CN114758430A - Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal - Google Patents

Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal Download PDF

Info

Publication number
CN114758430A
CN114758430A CN202011587539.3A CN202011587539A CN114758430A CN 114758430 A CN114758430 A CN 114758430A CN 202011587539 A CN202011587539 A CN 202011587539A CN 114758430 A CN114758430 A CN 114758430A
Authority
CN
China
Prior art keywords
door lock
unit
log
security
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011587539.3A
Other languages
Chinese (zh)
Inventor
廖明威
曾文锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lumi United Technology Co Ltd
Original Assignee
Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lumi United Technology Co Ltd filed Critical Lumi United Technology Co Ltd
Priority to CN202011587539.3A priority Critical patent/CN114758430A/en
Publication of CN114758430A publication Critical patent/CN114758430A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal, relates to intelligent house technical field. According to the intelligent door lock, the door lock environment information is automatically acquired under the condition that a safety detection trigger event is found by the intelligent door lock, the door lock environment information and the safety detection trigger event are directly sent to the user terminal through the cloud equipment to be played, the intelligent door lock, the gateway equipment and the cloud equipment screen logs to be uploaded representing the operation live of the intelligent door lock layer by layer, the screened logs are sent to the user terminal to be played, the user is ensured to observe the real and effective door lock safety threat development condition, and the safety guarantee capability and the user experience of the intelligent door lock are improved. The method and the system have the advantages that the door lock environment information and the safety detection triggering event are stored in the cloud equipment, the log content related to the safety of the door lock is cached in multiple levels in the intelligent door lock, the gateway equipment and the cloud equipment, and the safety data of the door lock are effectively retained.

Description

Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal
Technical Field
The application relates to the technical field of smart home, in particular to a door lock management system, a smart door lock, gateway equipment, cloud equipment and a user terminal.
Background
With the continuous development of science and technology, the application of the internet of things technology is more and more extensive, wherein the field of smart home is an important application field of the internet of things technology. In the field of intelligent home, the intelligent door lock can guarantee personal and property safety of users, and therefore the intelligent door lock plays a very important role. Therefore, people put higher demands on the safety management of the intelligent door lock.
Disclosure of Invention
In view of this, an object of the present application is to provide a door lock management system, an intelligent door lock, a gateway device, a cloud device, and a user terminal, which enable a user to observe a real and effective development situation of a security threat of the door lock with predictability, improve the security guarantee capability and user experience of the intelligent door lock, and meanwhile, implement effective retention of security data of the door lock, and ensure the security of data retention.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides a door lock management system, where the door lock management system includes an intelligent door lock, a gateway device, a cloud device, and a user terminal;
the intelligent door lock is used for generating a log to be uploaded according to the monitored infrared sensing event and the door lock instrument change event for storage, and acquiring door lock environment information under the condition that a safety detection trigger event exists in the infrared sensing event and/or the door lock instrument change event;
the gateway equipment is in communication connection with the intelligent door lock and is used for receiving the security event logs uploaded by the intelligent door lock and extracting threat security logs from the security event logs for storage, wherein the security event logs are extracted from the logs to be uploaded by the intelligent door lock;
the cloud equipment is in communication connection with the intelligent door lock and is used for receiving and storing environment streaming media data uploaded by the intelligent door lock and generating first pushing information based on the environment streaming media data, wherein the environment streaming media data are obtained by encrypting the door lock environment information and the safety detection triggering event through the intelligent door lock;
the cloud equipment is in communication connection with the gateway equipment and is used for receiving the threat security logs uploaded by the gateway equipment, extracting effective threat logs from the threat security logs for storage, and then generating second push information based on the effective threat logs;
the user terminal is in communication connection with the cloud equipment and is used for playing the first push information and the second push information transmitted by the cloud equipment, responding to user operation to generate a corresponding control instruction, and then sending the control instruction to the intelligent door lock through the cloud equipment and the gateway equipment to be executed.
In a second aspect, an embodiment of the present application provides an intelligent door lock, where the intelligent door lock includes an infrared sensing unit, a door lock instrument unit, a door lock central control unit, an environment acquisition unit, a log generation unit, a first communication unit, and a first storage unit;
the infrared sensing unit is used for carrying out infrared detection on the surrounding environment of the intelligent door lock and generating an infrared sensing event according to a detection result;
the intelligent door lock comprises a door lock instrument unit, a door lock control unit and a door lock control unit, wherein the door lock instrument unit is used for monitoring the operation change condition of a door lock instrument assembly of the intelligent door lock and generating a door lock instrument change event according to the operation change condition;
the door lock central control unit is electrically connected with the infrared sensing unit and the door lock instrument unit and is used for detecting whether a safety detection triggering event exists in the infrared sensing event and/or the door lock instrument change event or not;
the door lock central control unit is electrically connected with the environment acquisition unit and is used for sending the detected safety detection trigger event to the environment acquisition unit and receiving door lock environment information matched with the safety detection trigger event and fed back by the environment acquisition unit, wherein the door lock environment information is acquired by the environment acquisition unit in response to the safety detection trigger event;
the log generation unit is electrically connected with the door lock central control unit and used for generating a log to be uploaded according to the generated infrared sensing event and the door lock instrument change event and sending the log to be uploaded to the door lock central control unit;
the first communication unit is electrically connected with the door lock central control unit, is in communication connection with cloud equipment, and is used for uploading environmental streaming media data generated by the door lock central control unit to the cloud equipment, wherein the environmental streaming media data are obtained by encrypting the mutually matched door lock environmental information and the security detection trigger event by the door lock central control unit;
the first communication unit is also in communication connection with gateway equipment and is used for uploading the security event logs extracted from the logs to be uploaded by the door lock central control unit to the gateway equipment, receiving a control instruction issued by a user terminal through the gateway equipment and then sending the control instruction to the door lock central control unit for execution;
the first storage unit is electrically connected with the door lock central control unit and is used for acquiring the log to be uploaded and the environmental streaming media data from the door lock central control unit for storage.
In a third aspect, an embodiment of the present application provides a gateway device, where the gateway device includes a gateway central control unit, a first log unit, a second storage unit, and a second communication unit;
the second communication unit is electrically connected with the gateway central control unit, is in communication connection with the intelligent door lock, and is used for receiving the security event log uploaded by the intelligent door lock and then sending the security event log to the gateway central control unit;
the gateway central control unit is electrically connected with the first log unit and is used for sending the security event log to the first log unit and receiving a threat security log extracted from the security event log by the first log unit;
the second communication unit is also in communication connection with cloud equipment and is used for sending the threat security log obtained by the gateway central control unit to the cloud equipment, receiving a control instruction which is sent by a user terminal through the cloud equipment and aims at the intelligent door lock, and then sending the obtained control instruction to the gateway central control unit;
the gateway central control unit is also used for converting the received control instruction into a control instruction adaptive to the intelligent door lock and sending the converted control instruction to the intelligent door lock for execution through the second communication unit;
the second storage unit is electrically connected with the gateway central control unit and used for storing the threat security log.
In a fourth aspect, an embodiment of the present application provides a cloud device, where the cloud device includes a cloud center control unit, a third communication unit, a push construction unit, a second log unit, and a third storage unit;
the third communication unit is electrically connected with the cloud central control unit, is in communication connection with the intelligent door lock, and is used for receiving the environmental streaming media data uploaded by the intelligent door lock and then sending the environmental streaming media data to the cloud central control unit;
the cloud center control unit is electrically connected with the push construction unit and is used for sending the environment streaming media data to the push construction unit and receiving first push information generated by the push construction unit according to the environment streaming media data;
the third communication unit is also in communication connection with the gateway device and is used for receiving the threat security log uploaded by the gateway device and sending the threat security log to the cloud central control unit;
the cloud center control unit is electrically connected with the second log unit and is used for sending the threat security log to the second log unit and receiving an effective threat log extracted from the threat security log by the second log unit;
the cloud central control unit is further configured to send the effective threat log to the push construction unit, and receive second push information generated by the push construction unit according to the effective threat log;
the third communication unit is in communication connection with a user terminal and is used for sending the first push information and the second push information obtained by the cloud central control unit to the user terminal for playing, receiving a control instruction issued by the user terminal for the intelligent door lock and then sending the obtained control instruction to the cloud central control unit;
the cloud central control unit is further used for converting the received control instruction into a control instruction adaptive to the gateway device, and the gateway device forwards the control instruction to the intelligent door lock for execution;
the third storage unit is electrically connected with the cloud central control unit and is used for storing the environment streaming media data and the effective threat log.
In a fifth aspect, an embodiment of the present application provides a user terminal, where the user terminal includes a playing unit, a fourth communication unit, and an instruction generating unit;
the fourth communication unit is in communication connection with the cloud equipment, is electrically connected with the playing unit, and is used for receiving first push information and second push information transmitted by the cloud equipment and then sending the first push information and the second push information to the playing unit for playing, wherein the first push information is generated by the cloud equipment based on environmental streaming media data of the intelligent door lock, and the second push information is generated by the cloud equipment based on effective threat logs in logs to be uploaded of the intelligent door lock;
the instruction generating unit is electrically connected with the fourth communication unit and used for responding to user operation to generate a control instruction for the intelligent door lock and sending the control instruction to the intelligent door lock for execution through the fourth communication unit and the cloud equipment.
The beneficial effects of the embodiment of the application include the following:
according to the method, the intelligent door lock automatically collects the door lock environment information under the condition that a safety detection trigger event is found, the door lock environment information and the safety detection trigger event are directly sent to the user terminal through the cloud equipment to be played, the intelligent door lock, the gateway equipment and the cloud equipment are mutually matched to screen the logs to be uploaded, which represent the operation condition of the intelligent door lock, layer by layer, and finally screened logs which really affect the door lock safety are sent to the user terminal to be played, so that the information observed by the user is visual and effective, the real and effective door lock safety threat development condition can be observed by the user in a predictive manner, and the safety guarantee capability and the user experience of the intelligent door lock are improved. Meanwhile, the door lock environment information and the safety detection trigger event are stored in the cloud equipment, and the log content which is screened from the log to be uploaded and relates to the safety of the door lock is cached in a multi-level mode in the intelligent door lock, the gateway equipment and the cloud equipment, so that the safety data of the door lock are effectively retained, and the safety of data retention is ensured.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic system composition diagram of a door lock management system according to an embodiment of the present application;
fig. 2 is a schematic composition diagram of an intelligent door lock according to an embodiment of the present application;
fig. 3 is a second schematic view illustrating the composition of the intelligent door lock according to the embodiment of the present application;
fig. 4 is a schematic composition diagram of a gateway device according to an embodiment of the present application;
fig. 5 is a schematic composition diagram of a cloud device provided in an embodiment of the present application;
fig. 6 is a schematic composition diagram of a user terminal according to an embodiment of the present application.
An icon: 10-a door lock management system; 100-intelligent door lock; 200-a gateway device; 300-a cloud device; 400-user terminal; 110-an infrared sensing unit; 120-a door lock instrument unit; 130-a door lock central control unit; 140-an environment acquisition unit; 150-log generation unit; 160-a first communication unit; 170 — a first storage unit; 111-human body infrared sensing module; 112-human behavior analysis module; 180-a door lock alarm unit; 210-a gateway central control unit; 220-first log unit; 230-a second storage unit; 240-second communication unit; 211-a first check module; 221-a first format conversion module; 222-a first log screening module; 310-cloud center control unit; 320-a third communication unit; 330-push building unit; 340-a second log unit; 350-a third memory cell; 311-a second check-up module; 341-second format conversion module; 342-a second log screening module; 331-a first information construction module; 312-a data decryption module; 332-a second information construction module; 410-a playback unit; 420-a fourth communication unit; 430-instruction generation unit.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present application, it is to be understood that relational terms such as the terms first and second, and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
The applicant finds that the safety management scheme of the existing intelligent door lock only depends on the safety performance of door lock instrument components (such as a lock tongue, a lock cylinder, a fingerprint module, a key hole, a touch panel, a prying-resistant switch and the like), only provides safety guarantee by the aid of the door lock instrument components, has obvious loopholes in the aspect of data management related to the safety of the door lock, does not pay attention to specific application of door lock safety data, cannot enable a user to observe specific development conditions of real and effective door lock safety threat in a predictive manner, cannot effectively retain the door lock safety data, has a risk of data leakage, and seriously threatens the safety guarantee capability and the sensory experience of the user of the door lock.
Therefore, the applicant provides a door lock management system and component devices (including an intelligent door lock, gateway equipment, cloud equipment and a user terminal) of the door lock management system, so as to ensure that a user can predictably observe the development condition of real and effective door lock security threats, improve the security guarantee capability and user experience of the intelligent door lock, effectively retain safe data of the door lock, and ensure the security of data retention.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments and features of the embodiments described below can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic system composition diagram of a door lock management system 10 according to an embodiment of the present disclosure. In the embodiment of the application, the door lock management system 10 enables a user to predictably observe the real and effective door lock security threat development condition and effectively retain the door lock security data, so that the security guarantee capability and the user experience of the intelligent door lock are improved, and the security of data retention is ensured. The door lock management system 10 includes an intelligent door lock 100, a gateway device 200, a cloud device 300, and a user terminal 400.
In this embodiment, the intelligent door lock 100 is capable of performing infrared detection on the environment around the intelligent door lock 100 (including the inside and/or outside of the doorway where the door lock is located), and generating a corresponding infrared sensing event according to a specific detection result when detecting that there is an object near the door lock. Meanwhile, the smart door lock 100 may also monitor a change state of an operation state of a door lock device assembly (including a latch, a lock cylinder, a fingerprint module, a keyhole, a touch panel, a tamper switch, a door lock battery, etc.) (e.g., a change state of the latch and the lock cylinder, a password input by the touch panel, a fingerprint recognized by the fingerprint module, a tamper switch is pried, a battery level of the door lock is in a normal state or a low-level state or a state close to exhaustion, etc.) and generate a door lock device change event according to the specific change state of the operation of the door lock device assembly. The infrared sensing event is an event for recording the change condition of an object in the infrared sensing range of the intelligent door lock 100, and the door lock instrument change event is an event for recording the specific operation change condition of each door lock instrument component in the intelligent door lock 100.
After obtaining an infrared sensing event or a door lock instrument change event, the intelligent door lock 100 analyzes the obtained infrared sensing event or door lock instrument change event, and determines whether the obtained infrared sensing event or door lock instrument change event meets the condition of being determined as a safety detection trigger event according to the analysis result. The security detection triggering event is an event indicating that an extra environment information acquisition function needs to be actively opened to verify whether the current intelligent door lock 100 is safe, and the security detection triggering event can include but is not limited to the failure of continuously recognizing fingerprints for multiple times by a fingerprint module, the failure of opening a door by continuous passwords for multiple times, a prying-resistant switch is pried, a certain object of infrared detection stays at a door for ten minutes and several minutes, and a door lock indicating button used for indicating that a homeowner leaves home is triggered and the like.
When it is determined that a security detection triggering event exists in the obtained infrared sensing event and/or the door lock instrument change event, the intelligent door lock 100 correspondingly starts an environment information acquisition function to acquire environment information of a surrounding environment of the intelligent door lock 100, so as to obtain corresponding door lock environment information, where the door lock environment information may be, but is not limited to, one or a combination of video stream data, audio stream data, and a door lock environment image of an environment where the door lock is located, and accordingly the environment information acquisition function includes a camera function and/or a sound pickup function. Then, the intelligent door lock 100 encrypts the matched door lock environment information and the security detection trigger event to obtain corresponding environment streaming media data, wherein the environment streaming media data corresponds to the specific composition of the door lock environment information. In an implementation manner of this embodiment, different types of door lock environment information (e.g., video stream data, audio stream data, or door lock environment image) may be encrypted in different encryption manners, and corresponding encryption passwords may also be different, so as to reduce the possibility that the encrypted environment streaming media data is tampered.
Meanwhile, when an event (for example, an infrared sensing event or a door lock instrument change event) is obtained, the intelligent door lock 100 generates a log to be uploaded matching with the event according to the current time and a division standard of a preset event type for the event, and stores the generated log to be uploaded. The preset event type classification standard is used for identifying which security threat level the corresponding event is in for the door lock, that is, the preset event type can characterize the security threat level of the corresponding event to a certain extent, wherein the security threat level may include a zero security threat level, a low security threat level, a medium-high security threat level, a high security threat level, and the like. For example, an infrared sensing event with the content that an out-door human body stays for more than ten minutes can be identified as an event type with a high security threat level; the content is the event type that infrared sensing events with the frequency of back and forth movement of the pet outside the door exceeding 1 minute and 20 times can be identified as zero security threat level; the content is that an infrared sensing event that one person shakes outside a door can be identified as an event type with a medium-low security threat level; the content is that the door lock instrument change event with the prying-resistant switch pried after a homeowner leaves home can be identified as an event type with a high security threat level; the content is the event type that the door lock instrument change event triggered by the fingerprint module can be identified as the medium security threat level when the householder is at home; the door lock instrument change event with the content of the standby fingerprint module can be identified as an event type with a low security threat level; the event type that the door lock instrument change event with the content that the battery power of the door lock is in a low state can be determined as a high-high security threat level; a door lock instrument change event in which the door lock battery charge is near exhaustion may be identified as a high security threat level event type.
In this embodiment, the smart door lock 100 is in communication connection with the gateway device 200, and is configured to extract a security event log from the generated log to be uploaded and upload the security event log to the gateway device 200. The security event log is a log corresponding to various events related to the security of the door lock monitored by the intelligent door lock 100, wherein the security threat level corresponding to the event type related to the security of the door lock is not lower than the low security threat level, so as to ensure that the security event log extracted from the logs to be uploaded by the intelligent door lock 100 is truly related to the security of the door lock, and invalid logs unrelated to the security of the door lock are avoided as much as possible in logs finally transmitted to the gateway device 200. In an implementation manner of this embodiment, when all the security event logs are preliminarily extracted, the smart door lock 100 may exclude the security event logs related to the user privacy (e.g., fingerprint information for fingerprint unlocking, specific password for password unlocking, etc.) from the security event logs transmitted to the gateway device 200 according to the privacy habit set by the user, that is, the security event logs related to the user privacy are not transmitted to the gateway device 200.
After receiving the security event logs uploaded by the intelligent door lock 100, the gateway device 200 may further screen the security event logs to determine how much log content exists in the security event logs and does not substantially affect the safety of the door lock, and further extract threat security logs that may threaten the safety of the door lock from the security event logs for storage, where a security threat level corresponding to the threat security logs should not be lower than a medium-low security threat level, so as to ensure that the screened threat security logs stored at the gateway device 200 belong to log files that actually affect the safety of the door lock, and ensure that more log files that actually affect the safety of the door lock are included in logs finally transmitted to the cloud device 300.
In this embodiment, the smart door lock 100 is further communicatively connected to the cloud device 300, and is configured to directly send the environmental streaming media data to the cloud device 300 under the condition that the environmental streaming media data is generated, so that the cloud device 300 receives and stores the environmental streaming media data.
After receiving the environment streaming media data, the cloud device 300 correspondingly analyzes the environment streaming media data, and generates first push information capable of accessing and browsing the door lock environment information and the essential content of the security detection trigger event according to the analyzed door lock environment information and the security detection trigger event. In an implementation manner of this embodiment, the first push information may be formed by directly performing data encapsulation on the door lock environment information and the security detection trigger event in a file format that can be recognized by the user terminal 400, or may be formed by splicing an information browsing address of the door lock environment information and an event type of the security detection trigger event into a format field of a file format that can be processed by the user terminal 400.
In this embodiment, the gateway device 200 is in communication connection with the cloud device 300, and is configured to send the threat security log extracted by the gateway device 200 to the cloud device 300, and the cloud device 300 further screens the received threat security log to determine how much log content exists in the threat security log, so as to extract an effective threat log having a large impact on the security of the door lock from the threat security log and store the effective threat log. The security threat level corresponding to the effective threat log should not be lower than the medium security threat level, so as to ensure that the screened effective threat log stored at the cloud device 300 belongs to a log file which particularly affects the security of the door lock, and ensure that the user directly and intuitively observes the security status of the intelligent door lock 100 based on the log finally transmitted to the user terminal 400.
After the effective threat log is extracted, the cloud device 300 performs data splicing according to the log content of the effective threat log and the event type corresponding to the effective threat log to obtain corresponding second push information. The second push information is formed by splicing the log content of the effective threat log and the event type corresponding to the effective threat log into a format field of a file format that can be processed by the user terminal 400 by the cloud device 300.
In this embodiment, the cloud device 300 is in communication connection with the user terminal 400, and is configured to send the first push information and the second push information generated by the cloud device to the user terminal 400 for playing, so that the information content observed by the user at the user terminal 400 and the security aspect of the smart door lock 100 are intuitive and effective, the user can observe the development status of a real and effective door lock security threat in a predictive manner, and the security guarantee capability and the user experience of the smart door lock 100 are improved. If the door lock environment information corresponding to the first push information includes audio stream data, the user terminal 400 may perform audio playing on the audio content corresponding to the first push information correspondingly; if the door lock environment information corresponding to the first push information includes video stream data or a door lock image, the user terminal 400 may correspondingly display video content or image content corresponding to the first push information; for the second push information, the user terminal 400 may correspondingly display the log content and the event type included in the second push information.
After the user looks up the first push message or the second push message related to the security of the intelligent door lock 100 through the user terminal 400, the user may issue a control operation to the intelligent door lock 100 at the user terminal 400, so that the user terminal 400 correspondingly generates a control instruction matched with the user operation. Then, the user terminal 400 correspondingly sends the control instruction to the cloud device 300, the cloud device 300 forwards the control instruction to the gateway device 200, and the gateway device 200 forwards the control instruction to the intelligent door lock 100, so that the intelligent door lock 100 is executed according to the obtained control instruction, thereby implementing remote control of the intelligent door lock 100 by the user. The control command may be, but is not limited to, an environmental information collection function of opening/closing the intelligent door lock 100, an audio playing function of opening/closing the intelligent door lock 100, a door leaf where the intelligent door lock 100 is located, an infrared detection function of opening/closing the intelligent door lock 100, and the like.
Therefore, the door lock management system 10 can automatically collect the door lock environment information when the intelligent door lock 100 finds the security detection trigger event, directly send the door lock environment information and the security detection trigger event to the user terminal 400 through the cloud equipment 300 for playing, and perform layer-by-layer screening on the log to be uploaded, which represents the operation live of the intelligent door lock 100, by mutually matching the intelligent door lock 100, the gateway equipment 200 and the cloud equipment 300, and then send the finally screened log which really affects the door lock security to the user terminal 400 for playing, so as to ensure that the information observed by the user is intuitive and effective, so that the user can predictably observe the real and effective door lock security threat development condition, and improve the security guarantee capability and user experience of the intelligent door lock 100.
Meanwhile, the door lock management system 10 also stores the door lock environment information and the security detection trigger event at the cloud device 300, and performs multi-level cache on the log content related to the door lock security screened from the log to be uploaded at the intelligent door lock 100, the gateway device 200 and the cloud device 300 according to different screening rules, so that the door lock security data is effectively retained, and the security of data retention is ensured.
It should be noted that the gateway device 200 may be integrated with the intelligent door lock 100 into an integrated device, or may be an electronic device independent from the intelligent door lock 100; the cloud device 300 may be a collection of multiple electronic devices to implement the functions of the cloud device 300, or may be a single electronic device, where the electronic device may be a server, a computer device, a personal computer, or the like; the user terminal 400 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a smart watch, and the like.
In an implementation manner of this embodiment, in order to improve the instruction transmission efficiency between the user terminal 400 and the intelligent door lock 100, and ensure that the user observes the specific content of the door lock environment information and the security detection triggering event at the user terminal 400, the intelligent door lock 100 may be directly in communication connection with the user terminal 400. When the user terminal 400 is in direct communication connection with the intelligent door lock 100, the user terminal 400 can directly send a media data acquisition instruction to the intelligent door lock 100 to acquire the environmental streaming media data from the intelligent door lock 100 for playing, and the user terminal 400 responds to a user operation and directly sends a control instruction corresponding to the user operation to the intelligent door lock 100, so that the intelligent door lock 100 executes according to the control instruction. If the environment streaming media data includes audio streaming data, the user terminal 400 may perform audio playing on the audio streaming data; if the environment streaming media data includes video stream data and/or a door lock environment image, the user terminal 400 may perform screen display on the video stream data and/or the door lock environment image.
In the present application, in order to ensure that the door lock management system 10 can be normally implemented, the specific components of each component device included in the door lock management system 10 are divided, so that each component device can cooperatively implement the functions of the door lock management system 10. The specific components of the constituent devices included in the door lock management system 10 provided in the present application will be described in detail below.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating a composition of an intelligent door lock 100 according to an embodiment of the present disclosure. In this embodiment, the intelligent door lock 100 may include an infrared sensing unit 110, a door lock instrument unit 120, a door lock central control unit 130, an environment acquisition unit 140, a log generation unit 150, a first communication unit 160, and a first storage unit 170.
The infrared sensing unit 110 is configured to perform infrared detection on the surrounding environment of the intelligent door lock 100 and generate an infrared sensing event according to a detection result, and the door lock instrument unit 120 is configured to monitor an operation change condition of a door lock instrument assembly of the intelligent door lock 100 and generate a door lock instrument change event according to the operation change condition. The infrared sensing unit 110 may include an infrared sensor, and implement its own infrared detection function through the infrared sensor.
The door lock central control unit 130 is electrically connected to the infrared sensing unit 110 and the door lock instrument unit 120, and is configured to acquire the monitored infrared sensing event from the infrared sensing unit 110, acquire the monitored door lock instrument change event from the door lock instrument unit 120, and perform content analysis on the infrared sensing event and/or the door lock instrument change event to determine whether a security detection trigger event exists in the infrared sensing event and/or the door lock instrument change event. The door lock Central control Unit 130 may include at least one of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a Network Processor (NP), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, and a discrete hardware component.
The door lock central control unit 130 is electrically connected to the environment acquisition unit 140, and is configured to send the detected security detection trigger event to the environment acquisition unit 140 when detecting the security detection trigger event, so as to trigger the environment acquisition unit 140 to start an environment information acquisition function. The environment acquisition unit 140 may include a camera, and the camera performs a camera shooting function and a picture taking function in the environment information acquisition function to obtain video stream data and/or a door lock environment image in the door lock environment information; the environment collecting unit 140 may include a microphone, and the microphone may implement a sound pickup function in the environment information collecting function to obtain audio stream data in the door lock environment information.
After the environment acquisition unit 140 acquires the door lock environment information matched with the security detection trigger event, the acquired door lock environment information can be fed back to the door lock central control unit 130 through the electrical connection between the door lock central control unit 130 and the environment acquisition unit 140. In an implementation manner of this embodiment, the door lock environment information fed back to the door lock central control unit 130 by the environment acquisition unit 140 may make the door lock central control unit 130 intuitively know the association relationship between the door lock environment information and the security detection trigger event by carrying information of the security detection trigger event that triggers the environment information acquisition function.
The log generating unit 150 is electrically connected to the door lock central control unit 130, and is configured to acquire the monitored infrared sensing event and the door lock instrument change event from the door lock central control unit 130, determine an event type corresponding to each acquired event according to a division standard of a preset event type, further combine event occurrence time and the event type of the corresponding event, generate a log to be uploaded matched with the event, and then send the generated log to be uploaded to the door lock central control unit 130. At this time, the door lock central control unit 130 may screen out security event logs corresponding to various events related to the door lock security from the generated logs to be uploaded.
The door lock central control unit 130 is electrically connected to the first communication unit 160, the first communication unit 160 is in communication connection with the gateway device 200, and is configured to upload the security event logs in the logs to be uploaded to the gateway device 200 through the first communication unit 160, and the gateway device 200 and the cloud device 300 perform layer-by-layer screening on the security event logs, so as to finally determine effective logs really affecting the safety of the door lock. In addition, the door lock central control unit 130 may further receive a control command issued by the user terminal 400 via the cloud device 300 and the gateway device 200 through the first communication unit 160, and accordingly execute the received control command.
The first communication unit 160 is further in communication connection with the cloud device 300, and after determining the matched door lock environment information and security detection trigger event, the door lock central control unit 130 encrypts the matched door lock environment information and security detection trigger event to obtain corresponding environment streaming media data, and directly uploads the environment streaming media data to the cloud device 300 through the first communication unit 160. The cloud device 300 transmits the obtained specific content of the environmental streaming media data to the user terminal 400 for playing, so that the user can intuitively and effectively know the specific state of the security threat of the door lock.
The first storage unit 170 is electrically connected to the door lock central control unit 130, and is configured to acquire the log to be uploaded and the environmental streaming media data from the door lock central control unit 130 for storage, so as to effectively retain the door lock security data, and ensure the security of data retention. The first storage unit 170 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The first storage unit 170 may be configured to store a computer program, and the door lock central control unit 130 may execute the computer program after receiving the execution instruction.
In an implementation manner of this embodiment, the infrared sensing event includes a human infrared event, and the infrared sensing unit 110 includes a human infrared sensing module 111 and a human behavior analysis module 112. The human body infrared sensing module 111 is configured to perform infrared detection on a human body in the environment around the intelligent door lock 100 to obtain a corresponding human body infrared detection result. The human body infrared sensing module 111 may include a human body infrared sensor and implement a human body infrared detection function through the human body infrared sensor.
The human behavior analysis module 112 is configured to analyze and classify human behaviors in the human infrared detection result according to behavior rules corresponding to different preset security levels, so as to obtain corresponding human infrared events. The action rule comprises a time length value range which judges the duration of the corresponding human body stay in which safety level, and/or a frequency value range which judges the moving frequency of the corresponding human body in which safety level in a preset time period. The safety level is used for representing the safety degree of the safety influence of the corresponding human body on the door lock, the higher the value of the safety level is, the safer the corresponding human body behavior is, namely, the lower the safety threat level of the corresponding event is, and the smaller the safety level is, the larger the lower limit time length value of the corresponding time length value range is, and the larger the lower limit frequency value of the corresponding frequency value range is. The time length value ranges and the frequency value ranges of different safety levels can be configured by designers according to the requirement of safety level division precision, wherein the smaller the time length interval value corresponding to the time length value range is, the higher the safety level division precision is, and meanwhile, the smaller the frequency interval value corresponding to the frequency value range is, the higher the safety level division precision is, so that the intelligent door lock 100 can finely divide the human body behaviors around the intelligent door lock 100, and effectively identify which human body behaviors belong to behaviors having no influence on the safety of the door lock and which human body behaviors belong to behaviors related to the safety of the door lock.
Optionally, referring to fig. 3, fig. 3 is a second schematic view illustrating a composition of the intelligent door lock 100 according to an embodiment of the present application. In the embodiment of the present application, compared to the intelligent door lock 100 shown in fig. 2, the intelligent door lock 100 shown in fig. 3 may further include a door lock alarm unit 180.
At this time, the door lock central control unit 130 is further configured to detect whether a safety alarm triggering event exists in the infrared sensing event and/or the door lock instrument change event. The door lock alarm unit 180 is electrically connected to the door lock central control unit 130, and is configured to respond to the security alarm trigger event sent by the door lock central control unit 130, and execute a security alarm operation. The door lock alarm unit 180 may include a speaker, and the door lock alarm unit 180 performs a safety alarm through the speaker. The safety alarm operation may be, but is not limited to, an audible alarm, an alarm, and the like.
In an implementation manner of this embodiment, for the intelligent door lock 100 shown in fig. 2 and fig. 3, the first communication unit 160 is further in direct communication connection with the user terminal 400, and is configured to directly send the environmental streaming media data generated by the intelligent door lock 100 to the user terminal 400 for playing, receive the control instruction directly sent by the user terminal 400, and then send the control instruction to the door lock central control unit 130 for execution.
Therefore, the intelligent door lock 100 shown in fig. 2 and 3 can limit the data content uploaded to other devices, reduce the false alarm rate of information, ensure that the door lock security data uploaded to other devices for storage is real and effective, and ensure that the door lock security data finally observed by the user is reliable.
Referring to fig. 4, fig. 4 is a schematic diagram illustrating a gateway device 200 according to an embodiment of the present application. In the embodiment of the present application, the gateway device 200 may include a gateway central control unit 210, a first log unit 220, a second storage unit 230, and a second communication unit 240.
The second communication unit 240 is in communication connection with the intelligent door lock 100, and is configured to receive a security event log uploaded by the intelligent door lock 100.
The second communication unit 240 is in communication connection with the gateway central control unit 210, and is configured to send the received security event log to the gateway central control unit 210. The gateway Central control Unit 210 may also include at least one of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a Network Processor (NP), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, and a discrete hardware component.
The gateway central control unit 210 is electrically connected to the first log unit 220, and is configured to send the received security event log to the first log unit 220, and the first log unit 220 extracts a threat security log from the security event log according to a data retention requirement of a user.
The second communication unit 240 is further in communication connection with the cloud device 300, so that the gateway central control unit 210 can send the extracted threat security log to the cloud device 300 through the second communication unit 240, and the cloud device 300 further screens the obtained threat security log to determine final log content having a large influence on the security of the door lock, and transmits the determined log content to the user terminal 400 for playing.
In addition, the second communication unit 240 is further configured to receive a control instruction, which is issued by the user terminal 400 through the cloud device 300 and is directed to the intelligent door lock 100, then send the obtained control instruction to the gateway central control unit 210, convert the received control instruction into a control instruction adapted to the intelligent door lock 100 by the gateway central control unit 210, and send the converted control instruction to the intelligent door lock 100 through the second communication unit 240 for execution.
The second storage unit 230 is electrically connected to the gateway central control unit 210, and is configured to store the extracted threat security log. The second storage unit 230 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The second storage unit 230 may be configured to store a computer program, and the gateway central control unit 210 may execute the computer program accordingly after receiving the execution instruction.
Therefore, the gateway device 200 shown in fig. 4 can cooperate with the intelligent door lock 100 to further screen the log content reported by the intelligent door lock 100, so that the validity and intuitiveness of the door lock safety data observed by the user are improved, meanwhile, the door lock safety data can be effectively retained, and the safety of data retention is ensured.
In an implementation manner of this embodiment, the gateway central control unit 210 includes a first checking module 211, and the first log unit 220 includes a first format conversion module 221 and a first log screening module 222. The first checking module 211 is configured to perform data security checking on the received security event log, and send the security event log that is successfully checked to the first format conversion module 221.
The first format conversion module 221 is configured to convert the format of the security event log sent by the first verification module 211 into a log format adapted to the gateway device 200, and send the security event log after format conversion to the first log screening module 222.
The first log screening module 222 is configured to identify event threat levels of the security event logs sent by the first format conversion module 221 according to preset resolution rules corresponding to different event threat levels, and screen out threat security logs exceeding an event threat level threshold from the security event logs. The event threat level is used to describe the impact of the event occurring at the intelligent door lock 100 on the door lock security, which may be a specific refinement of the foregoing various security threat levels, such as dividing the event threat levels 1-10 into a low security threat level line, dividing the event threat levels 11-15 into a medium-low security threat level line, and the like. In addition, the resolution rule can identify the event type corresponding to the log in advance when being applied specifically, determine the security threat level category of the log, evaluate the importance of the log content according to the specific expression conditions of the corresponding log content in the aspects of whether the homeowner leaves home, the switch of the door lock instrument assembly, the integrity of the door lock instrument assembly and the like, determine the event threat level of the log according to the importance score, effectively evaluate the degree of the log content influencing the door lock security from multiple angles, and further accurately determine the true event threat level of the corresponding log content, wherein the higher the importance score is, the higher the corresponding event threat level is.
Therefore, the gateway device 200 can effectively extract the threat security log threatening the security of the door lock from the log to be uploaded through the first format conversion module 221 and the first log screening module 222.
Referring to fig. 5, fig. 5 is a schematic composition diagram of a cloud device 300 according to an embodiment of the present disclosure. In this embodiment, the cloud device 300 may include a cloud central control unit 310, a third communication unit 320, a push construction unit 330, a second log unit 340, and a third storage unit 350.
The third communication unit 320 is in communication connection with the intelligent door lock 100, and is configured to receive the environmental streaming media data uploaded by the intelligent door lock 100.
The third communication Unit 320 is electrically connected to the cloud Central control Unit 310, and is configured to send the received environment streaming media data to the cloud Central control Unit 310, where the cloud Central control Unit 310 may also include at least one of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a Network Processor (NP), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, and a discrete hardware component.
The cloud central control unit 310 is electrically connected to the push construction unit 330, and configured to send the environment streaming media data to the push construction unit 330, and the push construction unit 330 generates first push information according to the received environment streaming media data. Then, the push construction unit 330 feeds back the first push information to the cloud central control unit 310.
The third communication unit 320 is further communicatively connected to the gateway device 200, and is configured to receive the threat security log uploaded by the gateway device 200, and send the threat security log to the cloud central control unit 310.
The cloud central control unit 310 is electrically connected to the second log unit 340, and is configured to send the threat security log to the second log unit 340, and the second log unit 340 extracts an effective threat log having a large impact on the security of the door lock from the threat security log. The second log unit 340 then feeds back the obtained valid threat log to the cloud central control unit 310.
At this time, the cloud central control unit 310 is further configured to send the valid threat log to the push constructing unit 330, and the push constructing unit 330 generates second push information according to the received valid threat log. Then, the push construction unit 330 feeds back the second push information to the cloud central control unit 310.
The third communication unit 320 is further in communication connection with the user terminal 400, and is configured to send the first push information and the second push information obtained by the cloud central control unit 310 to the user terminal 400 for playing, correspondingly receive a control instruction issued by the user terminal 400 for the smart door lock 100, and then send the obtained control instruction to the cloud central control unit 310. At this time, the cloud central control unit 310 converts the received control instruction into a control instruction adapted to the gateway device 200, and transmits the control instruction to the gateway device 200 through the third communication unit 320, and the gateway device 200 forwards the control instruction to the intelligent door lock 100 for execution.
The third storage unit 350 is electrically connected to the cloud central control unit 310, and is configured to store the environmental streaming media data and the valid threat log. The third storage unit 350 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The third storage unit 350 may be configured to store a computer program, and the cloud central control unit 310 may execute the computer program after receiving the execution instruction.
From this, cloud equipment 300 can cooperate gateway equipment 200, right intelligence lock 100 warp the log content that gateway equipment 200 reported further filters, promotes the validity and the intuitiveness of the lock security data that the user observed, also can effectively preserve the lock security data that obtain simultaneously, ensures the security of data retention.
In an implementation manner of this embodiment, the cloud central control unit 310 includes a second checking module 311, the second log unit 340 includes a second format conversion module 341 and a second log screening module 342, and the push construction unit 330 includes a first information construction module 331.
The second check module 311 is configured to perform data security check on the received threat security log, and send the threat security log with a successful check to the second format conversion module 341.
The second format conversion module 341 is configured to convert the format of the threat security log sent by the second check module 311 into a log format adapted to the cloud device 300, and send the threat security log after format conversion to the second log screening module 342.
The second log screening module 342 is configured to perform effective information extraction on the threat security log sent by the second format conversion module 341 according to a preset effective information extraction rule, so as to obtain a corresponding effective threat log. And the effective information extraction rule is used for extracting a log with a large influence degree on the safety of the door lock. In an implementation manner of this embodiment, the valid information extraction rule may refer to a manner of screening the threat security log at the gateway device 200, and extract a log with an event threat level exceeding another event threat level threshold value from the threat security log as the valid threat log, where the event threat level threshold value at the cloud device 300 is greater than the event threat level threshold value at the gateway device 200. In another implementation manner of this embodiment, the valid information extraction rule may be to directly extract, from the threat security log, a log with a security threat level exceeding a medium security threat level corresponding to the event type, as the valid threat log. Therefore, the two implementation manners of the effective information extraction rules can greatly simplify the operation process of the cloud equipment 300 for extracting the effective threat logs, further unify the respective log screening rules of the intelligent door lock 100, the gateway equipment 200 and the cloud equipment 300, and conveniently realize effective management of the log data.
The first information building module 331 is configured to perform data splicing on the log content of the effective threat log and the event type corresponding to the effective threat log to obtain the second push information. The second push information may be formed by splicing the log content of the effective threat log and the event type corresponding to the effective threat log into a format field of a file format that can be processed by the user terminal 400.
Therefore, the cloud device 300 can effectively extract a real and effective threat log from the threat security log through the second format conversion module 341 and the second log screening module 342.
Optionally, the cloud central control unit 310 may further include a data decryption module 312, and the push construction unit 330 further includes a second information construction module 332.
The second checking module 311 is configured to perform data security check on the received environment streaming media data, and send the successfully checked environment streaming media data to the data decryption module 312.
The data decryption module 312 is configured to decrypt the environmental streaming media data sent by the second check module 311, obtain the door lock environment information and the security detection trigger event included in the environmental streaming media data, send the door lock environment information to the third storage unit 350 for storage, and obtain the information browsing address of the door lock environment information in the third storage unit 350.
The second information building module 332 is configured to perform data splicing on an information browsing address of the door lock environment information in the third storage unit 350 and an event type of the security detection trigger event, so as to obtain the first push information. The first push detail information is formed by splicing the information browsing address of the door lock environment information and the event type of the security detection triggering event into a format field of a file format that can be processed by the user terminal 400.
Therefore, the cloud device 300 reasonably stores the environment media stream data directly uploaded by the intelligent door lock 100 through the cooperation between the data decryption module 312 and the second information construction module 332, and improves the door lock environment information access efficiency of the user terminal 400 by forwarding the first push information including the information browsing address, thereby preventing the door lock environment information from being directly leaked.
Referring to fig. 6, fig. 6 is a schematic diagram illustrating a user terminal 400 according to an embodiment of the present disclosure. In this embodiment, the user terminal 400 may include a playing unit 410, a fourth communication unit 420, and an instruction generating unit 430.
The fourth communication unit 420 is in communication connection with the cloud device 300, and is electrically connected to the playing unit 410, and is configured to receive the first push information and the second push information transmitted by the cloud device 300, and then send the first push information and the second push information to the playing unit 410 for playing. The first push information is generated by the cloud device 300 based on the environment streaming media data of the intelligent door lock 100, and the second push information is generated by the cloud device 300 based on a valid threat log in the to-be-uploaded log of the intelligent door lock 100.
The playing unit 410 may include a display screen and a speaker. If the door lock environment information corresponding to the first push information includes audio stream data, the playing unit 410 may perform audio playing on the audio content corresponding to the first push information through the speaker; if the door lock environment information corresponding to the first push information includes video stream data or a door lock image, the playing unit 410 may display video content or image content corresponding to the first push information through the display screen; for the second push message, the playing unit 410 may display the log content and the event type included in the second push message through the display screen.
The instruction generating unit 430 is electrically connected to the fourth communication unit 420, and is configured to generate a control instruction for the smart door lock 100 in response to a user operation, and send the control instruction to the smart door lock 100 through the fourth communication unit 420 via the cloud device 300 and the gateway device 200 for execution. The instruction generating Unit 430 may include at least one of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a Network Processor (NP), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, and a discrete hardware component.
Optionally, in an implementation manner of this embodiment, the fourth communication unit 420 is further in direct communication connection with the intelligent door lock 100, and is configured to forward the environment streaming media data directly transmitted by the intelligent door lock 100 to the playing unit 410 for playing, and directly transmit the control instruction generated by the instruction generating unit 430 to the intelligent door lock 100 for execution. The playing unit 410 may perform audio playing on audio stream data included in the environment stream media data through a speaker, and the playing unit 410 may perform screen display on the environment stream media data including video stream data and/or a door lock environment image through a display screen.
Therefore, the user terminal 400 shown in fig. 6 can provide an observation channel for observing the development status of the real and effective door lock security threat to the user, and realize the remote control function of the user on the intelligent door lock 100, thereby ensuring the observability of the door lock security status and the remote controllability of the intelligent door lock 100.
In the embodiments provided in the present application, it should be understood that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In summary, in the door lock management system, the intelligent door lock, the gateway device, the cloud device and the user terminal provided by the present application, the intelligent door lock automatically collects the door lock environment information under the condition that the safety detection triggering event is found, and directly sends the door lock environment information and the security detection trigger event to the user terminal through the cloud equipment for playing, and the intelligent door lock, the gateway equipment and the cloud equipment are mutually matched to screen the logs to be uploaded, which represent the operation condition of the intelligent door lock, layer by layer, and then send the finally screened logs which really affect the safety of the door lock to the user terminal for playing, so that the information observed by the user is visual and effective, the user can be enabled to observe the real and effective door lock safety threat development condition in a predictive manner, and the safety guarantee capability and the user experience of the intelligent door lock are improved. Meanwhile, the door lock environment information and the safety detection trigger event are stored in the cloud equipment, and the log content which is screened from the log to be uploaded and relates to the safety of the door lock is cached in a multi-level mode in the intelligent door lock, the gateway equipment and the cloud equipment, so that the safety data of the door lock are effectively retained, and the safety of data retention is ensured.
The above description is only for various embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and all such changes or substitutions are included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. The door lock management system is characterized by comprising an intelligent door lock, gateway equipment, cloud equipment and a user terminal;
the intelligent door lock is used for generating a log to be uploaded according to the monitored infrared sensing event and the door lock instrument change event for storage, and acquiring door lock environment information under the condition that a safety detection trigger event exists in the infrared sensing event and/or the door lock instrument change event;
the gateway equipment is in communication connection with the intelligent door lock and is used for receiving the security event logs uploaded by the intelligent door lock and extracting threat security logs from the security event logs for storage, wherein the security event logs are extracted from the logs to be uploaded by the intelligent door lock;
the cloud equipment is in communication connection with the intelligent door lock and is used for receiving and storing environment streaming media data uploaded by the intelligent door lock and generating first pushing information based on the environment streaming media data, wherein the environment streaming media data are obtained by encrypting the door lock environment information and the safety detection triggering event through the intelligent door lock;
the cloud equipment is in communication connection with the gateway equipment and is used for receiving the threat security logs uploaded by the gateway equipment, extracting effective threat logs from the threat security logs for storage, and then generating second push information based on the effective threat logs;
the user terminal is in communication connection with the cloud equipment and is used for playing the first push information and the second push information transmitted by the cloud equipment, responding to user operation to generate a corresponding control instruction, and then sending the control instruction to the intelligent door lock through the cloud equipment and the gateway equipment to be executed.
2. The door lock management system according to claim 1,
the user terminal is also in direct communication connection with the intelligent door lock and is used for acquiring the environment streaming media data from the intelligent door lock to play, responding to user operation to generate a corresponding control instruction, and then directly sending the control instruction to the intelligent door lock to execute.
3. An intelligent door lock is characterized by comprising an infrared sensing unit, a door lock instrument unit, a door lock central control unit, an environment acquisition unit, a log generation unit, a first communication unit and a first storage unit;
the infrared sensing unit is used for carrying out infrared detection on the surrounding environment of the intelligent door lock and generating an infrared sensing event according to a detection result;
the intelligent door lock comprises a door lock instrument unit, a door lock control unit and a door lock control unit, wherein the door lock instrument unit is used for monitoring the operation change condition of a door lock instrument assembly of the intelligent door lock and generating a door lock instrument change event according to the operation change condition;
the door lock central control unit is electrically connected with the infrared sensing unit and the door lock instrument unit and is used for detecting whether a safety detection triggering event exists in the infrared sensing event and/or the door lock instrument change event or not;
the door lock central control unit is electrically connected with the environment acquisition unit and is used for sending the detected safety detection trigger event to the environment acquisition unit and receiving door lock environment information matched with the safety detection trigger event and fed back by the environment acquisition unit, wherein the door lock environment information is acquired by the environment acquisition unit in response to the safety detection trigger event;
the log generation unit is electrically connected with the door lock central control unit and used for generating a log to be uploaded according to the generated infrared sensing event and the door lock instrument change event and sending the log to be uploaded to the door lock central control unit;
the first communication unit is electrically connected with the door lock central control unit, is in communication connection with cloud equipment, and is used for uploading environment streaming media data generated by the door lock central control unit to the cloud equipment, wherein the environment streaming media data is obtained by encrypting the door lock environment information and the security detection trigger event which are matched with each other by the door lock central control unit;
the first communication unit is also in communication connection with gateway equipment and is used for uploading the security event logs extracted from the logs to be uploaded by the door lock central control unit to the gateway equipment, receiving a control instruction issued by a user terminal through the gateway equipment and then sending the control instruction to the door lock central control unit for execution;
the first storage unit is electrically connected with the door lock central control unit and is used for acquiring the log to be uploaded and the environmental streaming media data from the door lock central control unit for storage.
4. The intelligent door lock according to claim 3, wherein the infrared sensing event comprises a human body infrared event, and the infrared sensing unit comprises a human body infrared sensing module and a human body behavior analysis module;
the human body infrared sensing module is used for carrying out infrared detection on a human body in the environment surrounding the intelligent door lock to obtain a corresponding human body infrared detection result;
and the human body behavior analysis module is used for analyzing and classifying the human body behaviors in the human body infrared detection result according to the preset behavior rules corresponding to different security levels respectively to obtain the corresponding human body infrared events.
5. The intelligent door lock of claim 3, further comprising a door lock alarm unit;
the door lock central control unit is also used for detecting whether a safety alarm triggering event exists in the infrared sensing event and/or the door lock instrument change event;
the door lock alarm unit is electrically connected with the door lock central control unit and used for responding to the safety alarm triggering event sent by the door lock central control unit and executing safety alarm operation.
6. The intelligent door lock according to any one of claims 3 to 5,
the first communication unit is also in direct communication connection with the user terminal and is used for directly sending the environment streaming media data to the user terminal for playing, receiving a control instruction directly sent by the user terminal and then sending the control instruction to the door lock central control unit for execution.
7. The gateway equipment is characterized by comprising a gateway central control unit, a first log unit, a second storage unit and a second communication unit;
the second communication unit is electrically connected with the gateway central control unit, is in communication connection with the intelligent door lock, and is used for receiving the security event log uploaded by the intelligent door lock and then sending the security event log to the gateway central control unit;
the gateway central control unit is electrically connected with the first log unit and is used for sending the security event log to the first log unit and receiving a threat security log extracted from the security event log by the first log unit;
the second communication unit is also in communication connection with cloud equipment and is used for sending the threat security log obtained by the gateway central control unit to the cloud equipment, receiving a control instruction which is issued by a user terminal through the cloud equipment and aims at the intelligent door lock, and then sending the obtained control instruction to the gateway central control unit;
the gateway central control unit is also used for converting the received control instruction into a control instruction adaptive to the intelligent door lock and sending the converted control instruction to the intelligent door lock for execution through the second communication unit;
the second storage unit is electrically connected with the gateway central control unit and used for storing the threat security log.
8. The gateway device according to claim 7, wherein the gateway central control unit includes a first checking module, and the first log unit includes a first format conversion module and a first log screening module;
the first checking module is used for carrying out data security checking on the received security event logs and sending the successfully checked security event logs to the first format conversion module;
the first format conversion module is configured to convert the format of the security event log sent by the first verification module into a log format adapted to the gateway device, and send the security event log after format conversion to the first log screening module;
the first log screening module is used for identifying the event threat levels of the security event logs sent by the first format conversion module according to preset distinguishing rules corresponding to different event threat levels respectively, and screening threat security logs exceeding an event threat level threshold value from the security event logs.
9. The cloud equipment is characterized by comprising a cloud center control unit, a third communication unit, a push construction unit, a second log unit and a third storage unit;
the third communication unit is electrically connected with the cloud central control unit, is in communication connection with the intelligent door lock, and is used for receiving the environment streaming media data uploaded by the intelligent door lock and then sending the environment streaming media data to the cloud central control unit;
the cloud center control unit is electrically connected with the push construction unit and is used for sending the environment streaming media data to the push construction unit and receiving first push information generated by the push construction unit according to the environment streaming media data;
the third communication unit is also in communication connection with the gateway device and is used for receiving the threat security log uploaded by the gateway device and sending the threat security log to the cloud central control unit;
the cloud center control unit is electrically connected with the second log unit and is used for sending the threat security log to the second log unit and receiving an effective threat log extracted from the threat security log by the second log unit;
the cloud central control unit is further configured to send the effective threat log to the push construction unit, and receive second push information generated by the push construction unit according to the effective threat log;
the third communication unit is in communication connection with a user terminal and is used for sending the first push information and the second push information obtained by the cloud central control unit to the user terminal for playing, receiving a control instruction issued by the user terminal for the intelligent door lock and then sending the obtained control instruction to the cloud central control unit;
the cloud central control unit is also used for converting the received control instruction into a control instruction adaptive to the gateway equipment, and the gateway equipment forwards the control instruction to the intelligent door lock for execution;
the third storage unit is electrically connected with the cloud center control unit and used for storing the environmental streaming media data and the effective threat log.
10. The cloud device of claim 9, wherein the cloud central control unit comprises a second check module, the second log unit comprises a second format conversion module and a second log screening module, and the push construction unit comprises a first information construction module;
the second check module is configured to perform data security check on the received threat security log, and send the threat security log that is successfully checked to the second format conversion module;
the second format conversion module is configured to convert the format of the threat security log sent by the second check module into a log format adapted to the cloud device, and send the threat security log after format conversion to the second log screening module;
the second log screening module is used for extracting effective information of the threat security log sent by the second format conversion module according to a preset effective information extraction rule to obtain a corresponding effective threat log;
the first information building module is used for performing data splicing on the log content of the effective threat log and the event type corresponding to the effective threat log to obtain the second push information.
11. The cloud device of claim 10, wherein the cloud central control unit further comprises a data decryption module, and the push construction unit further comprises a second information construction module;
the second check module is used for performing data security check on the received environment streaming media data and sending the successfully checked environment streaming media data to the data decryption module;
the data decryption module is configured to decrypt the environmental streaming media data sent by the second check module to obtain the door lock environment information and the security detection trigger event included in the environmental streaming media data, and send the door lock environment information to the third storage unit for storage;
the second information building module is used for performing data splicing on the information browsing address of the door lock environment information in the third storage unit and the event type of the security detection trigger event to obtain the first push information.
12. A user terminal is characterized in that the user terminal comprises a playing unit, a fourth communication unit and an instruction generating unit;
the fourth communication unit is in communication connection with the cloud equipment, is electrically connected with the playing unit, and is used for receiving first push information and second push information transmitted by the cloud equipment and then sending the first push information and the second push information to the playing unit for playing, wherein the first push information is generated by the cloud equipment based on environmental streaming media data of the intelligent door lock, and the second push information is generated by the cloud equipment based on effective threat logs in logs to be uploaded of the intelligent door lock;
the instruction generating unit is electrically connected with the fourth communication unit and used for responding to user operation to generate a control instruction for the intelligent door lock and sending the control instruction to the intelligent door lock for execution through the fourth communication unit and the cloud equipment.
13. The user terminal of claim 12,
the fourth communication unit is also in direct communication connection with the intelligent door lock and is used for forwarding the environment streaming media data directly transmitted by the intelligent door lock to the playing unit for playing and directly transmitting the control instruction generated by the instruction generating unit to the intelligent door lock for execution.
CN202011587539.3A 2020-12-29 2020-12-29 Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal Pending CN114758430A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011587539.3A CN114758430A (en) 2020-12-29 2020-12-29 Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011587539.3A CN114758430A (en) 2020-12-29 2020-12-29 Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal

Publications (1)

Publication Number Publication Date
CN114758430A true CN114758430A (en) 2022-07-15

Family

ID=82324517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011587539.3A Pending CN114758430A (en) 2020-12-29 2020-12-29 Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal

Country Status (1)

Country Link
CN (1) CN114758430A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114765609A (en) * 2020-12-30 2022-07-19 深圳绿米联创科技有限公司 Monitoring method and device, door lock, cloud server, terminal, system and medium
WO2024021908A1 (en) * 2022-07-27 2024-02-01 深圳Tcl新技术有限公司 Door lock security assessment method and related device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202523127U (en) * 2011-12-01 2012-11-07 北京市电力公司 Electricity room door applied to high-voltage switching station and monitoring system
CN202750176U (en) * 2012-08-25 2013-02-20 深圳军安科技发展有限公司 3G wireless communication based remote video monitoring system
CN105979205A (en) * 2016-05-17 2016-09-28 中山大学 Terminal monitoring system based on community network
CN110113423A (en) * 2019-05-10 2019-08-09 广东科徕尼智能科技有限公司 A method of message is used based on internet push intelligent door lock
CN110460671A (en) * 2019-08-19 2019-11-15 深圳坚朗海贝斯智能科技有限公司 Intelligent door lock linkage management method and the networking intelligent lock system for realizing this method
CN110908858A (en) * 2019-10-12 2020-03-24 中国平安财产保险股份有限公司 Log sample sampling method based on double-funnel structure and related device
CN110956722A (en) * 2019-11-25 2020-04-03 广东科徕尼智能科技有限公司 Method, equipment and storage medium for alarming abnormity of intelligent lock
CN111754077A (en) * 2020-05-27 2020-10-09 武汉智维云创科技有限公司 Alarm convergence analysis method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202523127U (en) * 2011-12-01 2012-11-07 北京市电力公司 Electricity room door applied to high-voltage switching station and monitoring system
CN202750176U (en) * 2012-08-25 2013-02-20 深圳军安科技发展有限公司 3G wireless communication based remote video monitoring system
CN105979205A (en) * 2016-05-17 2016-09-28 中山大学 Terminal monitoring system based on community network
CN110113423A (en) * 2019-05-10 2019-08-09 广东科徕尼智能科技有限公司 A method of message is used based on internet push intelligent door lock
CN110460671A (en) * 2019-08-19 2019-11-15 深圳坚朗海贝斯智能科技有限公司 Intelligent door lock linkage management method and the networking intelligent lock system for realizing this method
CN110908858A (en) * 2019-10-12 2020-03-24 中国平安财产保险股份有限公司 Log sample sampling method based on double-funnel structure and related device
CN110956722A (en) * 2019-11-25 2020-04-03 广东科徕尼智能科技有限公司 Method, equipment and storage medium for alarming abnormity of intelligent lock
CN111754077A (en) * 2020-05-27 2020-10-09 武汉智维云创科技有限公司 Alarm convergence analysis method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114765609A (en) * 2020-12-30 2022-07-19 深圳绿米联创科技有限公司 Monitoring method and device, door lock, cloud server, terminal, system and medium
WO2024021908A1 (en) * 2022-07-27 2024-02-01 深圳Tcl新技术有限公司 Door lock security assessment method and related device

Similar Documents

Publication Publication Date Title
Hu et al. An insider threat detection approach based on mouse dynamics and deep learning
US11367341B2 (en) Monitoring security
CN201315654Y (en) Special SkyEyes** intelligent monitoring system for prison
CN114758430A (en) Door lock management system, intelligent door lock, gateway equipment, cloud equipment and user terminal
Majumder et al. A smart IoT security system for smart-home using motion detection and facial recognition
CN109598120A (en) Security postures intelligent analysis method, device and the storage medium of mobile terminal
Zhang et al. Multi-sensor data fusion for cyber security situation awareness
US11050827B1 (en) Method and device for identifying suspicious object movements based on historical received signal strength indication information associated with internet-of-things devices
KR102083870B1 (en) contact imprint management system for video surveillance by use of blockchain and biometric authentication
CN111353414A (en) Identity recognition method, system, machine readable medium and equipment
Van Hoorde et al. The influence of technological innovations on theft prevention: Perspectives of citizens and experts
JP7118322B2 (en) Monitoring system
CN112351025B (en) Unmanned monitoring system suitable for fortress machine and use method thereof
CN111052708A (en) Identifying abnormal use of an electronic device
CN210573994U (en) Networking type access control mainboard based on security chip
EP1915743A1 (en) Physical security management system
Prabhu et al. Automated Home Security using Facial Recognition with IoT Remote Monitoring
CN111985401A (en) Area monitoring method, system, machine readable medium and equipment
Mohammed et al. Implementation of human detection on raspberry pi for smart surveillance
Goyal et al. 5G Enabled IoT-Based DL with BC Model for Secured Home Door System
Sayakkara et al. Forensic Science International: Digital Investigation
US11647049B2 (en) Dynamic application security posture change based on physical vulnerability
TWI533260B (en) Security supervisory system
CN117220961B (en) Intrusion detection method, device and storage medium based on association rule patterns
Ntezicyimanikora Smart Surveillance System With Anomaly Detection at Home

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination