CN112396733A - Alarm processing method and device, storage medium and electronic device - Google Patents

Alarm processing method and device, storage medium and electronic device Download PDF

Info

Publication number
CN112396733A
CN112396733A CN202011346220.1A CN202011346220A CN112396733A CN 112396733 A CN112396733 A CN 112396733A CN 202011346220 A CN202011346220 A CN 202011346220A CN 112396733 A CN112396733 A CN 112396733A
Authority
CN
China
Prior art keywords
door lock
intelligent door
alarm
target terminal
alarm state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011346220.1A
Other languages
Chinese (zh)
Inventor
曹丽君
钟仙凤
莫东燕
田丰源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011346220.1A priority Critical patent/CN112396733A/en
Publication of CN112396733A publication Critical patent/CN112396733A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/08Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind

Abstract

The application discloses an alarm processing method and device, a storage medium and an electronic device. Wherein, the method comprises the following steps: after detecting that the intelligent door lock enters an alarm state, sending a notification message to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal, so that part of false triggered alarms can be reduced, the technical problem that false alarms frequently occur in the intelligent door lock in the related technology can be solved, and the probability of alarm occurrence is reduced.

Description

Alarm processing method and device, storage medium and electronic device
Technical Field
The application relates to the field of security and protection, in particular to a method and device for processing an alarm, a storage medium and an electronic device.
Background
The intelligent door lock is an improved lock which is different from the traditional mechanical lock and is more intelligent, simple and convenient in the aspects of user safety, identification and manageability. The intelligent door lock is an execution component for locking a door in an access control system.
Along with the development of science and technology, people pay more and more attention to the safety problem at home, however along with the appearance of all kinds of locks, also can emerge a lot of corresponding problems, though for example the intelligence theftproof alarming function of lock is good. But also has the disadvantage of false alarms.
Aiming at the problem that false alarm often occurs in the intelligent door lock, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the application provides an alarm processing method and device, a storage medium and an electronic device, so as to at least solve the technical problem that false alarms often occur in an intelligent door lock in the related art.
According to an aspect of an embodiment of the present application, there is provided an alarm processing method, including: after detecting that the intelligent door lock enters an alarm state, sending a notification message to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal.
Optionally, when it is detected that the intelligent door lock enters an alarm state, acquiring the number of times of wrong input of a secret key on the intelligent door lock, and determining that the intelligent door lock enters the alarm state under the condition that the number of times of wrong input reaches a target threshold value; under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state; and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
Optionally, when the number of wrong inputs of the key on the intelligent door lock is obtained, the number of presses on a door handle of the intelligent door lock is obtained; acquiring the identification failure times when the intelligent door lock performs finger vein identification; and acquiring the password mistake-proofing times on the intelligent door lock.
Optionally, when determining whether to output an alarm signal according to a feedback result of the target terminal, the alarm of the intelligent door lock is released under the condition that an alarm releasing instruction fed back by the target terminal is received; and under the condition that the instruction for opening the intelligent door lock fed back by the target terminal is received, the alarm of the intelligent door lock is released.
Optionally, after sending a notification message to a target terminal, according to an instruction of the target terminal, transmitting an image acquired by a camera of the intelligent door lock to the target terminal to determine whether to alarm by mistake; detecting whether the intelligent door lock is configured with a mode of mistakenly touching the alarm, wherein the mode of mistakenly touching the alarm is configured for children and old people, and if the mode of mistakenly touching the alarm is started, the alarm is allowed to be directly released.
Optionally, after the intelligent door lock is detected to enter the alarm state, under the condition that the face of a householder is collected through a camera of the intelligent door lock, the alarm is released; and under the condition that the house main finger vein is identified through the intelligent door lock, the alarm is relieved.
Optionally, before the intelligent door lock is detected to enter an alarm state, the intelligent door lock is bound with a target mobile phone number, wherein the target mobile phone number is a mobile phone number used on the target terminal.
According to another aspect of the embodiments of the present application, there is also provided an apparatus for processing an alarm, including: the intelligent door lock system comprises a notification unit, a target terminal and a control unit, wherein the notification unit is used for sending a notification message to the target terminal after detecting that the intelligent door lock enters an alarm state, and the alarm state of the intelligent door lock is triggered by illegal intrusion; and the processing unit is used for determining whether to output an alarm signal according to the feedback result of the target terminal.
Optionally, the notification unit is further configured to, when it is detected that the smart door lock enters the alarm state, obtain a number of times of wrong input of a secret key on the smart door lock, and determine that the smart door lock enters the alarm state when the number of times of wrong input reaches a target threshold; under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state; and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
Optionally, the notification unit is further configured to acquire the number of presses on the door handle of the smart door lock when acquiring the number of wrong inputs of the key on the smart door lock; acquiring the identification failure times when the intelligent door lock performs finger vein identification; and acquiring the password mistake-proofing times on the intelligent door lock.
Optionally, the processing unit is further configured to, when it is determined whether to output an alarm signal according to a feedback result of the target terminal, cancel the alarm of the intelligent door lock in a case where an alarm cancellation instruction fed back by the target terminal is received; and under the condition that the instruction for opening the intelligent door lock fed back by the target terminal is received, the alarm of the intelligent door lock is released.
Optionally, the processing unit is further configured to transmit an image acquired by a camera of the intelligent door lock to a target terminal according to an instruction of the target terminal after sending a notification message to the target terminal, so as to determine whether to alarm by mistake; detecting whether the intelligent door lock is configured with a mode of mistakenly touching the alarm, wherein the mode of mistakenly touching the alarm is configured for children and old people, and if the mode of mistakenly touching the alarm is started, the alarm is allowed to be directly released.
Optionally, the processing unit is further configured to, after detecting that the intelligent door lock enters the alarm state, remove the alarm under the condition that a human face of a householder is acquired through a camera of the intelligent door lock; and under the condition that the house main finger vein is identified through the intelligent door lock, the alarm is relieved.
Optionally, the processing unit is further configured to bind the smart door lock with a target mobile phone number before detecting that the smart door lock enters an alarm state, where the target mobile phone number is a mobile phone number used on the target terminal.
According to another aspect of the embodiments of the present application, there is also provided a storage medium including a stored program which, when executed, performs the above-described method.
According to another aspect of the embodiments of the present application, there is also provided an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the above method through the computer program.
In the embodiment of the application, after the intelligent door lock is detected to enter the alarm state, a notification message is sent to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal, so that part of false triggered alarms can be reduced, the technical problem that false alarms frequently occur in the intelligent door lock in the related technology can be solved, and the probability of alarm occurrence is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of an alternative method of alert processing according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative false alarm resolution scheme according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative door lock identification scheme according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an alternative alarm processing device according to an embodiment of the present application;
and
fig. 5 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Along with the development of science and technology, people pay more and more attention to the safety problem at home, however along with the appearance of all kinds of locks, also can emerge a lot of corresponding problems, though for example the intelligence theftproof alarming function of lock is good. But also has the disadvantage of false alarms. In order to overcome the disadvantages, according to an aspect of the embodiments of the present application, an embodiment of an alarm processing method is provided, and functions such as a door lock false alarm cancellation method are developed. Fig. 1 is a flow chart of an alternative method for processing an alarm according to an embodiment of the present application, which may include the following steps, as shown in fig. 1:
step S1, after detecting that the intelligent door lock enters the alarm state, sending a notification message (such as sending a short message, instant messaging information, a mail and the like) to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock.
Optionally, when it is detected that the intelligent door lock enters the alarm state, acquiring the number of times of wrong input of the key on the intelligent door lock, and determining that the intelligent door lock enters the alarm state when the number of times of wrong input reaches a target threshold (for example, 5 times); under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state; and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
Optionally, when the number of wrong inputs of the key on the intelligent door lock is obtained, the number of presses on a door handle of the intelligent door lock is obtained; acquiring the identification failure times when the intelligent door lock performs finger vein identification; and acquiring the password mistake-proofing times on the intelligent door lock.
And step S2, determining whether to output an alarm signal according to the feedback result of the target terminal.
Optionally, when determining whether to output an alarm signal according to a feedback result of the target terminal, the alarm of the intelligent door lock is released under the condition that an alarm releasing instruction fed back by the target terminal is received; and under the condition that the instruction for opening the intelligent door lock fed back by the target terminal is received, the alarm of the intelligent door lock is released.
Optionally, after sending a notification message to a target terminal, according to an instruction of the target terminal, transmitting an image acquired by a camera of the intelligent door lock to the target terminal to determine whether to alarm by mistake; detecting whether the intelligent door lock is configured with a mode of mistakenly touching the alarm, wherein the mode of mistakenly touching the alarm is configured for children and old people, and if the mode of mistakenly touching the alarm is started, the alarm is allowed to be directly released.
Optionally, after the intelligent door lock is detected to enter the alarm state, under the condition that the face of a householder is collected through a camera of the intelligent door lock, the alarm is released; and under the condition that the house main finger vein is identified through the intelligent door lock, the alarm is relieved.
Optionally, before the intelligent door lock is detected to enter an alarm state, the intelligent door lock is bound with a target mobile phone number, wherein the target mobile phone number is a mobile phone number used on the target terminal.
Through the steps, after the intelligent door lock is detected to enter the alarm state, a notification message is sent to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal, so that part of false triggered alarms can be reduced, the technical problem that false alarms frequently occur in the intelligent door lock in the related technology can be solved, and the probability of alarm occurrence is reduced.
The invention can solve the problem of false alarm through simple operation, such as the old or children at home operating the door lock to alarm carelessly, and also can remove the alarm state through remote operation, thereby reducing unnecessary trouble. As an alternative example, as shown in fig. 2 and fig. 3, the following further details the technical solution of the present application with reference to specific embodiments.
The door lock detects the trial and error times of the user, and after the times reach the limited times and before the door lock enters the alarm state, the verification signal can be input through the bound mobile phone to enable the door lock to ignore the output of the alarm signal, or the door lock is selected to continuously keep the early warning state and the like.
(1) The trial and error times of the used door lock reach a certain number.
The mode of triggering the door lock alarm is as follows: firstly, the intelligent door lock can set a door handle pressing numerical value to determine whether a person attempts to enter, and the intelligent door lock enters an alarm state when the door handle pressing frequency reaches the set value; identifying through a camera arranged in the door lock, and entering an alarm state when the identification is abnormal; thirdly, the finger vein identification fails, or enters an alarm state after reaching a certain number of times; fourthly, entering an alarm state when the password input error reaches a certain number of times; and fifthly, the door lock is damaged and enters an alarm state. The user can manually set whether to start and the number of times.
(2) And (3) automatically identifying the door lock, sending the verification information to the mobile phone bound by the user, and determining whether the operation is misoperation, if so, executing (3), otherwise, executing (4).
How to judge whether to give a false alarm due to factors such as misoperation: if a person is at home, the person can be called to check; if no person exists, the user can remotely check the situation around the door lock by connecting camera equipment such as a door lock camera and the like; and thirdly, setting a mode that children and the old are easy to mistakenly touch the alarm, and if the children and the old are mistakenly touched, directly releasing the alarm.
(3) The user can remotely disarm the alarm and can choose whether to unlock it, if so, go (5), otherwise, go (6).
How to resolve after false alarm: if the user is not at home, an alarm prompt is generated, and the door lock can send verification information such as a verification code and the like to prompt whether the alarm is relieved or not; when the user is at home, after the false alarm is triggered, unlocking can be carried out through face recognition; and thirdly, when the user is at home, after the false alarm is triggered, unlocking can be performed through finger vein recognition.
After the alarm is released, the state is entered: firstly, the door lock can be directly unlocked by a user after the user receives the verification of the binding mobile phone; setting a state of removing the false alarm of the old or the child by the user; and thirdly, the user can continuously enter a safety monitoring state through setting.
(4) The operation of alarming or returning home and the like can be selected.
(5) And the user selects unlocking, and the door lock is opened.
(6) The door lock continues to maintain the security monitoring state.
By adopting the scheme, the problem that the door lock cannot be operated and removed after false alarm is solved; the alarm state can be timely and effectively relieved after the false alarm of the door lock; after determining whether the misoperation occurs, unlocking or alarming and the like can be selected; after the misoperation is confirmed, the safe protection state can be selected to be continued and the door lock can be opened.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
According to another aspect of the embodiments of the present application, there is also provided an alarm processing apparatus for implementing the above alarm processing method. Fig. 4 is a schematic diagram of an alternative alarm processing apparatus according to an embodiment of the present application, and as shown in fig. 4, the apparatus may include:
the notification unit 41 is configured to send a notification message to a target terminal after detecting that an intelligent door lock enters an alarm state, where the alarm state of the intelligent door lock is triggered by an illegal intrusion; and the processing unit 43 is configured to determine whether to output an alarm signal according to the feedback result of the target terminal.
It should be noted that the notification unit 41 in this embodiment may be configured to execute step S1 in this embodiment, and the processing unit 43 in this embodiment may be configured to execute step S2 in this embodiment.
Through the module, after detecting that the intelligent door lock enters an alarm state, sending a notification message to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal, so that part of false triggered alarms can be reduced, the technical problem that false alarms frequently occur in the intelligent door lock in the related technology can be solved, and the probability of alarm occurrence is reduced.
Optionally, the notification unit is further configured to, when it is detected that the smart door lock enters the alarm state, obtain a number of times of wrong input of a secret key on the smart door lock, and determine that the smart door lock enters the alarm state when the number of times of wrong input reaches a target threshold; under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state; and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
Optionally, the notification unit is further configured to acquire the number of presses on the door handle of the smart door lock when acquiring the number of wrong inputs of the key on the smart door lock; acquiring the identification failure times when the intelligent door lock performs finger vein identification; and acquiring the password mistake-proofing times on the intelligent door lock.
Optionally, the processing unit is further configured to, when it is determined whether to output an alarm signal according to a feedback result of the target terminal, cancel the alarm of the intelligent door lock in a case where an alarm cancellation instruction fed back by the target terminal is received; and under the condition that the instruction for opening the intelligent door lock fed back by the target terminal is received, the alarm of the intelligent door lock is released.
Optionally, the processing unit is further configured to transmit an image acquired by a camera of the intelligent door lock to a target terminal according to an instruction of the target terminal after sending a notification message to the target terminal, so as to determine whether to alarm by mistake; detecting whether the intelligent door lock is configured with a mode of mistakenly touching the alarm, wherein the mode of mistakenly touching the alarm is configured for children and old people, and if the mode of mistakenly touching the alarm is started, the alarm is allowed to be directly released.
Optionally, the processing unit is further configured to, after detecting that the intelligent door lock enters the alarm state, remove the alarm under the condition that a human face of a householder is acquired through a camera of the intelligent door lock; and under the condition that the house main finger vein is identified through the intelligent door lock, the alarm is relieved.
Optionally, the processing unit is further configured to bind the smart door lock with a target mobile phone number before detecting that the smart door lock enters an alarm state, where the target mobile phone number is a mobile phone number used on the target terminal.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules as a part of the apparatus may run in a corresponding hardware environment, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to another aspect of the embodiment of the present application, there is also provided a server or a terminal for implementing the method for processing an alarm.
Fig. 5 is a block diagram of a terminal according to an embodiment of the present application, and as shown in fig. 5, the terminal may include: one or more processors 201 (only one shown), memory 203, and transmission means 205, as shown in fig. 5, the terminal may further comprise an input-output device 207.
The memory 203 may be configured to store software programs and modules, such as program instructions/modules corresponding to the alarm processing method and apparatus in the embodiment of the present application, and the processor 201 executes various functional applications and data processing by running the software programs and modules stored in the memory 203, that is, implements the above alarm processing method. The memory 203 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 203 may further include memory located remotely from the processor 201, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 205 is used for receiving or sending data via a network, and can also be used for data transmission between a processor and a memory. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 205 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices to communicate with the internet or a local area Network. In one example, the transmission device 205 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Wherein the memory 203 is specifically used for storing application programs.
The processor 201 may call the application stored in the memory 203 via the transmission means 205 to perform the following steps:
after detecting that the intelligent door lock enters an alarm state, sending a notification message to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal.
The processor 201 is further configured to perform the following steps:
when the intelligent door lock is detected to enter an alarm state, acquiring the number of times of wrong input of a secret key on the intelligent door lock, and determining that the intelligent door lock enters the alarm state under the condition that the number of times of wrong input reaches a target threshold value; under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state; and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
It can be understood by those skilled in the art that the structure shown in fig. 5 is only an illustration, and the terminal may be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, etc. Fig. 5 is a diagram illustrating a structure of the electronic device. For example, the terminal may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 5, or have a different configuration than shown in FIG. 5.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Embodiments of the present application also provide a storage medium. Alternatively, in the present embodiment, the storage medium may be a program code for executing a processing method of an alarm.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
after detecting that the intelligent door lock enters an alarm state, sending a notification message to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock; and determining whether to output an alarm signal according to the feedback result of the target terminal.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
when the intelligent door lock is detected to enter an alarm state, acquiring the number of times of wrong input of a secret key on the intelligent door lock, and determining that the intelligent door lock enters the alarm state under the condition that the number of times of wrong input reaches a target threshold value; under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state; and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. A method for processing an alert, comprising:
after detecting that the intelligent door lock enters an alarm state, sending a notification message to a target terminal, wherein the alarm state of the intelligent door lock is triggered by illegal intrusion of the intelligent door lock;
and determining whether to output an alarm signal according to the feedback result of the target terminal.
2. The method of claim 1, wherein detecting that the smart door lock enters the alarm state comprises:
acquiring the number of times of wrong input of a secret key on the intelligent door lock, and determining that the intelligent door lock enters an alarm state under the condition that the number of times of wrong input reaches a target threshold value;
under the condition that the intelligent door lock is damaged, determining that the intelligent door lock enters an alarm state;
and the camera of the intelligent door lock is used for carrying out face recognition, and the intelligent door lock enters an alarm state when abnormal recognition occurs.
3. The method of claim 2, wherein obtaining the number of incorrect entries of the key on the smart door lock comprises at least one of:
acquiring the number of times of pressing on a door handle of the intelligent door lock;
acquiring the identification failure times when the intelligent door lock performs finger vein identification;
and acquiring the password mistake-proofing times on the intelligent door lock.
4. The method of claim 1, wherein determining whether to output an alarm signal according to the feedback result of the target terminal comprises:
under the condition that an alarm releasing instruction fed back by the target terminal is received, the alarm of the intelligent door lock is released;
and under the condition that the instruction for opening the intelligent door lock fed back by the target terminal is received, the alarm of the intelligent door lock is released.
5. The method of claim 1, wherein after sending the notification message to the target terminal, the method further comprises:
according to the indication of the target terminal, transmitting the image acquired by the camera of the intelligent door lock to the target terminal so as to determine whether to alarm by mistake;
detecting whether the intelligent door lock is configured with a mode of mistakenly touching the alarm, wherein the mode of mistakenly touching the alarm is configured for children and old people, and if the mode of mistakenly touching the alarm is started, the alarm is allowed to be directly released.
6. The method of claim 1, wherein after detecting that the smart door lock enters the alarm state, the method further comprises:
under the condition that the face of a house owner is collected through a camera of the intelligent door lock, the alarm is relieved;
and under the condition that the house main finger vein is identified through the intelligent door lock, the alarm is relieved.
7. The method according to any one of claims 1 to 6, wherein before detecting that the intelligent door lock enters the alarm state, the method further comprises:
and binding the intelligent door lock with a target mobile phone number, wherein the target mobile phone number is the mobile phone number used on the target terminal.
8. An apparatus for processing an alert, comprising:
the intelligent door lock system comprises a notification unit, a target terminal and a control unit, wherein the notification unit is used for sending a notification message to the target terminal after detecting that the intelligent door lock enters an alarm state, and the alarm state of the intelligent door lock is triggered by illegal intrusion;
and the processing unit is used for determining whether to output an alarm signal according to the feedback result of the target terminal.
9. A storage medium, characterized in that the storage medium comprises a stored program, wherein the program when executed performs the method of any of the preceding claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the method of any of the preceding claims 1 to 7 by means of the computer program.
CN202011346220.1A 2020-11-26 2020-11-26 Alarm processing method and device, storage medium and electronic device Pending CN112396733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011346220.1A CN112396733A (en) 2020-11-26 2020-11-26 Alarm processing method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011346220.1A CN112396733A (en) 2020-11-26 2020-11-26 Alarm processing method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN112396733A true CN112396733A (en) 2021-02-23

Family

ID=74605229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011346220.1A Pending CN112396733A (en) 2020-11-26 2020-11-26 Alarm processing method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN112396733A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112991593A (en) * 2021-03-19 2021-06-18 青岛海尔科技有限公司 Result notification method and apparatus, storage medium, and electronic apparatus

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201170913Y (en) * 2007-08-13 2008-12-24 茂名市郊区农电管理所 Power line anti-theft alarm
CN103218862A (en) * 2013-03-20 2013-07-24 上海研庆电子有限公司 Remote fingerprint password anti-theft intelligent lock
CN103452388A (en) * 2012-05-29 2013-12-18 希姆通信息技术(上海)有限公司 Alarming device and method and intelligent lock
CN105185066A (en) * 2015-10-15 2015-12-23 上海斐讯数据通信技术有限公司 Household intelligent cloud antitheft system and application method therefor
KR101640802B1 (en) * 2015-03-12 2016-07-20 주식회사 에스원 Mobile Alarm Card System of Door and Door Alarm Set-Clear Method thereof
CN107195036A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of method and its system of the improper unlocking of identification intelligent door lock
CN107316360A (en) * 2017-06-22 2017-11-03 成都智慧家信息技术有限公司 Intelligent access control system for security protection
CN107644479A (en) * 2017-08-25 2018-01-30 深圳市盛路物联通讯技术有限公司 A kind of safety door inhibition method and intelligent terminal based on intelligent video camera head
WO2018109240A1 (en) * 2016-12-13 2018-06-21 Talleres Aga, S.A. Safety lock
CN108412315A (en) * 2018-03-22 2018-08-17 深圳市创维群欣安防科技股份有限公司 A kind of intelligent door lock caution system and its control method
US20190295340A1 (en) * 2016-09-19 2019-09-26 Intel Corporation Internet of things smart entry
CN111340986A (en) * 2020-02-28 2020-06-26 广东科徕尼智能科技有限公司 Intelligent lock abnormity alarm method, intelligent lock and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201170913Y (en) * 2007-08-13 2008-12-24 茂名市郊区农电管理所 Power line anti-theft alarm
CN103452388A (en) * 2012-05-29 2013-12-18 希姆通信息技术(上海)有限公司 Alarming device and method and intelligent lock
CN103218862A (en) * 2013-03-20 2013-07-24 上海研庆电子有限公司 Remote fingerprint password anti-theft intelligent lock
KR101640802B1 (en) * 2015-03-12 2016-07-20 주식회사 에스원 Mobile Alarm Card System of Door and Door Alarm Set-Clear Method thereof
CN105185066A (en) * 2015-10-15 2015-12-23 上海斐讯数据通信技术有限公司 Household intelligent cloud antitheft system and application method therefor
US20190295340A1 (en) * 2016-09-19 2019-09-26 Intel Corporation Internet of things smart entry
WO2018109240A1 (en) * 2016-12-13 2018-06-21 Talleres Aga, S.A. Safety lock
CN107195036A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of method and its system of the improper unlocking of identification intelligent door lock
CN107316360A (en) * 2017-06-22 2017-11-03 成都智慧家信息技术有限公司 Intelligent access control system for security protection
CN107644479A (en) * 2017-08-25 2018-01-30 深圳市盛路物联通讯技术有限公司 A kind of safety door inhibition method and intelligent terminal based on intelligent video camera head
CN108412315A (en) * 2018-03-22 2018-08-17 深圳市创维群欣安防科技股份有限公司 A kind of intelligent door lock caution system and its control method
CN111340986A (en) * 2020-02-28 2020-06-26 广东科徕尼智能科技有限公司 Intelligent lock abnormity alarm method, intelligent lock and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112991593A (en) * 2021-03-19 2021-06-18 青岛海尔科技有限公司 Result notification method and apparatus, storage medium, and electronic apparatus

Similar Documents

Publication Publication Date Title
CN108537929B (en) Remote unlocking system and remote unlocking method
EP2857947B1 (en) Terminal device and unlocking method thereof
CN105530356B (en) Communication terminal and its data guard method and device
CN104850771A (en) Identity verification method and related equipment
CN103899156A (en) Door lock extensive application implementation method and door lock extensive application implementation system
CN110727938B (en) Configuration method and device of intelligent equipment, electronic equipment and storage medium
CN109979047A (en) Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock
CN104021327A (en) Method and device for unlocking intelligent device
CN108221270B (en) Shared washing machine control method, device and system based on embedded computer
CN112396733A (en) Alarm processing method and device, storage medium and electronic device
WO2016072833A1 (en) System and method to disable factory reset
CN101645124B (en) Method for unlocking PIN code and intelligent secret key device
CN109460648B (en) Computer data defense method
CN111768530B (en) Intelligent unlocking method and device
CN102411692B (en) Method, system and equipment for running terminal
TWI820007B (en) Method and device for displaying contact information and method and device for displaying information
CN105590361A (en) Intelligent antitheft door and method for remotely unlocking intelligent antitheft door
CN115952477A (en) User data protection system of safety computer
CN113205673A (en) Method and apparatus for controlling remote control apparatus, and storage medium
CN112581732B (en) Alarm triggering method and device, storage medium and electronic device
CN112734999A (en) Data processing method, device and system, electronic equipment and storage medium
KR101372575B1 (en) Emergency reporting system and method using disguised code
CN112614252B (en) Control method and device of intelligent door lock, storage medium and electronic device
CN112541168A (en) Data anti-theft method, system and storage medium
US10366225B2 (en) Method for allowing a configuration change of an intelligent electronic device of a power system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223