限公司 | Intelligent caller method and system |
CN110647797A (en) * | 2019-08-05 | 2020-01-03 | 深圳市大拿科技有限公司 | Visitor detection method and device |
Non-Patent Citations (1)
Title |
---|
C114通信网: "http://mp.ofweek.com/iot/a545693720736,"你真的了解LTECat.1到底是什么吗?", 《HTTP://MP.OFWEEK.COM/IOT/A545693720736》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113329275A (en) * | 2021-05-27 | 2021-08-31 | 深圳市威尔健科技发展有限公司 | Instant intercom device based on CAT1 does not have distance limitation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108198292B (en) | Household monitoring method and system based on intelligent cloud lock | |
US11417158B2 (en) | Information prompting method, apparatus, and system, and intelligent electronic door lock | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
CN107093243B (en) | Door lock verification alarm method and system and terminal | |
CN106506442A (en) | A kind of smart home multi-user identification and its Rights Management System | |
CN105118125B (en) | A kind of intelligent unlocking method and system of electronic lock | |
CN203366408U (en) | Multifunctional entrance guard based on function application of FPGA (field programmable gate array) control chip | |
US10089806B2 (en) | Device and system for controlling secure key access using an internet-connected key box device | |
CN107492173A (en) | A kind of cloud password access control system and method | |
CN104517338A (en) | Remote door access control system based on wireless network and realization method of remote door access control system | |
CN106934887A (en) | The smart bluetooth entrance guard device and control method of a kind of integrated position judgment and the direction of motion | |
CN111917981A (en) | Privacy protection method, device, equipment and computer readable storage medium | |
CN113611032A (en) | Access control management method and system based on face recognition | |
CN111612958A (en) | Intelligent access control method and device, intelligent access control system and electronic equipment | |
CN112927408A (en) | Visitor visiting processing method and device | |
CN106295276A (en) | A kind of user of record inputs the method that BIOS password enters system | |
CN112215994A (en) | Control method and system for remote visual intercom intelligent anti-theft door lock and storage medium | |
CN111119597A (en) | Control method and device of safety lock tongue | |
CN206753380U (en) | A kind of intelligent integrated safety door | |
CN112215995A (en) | Control method and system for remote visual intercom intelligent door lock and storage medium | |
CN112215993A (en) | Control method and system for remote visual intercom intelligent door lock and storage medium | |
CN111915765A (en) | Personnel safety monitoring method and system based on intelligent lock and sensor linkage | |
CN111768544B (en) | Intelligent access control method, device and system, electronic equipment and storage medium | |
CN111915774B (en) | Remote intelligent assisted unlocking method and device | |
US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210112 |
|
RJ01 | Rejection of invention patent application after publication |