CN114077200A - Equipment control method and device and terminal equipment - Google Patents

Equipment control method and device and terminal equipment Download PDF

Info

Publication number
CN114077200A
CN114077200A CN202010833910.3A CN202010833910A CN114077200A CN 114077200 A CN114077200 A CN 114077200A CN 202010833910 A CN202010833910 A CN 202010833910A CN 114077200 A CN114077200 A CN 114077200A
Authority
CN
China
Prior art keywords
area
mode
user
time period
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010833910.3A
Other languages
Chinese (zh)
Inventor
林坪
林友钦
林思南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leedarson Lighting Co Ltd
Original Assignee
Leedarson Lighting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leedarson Lighting Co Ltd filed Critical Leedarson Lighting Co Ltd
Priority to CN202010833910.3A priority Critical patent/CN114077200A/en
Publication of CN114077200A publication Critical patent/CN114077200A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM]
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2642Domotique, domestic, home control, automation, smart house

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a device control method, a device and terminal equipment, which are applicable to the technical field of Internet of things, and the method comprises the following steps: acquiring a scene mode of a first area; if the scene mode of the first area is the first mode, acquiring an equipment control strategy associated with the first area, wherein the equipment control strategy is a strategy obtained according to historical use data of a user on target equipment in the first area; and controlling the target equipment according to the equipment control strategy. According to the embodiment of the application, the user behavior is simulated, so that the illegal identity is difficult to find out that the user leaves the first area. Therefore, the illegal share is effectively deterred, the probability of illegal behaviors such as theft of the illegal share to the first area is reduced, and the property safety of the user is improved.

Description

Equipment control method and device and terminal equipment
Technical Field
The application belongs to the technical field of Internet of things, and particularly relates to a device control method and device and terminal equipment.
Background
With the development of science and technology, the internet of things gradually enters the work and life of people. The convenience and the intelligence of the Internet of things equipment are utilized, and the quality of daily life of a user can be greatly improved.
In real life, users often leave their houses for various reasons. And the illegal persons often use the time when the users are not at home to carry out illegal activities such as theft and the like, thereby causing property loss of the users. In order to improve the property safety of users, the internet of things gradually incorporates some security measures. For example, some sensor devices and alarm devices are added to the internet of things. When the user is not at home, the sensor devices are used for security monitoring, and when danger is found, the alarm devices are used for alarming. However, in practical application, the security effect is poor, and the capability of guaranteeing the property safety of the user is poor.
Accordingly, there is a need in the art for a method that can improve the security of a user's property.
Disclosure of Invention
In view of this, embodiments of the present application provide a device control method, an apparatus, and a terminal device, which can solve the problem of low user property security in the prior art.
A first aspect of an embodiment of the present application provides an apparatus control method, including:
acquiring a scene mode of a first area;
if the scene mode of the first area is a first mode, acquiring an equipment control strategy associated with the first area, wherein the equipment control strategy is a strategy obtained according to historical use data of a user on target equipment in the first area;
and controlling the target equipment according to the equipment control strategy.
A second aspect of an embodiment of the present application provides an apparatus control device, including:
the mode acquisition module is used for acquiring a scene mode of the first area;
a policy obtaining module, configured to obtain a device control policy associated with the first area when a scene mode of the first area is a first mode, where the device control policy is obtained according to historical usage data of a user on a target device in the first area;
and the equipment control module is used for controlling the target equipment according to the equipment control strategy.
A third aspect of embodiments of the present application provides a terminal device, where the terminal device includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the steps of the device control method according to the first aspect when executing the computer program.
A fourth aspect of an embodiment of the present application provides a computer-readable storage medium, including: stored computer program, characterized in that the computer program, when being executed by a processor, realizes the steps of the device control method according to the first aspect as described above.
In a fifth aspect, an embodiment of the present application provides a computer program product, which, when running on a terminal device, causes the terminal device to execute the device control method according to the first aspect.
Compared with the prior art, the embodiment of the application has the advantages that: the method and the device for determining the scene mode of the first area determine whether the scene mode of the first area is the first mode in which the user is not in the first area. If the first mode is adopted, the device control strategy of each target device in the first area is obtained, and the target device is controlled according to the device control strategy. Wherein the device control is a policy obtained by processing historical usage data of the target device in the first area according to the actual presence of the user. Therefore, when the user is not in the first area, the target device in the first area can be controlled according to the historical use habits of the user. The user behavior simulation of the user being normally in the first area is realized, so that illegal members are difficult to find that the user has left the first area. Therefore, the illegal share is effectively deterred, the probability of illegal behaviors such as theft of the illegal share to the first area is reduced, and the property safety of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart illustrating an implementation of a device control method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation of a device control method provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of an implementation of an apparatus control method provided in an embodiment of the present application;
fig. 4 is a schematic flow chart illustrating an implementation of a device control method provided in an embodiment of the present application;
fig. 5 is a schematic flow chart illustrating an implementation of a device control method provided in an embodiment of the present application;
fig. 6 is a schematic flow chart illustrating an implementation of a device control method provided in an embodiment of the present application;
FIG. 7 is a schematic structural diagram of an apparatus control device provided in an embodiment of the present application;
fig. 8 is a schematic diagram of a terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
For the convenience of understanding, the embodiments of the present application will be briefly described herein:
in real life, users often leave their houses for various reasons. And the illegal persons often use the time when the users are not at home to carry out illegal activities such as theft and the like, thereby causing property loss of the users. Therefore, there is a need for a method that can improve the security of the user's property when the user is not at home.
In order to improve the property safety of users, the internet of things gradually incorporates some security measures. For example, some sensor devices and alarm devices are added to the internet of things. When the user is not at home, the sensor devices are used for security monitoring, and when danger is found, the alarm devices are used for alarming. But in practice, the method is passive, and many lawbreakers can embrace the fate spirit to continue stealing and robbing illegal behaviors even if knowing that the lawbreakers are detected by the sensor after discovering that the users are not at home. Therefore, the sensor equipment and the alarm equipment are used, so that the illegal weight share is difficult to be effectively deterred. And then lead to the security protection effect relatively poor for user property security is still lower.
The embodiment of the application refers to a space area to be property protected as a first area. To improve the security of the user's property, it is first determined whether the scene mode of the first area is a first mode in which the user is not in the first area. If the first mode is adopted, the device control strategy of each target device in the first area is obtained, and the target device is controlled according to the device control strategy. Wherein the device control is a policy obtained by processing historical usage data of the target device in the first area according to the actual presence of the user. Therefore, when the user is not in the first area, the target device in the first area can be controlled according to the historical use habits of the user. The simulation of the user behavior of the user being normally in the first area is realized, so that it is difficult for an illegal member to find that the user has left the first area so that the user is still normally in the first area. Therefore, the illegal share is effectively deterred, the probability of illegal behaviors such as theft of the illegal share to the first area is reduced, and the property safety of the user is improved.
Meanwhile, some terms that may be referred to in the embodiments of the present application are described as follows:
a first region: the method refers to a space area which needs property protection and user behavior simulation in the embodiment of the application. The type and size of the area may also vary according to the actual application scenario. For example, it may be a large area of space such as a house, office building, warehouse, or classroom building. Or a smaller spatial area of a room or classroom. The determination is specifically required according to the actual application scenario, and is not limited herein.
The target device: refers to a device that needs to be controlled in the first area when performing user behavior simulation. For example, suppose there is a light, a sound box and a television in the first area, while suppose that the user needs to turn on the light, sound box and television while behaving in a simulation. At this time, the lamp, the sound box and the television are all target devices in the embodiment of the present application. And if the user behavior is simulated, only the lamp needs to be turned on, and the lamp is the target device in the embodiment of the application. The target equipment to be controlled in the user behavior simulation can be set by a technician or a user. For example, all the devices used by the user may be set as target devices, or some types of devices may be preset, and then the devices belonging to these types of devices used by the user may be set as target devices. Therefore, the type and number of the devices specifically included in the target device need to be determined according to the actual application. In the embodiment of the application, the target devices are all devices in the internet of things, namely all devices belonging to the internet of things.
Scene mode: in the embodiment of the application, scene division is performed according to whether a user is in a first area, and corresponding scene modes are set for different scenes. The first mode refers to a scene mode in which the user is not in the first area. For example, when the first area is a house, if the user needs to leave the house due to a demand such as travel or business trip, the scene mode of leaving the house due to travel or business trip is the first mode. In a first mode, the embodiment of the application performs user behavior simulation.
On the basis of including the first mode, the setting of the scene division and the scene mode is not limited too much in the embodiment of the application, and can be set by technical personnel according to actual requirements. For example, in some alternative embodiments, the scene modes corresponding to the scenes of the user in the first area may all be set to other modes. Or the scene of the user in the first area can be subdivided to obtain more scene modes.
And (3) equipment control strategy: the method refers to a scheme for specifically controlling each target device when user behavior simulation is performed. For example when the target device is turned on and when the target device is turned off. According to the method and the device, the fineness of the device control strategy is not limited too much, and technical personnel or users can set the fineness according to actual requirements. Theoretically, the higher the fineness of the equipment control strategy is, the better the user behavior simulation effect is, the better the deterrence effect is, and the higher the user property safety is. For example, the device control policy may only contain the time to turn on and off the target device. The task content specifically executed by the target device in the starting time period can be set. For example, when the target device is a lamp with adjustable brightness, the device control strategy may include the on and off time of the lamp, and may also include the brightness setting for lighting at different times. More detailed behavioral simulation can be achieved at this time.
In addition, the execution subject of the embodiment of the present application is explained as follows:
an execution main body of the device control method provided by the embodiment of the application is the terminal device, wherein the device type of the terminal device is not limited too much in the embodiment of the application, and can be set by a technician according to the actual situation. For example, the mobile terminal may be a mobile terminal such as a mobile phone, a tablet computer or a wearable device, or the server may also be an internet of things device in the first area, for example, an intelligent gateway or a computer. According to different types of terminal devices, when operations such as scene mode acquisition and target device control are actually performed, implementation details may have a certain difference, and reference may be specifically made to the description of the embodiment shown in fig. 1. Because the internet of things equipment comprises the target equipment, the terminal equipment can also be the target equipment in theory.
In order to explain the technical solution described in the present application, the following takes the first area as a user house, and divides the scene mode into a first mode and another mode as an example, and the description is given by using a specific embodiment. The other mode is a scene mode corresponding to a scene of the user in the first area. In practical applications, the first area may also be other types of spatial areas, and the scene mode may also have other dividing methods, which are not limited herein.
Fig. 1 shows a flowchart of an implementation of a device control method according to an embodiment of the present application, which is detailed as follows:
s101, acquiring a scene mode of the first area.
In the embodiment of the application, scene recognition is performed on a house, that is, a scene mode of the house is obtained to determine whether a user is at home. The embodiment of the application does not excessively limit the specific implementation mode of scene recognition, and can be determined by technical personnel according to actual requirements.
As an optional embodiment of the present application, the method for acquiring a scene mode at least includes the following two optional methods:
mode 1, user manual selection.
Mode 2, terminal equipment automatic identification.
For mode 1, referring to fig. 2, at this time S101 may be replaced with: S1011-S1012.
S1011, a mode setting instruction of the user is obtained, and a second mode pointed by the mode setting instruction is determined.
And S1012, determining the scene mode of the first area according to the second mode.
In the mode 1, a user can set a scene mode of a house according to the requirement, and further the actual requirement of the user is met. For example, the user may manually set the scene mode to the first mode when traveling on a business trip or a trip to initiate the user behavior simulation in the embodiment of the present application.
Depending on the device type of the terminal device, the implementation manner of S1011 may also have a certain difference. Specifically, the following cases can be classified:
1. when the terminal device is a device that the user can directly operate. For example, a mobile terminal such as a mobile phone, or an internet of things device that can realize human-computer interaction through voice, keys or a touch screen. At this time, the embodiment of the application provides a function of setting the scene mode in the terminal device. The user can use the function in the terminal device by himself and input the mode setting instruction according to the actual requirement. The terminal device recognizes a scene mode (i.e., a second mode) pointed to by the mode setting command input by the user. For example, the user may set the first mode, or other modes.
2. The terminal device is a device which can not be directly operated by a user and needs to perform data interaction through other devices. Such as a server of the target device vendor. At this time, the user can set a scene mode in other devices and input a corresponding mode setting instruction. And the other equipment sends the mode setting instruction to the terminal equipment, and the terminal equipment analyzes the instruction and determines the pointed second mode.
In practical applications, the implementation process of S1011 needs to be determined according to actual terminal device conditions.
Since the scene mode is divided into the first mode and the other modes in the embodiments of the present application, the second mode is the first mode or the other modes in the embodiments of the present application. After the second mode is obtained, the embodiment of the application determines a real scene mode of the house according to the second mode. As a possible embodiment of the present application, the second mode may be a scene mode of a house. As another optional embodiment of the present application, some pattern determination rules may also be preset, and the second pattern is processed based on the rules to obtain the scene pattern of the house. For example, when more than one owner of the house, the terminal device may receive a plurality of different second modes. At this time, the mode determination rule may be set such that each user has an associated priority, and when a plurality of second modes are received, the second mode corresponding to the user with the highest priority among the second modes is set as the scene mode of the house.
For mode 2, referring to fig. 3, at this time S101 may be replaced with: S1013-S1014.
S1013, first data of the user entering the first area in the first time period is acquired, and a third mode is determined according to the first data.
And S1014, determining the scene mode of the first area according to the third mode.
In consideration of the fact that it may be inconvenient for a user to set a scene mode in practical applications, special users such as the elderly and children do not operate the terminal device. Or may forget to set the scene mode, for example, when the user goes out due to an emergency, it is easy to forget the setting. Therefore, in the embodiment of the application, whether the user is at home or not can be automatically identified by the terminal equipment.
Specifically, the terminal device first acquires data (i.e., first data) that the user entered the house within a past period of time (i.e., a first period of time). The specific range of the first time period may be set by a technician according to actual circumstances, and may be, for example, the past half day, one day, or one week. After the first data is obtained, the embodiment of the application analyzes the first data to determine whether the user leaves home, and obtains a scene mode (i.e., a third mode) of the response. The specific analysis method of the first data is not limited in the embodiment of the application, and can be set by a technician according to the actual situation. For example, in some embodiments, a threshold number of times may be set and the total number of times the user enters the premises during the first time period may be counted based on the first data. And when the total times is smaller than the time threshold value, determining that the user is away from the home, wherein the third mode is the first mode. On the contrary, if the total number of times is greater than or equal to the threshold, it can be determined that the user is not away from home but enters or exits the house normally. The third mode is the other mode. Wherein, the size of the time threshold value can be set by a technician. Or in other embodiments, a threshold time of the latest return to the house may be set. For example, the time can be set to any time between 11 o 'clock and 12 o' clock at night. And then judging whether the user enters the house at the threshold moment in the current day (the first time period can be set to the current day) according to the first data. If not, the user is judged to be away from the home, and the third mode is the first mode. Otherwise, it can be determined that the user is not away from home but enters and exits the house normally. The third mode is the other mode. In addition, the embodiment of the present application does not excessively limit the manner of acquiring the first data, and may be set by a technician according to actual circumstances. For example, in some embodiments, when the terminal device is not an internet of things device in a house, the recording of the first data may be completed by the internet of things device and sent to the terminal device.
After the third mode is obtained, the embodiment of the application may determine a real scene mode of the first area according to the third mode. As one possible embodiment of the present application, the third mode may be a scene mode of the first area. As another optional embodiment of the present application, some pattern determination rules may also be preset, and the third pattern is processed based on the rules to obtain the scene pattern of the first area.
It should be noted that the above-described modes 1 and 2 are only two alternative implementations. In practical applications, a technician may arbitrarily select one or more modes from the scene modes to acquire the scene modes. When the two modes are combined, if only the second mode or the third mode is acquired, the processing may be performed according to the contents of the modes 1 and 2. If the second mode and the third mode are acquired simultaneously, one of the modes needs to be selected and then processed. As an optional embodiment of the present application, the user may preferentially actually set, select the second mode, and then process the content according to the method 1. In addition, in practical applications, other manners besides the manner 1 and the manner 2 may also be selected to obtain the scene mode, for example, a timed-start user behavior simulation may be set for the embodiment of the present application to meet the user requirements with a fixed away habit. At this time S101 may be replaced by: and acquiring a scene mode of the first area at fixed time, wherein the scene mode is a first mode set by default. The specific timing starting time can be set by a technician or a user. For example, 8 am on six morning or 7 am on 30 am per month may be set.
And S102, if the scene mode of the first area is the first mode, acquiring a device control strategy associated with the first area, wherein the device control strategy is a strategy obtained based on historical use data of a user on target devices in the first area.
When the scene mode is the first mode, which indicates that the user leaves home, user behavior simulation needs to be performed. In order to implement user behavior simulation, the embodiment of the present application analyzes historical usage data of a user on a target device to determine a usage habit of the user on the target device (i.e., a behavior of the user). And generating a corresponding equipment control strategy. The operation of generating the device control policy may be performed before S102, or may be performed in S102, which is not limited herein. When executed before S102, for S102, the device control policy that has been generated may be acquired when it is determined that user behavior simulation is required. And when performed in S102. For S102, when it is determined that the user behavior simulation is required, the historical usage data is analyzed to obtain the device control policy. The embodiment of the application does not excessively limit the specific analysis method of the historical use data, and can be set by technical personnel according to the actual situation. For example, in some alternative embodiments, the devices actually used by the user may be analyzed according to the historical usage data, and some or all of the devices may be selected as target devices, and the usage periods of the respective target devices may be analyzed. And setting the starting time and the closing time of each target device when the user behavior simulation is set according to the use time period, and storing the starting time and the closing time of the target devices as a device control strategy.
As an alternative implementation manner of generating the device control policy in the present application, the generation of the device control policy may be implemented in S102. Referring to fig. 4, at this time S102 may be replaced with: S401-S402.
S401, historical use data of the user for the target device in the first area in the second time period is obtained.
Wherein the second time period is a sample time period for user behavior analysis. The specific range of the second time period is not limited too much in the embodiments of the present application, and may be set by a technician according to actual needs, for example, it may be a past week, a month, or a half year. On the one hand, theoretically, the longer the second time period is, the larger the data size that can be acquired is, the better the effect of user behavior analysis at this time is, and further the effect of user behavior simulation is better. But on the other hand may be significantly different at different times due to user behavior habits. That is, when the second period of time is too long, the reference value of the part of the history data may be low. Which in turn may affect the effect of the simulation of the user's behavior. Thus, the technician may set the range of the second time period according to the actual user situation. The method for acquiring the historical use data is not limited too much and can be determined according to the actual scene condition. For example, the device of the internet of things collects the record and sends the record to the terminal device (the record can be forwarded via a device such as a server). Or may be manually input by the user or copied through an external memory.
S402, analyzing the historical use data and generating a device control strategy associated with the first area.
The embodiment of the application does not excessively limit the specific analysis method of the historical use data, and can be set by a technician. For example, reference may be made to the description of S102 above. Analysis may also be accomplished using some big data analysis method. For example, the historical usage data may be subjected to operations such as classification, regression analysis, sorting, association analysis, and the like, and then processed by using learning models such as a decision tree, a genetic algorithm, an artificial neural network, and the like, so as to determine the behavior of the user and obtain a corresponding device control strategy.
As an optional embodiment of the present application, the device control policy may be generated automatically by the terminal device, or may be manually set by the user. That is, the user may set the device control policy according to the usage habit of the target device, and at this time, S102 is to obtain the device control policy set by the user.
As an optional embodiment of the present application, on the basis that the terminal device automatically generates the device control policy, a policy modification function may be provided for the user. That is, the user can modify the device control strategy according to the actual requirement of the user. At this time, S102 is to obtain the device control policy modified by the user.
As a specific implementation method for analyzing the historical usage data in the embodiment shown in fig. 1 and the embodiment shown in fig. 4. Referring to fig. 5, in the embodiment of the present application, the historical usage data includes a usage period (i.e., a first usage period) of the target device by the user, and a work site (i.e., a first work site) of the target device in the first area during the usage period. The embodiment of the application comprises the following steps:
s501, analyzing the first use time period and the first work place to obtain a second use time period of the target device and a second work place in a second area.
And S502, generating a device control strategy for the target device based on the second use time period and the second work place.
The method and the device mainly aim at analyzing the use time period and the work place of the target device by the user. Wherein different finenesses of the use periods can be set according to the actual requirements. For example, in some alternative embodiments, if one only wants to perform a user behavior simulation in "single day" units. Every day in the second time period is the equivalent processing object. The first usage period is a period of time during which the target device is used each day. For example 8 to 9 points. In other alternative embodiments, the user behavior simulation may be performed in units of "one week" in order to more humanly simulate the user behavior. In this case, the embodiment distinguishes between monday, tuesday, wednesday, thursday, friday, saturday and sunday of each week during the second time period. The first usage period is a period of time during which the target device is used on a different day of the week. For example, 8 o 'clock to 9 o' clock on monday to friday each week, 11 o 'clock to 11 o' clock 15 on saturday to sunday. The fineness is higher than that of the user behavior simulation in the unit of 'single day'.
On the basis of obtaining the first use time period, the embodiment of the application analyzes the first use time period to determine the use time habit of the user for each target device. And then determining the time period (namely a second use time period) for using each target device when the user behavior simulation is carried out. And further, the simulation of the user behavior on the time dimension is realized. The specific use time period analysis method is not limited too much in the embodiment of the application, and can be set by technical personnel according to actual requirements. For example, the first usage period may be used as the second usage period, and some learning models are used to learn the usage period, so as to obtain the second usage period. As an alternative embodiment of the present application, the analysis of the usage period may be performed in a unit of a single day. Analyzing one or more first use time periods used by the target equipment in each day, and performing comprehensive analysis and learning on the first use time periods in multiple days to obtain one or more second use time periods corresponding to the target equipment in a single day.
To illustrate with an example, assume that the analysis is performed in units of "single day" within the past week (assuming that the second time period is set to the past week). While assuming that lamp a is used between 7 to 8 am and 7 to 12 pm. The first period of use of lamp a at this time was 7 to 8 am and 7 to 12 pm per day of the week. On this basis, the first period of use may be set as the second period of use, resulting in a second period of use of lamp a of 7 to 8 am and 7 to 12 pm per day.
On the other hand, the work site of the target device refers to a specific site of the target device in the first area. Therefore, the first area needs to be divided into area locations in advance. The embodiment of the application does not excessively limit the division rule of the area and the location, and technical personnel can divide the area and the location according to actual conditions. For example, where the first area is a house, the work site for the target device may be a bedroom, a living room, a kitchen, or a study. When the first area is an office building, the work site of the target device may be an office on a different floor.
In the embodiment of the present application, the work place of the target device can be divided into three cases:
1. the work site is stable for the first period of use. E.g., fixed lamps, are used at the same location.
2. There is a change in the work site during the first period of use. For example, the sweeping robot can sweep different places at different times, such as sweeping a public area in the morning, sweeping a bedroom at night, and the like.
3. The work site cannot be acquired. In view of the practical application, the location information of some devices may be difficult to know. For example, the work place of some portable sound boxes can change along with the use requirements of users, and the work place is difficult to set in advance. At this time, if the user does not manually input the information, the terminal device cannot know the working place of the portable sound box.
In order to realize more accurate simulation of user behaviors, the application embodiment analyzes the use place of the target device in the first use time period. In the case where the target device belongs to the 3 rd category, the work place cannot be acquired, the analysis may not be performed. However, in the cases of the 1 st and 2 nd possible or working locations, the working locations of the target devices need to be analyzed, and then the working locations (i.e., the second working locations) where the target devices are used in the user behavior simulation are determined. And further, the simulation of the user behavior on the spatial position dimension is realized. The analysis method of the first work place is not limited too much in the embodiment of the application, and can be selected or set by technical personnel according to actual requirements. The learning of the work site may be accomplished, for example, with the first work site as the second work site, or with some learning model. It should be particularly noted that, as an alternative embodiment of the present application, when a single target device has a plurality of second work sites, the second usage periods corresponding to the respective second work sites are recorded. If a single second use time period corresponds to a plurality of second work sites, the sequence among the second work sites needs to be recorded according to the sequence of corresponding time in the second use time period. For example, suppose the sweeping robot has two second periods of use, 8 to 9 am, and 9 to 11 pm. Wherein, the second working place from 8 to 9 in the morning is a living room, and the second working place from 9 to 11 in the evening is a bedroom, a dining room and a living room. It is now necessary to record the sequence of the second work site, from 9 pm to 11 pm: bedrooms, restaurants, and living rooms.
After the second period of use and the second work site have been obtained, it has been theoretically determined when and where the target device is used. Therefore, the embodiment of the application generates a specific device control strategy according to the second use time period and the second work place. I.e. generating a control scheme of when the target device is switched on, where and at different times, and when to switch off, etc.
As an alternative embodiment of the present application, on the basis of the embodiment shown in fig. 5, in order to achieve a more refined simulation of the user behavior. In the embodiment of the present application, the historical usage data further includes an operating parameter (i.e., a first operating parameter) of the target device during the first usage period. Such as the brightness of the lights or the volume of the sound box, etc. When the equipment control strategy is generated, the working parameter condition of the target equipment is considered at the same time, so that the detail simulation of the user behavior is realized, and the deterrence force on illegal shares is improved. Referring to fig. 6, in the embodiment of the present application, S501 and S502 may be replaced with: S601-S602.
S601, analyzing the first use time period, the first work place and the first work parameters to obtain a second use time period of the target device, a second work place in the first area and second work parameters in the second use time period.
In the embodiment of the present application, the operating parameters refer to configuration parameters of the device during operation, such as brightness and volume. Different target devices have different software and hardware configurations, so that working parameter conditions corresponding to different target devices can have certain differences. In the embodiment of the present application, the technician may set the working parameter conditions corresponding to the required acquisition and control in advance for different types of devices. For example, for a lighting device such as a lamp, the brightness is set to the corresponding operating parameter. For the playing devices such as a sound box, working parameters such as volume are set. For a playing device such as a television, both brightness and volume can be set as working parameters.
On the basis of obtaining the first working parameter of the target device, the embodiment of the application analyzes the working parameter to determine the parameter use habit of the user on each target device. And determining the conditions of the working parameters (namely the second working parameters) of each target device during the user behavior simulation. And further, the detail simulation of the user behavior is realized. The working parameter analysis method used in the embodiment of the application is not limited too much, and can be selected or set by technical personnel according to actual requirements. The learning of the operating parameter may be implemented, for example, with the first operating parameter as the second operating parameter, or with some learning model.
As an alternative embodiment of the present application, after determining each first usage time period, a first summary analysis of the operating parameters may be performed on the corresponding first usage time period in each day in the second time period in units of "a single day". And obtaining the most possible working parameters of the target equipment used by the user in each first use time period. And setting the working parameter as a second working parameter corresponding to a second time period. For example, suppose lamp B has two first periods of use, 8 to 9 am, and 9 to 11 pm. And in the working parameters of each day in the second time period, the brightness A is used most from 8 to 9 in the morning, and the brightness B is used most from 9 to 11 in the evening. And set 8 to 9 am and 9 to 11 pm as a second period of use for lamp B. At this time, the working parameter of the lamp B corresponding to 8 o 'clock to 9 o' clock in the morning may be set as the brightness a, and the working parameter corresponding to 9 o 'clock to 11 o' clock in the evening may be set as the brightness B.
And S602, generating a device control strategy for the target device based on the second use time period, the second work place and the second work parameter.
After the second period of use, the second work location and the second work parameters have been obtained, it has been theoretically determined how to use the target device at any time and place (in this case, it may be possible to switch on and off the target device only). Therefore, the embodiment of the application generates a specific device control strategy according to the second use time period, the second work place and the second work parameter. The control scheme is generated when the target device is started, where and at different times the target device works, the working parameters set during specific working, when the target device stops working and the like.
And S103, controlling the target equipment in the first area according to the equipment control strategy.
After the device control strategy for the target device is obtained, the embodiment of the application can realize the control of the target device based on the device control strategy so as to realize the user behavior simulation. According to different data conditions actually contained in the equipment control strategy, different fineness of the target equipment can be controlled. For example, when only a period of use of the target device is contained within the device control policy, control of when the target device is switched on and off may be implemented at this time. When the equipment control strategy contains the use time period and the work place of the target equipment, the accurate control of the switch and the use place of the target equipment can be realized. And when the equipment control strategy simultaneously comprises the use time period, the work place and the work parameters, the accurate control of the switch, the use place and the parameter configuration during use of the target equipment can be realized. These different finesse controls can enable behavioral simulation for the user in different dimensions. And further, user behavior simulation with different accuracies can be realized, and then deterrence effects with different degrees are achieved. In practical applications, a technician or a user may set the data content included in the device control policy according to actual requirements.
As an alternative embodiment of the present application, as can be seen from the description content of the embodiment shown in fig. 5, the embodiment of the present application may set the fineness setting of the usage period according to actual requirements. Accordingly, when the user behavior simulation is performed, the target device may be controlled according to the fineness of the usage period. For example, user behavior simulation is performed in units of "one day". At this time, only one set of control scheme needs to be stored in the device control strategy for a single target device. When the target device control is performed, the content of the control on the target device is the same every day. And user behavior simulation is performed in units of "one week". A maximum of 7 sets of control schemes may be stored within the device control strategy for a single target device. When the target device is controlled, the specific control scheme of the target device needs to be determined according to the day of the week. For example, in some embodiments, light C may be controlled to light at a setting of brightness a on monday through friday, 8 to 9 am. And sixty to sunday, the lamp C is controlled to be lighted at 10 to 11 points in the morning at the setting of the brightness C.
In the embodiment of the present application, it is first determined whether the user leaves the first area. If the user has left the first area, the first area is in the first mode. A pre-generated device control policy is obtained or a device control policy is generated based on historical usage data of the target device by the user. And finally, controlling the target equipment in the first area based on the equipment control strategy, thereby realizing the user behavior simulation of the user in the first area. Making it difficult for illegal shares to find out that the user has left the first area in order for the user to remain normally within the first area. Therefore, the illegal share is effectively deterred, the probability of illegal behaviors such as theft of the illegal share to the first area is reduced, and the property safety of the user is improved.
Meanwhile, historical behaviors of the user are analyzed by starting from multiple dimensions of the equipment use time, the equipment work place and the working parameters configured by the equipment, and then the equipment control strategy simultaneously containing multiple dimension analysis results is obtained. According to the embodiment of the application, when the target equipment is controlled based on the equipment control strategy, the user behavior can be simulated more accurately, the simulation effect is better, and the deterrence to illegal parts is stronger. Thereby making the security of the user's property higher.
Fig. 7 shows a block diagram of a device control apparatus provided in the embodiment of the present application, which corresponds to the method of the above embodiment, and only shows a part related to the embodiment of the present application for convenience of description. The device control apparatus illustrated in fig. 6 may be an execution subject of the device control method provided in the first embodiment.
Referring to fig. 7, the device control apparatus includes:
a mode obtaining module 71, configured to obtain a scene mode of the first area.
The policy obtaining module 72 is configured to, when the scene mode of the first area is the first mode, obtain a device control policy associated with the first area, where the device control policy is obtained according to historical usage data of a target device in the first area by a user.
And the device control module 73 is used for controlling the target device according to the device control strategy.
As an embodiment of the present application, the pattern obtaining module 71 includes:
and the first mode acquisition submodule is used for acquiring a mode setting instruction of a user and determining a second mode pointed by the mode setting instruction.
And the first mode determining module is used for determining the scene mode of the first area according to the second mode.
As an embodiment of the present application, the pattern obtaining module 71 includes:
and the second mode acquisition submodule is used for acquiring first data of a user entering the first area in the first time period and determining a third mode according to the first data.
And the second mode determining module is used for determining the scene mode of the first area according to the third mode.
As an embodiment of the present application, the policy obtaining module 72 includes:
and the data acquisition module is used for acquiring historical use data of the target equipment in a second time period.
And the strategy generation module is used for analyzing the historical use data and generating the equipment control strategy associated with the first area.
As an embodiment of the present application, the historical usage data includes: a first period of use of the target device by the user during the second period of time, and a first work site of the target device within the first area during the first period of use. Accordingly, the policy generation module comprises:
and the first data analysis module is used for analyzing the first use time period and the first work place to obtain a second use time period of the target equipment and a second work place in the first area.
And the first strategy generation submodule is used for generating a device control strategy for the target device based on the second use time and the second work place.
As an embodiment of the present application, the historical usage data includes: the method includes the steps of a first usage period of time of the target device by a user within a second time period, a first work place of the target device within a first area within the first usage period, and a first work parameter of the target device within the first usage period. Accordingly, the policy generation module comprises:
and the second data analysis module is used for analyzing the first use time period, the first work place and the first work parameters to obtain a second use time period of the target equipment, a second work place in the first area and second work parameters in the second use time period.
And the second strategy generation submodule is used for generating a device control strategy for the target device based on the second use time, the second work place and the second work parameter.
The process of implementing each function by each module in the device control apparatus provided in this embodiment may specifically refer to the description of the first embodiment shown in fig. 1, and is not described herein again.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance. It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements in some embodiments of the application, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first table may be named a second table, and similarly, a second table may be named a first table, without departing from the scope of various described embodiments. The first table and the second table are both tables, but they are not the same table.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The device control method provided by the embodiment of the application can be applied to terminal devices such as a mobile phone, a tablet personal computer, a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and the like, and the embodiment of the application does not limit the specific type of the terminal device at all.
By way of example and not limitation, when the terminal device is a wearable device, the wearable device may also be a generic term for intelligently designing daily wearing by applying wearable technology, developing wearable devices, such as glasses, gloves, watches, clothing, shoes, and the like. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable intelligent device has the advantages that the generalized wearable intelligent device is complete in function and large in size, can realize complete or partial functions without depending on a smart phone, such as a smart watch or smart glasses, and only is concentrated on a certain application function, and needs to be matched with other devices such as the smart phone for use, such as various smart bracelets for monitoring physical signs, smart jewelry and the like.
Fig. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 8, the terminal device 8 of this embodiment includes: at least one processor 80 (only one shown in fig. 8), a memory 81, said memory 81 having stored therein a computer program 82 executable on said processor 80. The processor 80, when executing the computer program 82, implements the steps in the various device control method embodiments described above, such as the steps 101 to 103 shown in fig. 1. Alternatively, the processor 80, when executing the computer program 82, implements the functions of the modules/units in the above-described device embodiments, such as the functions of the modules 71 to 73 shown in fig. 7.
The terminal device 8 may be a mobile phone, a tablet computer, a desktop computer, a notebook computer, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 80, a memory 81. It will be appreciated by those skilled in the art that fig. 8 is merely an example of a terminal device 8 and does not constitute a limitation of terminal device 8 and may include more or less components than shown, or some components may be combined, or different components, e.g. the terminal device may also include an input transmitting device, a network access device, a bus, etc.
The Processor 80 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 81 may in some embodiments be an internal storage unit of the terminal device 8, such as a hard disk or a memory of the terminal device 8. The memory 81 may also be an external storage device of the terminal device 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 8. Further, the memory 81 may also include both an internal storage unit and an external storage device of the terminal device 8. The memory 81 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 81 may also be used to temporarily store data that has been transmitted or is to be transmitted.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a terminal device, enables the terminal device to implement the steps in the above method embodiments when executed.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (10)

1. An apparatus control method characterized by comprising:
acquiring a scene mode of a first area;
if the scene mode of the first area is a first mode, acquiring an equipment control strategy associated with the first area, wherein the equipment control strategy is a strategy obtained according to historical use data of a user on target equipment in the first area;
and controlling the target equipment according to the equipment control strategy.
2. The device control method according to claim 1, wherein the acquiring the scene mode of the first area includes:
acquiring a mode setting instruction of the user, and determining a second mode pointed by the mode setting instruction;
and determining the scene mode of the first area according to the second mode.
3. The device control method according to claim 1, wherein the acquiring the scene mode of the first area includes:
acquiring first data of the user entering the first area within a first time period, and determining a third mode according to the first data;
and determining the scene mode of the first area according to the third mode.
4. The device control method according to any one of claims 1 to 3, wherein the obtaining of the device control policy associated with the first area further includes:
acquiring historical use data of the target equipment in a second time period;
analyzing the historical usage data to generate the device control policy associated with the first zone.
5. The device control method according to claim 4, wherein the historical usage data includes: a first time period of use of the target device by a user during the second time period, and a first work site of the target device within the first area during the first time period of use;
accordingly, the analyzing the historical usage data to generate the device control policy associated with the first zone includes:
analyzing the first use time period and the first work place to obtain a second use time period of the target equipment and a second work place in the first area;
generating the device control policy for the target device based on the second usage time and the second work site.
6. The device control method according to claim 4, wherein the historical usage data includes: a first time period of use of the target device by a user during the second time period, a first place of operation of the target device within the first area during the first time period of use, and a first operating parameter of the target device during the first time period of use;
accordingly, the analyzing the historical usage data to generate the device control policy associated with the first zone includes:
analyzing the first use time period, the first work place and the first work parameter to obtain a second use time period of the target equipment, a second work place in the first area and a second work parameter in the second use time period;
generating the device control policy for the target device based on the second usage time, the second work site, and the second work parameter.
7. An apparatus control device, characterized by comprising:
the mode acquisition module is used for acquiring a scene mode of the first area;
a policy obtaining module, configured to obtain a device control policy associated with the first area when a scene mode of the first area is a first mode, where the device control policy is obtained according to historical usage data of a user on a target device in the first area;
and the equipment control module is used for controlling the target equipment according to the equipment control strategy.
8. The device control apparatus of claim 7, wherein the policy acquisition module comprises:
the data acquisition module is used for acquiring historical use data of the target equipment in a second time period;
a policy generation module to analyze the historical usage data to generate the device control policy associated with the first region.
9. A terminal device, characterized in that the terminal device comprises a memory, a processor, a computer program being stored on the memory and being executable on the processor, the processor implementing the steps of the method according to any of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
CN202010833910.3A 2020-08-18 2020-08-18 Equipment control method and device and terminal equipment Pending CN114077200A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010833910.3A CN114077200A (en) 2020-08-18 2020-08-18 Equipment control method and device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010833910.3A CN114077200A (en) 2020-08-18 2020-08-18 Equipment control method and device and terminal equipment

Publications (1)

Publication Number Publication Date
CN114077200A true CN114077200A (en) 2022-02-22

Family

ID=80281387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010833910.3A Pending CN114077200A (en) 2020-08-18 2020-08-18 Equipment control method and device and terminal equipment

Country Status (1)

Country Link
CN (1) CN114077200A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979515A (en) * 2017-11-21 2018-05-01 广东欧珀移动通信有限公司 A kind of control method of intelligent appliance, terminal device and storage medium
US20180299955A1 (en) * 2017-04-14 2018-10-18 International Business Machines Corporation Enhanced virtual scenarios for safety concerns
CN109241711A (en) * 2018-08-22 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on prediction model
CN109283872A (en) * 2018-10-19 2019-01-29 维沃移动通信有限公司 A kind of control method of equipment, device and terminal device
CN110347076A (en) * 2019-05-22 2019-10-18 珠海格力电器股份有限公司 Control method, device, electronic equipment and storage medium
CN111121237A (en) * 2019-12-27 2020-05-08 广东美的白色家电技术创新中心有限公司 Air conditioner, control method thereof, server, and computer-readable storage medium
CN111295022A (en) * 2020-01-23 2020-06-16 珠海荣邦电子科技有限公司 Light control method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180299955A1 (en) * 2017-04-14 2018-10-18 International Business Machines Corporation Enhanced virtual scenarios for safety concerns
CN107979515A (en) * 2017-11-21 2018-05-01 广东欧珀移动通信有限公司 A kind of control method of intelligent appliance, terminal device and storage medium
CN109241711A (en) * 2018-08-22 2019-01-18 平安科技(深圳)有限公司 User behavior recognition method and device based on prediction model
CN109283872A (en) * 2018-10-19 2019-01-29 维沃移动通信有限公司 A kind of control method of equipment, device and terminal device
CN110347076A (en) * 2019-05-22 2019-10-18 珠海格力电器股份有限公司 Control method, device, electronic equipment and storage medium
CN111121237A (en) * 2019-12-27 2020-05-08 广东美的白色家电技术创新中心有限公司 Air conditioner, control method thereof, server, and computer-readable storage medium
CN111295022A (en) * 2020-01-23 2020-06-16 珠海荣邦电子科技有限公司 Light control method and system

Similar Documents

Publication Publication Date Title
WO2021180062A1 (en) Intention identification method and electronic device
US20180338120A1 (en) Intelligent event summary, notifications, and video presentation for audio/video recording and communication devices
US10685233B2 (en) Sensor based semantic object generation
US10359741B2 (en) Switch terminal system with spatial relationship information
CN110139732A (en) Social robot with environmental Kuznets Curves feature
CN110458360B (en) Method, device, equipment and storage medium for predicting hot resources
CN103620620A (en) Using spatial information in device interaction
US10769909B1 (en) Using sensor data to detect events
CN107431649B (en) The method and system realized for resident's strategy in intelligent household's environment
US11018939B1 (en) Determining product compatibility and demand
US11659144B1 (en) Security video data processing systems and methods
US10642231B1 (en) Switch terminal system with an activity assistant
WO2012032714A1 (en) User device, server, and operating conditions setting system
Windl et al. Investigating Tangible Privacy-Preserving Mechanisms for Future Smart Homes
CN114077200A (en) Equipment control method and device and terminal equipment
He et al. Smartphone usage contexts and sensable patterns as predictors of future sedentary behaviors
US20210208843A1 (en) Information processing apparatus, information processing method, information processing program
US10401805B1 (en) Switch terminal system with third party access
CN109903173A (en) A kind of processing method of insurance business, device, equipment and system
Von Dehsen Providing a Camera Stream on an Ancillary Display
Ajayi et al. Design and Implementation of a WiFi-Enabled Home Automation System.
Von Dehsen Camera Lens with Display Mode
Dhillon et al. Health Analyzing Smart Mirror
Tait Smart Rubbish Bins
Zaarour Smart Playing Cards

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination