CN114049705A - Smart home monitoring method and system based on communication between mobile phone software and Internet of things - Google Patents
Smart home monitoring method and system based on communication between mobile phone software and Internet of things Download PDFInfo
- Publication number
- CN114049705A CN114049705A CN202111343165.5A CN202111343165A CN114049705A CN 114049705 A CN114049705 A CN 114049705A CN 202111343165 A CN202111343165 A CN 202111343165A CN 114049705 A CN114049705 A CN 114049705A
- Authority
- CN
- China
- Prior art keywords
- instruction
- information
- alarm
- coded lock
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Automation & Control Theory (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an intelligent home monitoring method and system based on communication between mobile phone software and the Internet of things, and relates to the field of intelligent home, wherein the method comprises the steps of obtaining induction information of a coded lock, forming the induction information after touching the coded lock, and sending the induction information to a user terminal; forming a starting request instruction according to the induction information; acquiring a starting request result, wherein a user inputs a result according to a starting request instruction and then sends a judgment result to judge whether the starting request result is consistent with a preset request result; if the judgment result is yes, sending a starting request instruction to a control system of the coded lock so as to control the camera to be opened, wherein the camera is arranged on the coded lock; and acquiring real shooting information of the camera, wherein the real shooting information is automatically shot and transmitted after the camera is started. The method and the device can facilitate the user to know whether the coded lock is opened or not in time.
Description
Technical Field
The invention relates to the technical field of smart homes, in particular to a smart home monitoring method and system based on communication between mobile phone software and the Internet of things.
Background
The intelligent home is characterized in that a home is used as a platform, facilities related to home life are integrated by utilizing a comprehensive wiring technology, a network communication technology, a safety precaution technology, an automatic control technology and an audio and video technology, an efficient management system of home facilities and family schedule affairs is constructed, home safety, convenience, comfortableness and artistry are improved, and an environment-friendly and energy-saving living environment is realized.
At present, along with the appearance of intelligent house, the trick lock also appears thereupon, and vast user all can select to install the trick lock as anti-theft measures, sets up the entrance guard through modes such as face identification or input password, perhaps fingerprint unblock, and when the password is correct, the door can be opened.
However, when the user goes out, no one is at home, and a thief or a lawless person wants to steal in the room, the thief or the lawless person can enter the home through various ways, so that even if the user is provided with the coded lock, the security of the home cannot be completely guaranteed, and when the coded lock is opened, the user cannot know the situation in time.
Disclosure of Invention
In order to facilitate a user to know whether the coded lock is opened or not in time, the application provides an intelligent home monitoring method and system based on communication between mobile phone software and the Internet of things.
In a first aspect, the application provides an intelligent home monitoring method based on communication between mobile phone software and the internet of things.
An intelligent home monitoring method based on communication between mobile phone software and the Internet of things comprises the following steps:
acquiring induction information of the coded lock, forming induction information by touching the coded lock, and sending the induction information to a user terminal;
forming a starting request instruction according to the induction information;
acquiring a starting request result, wherein the starting request result is input by a user according to a starting request instruction and then is sent out;
judging whether the starting request result is consistent with a preset request result or not;
if the judgment result is yes, sending a starting request instruction to a control system of the coded lock so as to control the camera to be opened, wherein the camera is arranged on the coded lock;
and acquiring real shooting information of the camera, wherein the real shooting information is automatically shot and transmitted after the camera is started.
Through adopting above-mentioned technical scheme, form response information when the trick lock senses the touch, and with response information transmission to user terminal, form at user terminal and start the request instruction and supply the user to select, the user sends after will selecting the result input, judge whether start request result is unanimous with predetermineeing the request result, if judge unanimously, in then sending the control system of trick lock with start request instruction, open with the control camera, shoot information and transmit to user terminal through the camera, realize the purpose of control, so that the user in time knows the message.
Optionally, obtain the response information of trick lock, form the response information after touching the trick lock to send the response information to user terminal after, include:
acquiring the unlocking times of the coded lock, wherein the unlocking times are recorded when the coded lock is unlocked;
judging whether the unlocking times are greater than preset times or not;
if the judgment result is yes, warning information is formed and sent to the mobile phone terminal.
By adopting the technical scheme, when the coded lock is unlocked, the unlocking times are acquired, the unlocking times and the preset times are judged, when the unlocking times exceed the preset times, it is shown that someone tries to unlock maliciously, warning information is formed, and the warning information is sent to the user terminal, so that the user can know the warning information conveniently.
Optionally, if yes, forming warning information, and sending the warning information to the mobile phone terminal, including:
and forming an alarm instruction according to the warning information, and sending the alarm instruction to a control system of the coded lock for controlling an alarm device to give an alarm, wherein the alarm device is arranged on the door.
Forming alarm timing information according to the alarm instruction;
judging whether the alarm timing information is consistent with the preset timing information or not;
if the alarm device is judged to be the alarm device, an alarm removing instruction is formed, and the alarm removing instruction is sent to a control system of the coded lock and used for controlling the alarm device to be closed.
By adopting the technical scheme, after the warning information is formed, an alarm instruction is formed, the alarm device is controlled to respond through the alarm instruction so as to scare people trying to break into the home, when the alarm device responds, alarm timing information is formed, whether the alarm timing information is consistent with the preset timing information or not is judged, if so, an alarm removing instruction is formed, and the alarm removing instruction is sent to a control system of the coded lock so as to control the alarm device to be closed.
Optionally, if yes, forming warning information, and sending the warning information to the mobile phone terminal, including:
forming an opening forbidding instruction, sending the opening forbidding instruction to the coded lock control system, and controlling a coded lock password input interface to be closed;
forming the switching-on prohibition timing information according to the switching-on prohibition instruction;
judging whether the keep-off timing information is consistent with the preset keep-off time information or not;
if the password lock is judged to be yes, a pop-up instruction is formed and used for controlling the password lock to pop up the password input interface.
By adopting the technical scheme, after the forbidding instruction is sent to the control system of the coded lock, the input interface of the coded lock can be controlled to be closed, so that the possibility that a person to be intruded repeatedly inputs the code is reduced, the safety is further enhanced, when the forbidding instruction is formed, forbidding timing information is formed, the forbidding timing information is compared with preset forbidding information, whether the forbidding timing information is consistent with the preset forbidding information or not is judged, and if the forbidding timing information is consistent with the preset forbidding information, a pop-up instruction is formed, so that the code input interface is controlled to pop up.
Optionally, the alarm device includes an indicator light and an alarm installed in the combination lock, and the indicator light and the alarm are used for receiving the alarm command and responding when receiving the alarm command.
By adopting the technical scheme, after the alarm instruction is formed, the indicator light and the alarm receive the alarm instruction and control the indicator light and the alarm to work through the alarm instruction.
In a second aspect, the application provides an intelligent home monitoring system based on mobile phone software and internet of things communication.
The utility model provides an intelligent house monitored control system based on cell-phone software and thing communication of networking, includes:
the induction information acquisition module is used for acquiring induction information;
the instruction forming module is used for forming a starting request instruction by a user;
the result acquisition module is used for acquiring a starting request result;
the judging module is used for judging whether the starting request result is consistent with a preset request result or not;
the result forming module is used for forming a judgment result according to the judgment module;
the real shooting information acquisition module is used for acquiring real shooting information of the camera;
and the information receiving and sending module is used for sending or receiving information.
Through adopting above-mentioned technical scheme, through the cooperation between each module, realize the purpose with information transmission to user terminal, the user of being convenient for knows at any time and timely whether the trick lock is opened.
In a third aspect, the present application provides an intelligent terminal.
An intelligent terminal comprises a processor and a memory, wherein at least one instruction, at least one program, a code set or an instruction set is stored in the memory, and the at least one instruction, the at least one program, the code set or the instruction set is loaded and executed by the processor to realize the intelligent home monitoring method based on communication between mobile phone software and the internet of things.
In a fourth aspect, the present application provides a computer-readable storage medium.
A computer-readable storage medium, wherein at least one instruction, at least one program, a code set, or an instruction set is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement a smart home monitoring method based on mobile phone software and internet of things communication.
In summary, the present application has the following beneficial technical effects:
1. when the coded lock senses touch, sensing information is formed and sent to a user terminal, a starting request instruction is formed at the user terminal for a user to select, the user inputs and sends a selection result, whether the starting request result is consistent with a preset request result or not is judged, if yes, the starting request instruction is sent to a control system of the coded lock only to control a camera to be opened, information is shot through the camera and is transmitted to the user terminal, and the purpose of monitoring is achieved, so that the user can know the information in time;
2. through the cooperation between each module, realize the purpose with information transmission to user terminal, whether the user of being convenient for knows the trick lock at any time and in time is opened.
Drawings
Fig. 1 is a schematic flow chart of acquiring information actually shot by a camera in a method according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of forming alarm timing information in a method according to an embodiment of the present application.
FIG. 3 is a flowchart illustrating a method for forming a pop instruction according to an embodiment of the present disclosure.
Fig. 4 is a block diagram of a flow in a system according to an embodiment of the present application.
Description of reference numerals:
100. a sensing information acquisition module; 101. an instruction forming module; 102. a result obtaining module; 103. a judgment module; 104. a result forming module; 105. a real shooting information acquisition module; 106. and an information receiving and transmitting module.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
The embodiment of the application discloses an intelligent home monitoring method and system based on communication between mobile phone software and the Internet of things.
The embodiment of the application discloses an intelligent home monitoring method based on communication between mobile phone software and the Internet of things.
Referring to fig. 1, the method includes:
s1: and acquiring the induction information of the coded lock.
Specifically, be provided with control system in the trick lock, including the sensor in the control system, the sensor is connected with user terminal, and when someone touched the trick lock, the sensor sensed touch signal, formed response information to with response information transmission to user terminal. The user terminal can be a mobile phone or a notebook computer and the like, and software capable of being connected with a control system of the coded lock is installed on the mobile phone or the notebook computer of the user. The password setting of the password lock can be digital setting, fingerprint setting, face recognition setting and the like.
S2: forming a start request instruction.
Specifically, when the user terminal receives the sensing information, a starting request instruction is formed and displayed on a display screen of the user terminal, so that the user can know the starting request instruction conveniently. The starting request instruction is used for carrying out the next operation after the user selects the starting request instruction.
S3: and acquiring a starting request result.
Specifically, the user inputs and sends the selection result according to the start request instruction, and after the start request result is sent, the information of the start request instruction can be automatically closed through the closing instruction.
S4: and judging whether the starting request result is consistent with the preset request result.
If yes, the process proceeds to S5.
If not, the process is stopped.
Specifically, the preset request result is formed when the start request instruction is formed, and the preset request result may be yes. And judging whether the starting request result is consistent with the preset request result, if so, jumping to S5 to perform the next operation, and if not, stopping the process.
S5: and sending a starting request instruction to a control system of the coded lock.
Specifically, when the starting request result is consistent with the preset request result, it is described that the user allows the starting request to be sent to the control system of the coded lock, the camera is controlled to be started through the starting request instruction, the camera is installed on the coded lock or installed on the door, and after the camera is started, the situation of the door and the situation of the coded lock are shot through the camera.
S6: and acquiring the real shooting information of the camera.
Specifically, the camera will shoot the information and carry out real-time transmission after shooing the condition on gate, will shoot information reception through user terminal to the condition on gate is known in real time to the user, with the condition of opening of understanding the trick lock, realizes the purpose of control.
Referring to fig. 2, S7: and acquiring the unlocking times of the coded lock.
Specifically, when the combination lock is attempted to be opened, the unlocking times of the combination lock are automatically recorded every time the combination lock is unlocked.
S8: and judging whether the unlocking times are greater than the preset times.
If yes, the process proceeds to S9.
If no, the process proceeds to S7.
Specifically, the preset times are set by a manufacturer when the coded lock is produced or set by a user terminal. When the unlocking times of the coded lock are obtained, comparing the unlocking times with the preset times, judging whether the unlocking times are larger than the preset times, if so, jumping to S9 to perform the next operation, and if not, continuing to execute S7.
S9: and forming warning information and sending the warning information to the mobile phone terminal.
Specifically, when the number of times of unlocking is judged to be greater than the preset number of times, it is indicated that someone tries to unlock maliciously, warning information is formed, and the warning information is sent to the user terminal, so that the user can know the warning information in time.
S10: and forming an alarm instruction and sending the alarm instruction to a control system of the coded lock.
Specifically, after the warning information is formed, a warning instruction is formed according to the warning information and is sent to a control system of the coded lock, so that the response of the warning device is controlled, and the warning device is used for frightening the person who runs the coded lock. The alarm device comprises an indicator light and an alarm, wherein the indicator light and the alarm are both installed in the coded lock and used for responding to an alarm instruction, when the indicator light receives the alarm instruction, the indicator light is turned on, when the alarm receives the alarm instruction, the alarm gives an alarm sound, and the indicator light and the alarm receive the alarm instruction simultaneously.
S11: and forming alarm timing information.
Specifically, alarm timing information is formed according to the alarm instruction, when the alarm device responds, a timer starts to time, and the timer is installed in the coded lock and used for receiving the alarm instruction.
S12: and judging whether the alarm timing information is consistent with the preset timing information or not.
If yes, the process proceeds to S13.
If no, the process proceeds to S11.
Specifically, when the alarm device responds, timing is started, whether alarm timing information is consistent with preset timing information or not is judged, if yes, the step is skipped to S13, the next operation is carried out, and if not, the step is skipped to S11, and the operation of the step is continuously executed. The preset time information is set by a manufacturer when the coded lock is produced or set by a user terminal.
S13: and forming an alarm removing instruction and sending the alarm removing instruction to a control system of the coded lock.
Specifically, when the alarm timing information is consistent with the preset timing information, an alarm release instruction is formed, the alarm contact instruction is sent to a control system of the coded lock, and the alarm device is controlled to be closed through the alarm release instruction.
Referring to fig. 3, after S9, the method further includes:
s14: and forming a switching-on prohibition instruction and sending the switching-on prohibition instruction to the coded lock control system.
Specifically, after the warning information is formed, a forbidding instruction is formed and sent to the control system of the coded lock, and the forbidding instruction is used for controlling the password input interface of the coded lock to be closed, so that the possibility that the password input interface is damaged maliciously repeatedly by breaking is reduced.
S15: the keep-out timing information is formed.
Specifically, the keep-off timing information is formed according to the keep-off instruction, and after the keep-off instruction is formed, the timer is controlled to work and starts timing.
S16: and judging whether the keep-off timing information is consistent with the preset keep-off time information or not.
If yes, the process proceeds to S17.
If no, the process proceeds to S16.
Specifically, the keep-off timing information is compared with the preset keep-off time information, whether the keep-off timing information is consistent with the preset keep-off time information or not is judged, if yes, the operation jumps to S17 to perform the next operation, and if not, the operation continues to be performed to S16. The preset forbidding time information is set when a manufacturer produces the modified coded lock, or is set by a user terminal.
S17: a pop instruction is formed.
Specifically, if the forbidding time information is consistent with the preset forbidding time information, a pop-up instruction is formed and used for controlling the input interface of the coded lock to pop up again.
Fig. 1 is a schematic flow chart of smart home monitoring based on communication between mobile phone software and the internet of things in one embodiment. It should be understood that, although the steps in the flowchart of fig. 1 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows; the steps are not limited to be performed in the exact order disclosed, and steps may be performed in other orders, unless explicitly stated otherwise; and at least some of the steps in fig. 1 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least some of the sub-steps or stages of other steps.
The embodiment of the application further discloses an intelligent home monitoring system based on the communication between the mobile phone software and the Internet of things.
Referring to fig. 4, an intelligent home monitoring system based on mobile phone software and internet of things communication includes an induction information obtaining module 100, an instruction forming module 101, a result obtaining module 102, a judging module 103, a result forming module 104, an actual shooting information obtaining module 105, and an information transceiving module 106, wherein,
an induction information obtaining module 100, configured to obtain induction information;
an instruction forming module 101, which is used for forming a starting request instruction by a user;
a result obtaining module 102, configured to obtain a start request result;
the judging module 103 is configured to judge whether a start request result is consistent with a preset request result;
a result forming module 104, configured to form a determination result according to the determining module;
the real shooting information acquisition module 105 is used for acquiring real shooting information of the camera;
the information transceiver module 106 is used for transmitting or receiving information.
The embodiment of the application also discloses an intelligent terminal.
An intelligent terminal comprises a processor and a memory, wherein at least one instruction, at least one program, a code set or an instruction set is stored in the memory, and the at least one instruction, the at least one program, the code set or the instruction set is loaded and executed by the processor to realize the intelligent home monitoring method based on communication between mobile phone software and the internet of things.
The embodiment of the application also discloses a computer readable storage medium.
A computer-readable storage medium, wherein at least one instruction, at least one program, a code set, or an instruction set is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement a smart home monitoring method based on mobile phone software and internet of things communication.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.
Claims (9)
1. An intelligent home monitoring method based on communication between mobile phone software and the Internet of things is characterized by comprising the following steps:
acquiring induction information of the coded lock, forming induction information by touching the coded lock, and sending the induction information to a user terminal;
forming a starting request instruction according to the induction information;
acquiring a starting request result, wherein the starting request result is input by a user according to a starting request instruction and then is sent out;
judging whether the starting request result is consistent with a preset request result or not;
if the judgment result is yes, sending a starting request instruction to a control system of the coded lock so as to control the camera to be opened, wherein the camera is arranged on the coded lock;
and acquiring real shooting information of the camera, wherein the real shooting information is automatically shot and transmitted after the camera is started.
2. The smart home monitoring method based on the communication between the mobile phone software and the internet of things according to claim 1, wherein after the induction information of the coded lock is acquired, the induction information is formed by touching the coded lock, and the induction information is sent to the user terminal, the method comprises the following steps:
acquiring the unlocking times of the coded lock, wherein the unlocking times are recorded when the coded lock is unlocked;
judging whether the unlocking times are greater than preset times or not;
if the judgment result is yes, warning information is formed and sent to the mobile phone terminal.
3. The smart home monitoring method based on the communication between the mobile phone software and the internet of things according to claim 2, wherein if the judgment result is yes, warning information is formed and sent to the mobile phone terminal, and the method comprises the following steps:
and forming an alarm instruction according to the warning information, and sending the alarm instruction to a control system of the coded lock for controlling an alarm device to give an alarm, wherein the alarm device is arranged on the door.
4. Forming alarm timing information according to the alarm instruction;
judging whether the alarm timing information is consistent with the preset timing information or not;
if the alarm device is judged to be the alarm device, an alarm removing instruction is formed, and the alarm removing instruction is sent to a control system of the coded lock and used for controlling the alarm device to be closed.
5. The smart home monitoring method based on the communication between the mobile phone software and the internet of things according to claim 2, wherein if the judgment result is yes, warning information is formed and sent to the mobile phone terminal, and the method comprises the following steps:
forming an opening forbidding instruction, sending the opening forbidding instruction to the coded lock control system, and controlling a coded lock password input interface to be closed;
forming the switching-on prohibition timing information according to the switching-on prohibition instruction;
judging whether the keep-off timing information is consistent with the preset keep-off time information or not;
if the password lock is judged to be yes, a pop-up instruction is formed and used for controlling the password lock to pop up the password input interface.
6. The smart home monitoring method based on communication between mobile phone software and the Internet of things according to claim 3, characterized in that: the alarm device comprises an indicator light and an alarm which are arranged in the coded lock, wherein the indicator light and the alarm are used for receiving an alarm instruction and responding when the alarm instruction is received.
7. The utility model provides an intelligent house monitored control system based on cell-phone software and thing communication of networking which characterized in that includes:
the induction information acquisition module is used for acquiring induction information;
the instruction forming module is used for forming a starting request instruction by a user;
the result acquisition module is used for acquiring a starting request result;
the judging module is used for judging whether the starting request result is consistent with a preset request result or not;
the result forming module is used for forming a judgment result according to the judgment module;
the real shooting information acquisition module is used for acquiring real shooting information of the camera;
and the information receiving and sending module is used for sending or receiving information.
8. The utility model provides an intelligent terminal which characterized in that: the smart home monitoring method based on the communication between the mobile phone software and the internet of things comprises a processor and a memory, wherein at least one instruction, at least one section of program, a code set or an instruction set is stored in the memory, and is loaded and executed by the processor to realize the smart home monitoring method based on the communication between the mobile phone software and the internet of things according to any one of claims 1 to 5.
9. A computer-readable storage medium, wherein at least one instruction, at least one program, a code set, or a set of instructions is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the smart home monitoring method based on mobile phone software and internet of things communication according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111343165.5A CN114049705A (en) | 2021-11-13 | 2021-11-13 | Smart home monitoring method and system based on communication between mobile phone software and Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111343165.5A CN114049705A (en) | 2021-11-13 | 2021-11-13 | Smart home monitoring method and system based on communication between mobile phone software and Internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114049705A true CN114049705A (en) | 2022-02-15 |
Family
ID=80208715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111343165.5A Withdrawn CN114049705A (en) | 2021-11-13 | 2021-11-13 | Smart home monitoring method and system based on communication between mobile phone software and Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114049705A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115131898A (en) * | 2022-05-27 | 2022-09-30 | 江苏彩诚亿智能科技有限公司 | Independent network information intercommunication method for electronic lock |
-
2021
- 2021-11-13 CN CN202111343165.5A patent/CN114049705A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115131898A (en) * | 2022-05-27 | 2022-09-30 | 江苏彩诚亿智能科技有限公司 | Independent network information intercommunication method for electronic lock |
CN115131898B (en) * | 2022-05-27 | 2024-02-02 | 江苏彩诚亿智能科技有限公司 | Independent network information intercommunication method for electronic lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103957316B (en) | A kind of smart mobile phone anti-theft protection method | |
CN111691764B (en) | Household intelligent door lock and control method thereof | |
CN107093244A (en) | Abnormal unlocking control method based on door lock | |
CN107093252A (en) | A kind of intelligent door system and its control method | |
CN107869874A (en) | Refrigerator and the domestic automation system with refrigerator | |
CN110211267A (en) | Indoor openings control method, the configuration method of permission, device and storage medium | |
WO2019214232A1 (en) | Door lock, door lock control method and device | |
CN212276476U (en) | Intelligent door lock | |
US11961349B1 (en) | Biometric authentication for security sensor bypass | |
CN111917635B (en) | Security protection arming and disarming method and device based on gateway and storage medium | |
JP3961469B2 (en) | Security management device, security management method, security management program, and computer-readable recording medium | |
CN110580762A (en) | Intelligent household access control system and method | |
CN114049705A (en) | Smart home monitoring method and system based on communication between mobile phone software and Internet of things | |
CN111119597A (en) | Control method and device of safety lock tongue | |
CN112381971B (en) | Door lock control method, device, equipment and storage medium | |
CN108035621B (en) | A kind of intelligent door lock control method and device | |
CN114519906A (en) | Building entrance guard control method and system based on smart home | |
CN107705409A (en) | A kind of concealed intelligent gate control system and its control method | |
CN205582175U (en) | Intelligent monitoring anti -theft system | |
CN106331658A (en) | Cellphone remote video monitoring anti-theft system based on wireless network | |
CN110992526A (en) | Intelligent door lock control method and device | |
CN107464385B (en) | Theft prevention monitoring method, device, equipment and intelligent switch | |
CN115731645A (en) | Entrance guard management method and device, intelligent equipment and intelligent entrance guard system | |
CN111951440A (en) | Control method and device of invisible door, terminal equipment and medium | |
CN206149411U (en) | Based on wireless network cell -phone remote video monitoring anti -theft system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220215 |
|
WW01 | Invention patent application withdrawn after publication |