CN112785765A - Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform - Google Patents

Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform Download PDF

Info

Publication number
CN112785765A
CN112785765A CN202011567472.7A CN202011567472A CN112785765A CN 112785765 A CN112785765 A CN 112785765A CN 202011567472 A CN202011567472 A CN 202011567472A CN 112785765 A CN112785765 A CN 112785765A
Authority
CN
China
Prior art keywords
temporary
room
authorized
room door
authorizer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011567472.7A
Other languages
Chinese (zh)
Inventor
王剑涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Jiqi Network Technology Co ltd
Original Assignee
Nanjing Jiqi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Jiqi Network Technology Co ltd filed Critical Nanjing Jiqi Network Technology Co ltd
Priority to CN202011567472.7A priority Critical patent/CN112785765A/en
Publication of CN112785765A publication Critical patent/CN112785765A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2642Domotique, domestic, home control, automation, smart house

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an intelligent home remote control user authorization method based on big data analysis and an intelligent home cloud control platform, which are characterized in that each room door in a user house is counted, each room door is divided according to the corresponding importance level, and the classified importance level room doors are subjected to authorized crowd type setting and temporary authorization setting by adopting a user remote authorization mode, so that the authorized crowd type can enter the corresponding room door, a temporary authorized person can enter the room allowed to enter at the time point allowed to enter, the unauthorized people cannot enter the corresponding room door, the defect that the existing intelligent home remote authorization control mode has single function is overcome, the function of the existing intelligent home remote authorization control mode is perfected, the requirement that the user restricts the behavior of the authorized person from the specific action is met, and the privacy and property safety of the user is further guaranteed, the use experience of the user on the smart home is enhanced.

Description

Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform
Technical Field
The invention belongs to the technical field of intelligent home remote control, and particularly relates to an intelligent home remote control user authorization method based on big data analysis and an intelligent home cloud control platform.
Background
Along with the continuous improvement of people's standard of living, the continuous improvement of computer network information technology lets the continuous promotion of intelligent house's development, and intelligent house is through comfortable, safety, environmental protection and energy saving has obtained resident's liking. At present, the intelligent home is controlled by an access control system, people can remotely control any home equipment in the home at any time and any place through a mobile phone or the Internet, and other people can be authorized to remotely control the home equipment in the home in a remote authorization mode, so that the life of residents is greatly facilitated. However, for remote authorization control of smart homes, the current authorization control mode has a single function and is still imperfect, for example, smart access control is adopted, when a user needs to authorize other people to enter a user to handle items in a home, the user only wants the authorizer to handle in a specified room, and does not want the authorizer to enter other rooms, so that the user can only orally request the authorizer, and cannot restrict the behavior of the authorizer from specific actions, so that the user cannot know the actual behavior of the authorizer entering the home, and the problem that the property privacy safety of the user is difficult to guarantee is caused. Therefore, the current intelligent home remote authorization control mode cannot meet the requirement that the user restricts the behavior of an authorizer from specific actions.
Disclosure of Invention
In order to solve the problems, the invention takes an intelligent door control as an example, and provides an intelligent home remote control user authorization method and an intelligent home cloud control platform based on big data analysis.
The purpose of the invention can be realized by the following technical scheme:
in a first aspect, the invention provides an intelligent home remote control user authorization method based on big data analysis, which comprises the following steps;
s1, counting the number of doors of a family house: a user counts the number of room doors existing in a family house, and the names of the counted room doors are numbered according to a preset sequence and are respectively marked as 1,2.
S2, dividing the important grades of the room doors: comparing the names of the marked room doors according to the names of the room doors corresponding to the preset importance levels of the room doors to obtain the importance levels corresponding to the room doors, wherein the importance levels of the room doors comprise primary importance, secondary importance and tertiary importance;
s3, setting authorized crowd categories of all important-level room doors: the method comprises the steps that a user sets authorized crowd types for each important-level room door, wherein the authorized crowd types comprise family members, relatives, colleagues, classmates and neighbors, the number of persons contained in each authorized crowd is counted for each authorized crowd, the face features corresponding to each person are obtained at the same time, and then the face features of each person corresponding to each authorized crowd form a face feature information base corresponding to each authorized crowd;
s4, establishing an authorized crowd information base: the user sets authorized crowd types allowed to enter each important-level room door to obtain the authorized crowd types corresponding to each important-level room door to form an authorized crowd information base;
s5, acquiring and processing a face image: high-definition cameras are respectively arranged on the numbered room doors and are used for collecting face images of the doorways of the rooms, when a high-definition camera on a door of a certain room acquires a face image, the face image is stored, the definition of the face image is acquired, meanwhile, the definition of the acquired face image is compared with the preset standard face image definition, if the definition of the acquired face image is greater than the preset standard face image definition, stopping the acquisition, keeping the face image, if the definition of the acquired face image is less than the preset standard face image definition, removing the face image, collecting the face image by using the high-definition camera again until the definition of the collected face image is greater than the preset standard face image definition, stopping collecting, the face image is reserved, and the reserved face image is subjected to noise removal processing to obtain a processed face image;
s6, authorized crowd identification and processing: according to the number of the room door, acquiring the importance level corresponding to the room door, extracting the authorized crowd category corresponding to the importance level room door from the authorized crowd information base according to the importance level corresponding to the room door, extracting the face features from the processed face image, comparing and matching the face features with the face features of people in the face feature information base corresponding to the authorized crowd, if the matching is successful, opening the room door, allowing the people to enter, if the matching is failed, not opening the room door, not allowing the people to enter, comparing and matching the extracted face features with the face features of people in the face feature information base corresponding to various authorized crowds except the authorized crowd category corresponding to the importance level room door, comparing and matching the extracted face features with the face features of people in the face feature information base corresponding to other authorized crowds at the moment, if the face characteristics are different from the face characteristics corresponding to all the persons in the face characteristic information base corresponding to other authorized groups, the person corresponding to the face is determined to be an unauthorized group, at the moment, sound alarm is performed, an alarm signal is sent to the user, at the same time, the time point at the moment is recorded, and the time point at the moment and the face characteristics corresponding to the unauthorized group are sent to the user;
s7, temporary authorization setting: when a user needs to entrust a person temporarily to enter a home, temporary authorization setting is needed, wherein the temporary authorization setting comprises temporary authorizer setting, room door number setting allowed by the temporary authorizer to enter and access allowing time point and time length setting allowed by the temporary authorizer to enter each room door, and the face characteristics of the temporary authorizer, the room door number allowed by the temporary authorizer to enter and the access allowing time point and time length allowed by the temporary authorizer to enter each room door are obtained and stored in a temporary authorization database;
s8, temporary authorization processing after the temporary authorizer enters the room: when a temporary authorizer enters a house, when a camera on a certain room door collects a face image of the temporary authorizer, extracting face features of the temporary authorizer, matching the face features with the face features of the temporary authorizer in a temporary authorization database, if matching fails, not opening the room door, if matching succeeds, matching the number of the room door with the number of the room door allowed to enter by the temporary authorizer in the temporary authorization database, if matching fails, not opening the room door, if matching succeeds, obtaining the time point at the moment, further matching the time point with the time point allowed to enter the room door by the temporary authorizer in the temporary authorization database, if matching fails, not opening the room door, if matching succeeds, opening the room door, after opening, recording the opening time length of the room door, and simultaneously carrying out real-time recording the opening time length of the room door and the time allowed to enter by the temporary authorizer in the temporary authorization database And if the recorded opening time of the room door is equal to the time length of the temporary authorizer allowed to enter the room door, carrying out voice prompt to prompt the temporary authorizer to leave the room as soon as possible, simultaneously sending an upcoming timeout signal for the temporary authorizer to enter the room to the user, judging whether the time length of the temporary authorizer entering the room is prolonged or not by the user, if receiving an instruction sent by the user to prolong the time length of the temporary authorizer entering the room, continuously opening the room door, carrying out voice prompt to prolong the time length of the temporary authorizer entering the room, if not receiving the instruction sent by the user to prolong the time length of the temporary authorizer entering the room, closing the room door, carrying out voice alarm, and simultaneously sending an alarm signal to the user.
In an implementation manner of the first aspect of the present invention, the importance levels corresponding to the importance levels of the room door are respectively the highest importance level corresponding to the primary importance, the second importance level corresponding to the secondary importance, and the lowest importance level corresponding to the tertiary importance.
In an implementation manner of the first aspect of the present invention, in S5, the method further includes installing human body infrared sensors on each numbered room door respectively, where the human body infrared sensors are used for sensing approach of a human body, when the human body infrared sensors on a certain room door do not sense approach of a human body, the high definition cameras on the room doors are not started, when the human body is sensed to approach, the distance from the approaching human body to the room doors is obtained in real time through the human body infrared sensors, the obtained distance from the approaching human body to the room doors is compared with a preset approach distance threshold, and if the obtained distance is greater than the preset approach distance threshold, the high definition cameras on the room doors are started to perform face image acquisition on the approaching human body.
In an implementation manner of the first aspect of the present invention, the successful matching in S6 means that the extracted facial features are the same as the facial features of a person in the facial feature information base corresponding to the authorized group.
In an implementation manner of the first aspect of the present invention, the failure of matching in S6 means that the extracted facial features are different from facial features corresponding to all people in a facial feature information base corresponding to the authorized group.
In an implementation manner of the first aspect of the present invention, in S6, authorized crowd categories corresponding to the important-level room door are extracted from the authorized crowd information base, if only one authorized crowd category is extracted, the extracted face features are compared and matched with the face features of each person in the face feature information base corresponding to the authorized crowd, and if there is more than one authorized crowd category, the extracted face features are compared and matched with the face features of each person in the face feature information base corresponding to each extracted authorized crowd.
In an implementation manner of the first aspect of the present invention, in S8, after the temporary authorized person enters the room that the user allows to enter, the camera on the door of the room will follow the moving track of the temporary authorized person to capture a behavior video of the temporary authorized person entering the room, and then send the behavior video to the user.
In a second aspect, the invention provides an intelligent home cloud control platform, which includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is used for being in communication connection with at least one intelligent home remote control user authorization terminal, the machine-readable storage medium is used for storing a program, an instruction, or a code, and the processor is used for executing the program, the instruction, or the code in the machine-readable storage medium to execute the intelligent home remote control user authorization method based on big data analysis.
Based on any one of the above aspects, the invention has the following beneficial effects:
(1) according to the invention, each room door in the user house is counted, each room door is divided according to the corresponding importance level, and the authorized crowd type setting and the temporary authorization setting are carried out on each divided importance level room door in a user remote authorization mode, so that the authorized crowd type can enter the corresponding room door, the temporary authorized person can enter the room allowed to enter at the time point allowed to enter, the unauthorized people can not enter the corresponding room door, the defect that the function of the existing intelligent home remote authorization control mode is single is overcome, the function of the existing intelligent home remote authorization control mode is perfected, the requirement that the user restricts the behavior of the authorized person from the specific action is met, the property privacy safety of the user is further ensured, and the use experience of the user on the intelligent home is enhanced.
(2) According to the invention, the human body infrared sensors are respectively arranged on the room doors in the user house and used for sensing the approaching human body, when the approach of the human body is sensed and the distance between the approaching human body and the room door is greater than the preset approach distance threshold value, the high-definition camera on the room door is started to carry out face image acquisition on the approaching human body, so that the waste of equipment resources caused by the fact that the high-definition camera continues to work when no human body approaches is avoided, and the utilization rate of the equipment resources is improved.
(3) When the temporary authorization is set, the number of the room door allowing the temporary authorizer to enter and the time point and the time length of the room door allowing the temporary authorizer to enter are set, so that a foundation is laid for limiting the behavior of the temporary authorizer later, after the temporary authorizer enters the room allowing the user to enter, the behavior video of the temporary authorizer entering the room is shot and sent to the user, the user can visually know the behavior condition of the temporary authorizer entering the room, the user can conveniently check whether the behavior of the temporary authorizer entering the room violates the privacy of the user, further the targeted processing is carried out, and the privacy safety of the user is further guaranteed.
Drawings
The invention is further illustrated by means of the attached drawings, but the embodiments in the drawings do not constitute any limitation to the invention, and for a person skilled in the art, other drawings can be obtained on the basis of the following drawings without inventive effort.
FIG. 1 is a flow chart of the method steps of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a first aspect of the present invention provides a smart home remote control user authorization method based on big data analysis, including the following steps:
s1, counting the number of doors of a family house: a user counts the number of room doors existing in a family house, and the names of the counted room doors are numbered according to a preset sequence and are respectively marked as 1,2.. i.. n, wherein the room doors counted by the embodiment can comprise a house gate, a kitchen door, a bathroom door, a balcony door, a bedroom door, a book room door and the like;
s2, dividing the important grades of the room doors: comparing the names of the marked room doors according to the names of the room doors corresponding to the preset importance levels of the room doors to obtain the importance levels corresponding to the room doors, wherein the importance levels of the room doors comprise primary importance, secondary importance and tertiary importance, the importance levels corresponding to the importance levels of the room doors are respectively the lowest importance level corresponding to the primary importance, the second importance level is the lowest importance level corresponding to the secondary importance, and the third importance level is the highest importance level corresponding to the tertiary importance;
in the embodiment, the marked room doors are classified into the important grades, the higher the important grade of the room door is, the higher the corresponding important degree of the room door is, wherein the residential door and the bathroom door can be classified into the first-grade important, the kitchen door and the bedroom door can be classified into the second-grade important, the study can be classified into the third-grade important, and the authorized people who are classified into the room doors of the important grades are well laid;
s3, setting authorized crowd categories of all important-level room doors: the method comprises the steps that a user carries out authorized crowd category setting on each important-level room door, wherein the authorized crowd categories comprise family members, relatives, colleagues, classmates and neighbors, the number of persons contained in each authorized crowd is counted for each authorized crowd, the face features corresponding to the persons are obtained at the same time, and then the face features of the persons corresponding to each authorized crowd form a face feature information base corresponding to each authorized crowd;
s4, establishing an authorized crowd information base: the user sets authorized crowd types allowed to enter each important-level room door to obtain the authorized crowd types corresponding to each important-level room door to form an authorized crowd information base;
s5, acquiring and processing a face image: respectively installing a human body infrared sensor and a high-definition camera on each numbered room door, wherein the human body infrared sensor is used for sensing the approach of a human body, the high-definition camera is used for collecting a face image of the door of each room, when the human body infrared sensor on one room door does not sense the approach of the human body, the high-definition camera on the room door is not started, when the human body is sensed to approach, the distance between the approaching human body and the room door is obtained in real time through the human body infrared sensor, the obtained distance between the approaching human body and the room door is compared with a preset approach distance threshold value, if the obtained distance is larger than the preset approach distance threshold value, the high-definition camera on the room door is started to collect the face image of the approaching human body, when the high-definition camera collects the face image, the face image is stored, and the definition of the face image is obtained, simultaneously comparing the definition of the acquired face image with the definition of a preset standard face image, stopping acquisition and retaining the face image if the definition of the acquired face image is greater than the definition of the preset standard face image, removing the face image if the definition of the acquired face image is less than the definition of the preset standard face image, acquiring the face image again by using a high-definition camera, stopping acquisition until the definition of the acquired face image is greater than the definition of the preset standard face image, retaining the face image, and performing denoising processing on the retained face image to obtain a processed face image;
in the embodiment, the human body infrared sensors are respectively installed on the room doors in the user house and used for sensing the approaching human body, when the approach of the human body is sensed and the distance between the approaching human body and the room door is greater than the preset approach distance threshold value, the high-definition camera on the room door is started to acquire the face image of the approaching human body, so that the waste of equipment resources caused by the fact that the high-definition camera continues to work when no human body approaches is avoided, and the utilization rate of the equipment resources is improved;
s6, authorized crowd identification and processing: according to the serial number of the room door, acquiring the importance level corresponding to the room door, extracting the authorized crowd category corresponding to the importance level room door from the authorized crowd information base according to the importance level corresponding to the room door, extracting the face features from the processed face image, comparing and matching the extracted face features with the face features of people in the face feature information base corresponding to the authorized crowd if only one authorized crowd category is extracted, comparing and matching the extracted face features with the face features of people in the face feature information base corresponding to the extracted authorized crowd if not, wherein if the matching is successful, the matching is the same as the face features of a certain person in the face feature information base corresponding to the authorized crowd, if the matching fails, the room door is not opened and the entrance is not allowed, the extracted face features are compared and matched with the face features of persons in the face feature information libraries corresponding to other authorized groups except the authorized group category corresponding to the important-level room door in the face feature information libraries corresponding to the various authorized groups, if the face features are the same as the face features of a person in the face feature information libraries corresponding to the other authorized groups, the person corresponding to the face is one of the authorized groups, and voice prompt is performed to prompt that the person corresponding to the face is not the authorized group corresponding to the room door, if the human face characteristics are different from the human face characteristics corresponding to all the people in the human face characteristic information base corresponding to other authorized people, the people corresponding to the human face are indicated to be unauthorized people, at the moment, sound alarm is carried out, an alarm signal is sent to the user, at the same time, the time point at the moment is recorded, and then the time point at the moment and the human face characteristics corresponding to the unauthorized people are sent to the user;
according to the embodiment, the unauthorized people are subjected to alarm processing, and the time point and the face characteristics corresponding to the unauthorized people are sent to the user, so that the user can find the unauthorized people in time conveniently and further process the unauthorized people, and the property loss of the user caused by the unauthorized people is avoided;
s7, temporary authorization setting: when a user needs to entrust a person temporarily to enter a home, temporary authorization setting is needed, wherein the temporary authorization setting comprises temporary authorizer setting, room door number setting allowed by the temporary authorizer to enter and access allowing time point and time length setting allowed by the temporary authorizer to enter each room door, and the face characteristics of the temporary authorizer, the room door number allowed by the temporary authorizer to enter and the access allowing time point and time length allowed by the temporary authorizer to enter each room door are obtained and stored in a temporary authorization database;
the embodiment lays a foundation for limiting and restricting the behavior of the temporary authorizer later by setting the number of the room door which the temporary authorizer allows to enter and the time point and the time length of the room door which the temporary authorizer allows to enter;
s8, temporary authorization processing after the temporary authorizer enters the room: when a temporary authorizer enters a home, when a camera on a certain room door collects a face image of the temporary authorizer, extracting the face characteristics of the temporary authorizer, matching the face characteristics with the face characteristics of the temporary authorizer in a temporary authorization database, if the matching fails, not opening the room door, if the matching succeeds, matching the number of the room door with the number of the room door allowed to enter by the temporary authorizer in the temporary authorization database, if the matching fails, not opening the room door, if the matching succeeds, acquiring the time point, further matching the time point with the time point allowed to enter the room door by the temporary authorizer in the temporary authorization database, if the matching fails, not opening the room door, if the matching succeeds, opening the room door, and when the temporary authorizer enters the room allowed to enter by a user, shooting a behavior video after the temporary authorizer enters the room by following the moving track of the temporary authorizer by the camera on the room door, and then send to the user, for the user to know the behavior condition after the temporary authorizer enters the room intuitively, the user can check whether the behavior after the temporary authorizer enters the room violates the user privacy, and then perform the targeted processing, at the same time, after the room is opened, the opening duration is recorded, and the recorded opening duration of the room door is compared with the allowable entering duration of the temporary authorizer allowed to enter the room door in the temporary authorization database in real time, if the recorded opening duration of the room door is equal to the allowable entering duration of the temporary authorizer allowed to enter the room door, a voice prompt is performed to prompt the temporary authorizer to leave the room as soon as possible, and simultaneously a signal that the temporary authorizer enters the room and is about to overtime is sent to the user, the user judges whether the time that the temporary authorizer enters the room is prolonged, if an instruction sent by the user to allow the temporary authorizer to enter the room is received, the room door is continuously opened, the time length of the temporary authorizer entering the room is prolonged through voice prompt, if the instruction which is sent by the user and allows the time length of the temporary authorizer entering the room to be prolonged is not received, the room door is closed, sound alarm is carried out, meanwhile, an alarm signal is sent to the user, the user carries out next processing, the requirement that the user restricts the behavior of the authorizer from specific actions is met, property privacy safety of the user is greatly guaranteed, and the use experience of the user on the smart home is enhanced.
A second aspect of the present invention provides an intelligent home cloud control platform, where the cloud control platform includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected by a bus system, the network interface is used for communicating with at least one intelligent home remote control user authorization terminal, the machine-readable storage medium is used for storing a program, an instruction, or a code, such as a program instruction/module corresponding to the intelligent home remote control user authorization method in the embodiment of the present invention, and the processor is used for executing the program, the instruction, or the code in the machine-readable storage medium, so as to execute the intelligent home remote control user authorization method based on big data analysis according to the present invention.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (8)

1. An intelligent home remote control user authorization method based on big data analysis is characterized in that: comprises the following steps;
s1, counting the number of doors of a family house: a user counts the number of room doors existing in a family house, and the names of the counted room doors are numbered according to a preset sequence and are respectively marked as 1,2.
S2, dividing the important grades of the room doors: comparing the names of the marked room doors according to the names of the room doors corresponding to the preset importance levels of the room doors to obtain the importance levels corresponding to the room doors, wherein the importance levels of the room doors comprise primary importance, secondary importance and tertiary importance;
s3, setting authorized crowd categories of all important-level room doors: the method comprises the steps that a user sets authorized crowd types for each important-level room door, wherein the authorized crowd types comprise family members, relatives, colleagues, classmates and neighbors, the number of persons contained in each authorized crowd is counted for each authorized crowd, the face features corresponding to each person are obtained at the same time, and then the face features of each person corresponding to each authorized crowd form a face feature information base corresponding to each authorized crowd;
s4, establishing an authorized crowd information base: the user sets authorized crowd types allowed to enter each important-level room door to obtain the authorized crowd types corresponding to each important-level room door to form an authorized crowd information base;
s5, acquiring and processing a face image: high-definition cameras are respectively arranged on the numbered room doors and are used for collecting face images of the doorways of the rooms, when a high-definition camera on a door of a certain room acquires a face image, the face image is stored, the definition of the face image is acquired, meanwhile, the definition of the acquired face image is compared with the preset standard face image definition, if the definition of the acquired face image is greater than the preset standard face image definition, stopping the acquisition, keeping the face image, if the definition of the acquired face image is less than the preset standard face image definition, removing the face image, collecting the face image by using the high-definition camera again until the definition of the collected face image is greater than the preset standard face image definition, stopping collecting, the face image is reserved, and the reserved face image is subjected to noise removal processing to obtain a processed face image;
s6, authorized crowd identification and processing: according to the number of the room door, acquiring the importance level corresponding to the room door, extracting the authorized crowd category corresponding to the importance level room door from the authorized crowd information base according to the importance level corresponding to the room door, extracting the face features from the processed face image, comparing and matching the face features with the face features of people in the face feature information base corresponding to the authorized crowd, if the matching is successful, opening the room door, allowing the people to enter, if the matching is failed, not opening the room door, not allowing the people to enter, comparing and matching the extracted face features with the face features of people in the face feature information base corresponding to various authorized crowds except the authorized crowd category corresponding to the importance level room door, comparing and matching the extracted face features with the face features of people in the face feature information base corresponding to other authorized crowds at the moment, if the face characteristics are different from the face characteristics corresponding to all the persons in the face characteristic information base corresponding to other authorized groups, the person corresponding to the face is determined to be an unauthorized group, at the moment, sound alarm is performed, an alarm signal is sent to the user, at the same time, the time point at the moment is recorded, and the time point at the moment and the face characteristics corresponding to the unauthorized group are sent to the user;
s7, temporary authorization setting: when a user needs to entrust a person temporarily to enter a home, temporary authorization setting is needed, wherein the temporary authorization setting comprises temporary authorizer setting, room door number setting allowed by the temporary authorizer to enter and access allowing time point and time length setting allowed by the temporary authorizer to enter each room door, and the face characteristics of the temporary authorizer, the room door number allowed by the temporary authorizer to enter and the access allowing time point and time length allowed by the temporary authorizer to enter each room door are obtained and stored in a temporary authorization database;
s8, temporary authorization processing after the temporary authorizer enters the room: when a temporary authorizer enters a house, when a camera on a certain room door collects a face image of the temporary authorizer, extracting face features of the temporary authorizer, matching the face features with the face features of the temporary authorizer in a temporary authorization database, if matching fails, not opening the room door, if matching succeeds, matching the number of the room door with the number of the room door allowed to enter by the temporary authorizer in the temporary authorization database, if matching fails, not opening the room door, if matching succeeds, obtaining the time point at the moment, further matching the time point with the time point allowed to enter the room door by the temporary authorizer in the temporary authorization database, if matching fails, not opening the room door, if matching succeeds, opening the room door, after opening, recording the opening time length of the room door, and simultaneously carrying out real-time recording the opening time length of the room door and the time allowed to enter by the temporary authorizer in the temporary authorization database And if the recorded opening time of the room door is equal to the time length of the temporary authorizer allowed to enter the room door, carrying out voice prompt to prompt the temporary authorizer to leave the room as soon as possible, simultaneously sending an upcoming timeout signal for the temporary authorizer to enter the room to the user, judging whether the time length of the temporary authorizer entering the room is prolonged or not by the user, if receiving an instruction sent by the user to prolong the time length of the temporary authorizer entering the room, continuously opening the room door, carrying out voice prompt to prolong the time length of the temporary authorizer entering the room, if not receiving the instruction sent by the user to prolong the time length of the temporary authorizer entering the room, closing the room door, carrying out voice alarm, and simultaneously sending an alarm signal to the user.
2. The smart home remote control user authorization method based on big data analysis according to claim 1, characterized in that: the importance degrees corresponding to the importance levels of the room door are respectively the highest importance degree corresponding to the primary importance, the second importance degree corresponding to the secondary importance and the lowest importance degree corresponding to the tertiary importance.
3. The smart home remote control user authorization method based on big data analysis according to claim 1, characterized in that: still include in S5 and install human infrared sensor on each room door after the serial number respectively for respond to being close to of human body, when human infrared sensor on certain room door does not sense the human body and is close to, then do not start the high definition digtal camera on this room door, when sensing the human body and being close to, obtain this distance of this human body that is close to apart from this room door through human infrared sensor in real time this moment, and compare this distance of this human body that is close to apart from this room door that will acquire with the distance threshold value that is close to that predetermines, if be greater than predetermined distance threshold value that is close to, then start the high definition digtal camera on this room door and carry out the facial image to this human body that is close to and gather.
4. The smart home remote control user authorization method based on big data analysis according to claim 1, characterized in that: the successful matching in the step S6 means that the extracted face features are the same as the face features of a person in the face feature information base corresponding to the authorized group.
5. The smart home remote control user authorization method based on big data analysis according to claim 1, characterized in that: the matching failure in the step S6 means that the extracted face features are different from the face features corresponding to all the people in the face feature information base corresponding to the authorized people.
6. The smart home remote control user authorization method based on big data analysis according to claim 1, characterized in that: and in the step S6, authorized crowd categories corresponding to the important-level room door are extracted from the authorized crowd information base, if only one authorized crowd category is extracted, the extracted face features are compared and matched with the face features of the persons in the face feature information base corresponding to the authorized crowd, and if more than one authorized crowd category is extracted, the extracted face features are compared and matched with the face features of the persons in the face feature information base corresponding to the authorized crowd.
7. The smart home remote control user authorization method based on big data analysis according to claim 1, characterized in that: in S8, when the temporary authorizer enters the room that the user allows to enter, the camera on the door of the room will follow the moving track of the temporary authorizer to capture the behavior video of the temporary authorizer after entering the room, and then send the behavior video to the user.
8. The utility model provides an intelligence house cloud control platform which characterized in that: the cloud control platform comprises a processor, a machine-readable storage medium and a network interface, wherein the machine-readable storage medium, the network interface and the processor are connected through a bus system, the network interface is used for being in communication connection with at least one smart home remote control user authorization terminal, the machine-readable storage medium is used for storing programs, instructions or codes, and the processor is used for executing the programs, the instructions or the codes in the machine-readable storage medium so as to execute the smart home remote control user authorization method based on big data analysis according to any one of claims 1 to 7.
CN202011567472.7A 2020-12-25 2020-12-25 Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform Withdrawn CN112785765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011567472.7A CN112785765A (en) 2020-12-25 2020-12-25 Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011567472.7A CN112785765A (en) 2020-12-25 2020-12-25 Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform

Publications (1)

Publication Number Publication Date
CN112785765A true CN112785765A (en) 2021-05-11

Family

ID=75752607

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011567472.7A Withdrawn CN112785765A (en) 2020-12-25 2020-12-25 Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform

Country Status (1)

Country Link
CN (1) CN112785765A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113810667A (en) * 2021-11-19 2021-12-17 成都旺小宝科技有限公司 Channel wind control system based on video backtracking mode
CN115826422A (en) * 2022-10-21 2023-03-21 广州视声智能股份有限公司 Household equipment control method and device based on artificial intelligence

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113810667A (en) * 2021-11-19 2021-12-17 成都旺小宝科技有限公司 Channel wind control system based on video backtracking mode
CN113810667B (en) * 2021-11-19 2022-02-08 成都旺小宝科技有限公司 Channel wind control system based on video backtracking mode
CN115826422A (en) * 2022-10-21 2023-03-21 广州视声智能股份有限公司 Household equipment control method and device based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN111080994B (en) Intelligent security system based on Internet of things
CN112991585B (en) Access personnel management method and computer readable storage medium
CN108399671A (en) A kind of Internet of Things vena metacarpea video gate inhibition integrated system
CN108171840A (en) A kind of building control system based on recognition of face
CN105741392A (en) Visitor recording system and method of community access control management system
CN112785765A (en) Intelligent home remote control user authorization method based on big data analysis and intelligent home cloud control platform
US11676433B2 (en) Enhanced property access with video analytics
WO2021174991A1 (en) 5g technology-based facial recognition smart lock control system
CN112734988A (en) Forced unlocking judging and alarming system and method for intelligent door lock
CN111063088A (en) Control method of intelligent building intercom system
CN111800617A (en) Intelligent security system based on Internet of things
CN108320359A (en) A kind of city Internet of Things wisdom gate inhibition and safety-protection system
CN110942580A (en) Intelligent building visitor management method and system and storage medium
CN110930577A (en) Method for analyzing unregistered but actually living in personnel based on entrance guard data
CN105976469A (en) Intelligent doorkeeper management system with robot and application thereof
CN111429638B (en) Access control method based on voice recognition and face recognition
CN114898443A (en) Face data acquisition method and device
CN110992543A (en) Control method of building intercom system
CN112002052A (en) Data sharing method for smart community
CN113114969B (en) Intelligent video intercom monitoring system and intercom monitoring method for intelligent building based on big data
CN107705409A (en) A kind of concealed intelligent gate control system and its control method
CN207397368U (en) A kind of concealed intelligent access control system
CN111915788A (en) Anti-trailing method and system based on face recognition technology
CN110992553A (en) Access control system with face recognition function and use method
CN114648831B (en) Intelligent door lock control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210511