CN113914716A - Event detection method and door sensor - Google Patents

Event detection method and door sensor Download PDF

Info

Publication number
CN113914716A
CN113914716A CN202010651295.4A CN202010651295A CN113914716A CN 113914716 A CN113914716 A CN 113914716A CN 202010651295 A CN202010651295 A CN 202010651295A CN 113914716 A CN113914716 A CN 113914716A
Authority
CN
China
Prior art keywords
external force
event
door body
door
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010651295.4A
Other languages
Chinese (zh)
Inventor
林友钦
李名轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leedarson Lighting Co Ltd
Zhangzhou Lidaxin Optoelectronic Technology Co ltd
Original Assignee
Leedarson Lighting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leedarson Lighting Co Ltd filed Critical Leedarson Lighting Co Ltd
Priority to CN202010651295.4A priority Critical patent/CN113914716A/en
Publication of CN113914716A publication Critical patent/CN113914716A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • E05B47/0002Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B15/00Other details of locks; Parts for engagement by bolts of fastening devices
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/06Electric alarm locks

Landscapes

  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application provides an event detection method and a door sensor, which are applicable to the technical field of security and protection processing, and are applied to the door sensor, wherein the door sensor is installed on a door body, and the event detection method comprises the following steps: detecting external force data borne by the door body; identifying an operation event corresponding to the door body according to the external force data; and if the operation event belongs to the preset type of event, acquiring a response strategy associated with the operation event, and responding to the event according to the response strategy. The door magnetism intelligent degree of this application embodiment is higher. And the personal and property safety of the user can be effectively improved.

Description

Event detection method and door sensor
Technical Field
The application belongs to the technical field of security and protection, and particularly relates to an event detection method and a door sensor.
Background
The door magnet is a device which is arranged at a space entrance door body and is used for detecting whether the door body is opened or not. The door body can be a door, a window, a drawer or a cover and the like according to different space conditions. For example, when the space is a room, the door body may be a door of the room, or may be a window of the room. When the space is a box, the door body is a cover of the box. And when the space is a drawer, the door body can be the drawer.
With the advancement of technology, the concept of smart door magnets has emerged in succession. The intelligent door magnets can be connected into the Internet of things, and whether the door body is normally closed or not can be identified according to the use habits of users. When the fact that the user forgets to close the door body is identified, or when the user is not at home but detects that the door body is opened, a prompt can be sent to the user through the Internet of things, so that intelligent detection of the door body switch is achieved. Thus, although the intellectualization of the door magnet can be realized to a certain extent, the intellectualization degree is still low, and the ever-increasing requirements of users cannot be met.
Disclosure of Invention
In view of this, the embodiment of the present application provides an event detection method and a door sensor, which can solve the problem of low intelligence degree of the door sensor.
A first aspect of an embodiment of the present application provides an event detection method, which is applied to a door magnet, where the door magnet is installed on a door body, and the event detection method includes:
detecting external force data borne by the door body;
identifying an operation event corresponding to the door body according to the external force data;
and if the operation event belongs to the preset type of event, acquiring a response strategy associated with the operation event, and responding to the event according to the response strategy.
A second aspect of the embodiments of the present application provides a door sensor, where the door sensor includes a memory and a processor, where the memory stores a computer program executable on the processor, and the processor implements the steps of the event detection method according to any one of the first aspect when executing the computer program.
A third aspect of embodiments of the present application provides a computer-readable storage medium, comprising: there is stored a computer program, characterized in that the computer program, when executed by a processor, causes a door magnet to carry out the steps of the event detection method according to any one of the above-mentioned first aspects.
A fourth aspect of the embodiments of the present application provides a computer program product, which, when running on a door sensor, causes the door sensor to implement the steps of the event detection method according to any one of the first aspect.
Compared with the prior art, the embodiment of the application has the advantages that: the door magnet can detect the external force data born by the door body. And the external force data can be processed to determine the corresponding operation event, so that the condition of the door body being operated can be identified. And finally, when the operation event is the event of the preset type, responding according to the corresponding response strategy. Therefore, in the embodiment of the application, the door magnet can realize the identification and effective handling of the door body operation event, namely, the effective identification and handling of the door body illegal opening and other conditions. Therefore, compared with some existing door magnets, the door magnet provided by the embodiment of the application has a higher intelligentization degree. And the personal and property safety of the user can be effectively improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an implementation of an event detection method provided in an embodiment of the present application;
fig. 2 is a schematic view of a gate magnet provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
For the sake of understanding, the embodiments of the present application will be briefly described herein:
some existing door magnets can be connected into the Internet of things, and whether the door body is normally closed or not can be identified according to the use habits of users. When the fact that the user forgets to close the door body is recognized, or when the user is not at home but detects that the door body is opened, a prompt can be sent to the user through the Internet of things. Thus, although a certain degree of door magnet intelligence can be realized, the degree of intelligence is lower.
In actual life and work, some illegal members sometimes open the door body by various illegal means to conduct criminal behaviors. At the moment, certain dangers exist in the property and personal safety of the user. In order to recognize the illegally opened door body (hereinafter, referred to as an illegally opened door), it may be set that all the door bodies are opened illegally when the user is not at home. However, this has at least the following problems:
1. when the space is small volume such as a drawer and a box, the illegal door opening identification cannot be carried out by using the method.
2. Therefore, only whether the door is opened illegally can be identified, and specific door opening behaviors cannot be identified, so that subsequent targeted processing is difficult.
Therefore, the degree of intellectualization of the door magnet is low, and it is difficult to intelligently recognize the situation that the door body is illegally opened.
In order to improve the intelligentization degree of the door magnet, the conditions of illegal opening of the door body and the like are effectively identified. According to the embodiment of the application, certain events needing to be responded, such as drilling events when the door body is violently damaged by a drilling machine and events that the door body is illegally unlocked, are preset according to actual requirements. And sets a corresponding response strategy for the preset events, such as sounding an alarm or pushing alarm information to the user. On this basis, after the door magnetism is installed at the door body, the door magnetism can detect the external force data that the door body bore through the sensor that inside was provided. And the external force data can be processed to determine the corresponding operation event, so that the condition of the door body being operated can be identified. And finally, when the operation event is a preset event, responding according to a corresponding response strategy. Therefore, in the embodiment of the application, the door magnet can realize the identification and effective handling of the door body operation event, namely, the effective identification and handling of the door body illegal opening and other conditions. Therefore, compared with some existing door magnets, the door magnet provided by the embodiment of the application has a higher intelligentization degree.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples. In this application embodiment, the door magnetism is installed on the door body to realize the detection to the door body atress condition. The specific installation position of the door magnet is not limited too much here, and can be set by a technician according to the actual situation.
Fig. 1 shows a flowchart of an implementation of an event detection method provided in an embodiment of the present application, which is detailed as follows:
and S101, detecting external force data borne by the door body by the door magnet.
In consideration of the actual situation, when someone operates the door body, such as knocking, pushing and prying the door, the door body can bear certain external force. Therefore, in order to realize the identification of the door body operation event, the embodiment of the application can detect the stress condition of the door body and obtain corresponding external force data. The specific detection method is not limited herein, and can be set by a technician. As an alternative embodiment of the present application, it is considered that the door body may vibrate when being stressed. Therefore, a sensor capable of detecting stress or vibration can be arranged in the door magnet. For example, an acceleration sensor or a vibration sensor may be provided.
It should be noted that, when sensors such as acceleration sensors or vibration sensors are used to detect stress, the external force data in the embodiment of the present application refers to corresponding data detected by the sensors themselves. For example, when an acceleration sensor is used for detection, the external force data refers to corresponding acceleration data. When the vibration sensor is used for detection, the corresponding vibration data is referred to.
And S102, identifying the operation event corresponding to the door body by the door magnet according to the external force data.
In the embodiment of the application, the operation behaviors possibly encountered by the door body are sorted in advance, and corresponding operation events are set for the operation behaviors. For example, in the case of a person knocking the door, a knock event may be set for the knock behavior. And an illegal unlocking event can be set for illegal unlocking behavior under the condition that someone unlocks illegally. And then, recognizing the event through external force data, and further determining the specific operation behavior. The embodiment of the present application does not limit the types and the number of the operation events, and the operation events can be selected or set by a technician according to the actual situation.
After the external force data are obtained, the external force data can be analyzed, so that the stress analysis of the door body is realized, and the specific operation event corresponding to the door body is determined. The specific analysis method is not limited herein, and can be selected or set by a technician according to actual needs. For example, in some alternative embodiments, the force applied by the user is generally moderate and regular in magnitude when considering normal opening of the door body. For some behaviors of violently opening the door body and trying to illegally unlock and open the door body, the force application magnitude is obviously different from the normal force application magnitude of the user. Thus, the magnitude of the external force can be used to distinguish the operation event.
There are various attributes to consider external force, such as magnitude of external force, frequency of external force, and duration of external force. The values of these attributes may differ in different operational event scenarios. It is therefore theoretically possible to use these cases of external force properties to achieve a differentiated identification of different operating events. In practical application, however, according to different requirements for classification and identification accuracy of operation events, specific attribute conditions adopted in event identification may have certain differences. For example, only one of the external force magnitude, the external force frequency and the external force duration may be referred to, or a plurality of attributes thereof may be referred to simultaneously. Based on the principle, the external force attribute used in practice is not limited too much in the embodiment of the application, and can be selected or set by technical personnel according to practical requirements. Based on this, after determining the required used attribute, in the operation of identifying the external force data in S102, it means that the corresponding attribute data of the external force data is analyzed. For example, when only the attribute of the external force magnitude is selected for analysis, in this case, in S102, the external force magnitude of the external force data is analyzed to determine the corresponding operation event.
S103, if the operation event belongs to the preset type event, the door magnet obtains a response strategy associated with the operation event, and carries out event response according to the response strategy.
In practice, it is found that the kinds of operation behaviors can be very many, such as common door knocking, normal unlocking and accidental door hitting, as well as some illegal drilling machines breaking doors, impacting hammers hitting doors, illegal unlocking and the like. Some of these operations need to be responded to, so as to protect the personal and property safety of the user by informing the user or warning illegal members. But also has the daily normal behaviors that partial behaviors belong to, and does not need to respond, such as normal unlocking. Therefore, the embodiment of the present application may classify the operation events in advance, and classify the events that need to be responded into one type (in the embodiment of the present application, the type is referred to as a preset type). After the specific operation event is determined, whether the operation event belongs to the preset type or not is determined, and if the operation event belongs to the preset type, the operation event needs to be responded. In addition, in order to achieve reasonable and effective response to the operation event, in the embodiment of the present application, a response policy for responding to each actual setting in the preset type is also set in advance. And when the operation event is determined to be in need of response, responding according to the corresponding response strategy. The embodiment of the application does not excessively limit specific operation events contained in the preset types and response strategies corresponding to the operation events. Can be selected and set by technicians according to actual requirements. For example, in some optional embodiments, all events corresponding to illegal door opening behaviors may be classified into preset types, and response policies for the events are set to send warning information to the user terminal.
In the embodiment of the application, some operation events needing to be responded are preset according to actual requirements, and corresponding response strategies are set for the operation events. On this basis, after the door magnetism is installed at the door body, the door magnetism can detect the external force data that the door body bore through the sensor that inside was provided. And the external force data can be processed to determine the corresponding operation event, so that the condition of the door body being operated can be identified. And finally, when the operation event is the event of the preset type, responding according to the corresponding response strategy. Therefore, in the embodiment of the application, the door magnet can realize the identification and effective handling of the door body operation event, namely, the effective identification and handling of the door body illegal opening and other conditions. Therefore, compared with some existing door magnets, the door magnet provided by the embodiment of the application has a higher intelligentization degree. And the personal and property safety of the user can be effectively improved.
For some illustrations of the embodiment shown in fig. 1:
firstly, when external force data is analyzed, the actually usable external force attribute scheme can include a plurality of schemes.
As can be seen from the description of S102, the cases of these external force attributes can be utilized to realize the distinct identification of different operation events. In the embodiment of the application, it is proposed that any one or more attributes can be selected from the external force magnitude, the external force frequency and the external force duration as the attributes during the external force data analysis. At this time, according to the permutation and combination, 6 kinds of corresponding selectable combination modes can be obtained, which are respectively:
1. the magnitude of the external force.
2. The frequency of the external force.
3. The duration of the external force.
4. Magnitude of external force and frequency of external force.
5. The frequency of the external force and the duration of the external force.
6. Magnitude of external force, frequency of external force, and duration of external force.
The external force is detected by the door magnet. The external force frequency refers to the number of times the door magnet detects external force in a unit time. The duration of the external force refers to the duration of a single external force action detected by the door sensor, or the total duration of the external force action detected this time (different detections can be distinguished by not detecting the external force within a preset time interval), which can be specifically set by a technician. In the embodiment of the present application, the magnitude of the external force, the frequency of the external force, and the duration of the external force may be specific values or divided levels.
In order to realize identification of the operation events based on the attribute data, in the embodiment of the present application, simulation may be performed in advance for various operation events, and corresponding attribute data may be collected. And setting a corresponding attribute value range (or a plurality of different attribute thresholds) for each operation event according to the acquired attribute data condition. And finally, identifying the operation event according to the condition of the attribute value and the set attribute value range (or the size relation with different thresholds) in the actual external force data.
And secondly, if the external force magnitude, the external force frequency and the external force duration are selected to be used simultaneously to realize the identification of the operation event. At this time, the operation of identifying the operation event may be as follows:
and if the external force is larger than the first external force threshold, the external force frequency is higher than the first frequency threshold, and the duration of the external force is larger than the first time threshold, judging that the operation event corresponding to the door body is a drilling event.
And if the external force is greater than the second external force threshold, the external force frequency is lower than the second frequency threshold, and the duration of the external force is less than the second duration threshold, determining that the operation event corresponding to the door body is an impact event.
And if the external force is smaller than the third external force threshold, the external force frequency is lower than the third frequency threshold, and the duration of the external force is greater than the third duration threshold, determining that the operation event corresponding to the door body is an illegal unlocking event.
In the embodiment of the present application, the duration of the external force is defined as a duration of a single external force action detected by the door magnetism. Meanwhile, corresponding operation events are set for the following possible operation behaviors:
1. and (5) the illegal identity utilizes the behavior of damaging the door body by the drilling machine, and sets a corresponding drilling event.
2. And (5) the illegal part utilizes the behavior of the impact hammer to damage the door body, and sets a corresponding impact event.
3. And (4) carrying out unlocking action on the door body by the illegal member, and setting a corresponding illegal unlocking event. (if the door is not locked, or if the door is locked but not locked, then no such operation event exists.)
In order to identify the three operation events, in the embodiment of the present application, stress analysis of the door body is performed in advance according to the three operation events (stress analysis may be performed by simulating operation behaviors), and various corresponding thresholds (including a first external force threshold, a first frequency threshold, a first time threshold, a second external force threshold, a second frequency threshold, a second time threshold, a third external force threshold, a third frequency threshold, and a third time threshold) for the magnitude of the external force, the frequency of the external force, and the duration of the external force are respectively given. On the basis, the attribute data of the actual external force data is judged according to the set threshold values, so that the operation event is identified. It should be noted that, when setting the threshold, the confidence of the set threshold is increased to improve the accuracy of the recognition. When the threshold value of the attribute is set according to various operation events, the threshold value can be compared with the data of each attribute under the condition that the door body is normally opened (when the door body is locked, the door body is unlocked), and the threshold value is set according to the data of each attribute under the condition that the door body is normally opened as a reference. For example, after a certain interval up or down from the reference, a threshold is selected. To distinguish from a normally open door body.
The specific description for the three operational events is as follows:
aiming at the drilling event, when the drilling machine damages the door body, the external force applied to the door body is strong, and the drilling machine has long duration and high frequency. Therefore, when the external force magnitude, the external force frequency and the external force duration in the external force data are all higher than the corresponding threshold values, the current operation event can be judged to be the drilling event.
Aiming at the impact event, the impact hammer damages the door body, the external force of the impact hammer on the door body every time is strong, but the duration is short and the frequency is low. Therefore, when the magnitude of the external force is larger than the corresponding threshold value and the frequency and the duration of the external force are lower than the corresponding threshold values, the current operation event can be judged to be an impact event.
For the illegal unlocking event, the strength of the illegal member is generally small when the illegal member tries to unlock, but the frequency is higher than that of the illegal member when the illegal member tries to unlock, and the duration is longer. Therefore, when the magnitude of the external force is smaller than the corresponding threshold value and the frequency and duration of the external force are higher than the corresponding threshold value, the current operation event can be judged to be an illegal unlocking event.
Thirdly, when an acceleration sensor is arranged in the door magnet and the acceleration sensor is adopted to detect external force data (namely acceleration data), the determination operation of the external force magnitude, the external force frequency and the external force duration is as follows:
1. and determining the magnitude of the external force according to the instantaneous acceleration in the acceleration data.
Consider the case where the magnitude of the external force affects the instantaneous acceleration it detects for an acceleration sensor. Therefore, in the embodiment of the present application, the magnitude of the external force is determined according to the instantaneous acceleration in the acceleration data. The magnitude of the external force is only one quantized data of the magnitude of the stress on the door body, and in the acceleration sensor, the acceleration condition detected by the acceleration sensor is directly influenced by the external force. Therefore, theoretically, a conversion relation or a table of the magnitude of the instantaneous acceleration and the magnitude of the stress value can be established, and the stress value corresponding to the instantaneous acceleration is determined according to the conversion relation or the table and is used as the magnitude of the external force. Or for convenience, the instantaneous acceleration can be used as the magnitude of the external force to be processed without performing excessive conversion operation.
2. And determining the frequency of the external force according to the acceleration change times in the acceleration data.
3. And determining the duration of the external force according to the acceleration change duration in the acceleration data.
Since the external force change may cause the acceleration detected by the acceleration sensor to change, the external force frequency may be determined according to the number of times of the acceleration change in the embodiment of the present application. Namely, the detection of the external force frequency is realized by detecting the change times of the acceleration in unit time. And meanwhile, the duration of the external force can be determined according to the duration of the acceleration change.
Fourthly, when the vibration sensor is arranged in the door magnet and the vibration sensor is adopted to detect the external force data (namely the vibration data), the determination operation of the external force magnitude, the external force frequency and the external force duration is as follows:
1. and determining the magnitude of the external force according to the vibration amplitude in the acceleration data.
2. And determining the frequency of the external force according to the vibration times in the acceleration data.
3. And determining the duration of the external force according to the vibration duration in the acceleration data.
The principle and operation of the present invention are basically the same as those of the acceleration sensor in the third description point, and specific reference may be made to the description (replacing the acceleration data with the vibration data) in the third description point, which is not repeated herein.
And fifthly, selecting or setting a response strategy aiming at the operation event according to actual requirements.
In practical applications, the specific response strategy may be set by a technician or a user according to actual requirements. In the examples of the present application, three alternative response approaches are provided:
1. and are independently responded by the gate magnets. At this time, a corresponding output device, such as a buzzer or a loudspeaker, can be arranged in the door magnet. And corresponding signal output (such as alarm sound) is carried out through the output devices so as to realize response.
2. And performing linkage response after the door sensor is accessed into the Internet of things. At the moment, the door sensor is a device in the internet of things, and the door sensor sends specific data to other devices in the internet of things and the receiving device carries out corresponding response action. For example, when a camera exists in the internet of things, a specific instruction may be sent to the camera. After the camera receives the specific instruction, the camera starts the camera shooting function so as to monitor the door body or other specific areas. And the long phase and the illegal behavior of the lawbreakers are recorded in time to realize the evidence retention. Also for example, when security devices are present in the internet of things, such as some intelligent door locks, alarms and detectors, etc. The security devices can be linked to execute corresponding security schemes, such as locking all intelligent door locks, and enabling the detector to enter a high-power detection state for a period of time, so that security linkage is realized.
3. The door magnet sends corresponding information to the user terminal to realize response. At this time, the door magnet device can send corresponding warning information or prompt information to the user terminal through the network (such as a mobile phone) so as to inform the user of the door body condition at this time.
In practical application, a technician or a user can select a response path to set a response strategy according to actual requirements. Other approaches can be devised for processing.
On the basis of selecting a good response path, the specific strategy content in the response strategy can be further set. In an embodiment of the present application, an optional response policy content is provided:
and acquiring the danger level of the operation event, and determining a response strategy according to the danger level.
In the embodiment of the application, the operation events are classified in a grade mode according to the danger degree of the operation events. And corresponding response strategies are set for different danger levels. To achieve targeted response to different events. The specific danger level classification method and the content of the response strategy of each danger level are not limited herein, and can be set by a technician according to actual needs.
As an alternative embodiment of the present application, the risk level is divided into primary, secondary and tertiary levels. Assume that the door sensor has communication capability with other devices (including user terminals and other related devices), wherein the response strategy for each stage is as follows:
first-stage: and pushing prompt information to the user terminal to inform the user terminal of the operation event of the door body.
And (2) second stage: and informing to start the camera or informing related security equipment to execute corresponding operation according to a preset security linkage scheme. And push the prompt message to the user terminal.
Third-stage: the door magnet gives an alarm by itself, or the door magnet gives a command to a specific alarm device, and the alarm device gives a response alarm after receiving the command. And informing to start the camera or informing related security equipment to execute corresponding operation according to a preset security linkage scheme. And push the prompt message to the user terminal.
In consideration of the fact that some operation events are only door knock and the like, the user only needs to be informed of the operation events. Therefore, the embodiment of the application sets the danger level to be one level aiming at the behaviors, and sets the response strategy to push prompt information to the user terminal. Meanwhile, some illegal behaviors may have a certain difference in danger level, for example, some behaviors of pushing the door body may be only hit by passers-by carelessly. Some related security equipment can be started at the moment to improve the security level. And simultaneously informing the user of the operation event of the door body. A second level and corresponding response strategy is set. In some cases of intrusion events (illegal door opening actions including the above-mentioned drilling event, impact event and illegal unlocking event), the illegal copy needs to be warned to stop the illegal copy. Therefore, three levels and corresponding response strategies are set in the embodiment of the application.
In order to further improve the effectiveness of the alarm, different alarm contents may be set for different operation events. For example, for an illegal unlocking event, a warning audio can be recorded in advance. And playing the audio when in alarm to inform the illegal copies to stop unlocking. And aiming at worse events such as drilling events, impact events and the like, the alarm can be given at the same time, and lawless persons are informed in the alarm content and are subjected to alarm processing currently. Thereby playing a role of frightening illegal parts.
Sixthly, the door magnet can operate in a low power consumption mode, and relevant operations in the above embodiments are started when external force is detected.
In the embodiment of the application, the door sensor comprises a sensor and a central control unit.
After the door sensor is started, the sensor is in the low-power-consumption module, and the central control unit is in the sleep mode.
When the sensor detects the external force action, corresponding external force data are generated and sent to the central control unit. At this time, the external force data can be regarded as an interrupt event and is used for waking up the central control unit.
After receiving the external force data, the central control unit ends the sleep state, and performs an operation of processing the external force data to identify an operation event and an event response in S101.
In the embodiment of the application, the interruption process of the sensor is utilized, so that the detection function of the door magnet can be in a low power consumption state, and the purpose of saving power is further achieved.
It should be specifically noted that the contents of the above six description points may be individually combined to the embodiment shown in fig. 1 to be applied, or may be selected to be combined to the embodiment shown in fig. 1 to be applied together in a case where there is no logical conflict.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance. It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements in some embodiments of the application, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first table may be named a second table, and similarly, a second table may be named a first table, without departing from the scope of various described embodiments. The first table and the second table are both tables, but they are not the same table.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Fig. 2 is a schematic structural diagram of a door sensor according to an embodiment of the present application. As shown in fig. 2, the door 2 of this embodiment includes: at least one processor 20 (only one shown in fig. 2), a memory 21, said memory 21 having stored therein a computer program 22 executable on said processor 20. The processor 20, when executing the computer program 22, implements the steps in the various event detection method embodiments described above, such as the steps 101 to 103 shown in fig. 1.
The gate may include, but is not limited to, a processor 20, a memory 21. It will be understood by those skilled in the art that fig. 2 is merely an example of the door 2, and does not constitute a limitation of the door 2, and may include more or less components than those shown, or some components in combination, or different components, for example, the door may also include an input transmitting device, a network access device, a bus, etc.
The Processor 20 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 21 may in some embodiments be an internal storage unit of the door 2, such as a memory of the door 2. The memory 21 may also be an external storage device of the door 2, such as a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like provided on the door 2. Further, the memory 21 may include both an internal storage unit of the door 2 and an external storage device. The memory 21 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 21 may also be used to temporarily store data that has been transmitted or is to be transmitted.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiment of the present application provides a computer program product, which when running on a door magnet, enables the door magnet to implement the steps in the above method embodiments when executed.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (10)

1. An event detection method is applied to a door magnet, wherein the door magnet is mounted on a door body, and the event detection method comprises the following steps:
detecting external force data borne by the door body;
identifying an operation event corresponding to the door body according to the external force data;
and if the operation event belongs to the preset type of event, acquiring a response strategy associated with the operation event, and responding to the event according to the response strategy.
2. The event detection method according to claim 1, wherein the door magnet includes an acceleration sensor or a vibration sensor, and the detecting external force data applied to the door body includes:
acquiring acceleration data of the acceleration sensor, and taking the acceleration data as the external force data born by the door body; or
And acquiring vibration data of the vibration sensor, and taking the vibration data as the external force data born by the door body.
3. The event detection method according to claim 1 or 2, wherein the identifying the operation event corresponding to the door body according to the external force data includes:
processing the external force data to obtain corresponding attribute data, wherein the attribute data comprises any one or more of external force magnitude, external force frequency and external force duration;
and identifying the operation event corresponding to the door body according to the attribute data.
4. The event detection method according to claim 3, wherein the gate magnet includes an acceleration sensor, and when the attribute data includes an external force magnitude, an external force frequency, and an external force duration, the processing the external force data to obtain corresponding attribute data includes:
determining the magnitude of the external force according to the instantaneous acceleration in the acceleration data;
determining the external force frequency according to the acceleration change times in the acceleration data;
and determining the duration of the external force according to the acceleration change duration in the acceleration data.
5. The event detection method according to claim 4, wherein the identifying the operation event corresponding to the door body according to the attribute data includes:
and if the external force is greater than a first external force threshold, the external force frequency is greater than a first frequency threshold, and the duration of the external force is greater than a first time threshold, determining that the operation event corresponding to the door body is a drilling event.
6. The event detection method according to claim 4, wherein the identifying the operation event corresponding to the door body according to the attribute data includes:
and if the external force is greater than a second external force threshold, the external force frequency is lower than a second frequency threshold, and the duration of the external force is smaller than a second duration threshold, determining that the operation event corresponding to the door body is an impact event.
7. The event detection method according to claim 4, wherein the identifying the operation event corresponding to the door body according to the attribute data includes:
and if the external force is smaller than a third external force threshold, the external force frequency is lower than a third frequency threshold, and the duration of the external force is greater than a third duration threshold, determining that the operation event corresponding to the door body is an illegal unlocking event.
8. The event detection method according to claim 1 or 2, wherein the determining a response policy associated with the operation event and performing event response according to the response policy comprises:
and acquiring the danger level of the operation event, and determining the response strategy according to the danger level.
9. A door sensor, comprising a memory, a processor, a computer program being stored on the memory and being executable on the processor, the processor implementing the steps of the method according to any one of claims 1 to 8 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN202010651295.4A 2020-07-08 2020-07-08 Event detection method and door sensor Pending CN113914716A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010651295.4A CN113914716A (en) 2020-07-08 2020-07-08 Event detection method and door sensor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010651295.4A CN113914716A (en) 2020-07-08 2020-07-08 Event detection method and door sensor

Publications (1)

Publication Number Publication Date
CN113914716A true CN113914716A (en) 2022-01-11

Family

ID=79231746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010651295.4A Pending CN113914716A (en) 2020-07-08 2020-07-08 Event detection method and door sensor

Country Status (1)

Country Link
CN (1) CN113914716A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115206008A (en) * 2022-07-05 2022-10-18 珠海格力电器股份有限公司 Intelligent door lock control method and device, electronic equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103206130A (en) * 2013-03-27 2013-07-17 成都阳光铝制品有限公司 Intelligent door and window system
CN103745545A (en) * 2014-01-14 2014-04-23 福建创高安防技术有限公司 Door magnetic induction device and method
CN105336072A (en) * 2015-11-06 2016-02-17 童迎伟 Multilayer protection intelligent antitheft door lock system based on Internet of things, and alarm processing method
CN107396027A (en) * 2017-07-27 2017-11-24 北京小米移动软件有限公司 Knock at the door information processing method and device
CN108320440A (en) * 2018-01-31 2018-07-24 佛山市聚成知识产权服务有限公司 A kind of district monitoring system Internet-based
CN108364424A (en) * 2018-02-02 2018-08-03 宁夏宁信信息科技有限公司 Anti-theft prewarning system
CN207946900U (en) * 2018-03-07 2018-10-09 广州中国科学院软件应用技术研究所 A kind of anti-theft alarm system of Internet of Things multi-Source Events Fusion processing
CN109519046A (en) * 2019-01-02 2019-03-26 上海钧正网络科技有限公司 A kind of anti-theft alarm system and alarm method
CN109613299A (en) * 2018-11-14 2019-04-12 深圳绿米联创科技有限公司 Viberation detector, method, intelligent door lock and system
WO2019141471A1 (en) * 2018-01-22 2019-07-25 Assa Abloy Ab Determining when a break-in attempt is in process
CN111339142A (en) * 2020-02-26 2020-06-26 广州信安数据有限公司 Data monitoring response method, computer readable storage medium and data driving platform

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103206130A (en) * 2013-03-27 2013-07-17 成都阳光铝制品有限公司 Intelligent door and window system
CN103745545A (en) * 2014-01-14 2014-04-23 福建创高安防技术有限公司 Door magnetic induction device and method
CN105336072A (en) * 2015-11-06 2016-02-17 童迎伟 Multilayer protection intelligent antitheft door lock system based on Internet of things, and alarm processing method
CN107396027A (en) * 2017-07-27 2017-11-24 北京小米移动软件有限公司 Knock at the door information processing method and device
WO2019141471A1 (en) * 2018-01-22 2019-07-25 Assa Abloy Ab Determining when a break-in attempt is in process
CN108320440A (en) * 2018-01-31 2018-07-24 佛山市聚成知识产权服务有限公司 A kind of district monitoring system Internet-based
CN108364424A (en) * 2018-02-02 2018-08-03 宁夏宁信信息科技有限公司 Anti-theft prewarning system
CN207946900U (en) * 2018-03-07 2018-10-09 广州中国科学院软件应用技术研究所 A kind of anti-theft alarm system of Internet of Things multi-Source Events Fusion processing
CN109613299A (en) * 2018-11-14 2019-04-12 深圳绿米联创科技有限公司 Viberation detector, method, intelligent door lock and system
CN109519046A (en) * 2019-01-02 2019-03-26 上海钧正网络科技有限公司 A kind of anti-theft alarm system and alarm method
CN111339142A (en) * 2020-02-26 2020-06-26 广州信安数据有限公司 Data monitoring response method, computer readable storage medium and data driving platform

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115206008A (en) * 2022-07-05 2022-10-18 珠海格力电器股份有限公司 Intelligent door lock control method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20120278890A1 (en) Intrusion detection in communication networks
CN104881911A (en) System And Method Having Biometric Identification Instrusion And Access Control
CN106156619A (en) Application safety means of defence and device
US20080246607A1 (en) Method of detecting lock bumping
CN109600362B (en) Zombie host recognition method, device and medium based on recognition model
US20180359274A1 (en) Systems and methods for providing a notification of a cyber attack in a security system
EP2779133A2 (en) System and method of anomaly detection
CN110853269B (en) Door state detection method and device
CN111691764A (en) Household intelligent door lock and control method thereof
Jabbar et al. Intrusion detection system using bayesian network and feature subset selection
CN110855605A (en) Safety protection method, system, equipment and readable storage medium for terminal equipment
CN113914716A (en) Event detection method and door sensor
CN113572787A (en) Computer network intelligent monitoring system
CN113075438B (en) Electricity stealing detection method and device, electricity stealing prevention device and readable storage medium
CN113378161A (en) Security detection method, device, equipment and storage medium
CN110083747B (en) Unmanned aerial vehicle identification method and unmanned aerial vehicle detection equipment
CN105335629A (en) Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN107701064A (en) The based reminding method and intelligent door of intelligent door
CN116311714A (en) Method and system for preventing false alarm of intelligent door lock
CN111125701B (en) File detection method, equipment, storage medium and device
CN112324252A (en) Intelligent door lock alarm method and device
CN111724553A (en) Well lid alarm system and method
CN108286387A (en) A kind of method and device that anti-violence opens the door
CN114584342B (en) Network vulnerability recognition and detection system based on data analysis
CN218299070U (en) Security defense device, electronic equipment and intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220111