CN115150421A - Security monitoring method, device and system, terminal equipment, gateway and storage medium - Google Patents

Security monitoring method, device and system, terminal equipment, gateway and storage medium Download PDF

Info

Publication number
CN115150421A
CN115150421A CN202110338686.5A CN202110338686A CN115150421A CN 115150421 A CN115150421 A CN 115150421A CN 202110338686 A CN202110338686 A CN 202110338686A CN 115150421 A CN115150421 A CN 115150421A
Authority
CN
China
Prior art keywords
alarm
configuration
cloud
gateway
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110338686.5A
Other languages
Chinese (zh)
Inventor
宋永恒
黄灿武
刘泓兴
陈伟雄
游延筠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lumi United Technology Co Ltd
Original Assignee
Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lumi United Technology Co Ltd filed Critical Lumi United Technology Co Ltd
Priority to CN202110338686.5A priority Critical patent/CN115150421A/en
Publication of CN115150421A publication Critical patent/CN115150421A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a security monitoring method, a security monitoring device and a security monitoring system, terminal equipment, a gateway and a computer storage medium, wherein the security monitoring method comprises the following steps: acquiring a configuration instruction of a target security mode corresponding to a time period to be monitored; acquiring configuration parameters of the target security mode corresponding to the configuration instruction, sending the configuration parameters to a cloud end, and sending the configuration parameters of the target security mode to a gateway associated with the terminal equipment by the cloud end; and receiving security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.

Description

Security monitoring method, device and system, terminal equipment, gateway and storage medium
Technical Field
The application relates to the technical field of intelligent home security, in particular to a security monitoring method, a security monitoring device, a security monitoring system, a terminal device, a gateway and a computer storage medium.
Background
With the development of social progress and demand, people have higher and higher requirements on safe living environment. At present, the known main way for improving the home security is to configure a dedicated security monitoring device, and the security monitoring device, various alarm detectors, cameras and the like jointly form a home security alarm system for providing intrusion alarm service for a residence.
However, in the home security alarm system, the distance between the security monitoring device and the sensor device such as the alarm detector for detecting whether the security risk exists cannot be too far, the coverage area is small, the monitoring form is single, and the high-requirement security monitoring requirement cannot be met.
Disclosure of Invention
In order to solve the existing technical problems, the application provides a security monitoring method, a security monitoring device, a security monitoring system, a terminal device, a gateway and a computer storage medium, wherein the security monitoring method, the security monitoring device and the security monitoring system are wider in coverage range, various in monitoring forms and capable of improving monitoring safety performance.
In order to achieve the above purpose, the technical solution of the embodiment of the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a security monitoring method, which is applied to a terminal device, and includes: acquisition and to be monitored corresponding to time period configuring instructions of a target security mode; acquiring configuration parameters of the target security mode corresponding to the configuration instruction, sending the configuration parameters to a cloud, and sending the configuration parameters of the target security mode to a gateway associated with the terminal equipment by the cloud; and receiving security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.
In a second aspect, an embodiment of the present application provides a security monitoring device, which is applied to a terminal device, and includes: the acquisition module is used for acquiring a configuration instruction of a target security mode corresponding to a time period to be monitored; the configuration module is used for acquiring the configuration parameters of the target security mode corresponding to the configuration instruction, sending the configuration parameters to a cloud end, and sending the configuration parameters of the target security mode to a gateway associated with the terminal equipment by the cloud end; and the alarm module is used for receiving security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.
In a third aspect, an embodiment of the present application provides a terminal device, including a processor and a memory, where the memory stores a computer program executable by the processor, and when the computer program is executed by the processor, the security monitoring method applied to the terminal device side according to any embodiment of the present application is implemented.
The security monitoring method, the security monitoring device and the terminal device provided by the embodiment, wherein the configuration of the security mode is realized through the terminal device, the target security mode corresponds to the time period to be monitored, so that a user can configure the target security mode according to different time periods to be monitored, the terminal device obtains configuration parameters and sends the configuration parameters to the cloud, the configuration parameters are sent to the gateway associated with the terminal device by the cloud, when the intelligent household devices covered by the configuration parameters of the target security mode trigger execution actions, the gateway or the cloud is reported, the gateway or the cloud determines risk events according to the execution actions of the devices, and security monitoring information of the risk events is sent to the terminal device, so that no separate security monitoring device is needed to be set, the setting of security conditions can be more flexible and changeable, the range of the intelligent household devices which can be covered by the terminal device is wider, and security monitoring of more types of intelligent household devices is supported; in addition, different time periods to be monitored can correspond to different security modes, so that the monitoring mode is more diversified, and different requirements of users on security monitoring can be met more conveniently; in addition, the monitoring range can be diffused to multiple gateways, a stronger alarm prompt is formed, and the monitoring safety performance can be improved.
In a fourth aspect, an embodiment of the present application provides a security monitoring method, including: acquiring configuration parameters corresponding to a target security mode issued by a cloud; acquiring action execution information of associated trigger equipment, determining a risk event according to the action execution information and the configuration parameters, and sending security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
In a fifth aspect, an embodiment of the present application provides a security monitoring device, including: the receiving module is used for acquiring configuration parameters corresponding to a target security mode issued by the cloud; the event module is used for acquiring action execution information of the associated trigger equipment, determining a risk event according to the action execution information and the configuration parameters, and sending security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
In a sixth aspect, an embodiment of the present application provides a gateway, including a processor and a memory, where the memory stores a computer program executable by the processor, and when the computer program is executed by the processor, the security monitoring method applied to the gateway side according to any embodiment of the present application is implemented.
The security monitoring method, the security monitoring device and the gateway provided by the embodiment, wherein the cloud issues the configuration parameters corresponding to the target security mode to the gateway, and when the smart home devices covered by the configuration parameters of the target security mode trigger execution actions, the gateway or the cloud reports the configuration parameters to the gateway or the cloud, determines risk events according to the execution actions of the devices by the gateway or the cloud, and sends security monitoring information of the risk events to the terminal devices, so that the security conditions can be set more flexibly and more variably when the configuration is performed based on the target security mode, so that the range of the smart home devices covered by the security monitoring method is wider, and security monitoring of more types of smart home devices is supported; in addition, the interaction between the gateway and the cloud can spread the monitoring range to the associated multiple gateways, so that a stronger warning prompt is formed, and the monitoring safety performance is improved.
In a seventh aspect, an embodiment of the present application provides a security monitoring method, which is applied to a security monitoring system, and includes: the method comprises the steps that terminal equipment obtains a configuration instruction of a target security mode corresponding to a time period to be monitored and configuration parameters of the target security mode, and sends the configuration parameters to a cloud end; the cloud end sends the configuration parameters of the target security mode to a gateway associated with the terminal equipment; the gateway acquires action execution information of associated trigger equipment, determines a risk event according to the action execution information and the configuration parameters, and sends security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
In an eighth aspect, an embodiment of the present application provides a security monitoring system, including a cloud, a terminal device provided in any embodiment of the present application, a gateway provided in any embodiment of the present application, and a trigger device, where the gateway includes a first type of gateway in a same local area network as the terminal device, and a second type of gateway communicatively connecting the trigger device to the terminal device through a wide area network path; and the first type of gateway controls corresponding alarm equipment in the target security mode in the same local area network or different local area networks to cooperatively execute an alarm action according to the monitored alarm state of the target security mode and the synchronization of the second type of gateway.
According to the security monitoring method and system provided by the embodiment, the target security mode is configured based on the terminal device, the target security mode corresponds to the time period to be monitored, so that the target security mode can be configured according to different time periods to be monitored, the terminal device obtains the configuration parameters and sends the configuration parameters to the cloud, the configuration parameters are sent to the gateway associated with the terminal device by the cloud, when the intelligent household devices covered by the configuration parameters of the target security mode trigger execution actions, the gateway or the cloud is reported, the gateway or the cloud determines risk events according to the execution actions of the devices, and security monitoring information of the risk events is sent to the terminal device, so that the security conditions are set more flexibly and changeably, the range of the intelligent household devices covered by the security monitoring system is wider, and security monitoring of more types of intelligent household devices is supported; secondly, different time periods to be monitored can correspond to different security modes, so that the monitoring mode is more diversified, and different requirements of users on security monitoring can be met more conveniently; in addition, the monitoring range can be diffused to multiple gateways in the same local area network or different local area networks based on interaction of the gateways and the cloud, a stronger warning prompt is formed, and monitoring safety performance can be improved.
In a ninth aspect, the foregoing embodiments of the present application provide a computer storage medium, where the computer storage medium stores a computer program, and the computer program, when executed by a controller, implements the security monitoring method applied to the terminal device or the gateway according to any of the embodiments of the present application.
The security monitoring method implemented by the computer storage medium provided in the above embodiment is the same as the security monitoring method respectively applied to the terminal device side and the gateway side provided in the above embodiment, and accordingly has the same beneficial technical effects, and details are not repeated here.
Drawings
Fig. 1 is an application scenario diagram of a security monitoring method in an embodiment of the present application;
FIG. 2 is a flowchart of a security monitoring method in an embodiment of the present application;
FIGS. 3-15 are schematic diagrams of alternative interfaces in a security mode configuration process in an embodiment;
FIG. 16 is a schematic diagram of a security monitoring device in an embodiment of the present application;
fig. 17 is a schematic diagram of a terminal device in an embodiment of the present application;
FIG. 18 is a flowchart of a security monitoring method in another embodiment of the present application;
FIG. 19 is an interaction diagram of a security monitoring method in another embodiment of the present application;
FIG. 20 is a schematic diagram of a security monitoring device in an embodiment of the present application;
FIG. 21 is a schematic diagram of a gateway in an embodiment of the present application;
FIG. 22 is a flowchart of a security monitoring method in yet another embodiment of the present application;
FIG. 23 is a diagram illustrating a security monitoring system in an embodiment.
Detailed Description
The technical solution of the present application is further described in detail with reference to the drawings and specific embodiments of the specification.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of implementations of the present application. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
In the description of the present application, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, merely for convenience of description and simplicity of description, and do not indicate or imply that the devices or elements referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and thus, are not to be construed as limiting the present application. In the description of the present application, the meaning of "a plurality" is two or more unless otherwise specified.
In the description of the present application, it should be noted that, unless otherwise explicitly stated or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be, for example, a fixed connection, a detachable connection, or an integral connection; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in this application will be understood to be a specific case for those of ordinary skill in the art.
Please refer to fig. 1, which is a frame diagram of an internet of things system in an optional application scenario of the security monitoring method according to the embodiment of the present application. The internet of things system comprises intelligent household equipment 55, a gateway 53, a cloud 52, terminal equipment 51 and the like. The terminal device 51 may be any intelligent device with communication and storage functions, such as a smart phone, a desktop computer, a notebook computer, a tablet computer, or other intelligent communication devices with network connection functions. The cloud 52 may be a network access server, a database server, a cloud server, or the like. Optionally, the gateway 53 may be built based on a ZigBee protocol, and the smart home device 55 may be a device added to the gateway 53 in advance, for example, the smart home device 55 may be a device in a suite to which the gateway device belongs when the gateway 53 leaves a factory; or a device subsequently connected to the gateway 53 by a user operation.
Optionally, a client capable of managing the smart home device 55 is installed in the terminal device 51, where the client may be an application client (such as a mobile phone APP) or a web page client, and is not limited herein.
Optionally, the smart home device 55 may establish a network connection with the gateway 53 based on the ZigBee protocol, so as to join the ZigBee network.
Both the terminal device 51 and the smart home device 55 can access to the ethernet through the gateway 53, and the gateway 53 can access to the cloud 52 through wired or wireless communication connection. For example, the gateway 53 and the terminal device 51 may store the acquired information in the cloud 52. Optionally, the terminal device 51 may also establish a network connection with the cloud 52 through 2G/3G/4G/5G, wiFi, or the like, thereby acquiring the data transmitted by the cloud 52.
Optionally, the terminal device 51, the gateway 53, and the smart home device 55 may be in the same local area network, or may be in the same wide area network as the cloud 52. When the terminal device 51 and the gateway 53 are in the same local area network, the terminal device 51 may interact with the gateway 53 and the smart home device 55 connected to the gateway 53 through a local area network path; and may also interact with the gateway 53 and the smart home devices 55 connected to the gateway 53 via a wan path. When the terminal device 51 and the gateway 53 are not in the same local area network, the terminal device 51 may interact with the gateway 53 and the smart home device 55 connected to the gateway 53 through a wide area network path. The internet of things system can further realize the control of opening or closing the smart home devices 55 within the range of the local area network or correspondingly connected with the local area network through the smart home devices 55. The smart home devices 55 may include, but are not limited to, smart home products such as smart lamps, automatic curtains, and air conditioners.
Referring to fig. 2, a flowchart of a security monitoring method according to an embodiment of the present application is shown, and may be applied to the terminal device shown in fig. 1. The security monitoring method comprises but is not limited to S101, S103 and S105, and is specifically introduced as follows:
s101, acquiring a configuration instruction of a target security mode corresponding to a time period to be monitored.
The time period to be monitored is the time period in which the corresponding security mode takes effect, and is generally determined by the starting time and the closing time of the corresponding security mode. The time period to be monitored corresponding to the target security mode can be determined according to the starting and ending time of the target security mode selected by the user to take effect, for example, the user can select a certain time period of each day as the starting and ending time of the target security mode to take effect, or the user can select certain days of each week as the starting and ending time of the target security mode to take effect. The target security mode can be determined by the user according to one of a plurality of preset security modes, or can be determined by the user according to the current selected time period to be monitored. The configuration instruction refers to a trigger instruction for triggering the current security mode to be configured, for example, a configuration key for triggering the security mode to enter a security mode configuration process is arranged on a configuration interface of the security mode, and the configuration instruction is obtained according to the touch operation of a user on the configuration key.
S103, obtaining configuration parameters of the target security mode corresponding to the configuration instruction, sending the configuration parameters to a cloud end, and sending the configuration parameters of the target security mode to a gateway associated with the terminal device by the cloud end.
The terminal device obtains the configuration parameters of the target security mode corresponding to the configuration instruction, which may mean that the terminal device first obtains the configuration instruction triggering configuration for the target security mode, and then enters a configuration interface for the target security mode based on the configuration instruction to obtain the configuration parameters, for example, a configuration key triggering configuration flow entering the security mode is arranged on the configuration interface for the security mode, a user firstly clicks the configuration key, the terminal device obtains the configuration instruction according to the user clicking the configuration key, and switches to a configuration page for selecting or modifying the configuration parameters for the target security mode according to the configuration instruction, the user can input or select the configuration parameters for the target security mode in the configuration page and then confirms, and the terminal device sends the obtained configuration parameters for the target security mode to the cloud according to the confirmation instruction of the user.
The terminal device obtains the configuration parameters of the target security mode corresponding to the configuration instruction, or the configuration parameters of the target security mode to be currently configured on a configuration interface by the user are obtained by the terminal device, and then the configuration instruction for determining the configuration of the target security mode, which is input by the user, is obtained, for example, a configuration item and a confirmation key which are selected or modified for the configuration parameters of the target security mode are arranged on the configuration interface of the security mode, the user can firstly input or select the configuration parameters of the target security mode in the configuration page, then the confirmation key is clicked, the terminal device takes the confirmation instruction of the user as the configuration instruction, and the configuration parameter which is input or selected by the user in the configuration page is taken as the configuration parameters of the target security mode to be sent to the cloud.
The gateway associated with the terminal device may comprise at least one of: the gateway is positioned under the same local area network with the terminal equipment, the gateway is positioned under the same family account with the user account corresponding to the terminal equipment, the gateway is determined according to the self setting of the user, and the gateway is positioned in a set range of the physical distance with the terminal equipment. The cloud sends the configuration parameters of the target security mode to a gateway associated with the terminal device, and the gateway monitors the execution actions of more intelligent household devices, so that the range of the intelligent household devices which can be covered by the security monitoring method can be enlarged, and the security monitoring of the intelligent household devices of more categories can be conveniently realized.
And S105, receiving security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.
And after the cloud sends the configuration parameters of the target security mode to a gateway associated with the terminal equipment, the configuration parameters are locally stored by the gateway. When the current state of the intelligent household equipment in the target security mode changes or equipment action is executed, the gateway obtains the latest state of the intelligent household equipment and information of the equipment action, determines whether a risk event occurs according to locally stored configuration parameters of the target security mode, and sends security monitoring information of the risk event in the target security mode to the terminal equipment.
In the above embodiment, the configuration of the security mode is realized through the terminal device, the target security mode corresponds to the time period to be monitored, so that the user can configure the target security mode according to different time periods to be monitored, the terminal device obtains the configuration parameters and sends the configuration parameters to the cloud, the configuration parameters are sent to the gateway associated with the terminal device by the cloud, when the smart home devices covered by the configuration parameters of the target security mode trigger the execution action, the gateway or the cloud is reported, the gateway or the cloud determines the risk event according to the execution action of the device, and the security monitoring information of the risk event is sent to the terminal device. In addition, the range can be expanded to the whole home level, the multiple gateways realize security monitoring and/or alarming in a coordinated manner under the same account and the same home environment, the security monitoring can be diffused to the multiple gateways of the same local area network or different local area networks, a strong alarming prompt and deterrent effect is formed, meanwhile, the alarming information is pushed to the terminal equipment, and the user is informed of the monitoring information and the equipment. In addition, the security mode can form multiple security modes based on different time periods to be monitored or different configuration operations, for example, a 7 × 24-hour guarding mode, a home guarding mode, a night guarding mode and the like, different configurations such as alarm triggering equipment, alarm actions and alarm tones can be supported by different security modes, the monitoring mode is more various, different requirements of users on security monitoring can be met more conveniently, and the security monitoring is more flexible and convenient.
In some embodiments, before the obtaining of the configuration instruction of the target security mode corresponding to the time period to be monitored, the method includes:
setting a plurality of security modes according to security risk monitoring requirements in different time periods, wherein the security modes comprise at least one of the following modes: all-day guard mode, at-home guard mode, away-home guard mode, night guard mode.
Different time periods within a set period typically have different security risk monitoring requirements, and a set period may refer to, for example, daily, weekly, or monthly, etc. Taking a daily example, a user can determine that the security risk monitoring requirement in a time period when no one is at home after going out every day is larger according to the daily going-out condition, and correspondingly set an off-home guarding mode; the home guarding mode is correspondingly set according to the time of going home after going out every day; correspondingly setting a night guarding mode according to the time of falling asleep every night; the all-day guard mode can also be set correspondingly according to the weekend or the condition of the designated weekend. The user can configure the security mode according to the risk events which possibly occur under different security modes.
Referring to fig. 3 and fig. 4, an optional interface schematic diagram of configuration of a target security mode is shown, where multiple preset configured security modes such as home guarding, away guarding, and night guarding are displayed in the interface, a user may click one of the security modes as the target security mode and switch to a next configuration page of the target security mode, for example, click the home guarding security mode, and the next configuration page corresponding to the home guarding security mode includes various configuration item information such as basic configuration, advanced configuration, and basic information.
In the above embodiment, a plurality of security modes can be preset according to security risk monitoring requirements in different time periods, and when the security modes are configured, any one of the plurality of preset security modes is selected to be configured or modified, so that configuration operation on the security modes can be simplified.
In some embodiments, the obtaining the configuration parameter of the target security mode corresponding to the configuration instruction and sending the configuration parameter to a cloud includes:
acquiring trigger condition information of the target security mode corresponding to the configuration instruction, and sending the trigger condition information serving as a configuration parameter to a cloud; the trigger condition information comprises trigger equipment and execution actions of the trigger equipment.
The trigger equipment refers to intelligent household equipment contained in the corresponding target security mode. The execution action of the trigger equipment refers to the specified state or a specified certain execution action of the intelligent household equipment contained in the corresponding target security mode. The trigger condition information comprises trigger equipment and execution actions of the trigger equipment, and whether the corresponding risk event occurs currently can be determined according to the trigger condition information.
Referring to fig. 5 and 6, an optional interface schematic diagram configured for a target security mode is shown, where an interface displays a list of trigger devices to be selected, the list of trigger devices displays selectable trigger devices and corresponding selectable execution actions, and taking the target security mode as a home daemon mode as an example, a user may click a trigger device button in the home daemon mode to enter a trigger device list page in the home daemon mode, click and select one of the trigger devices in the trigger device list to enter an execution action setting page of the trigger device, where multiple execution actions that the trigger device can select are displayed in the execution action setting page, and if a door and window sensor is clicked to enter the execution action setting page of the door and window sensor, the execution actions to be selected included in the execution action setting page of the door and window sensor include opening, closing, opening for more than a period of time, and closing for more than a period of time, and the user may click and determine one of the selected execution actions in the execution action setting page to complete configuration of trigger condition information of the target security mode.
In the above embodiment, the configuration parameters of the target security mode mainly include setting the trigger device included in the target security mode and the execution action of the trigger device, and when the corresponding trigger device and the execution action of the trigger device are detected within the time period in which the target security mode takes effect, whether a corresponding risk event occurs may be determined according to the configuration parameters, so as to achieve the purpose of monitoring security risks.
In some embodiments, the obtaining trigger condition information of the target security mode corresponding to the configuration instruction, and sending the trigger condition information to a cloud as a configuration parameter includes:
switching to a trigger condition configuration page of the target security mode according to the configuration instruction;
displaying a trigger device to be selected in the trigger condition configuration page, and switching to an action configuration page of the trigger device to be selected based on a selected instruction of the trigger device to be selected;
displaying a to-be-selected action in the action configuration page, and receiving a selection instruction of the to-be-selected action;
and forming triggering condition information of the target security mode according to the selected instruction of the to-be-selected triggering device and the selected instruction of the to-be-selected action, and sending the triggering condition information serving as a configuration parameter to a cloud.
And the terminal equipment collects data and sends the data to the cloud according to the input of the user on the configuration interface. The page configuration process of the target security mode specifically includes: a user clicks one security mode in a configuration home page to serve as a selected target security mode, so that terminal equipment obtains a configuration instruction of the target security mode and switches to a trigger condition configuration page of the target security mode according to the configuration instruction; one or more trigger devices to be selected are displayed in the trigger condition configuration page, and a user can click one of the trigger devices to be selected to switch to the action configuration page of the corresponding trigger device to be selected; one or more actions to be selected are displayed in the action configuration page, and a user can click one of the actions to be selected and then click to determine, so that action configuration of the selected trigger equipment to be selected is completed; the user can enter the trigger condition configuration page again to select the next trigger equipment to be selected for setting, after setting of all the trigger equipment in the target security mode is completed, the user can click a determination key in the trigger condition configuration page, the terminal equipment forms trigger condition information of the target security mode according to a selection instruction of the trigger equipment to be selected and a selection instruction of the action to be selected, which are obtained according to input of the user in the configuration page corresponding to the target security mode, and the trigger condition information is sent to the cloud as a configuration parameter.
In the above embodiment, the corresponding configuration pages are respectively set according to the step of configuring the target security mode, and the configuration pages at all levels are sequentially entered according to the selected operation of the user, so that guidance of the user on configuration of the target security mode can be realized, the configuration process is clearer, and the operation difficulty can be reduced.
In some embodiments, the obtaining the configuration parameters of the target security mode corresponding to the configuration instruction, and sending the configuration parameters to a cloud, further includes:
acquiring alarm scheme information of the target security mode corresponding to the configuration instruction, and sending the alarm scheme information serving as a configuration parameter to a cloud; the alarm scheme information comprises alarm equipment and alarm actions of the alarm equipment.
The warning device is a device capable of giving a designated warning prompt, such as a screen device for displaying designated text information, a lamp for giving designated light, a device for giving a designated sound, and the like. The warning action refers to a corresponding mode that the corresponding warning device performs warning according to the current warning information, such as that the screen device displays designated text information, the lamp emits light with designated color or flickers according to designated frequency, and the sound generating device emits sound with designated frequency. The alarm scheme information of the target security mode may include setting corresponding alarm devices and alarm actions for one or more risk events included in the target security mode, respectively, if the risk events possibly existing in the target security mode include an event a, an event B, and an event C, setting corresponding alarm devices and alarm actions for the event a, setting corresponding alarm devices and alarm actions for the event B, and setting corresponding alarm devices and alarm actions for the event C; for another example, the risk events possibly existing in the target security mode include an event a, an event B, an event C, an event D, and an event E, the event a, the event B, the event C, the event D, and the event E are divided into a first level and a second level according to risk degrees, and the corresponding alarm device and the alarm action are respectively set for the event of the first level and the corresponding alarm device and the corresponding alarm action are set for the event of the second level.
In the above embodiment, the configuration parameters of the target security mode include alarm scheme information for the target security mode, the alarm scheme information for the target security mode is configured and sent to the cloud as the configuration parameters, and the cloud synchronizes the configuration parameters to the associated gateways, so that security monitoring can be spread to multiple gateways of the same local area network or different local area networks, and a strong alarm prompt and deterrent effect is formed.
Optionally, the obtaining of the alarm scheme information of the target security mode and sending the alarm scheme information as a configuration parameter to a cloud includes:
acquiring an alarm scheme setting instruction of the target security mode, and switching to an alarm scheme configuration page according to the alarm scheme setting instruction;
displaying a to-be-selected alarm mode in the alarm scheme configuration page, wherein the to-be-selected alarm mode comprises at least one of the following modes: pushing alarm information, pushing an alarm notification short message, alarming by a loudspeaker of target equipment and alarming by light of a target lamp;
and receiving a selected command of the to-be-selected alarm mode, forming alarm scheme information of the target security mode according to the selected command of the to-be-selected alarm mode, and sending the alarm scheme information as a configuration parameter to a cloud.
The alarm configuration process of the target security mode specifically includes: an alarm equipment adding key is arranged in a configuration page of the target security mode, and a user clicks the alarm equipment adding key, so that the terminal equipment acquires an alarm scheme setting instruction for the target security mode and switches to an alarm scheme configuration page according to the alarm scheme setting instruction; the method comprises the steps that a list of alarm modes to be selected is displayed in an alarm scheme configuration page, a user can click one or more alarm modes to be selected and then determine, for example, the user can select a push alarm notification short message and a speaker alarm of a target device as the alarm modes of a target security mode, so that a terminal device obtains a selection command of the push alarm notification short message and the speaker alarm of the target device as the alarm modes to be selected, alarm scheme information of the target security mode is formed according to the selection command of the alarm modes to be selected, and the alarm scheme information is sent to a cloud end as a configuration parameter.
Referring to fig. 7 and 8, for an example of setting an optional interface of the alarm scheme information of the target security mode, the to-be-selected alarm mode list includes a push alarm message, a push alarm message + a short message, and a user may select the push alarm message as the alarm mode of the target security mode, so as to switch to a sound setting page, where a plurality of optional sound types and a volume size adjustment progress bar are displayed in the sound setting page, and the optional sound types include a car alarm sound, a security accident sound, and the like, and the user may select the car alarm sound as the sound for pushing the alarm message.
In the above embodiment, the corresponding configuration pages are respectively set according to the step of configuring the alarm of the target security mode, and the configuration pages at all levels are sequentially entered according to the selected operation of the user, so that the guidance of the user on the alarm configuration in the target security mode can be realized, the configuration process is clearer, and the operation difficulty can be reduced.
In some embodiments, the obtaining the configuration parameter of the target security mode corresponding to the configuration instruction and sending the configuration parameter to a cloud further includes:
acquiring defense deploying strategy information of the target security mode corresponding to the configuration instruction, and sending the defense deploying strategy information serving as configuration parameters to a cloud; wherein the defense deploying strategy information comprises at least one of the following: whether delayed arming is started or not, delayed arming time, whether automatic arming is started or not, automatic arming starting conditions, whether automatic disarming is started or not, automatic disarming starting conditions and automatic arming and disarming switching conditions.
The intelligent home security monitoring is an ecological system which takes a house as a platform and connects various devices in the house together through the Internet of things technology to realize intellectualization. The intelligent home system has the functions of intelligent light control, intelligent electrical appliance control, a security monitoring system, intelligent background music, intelligent video sharing, a visual intercom system, a home theater system and the like. The defense deployment refers to starting a security monitoring function, for example, when the master leaves home or can deploy defense at rest, the system enters a defense deployment state, and when a risk event such as intrusion of a foreign person is monitored, automatic alarm is given. The disarming refers to turning off the security monitoring function, for example, the system can not monitor the risk event any more when the master can be disarmed after returning home. The delayed arming means that after the arming condition is met, the arming action is executed after the specified time is delayed. The automatic defense deployment means that the defense deployment is automatically started after the defense deployment condition is met. The automatic defense deployment starting condition refers to a preset condition that the defense deployment is automatically started under the condition of being met. The automatic disarming means that the disarming is automatically closed after the disarming condition is met. The automatic disarming starting condition refers to a preset condition for automatically closing the arming when the condition is met. The automatic arming and disarming switching condition is a preset condition for automatically switching between arming opening and arming closing under the condition of meeting.
Referring to fig. 9, a schematic diagram of an optional interface of delayed defense deployment is shown, where a configuration page of the target security mode is provided with a defense deployment policy setting option, and a user may select to start delayed defense deployment and set a delay time, so as to complete setting of defense deployment policy information of the target security mode. Referring to fig. 10, as an optional interface schematic diagram of automatic arming and automatic disarming, an arming setting page may provide options of arming conditions, a user may select one or more conditions to configure, so as to complete setting of arming policy information of a target security mode, and when the set conditions are met, the arming policy is intelligently turned on or turned off.
In the above embodiment, the configuration parameters of the target security mode include setting a defense deployment policy corresponding to the target security mode, the corresponding configuration pages are respectively set according to the step of configuring defense deployment of the target security mode, and the configuration pages at each level are sequentially entered according to the selected operation of the user, so that guidance of the user on defense deployment configuration in the target security mode can be realized, the configuration flow is clearer, and the operation difficulty can be reduced.
In some embodiments, the security monitoring method further comprises:
receiving confirmation information of dynamic defense deployment change sent by the gateway and/or the cloud according to the defense deployment strategy information; wherein the confirmation information of the arming dynamic change comprises at least one of the following information: whether to execute arming, whether to execute disarming and whether to execute arming switching;
and acquiring a confirmation command obtained based on the confirmation information of the defense deployment dynamic change, and sending the confirmation command to the gateway and/or the cloud.
The dynamic defense deployment change refers to the change of the defense deployment strategy, such as before the defense deployment is started, before the defense deployment is closed, before the different defense deployment strategies are switched, and the like. And before the defense deploying strategy is changed, the gateway or the cloud sends confirmation information of the dynamic defense deploying change to the terminal equipment according to the defense deploying strategy information so that a user can timely know the change of the current defense deploying strategy. The user may select whether to confirm according to the confirmation information of the arming dynamic change, for example, the confirmation information of the arming dynamic change may include: whether to execute the arming, whether to execute the disarming and whether to execute the arming switching, the terminal equipment returns to the gateway or the cloud end according to the confirmation command of the user, and the gateway or the cloud end executes the arming change according to the confirmation command of the user. On the contrary, the user can also choose not to confirm or choose to ignore the change according to the confirmation information of the defense deployment dynamic change, the terminal device returns the unconfirmed command or the change ignoring command of the user to the gateway or the cloud, and the gateway or the cloud stops the defense deployment change according to the unconfirmed command or the change ignoring command of the user.
In the above embodiment, before the arming change of the target security mode, the user confirms whether to execute the current arming change according to the confirmation information of the arming dynamic change sent to the terminal device, so that the user can timely know the execution condition of the current target security mode, and the requirement that the user autonomously determines whether to start the target security mode is met.
In some embodiments, the security monitoring method further comprises:
receiving defense deployment updating information of alarm equipment corresponding to the target security mode, sending the defense deployment changing information to the gateway and/or the cloud, and updating configuration parameters of the target security mode by the gateway and/or the cloud according to the defense deployment changing information;
wherein the defense change information includes at least one of: the target alarm device starts arming, the target alarm device starts disarming and the target alarm device executes arming switching.
Changes to the arming policy may also be modified locally. The user can modify the arming strategy at the alarm device side, when the alarm device obtains the modification operation of the arming strategy by the user, the arming updating information is obtained according to the modification operation of the arming strategy and is sent to the gateway or the cloud, and the gateway or the cloud synchronously updates the configuration parameters of the target security mode.
In the above embodiment, the user may set, on the side of the alarm device, that the alarm device enables arming, disarming, or performs arming switching, which is convenient for setting or modifying the arming state of an individual alarm device and is convenient for the user to operate.
In some embodiments, the receiving security monitoring information of the risk event in the target security mode sent by the gateway and/or the cloud includes:
receiving alarm confirmation information of the risk event in the target security mode, which is sent by the gateway and/or the cloud; the alarm confirmation information comprises an identifier of the target security mode, the type of the risk event and the time of the risk event;
and acquiring a confirmation instruction obtained based on the confirmation information, and sending the confirmation instruction to the gateway and/or the cloud.
And the gateway or the cloud sends alarm confirmation information to the terminal equipment when determining that the current risk event occurs according to the detected change or execution action of the current state of the intelligent household equipment and the configuration information of the target security mode. So that the user can know the current risk event in time. The user may select whether to confirm according to the alarm confirmation information, for example, the alarm confirmation information may include: after the user alarm confirmation information knows the risk event, the terminal equipment can take corresponding measures for eliminating the risk event or decide to ignore the risk event and then confirm the risk event, the terminal equipment returns to the gateway or the cloud terminal according to a confirmation instruction of the user, and the gateway or the cloud terminal records the risk event according to the confirmation instruction of the user.
Referring to fig. 11, a risk event list currently in an alarm state may be displayed on an alarm page of the terminal device, where alarm confirmation information corresponding to each risk event in the risk event list includes an identifier of the target security mode, a type of the risk event, and a time of the risk event, so that a user can intuitively know the risk event and determine whether to click to further view details. Referring to fig. 12 and 13, after clicking a risk event to be viewed, the user enters an alarm page corresponding to the risk event, or enters a confirmation page of alarm confirmation information corresponding to the risk event, and the user may click an ignore key or click a confirm alarm key to complete processing of the risk event.
In the above embodiment, when the risk event is monitored in the target security mode, the alarm confirmation information of the risk event is sent to the terminal device, and the user determines the mode for processing the risk event according to the alarm confirmation information of the risk event, so that the user can know the current security risk condition in time, and the security is improved.
In some embodiments, the obtaining a confirmation instruction obtained based on the confirmation information, and sending the confirmation instruction to the gateway and/or the cloud includes:
acquiring a confirmation instruction obtained based on the confirmation information;
when the confirmation instruction is a confirmation alarm instruction, the confirmation alarm instruction is sent to the gateway and/or the cloud end, and the gateway and/or the cloud end control corresponding alarm equipment in the target security mode to execute an alarm action;
and under the condition that the confirmation instruction is an alarm instruction, sending the alarm instruction to the gateway and/or the cloud end, and controlling the corresponding alarm equipment in the target security mode to cancel the alarm or stop executing the alarm action by the gateway and/or the cloud end.
The user can operate according to the confirmation page of the alarm confirmation information of the terminal device, whether the confirmation is carried out is selected, and under the condition that the confirmation instruction is the confirmation alarm instruction, the gateway and/or the cloud controls the corresponding alarm device in the target security mode to execute the alarm action, please refer to fig. 14, and the terminal device enters the alarm page state; and under the condition that the instruction is determined to be an alarm instruction, the gateway and/or the cloud controls the corresponding alarm equipment in the target security mode to cancel the alarm or stop executing the alarm action, so that the alarm disturbance caused by the risk event which is not concerned by the user can be avoided.
In the above embodiment, the user decides the mode of handling the risk event according to the warning confirmation information of the risk event, and the user of being convenient for in time knows the current security protection risk situation, and the convenience of customers handles the risk event of paying attention to or neglects the processing to the risk event of not paying attention to, ensures that the control is comprehensive, and on the basis of promotion security, avoids disturbing.
In some embodiments, the security monitoring method further comprises:
forming an alarm log according to the security monitoring information of the target security mode, wherein the alarm log comprises the target security mode identifier, a risk event, the time of the risk event and the current execution state of an alarm action corresponding to the risk event; and/or
And receiving an alarm push message which is sent by the gateway and/or the cloud and is formed according to the security monitoring information of the target security mode, and displaying the alarm push message through a list.
The terminal equipment forms an alarm log according to the security monitoring information of the target security mode, and the alarm log can be stored locally or stored in a cloud mode through an uploading gateway or a cloud. And the monitored risk events are recorded in the alarm log in sequence, so that a user can conveniently look up the risk events according to the requirement. Referring to FIG. 15, the current execution state of the alarm action corresponding to the risk event may be that the alarm is turned off. The pushing mode of the alarm push message can be one or more, such as short message notification, mail notification, and displaying on the current interface of the terminal device through a message floating window.
In the embodiment, the terminal device records the risk events monitored in the security monitoring process to form an alarm log, so that a user can conveniently check or analyze the risk events integrally according to needs; the terminal equipment receives and displays the alarm push message, so that a user can know the current security risk condition in time.
In another aspect of the embodiment of the present application, please refer to fig. 16, further providing a security monitoring apparatus, applied to a terminal device, including: the acquisition module 11 is configured to acquire a configuration instruction of a target security mode corresponding to a time period to be monitored; the configuration module 12 is configured to obtain configuration parameters of the target security mode corresponding to the configuration instruction, send the configuration parameters to a cloud, and send the configuration parameters of the target security mode to a gateway associated with the terminal device by the cloud; and the alarm module 13 is configured to receive security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.
Optionally, the configuration module 12 is further configured to set a plurality of security modes according to security risk monitoring requirements in different time periods, where the security modes include at least one of the following: all-day guard mode, at-home guard mode, away-home guard mode, night guard mode.
Optionally, the configuration module 12 is further configured to obtain trigger condition information of the target security mode corresponding to the configuration instruction, and send the trigger condition information as a configuration parameter to a cloud; the trigger condition information comprises trigger equipment and execution actions of the trigger equipment.
Optionally, the configuration module 12 is further configured to switch to a trigger condition configuration page of the target security mode according to the configuration instruction; displaying a trigger device to be selected in the trigger condition configuration page, and switching to an action configuration page of the trigger device to be selected based on a selected instruction of the trigger device to be selected; displaying a to-be-selected action in the action configuration page, and receiving a selection instruction of the to-be-selected action; and forming triggering condition information of the target security mode according to the selected instruction of the to-be-selected triggering device and the selected instruction of the to-be-selected action, and sending the triggering condition information as a configuration parameter to a cloud.
Optionally, the configuration module 12 is further configured to obtain alarm scheme information of the target security mode corresponding to the configuration instruction, and send the alarm scheme information as a configuration parameter to a cloud; the alarm scheme information comprises alarm equipment and alarm actions of the alarm equipment.
Optionally, the configuration module 12 is further configured to obtain an alarm scheme setting instruction for the target security mode, and switch to an alarm scheme configuration page according to the alarm scheme setting instruction; displaying a to-be-selected alarm mode in the alarm scheme configuration page, wherein the to-be-selected alarm mode comprises at least one of the following modes: pushing alarm information, pushing an alarm notification short message, alarming by a loudspeaker of target equipment and alarming by light of a target lamp; and receiving a selected command of the to-be-selected alarm mode, forming alarm scheme information of the target security mode according to the selected command of the to-be-selected alarm mode, and sending the alarm scheme information as a configuration parameter to a cloud.
Optionally, the configuration module 12 is further configured to obtain arming policy information of the target security mode corresponding to the configuration instruction, and send the arming policy information as a configuration parameter to a cloud; wherein the defense deploying strategy information comprises at least one of the following: whether delayed arming is started or not, delayed arming time, whether automatic arming is started or not, automatic arming starting conditions, whether automatic disarming is started or not, automatic disarming starting conditions and automatic arming and disarming switching conditions.
Optionally, the configuration module 12 is further configured to receive confirmation information of the dynamic defense deployment change sent by the gateway and/or the cloud according to the defense deployment policy information; wherein the confirmation information of the arming dynamic change comprises at least one of the following information: whether to execute arming, whether to execute disarming and whether to execute arming switching; and acquiring a confirmation command obtained based on the confirmation information of the defense deployment dynamic change, and sending the confirmation command to the gateway and/or the cloud.
Optionally, the configuration module 12 is further configured to receive provisioning update information of the alarm device corresponding to the target security mode, send the provisioning change information to the gateway and/or the cloud, and update the configuration parameters of the target security mode by the gateway and/or the cloud according to the provisioning change information; wherein the defense change information includes at least one of: the target alarm device starts arming, the target alarm device starts disarming and the target alarm device executes arming switching.
Optionally, the alarm module 13 is further configured to receive alarm confirmation information of the risk event in the target security mode, where the alarm confirmation information is sent by the gateway and/or the cloud; the alarm confirmation information comprises an identifier of the target security mode, the type of the risk event and the time of the risk event; and acquiring a confirmation instruction obtained based on the confirmation information, and sending the confirmation instruction to the gateway and/or the cloud.
Optionally, the alarm module 13 is further configured to obtain a confirmation instruction obtained based on the confirmation information; when the confirmation instruction is a confirmation alarm instruction, the confirmation alarm instruction is sent to the gateway and/or the cloud end, and the gateway and/or the cloud end control corresponding alarm equipment in the target security mode to execute an alarm action; and under the condition that the confirmation instruction is an alarm instruction, sending the alarm instruction to the gateway and/or the cloud end, and controlling the corresponding alarm equipment in the target security mode to cancel the alarm or stop executing the alarm action by the gateway and/or the cloud end.
Optionally, the alarm module is further configured to form an alarm log according to the security monitoring information of the target security mode, where the alarm log includes the target security mode identifier, a risk event, the time of the risk event, and a current execution state of an alarm action corresponding to the risk event; and/or receiving an alarm push message which is sent by the gateway and/or the cloud and formed according to the security monitoring information of the target security mode, and displaying the alarm push message through a list.
It should be noted that: in the process of implementing the security monitoring method, the security monitoring device provided in the above embodiment is exemplified by only the division of the program modules, and in practical applications, the processing distribution may be completed by different program modules as needed, that is, the internal structure of the device may be divided into different program modules, so as to complete all or part of the above described method steps. In addition, the security monitoring device provided by the above embodiment and the security monitoring method embodiment applied to the terminal device side belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
In another aspect of the embodiment of the present application, please refer to fig. 17, further providing a terminal device, including a processor 111, a memory 112, and a computer program stored in the memory 112 and executable by the processor 111, where when the computer program is executed by the processor 111, the security monitoring method applied to the terminal device side according to any embodiment of the present application is implemented, and the same technical effect can be achieved, and is not repeated here. The terminal device may be a smart phone, a personal computer, or the like.
In another aspect of the embodiment of the present application, please refer to fig. 18, which further provides a security monitoring method applied to a gateway, where the security monitoring method includes but is not limited to S201 and S203, and the specific introduction includes:
s201, acquiring configuration parameters corresponding to a target security mode issued by a cloud;
s203, acquiring action execution information of associated trigger equipment, determining a risk event according to the action execution information and the configuration parameters, and sending security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
The user can adopt the terminal equipment to configure the security mode, and the cloud end issues the configuration data to the gateway associated with the terminal equipment after receiving the configuration of the terminal equipment. And the gateway can perform local storage after acquiring the configuration parameters corresponding to the target security mode issued by the cloud. When the state of trigger equipment contained in a target security mode changes or executes an action, the trigger equipment reports action execution information to a gateway, the gateway determines a risk event according to the action execution information and the configuration parameters, and security monitoring information of the target security mode is sent to the cloud and/or the terminal equipment according to the risk event. The security monitoring information of the target security mode may include information such as the name, type, occurrence time, and risk level of the monitored risk event.
In the embodiment, the setting of the security condition can be more flexible and changeable when the target security mode is configured, so that the range of the intelligent household equipment which can be covered by the target security mode is wider, and the security monitoring of more types of intelligent household equipment is supported; in addition, the interaction between the gateway and the cloud can spread the monitoring range to the associated multiple gateways, so that a stronger warning prompt is formed, and the monitoring safety performance is improved.
In some embodiments, the security monitoring method further comprises:
reporting the updated configuration parameters of the target security mode to a cloud under the condition that the configuration parameters of the target security mode are determined to be updated, and issuing the updated configuration parameters of the target security mode to other associated gateways by the cloud; and/or synchronizing the updated configuration parameters of the target security mode to other associated gateways;
and the other associated gateways update the configuration of the target security mode stored by the gateways according to the updated configuration parameters.
Referring to fig. 19, in the operation process of the security monitoring mode, if the configuration information of the security monitoring mode is changed in the terminal device, the configuration information is reported to the cloud through the gateway, and the cloud issues the updated configuration parameter in the latest state to other associated gateways, or the gateway synchronizes the updated configuration parameter in the latest state to other associated gateways through the local area network, so that the other associated gateways can make appropriate adjustment or synchronize the latest configuration information with the cloud according to the configuration information. Optionally, the configuration information of the security monitoring mode is synchronized between gateways through the local area network every 10 minutes, and the configuration information of the security monitoring mode is synchronized across the local area network through the cloud end every 30 minutes. In an optional example, when the configuration information of the security monitoring mode is changed, the gateway synchronizes its configuration version and state information to other gateways of the lan, and if no response is received or the gateway is not in the same lan, the gateway synchronizes again to the gateway through the cloud. The gateway receiving the information can compare the configuration version with the state version, if the configuration version of the gateway initiating the synchronization is higher than the configuration version of the gateway, the gateway synchronizes the configuration information again from the cloud, otherwise, the gateway reversely synchronizes the configuration version information to the gateway initiating the synchronization; if the state version of the gateway initiating the synchronization is lower than the state version of the gateway, the gateway initiating the synchronization is considered to have lost information before, the gateway receiving the information can reversely synchronize the information to the gateway initiating the synchronization, otherwise, the state version and the state information of the gateway are modified to be consistent with the gateway initiating the synchronization.
In the above embodiment, the interaction between the gateway and the cloud can effectively ensure that the security mode configuration information of the gateway can be synchronized in real time, and the purpose of executing the security monitoring mode by the multi-gateway linkage is achieved.
In some embodiments, the security monitoring method further comprises:
and under the condition that the security monitoring information meets the alarm triggering condition, synchronizing the alarm state to other associated gateways, and controlling corresponding alarm equipment of the multi-target gateways in the target security mode to cooperatively execute alarm actions in the same local area network or different local area networks.
The way of synchronizing the alarm state to other associated gateways by the gateway may be the same as the way of synchronizing the state information of the security monitoring mode. The gateway reports the alarm state to the cloud end, the cloud end issues the alarm state to other associated gateways, or the gateway synchronizes the alarm state to other associated gateways through the local area network.
In the above embodiment, by controlling the multiple target gateways in the same local area network or different local area networks to cooperatively execute the warning action on the warning device corresponding to the target security mode, the security monitoring range can be spread to the multiple gateways, a stronger warning prompt is formed, and the monitoring safety performance can be improved.
In another aspect of the embodiment of the present application, please refer to fig. 20, further providing a security monitoring apparatus, applied to a gateway, including: the receiving module 21 is configured to obtain a configuration parameter corresponding to a target security mode issued by a cloud; the event module 22 is configured to acquire action execution information of the associated trigger device, determine a risk event according to the action execution information and the configuration parameter, and send security monitoring information of the target security mode to the cloud and/or the terminal device according to the risk event.
Optionally, the event module 22 is further configured to report the updated configuration parameters of the target security mode to a cloud and send the updated configuration parameters of the target security mode to other associated gateways by the cloud when determining that the configuration parameters of the target security mode are updated; and/or synchronizing the updated configuration parameters of the target security mode to other associated gateways; and the other associated gateways update the configuration of the target security mode stored by the gateways according to the updated configuration parameters.
Optionally, the event module 22 is further configured to, when it is determined that the security monitoring information meets the alarm triggering condition, synchronize the alarm state to other associated gateways, and control the multiple target gateways in the same local area network or different local area networks to cooperatively execute the alarm action in the target security mode.
It should be noted that: in the process of implementing the security monitoring method, the security monitoring device provided in the above embodiment is exemplified by only the division of the program modules, and in practical applications, the processing distribution may be completed by different program modules as needed, that is, the internal structure of the device may be divided into different program modules, so as to complete all or part of the above described method steps. In addition, the security monitoring device provided by the above embodiment and the security monitoring method embodiment applied to the gateway side belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
In another aspect of the embodiment of the present application, please refer to fig. 21, which further provides a gateway, including a processor 211, a memory 212, and a computer program stored on the memory 212 and executable by the processor 211, where when the computer program is executed by the processor 211, the security monitoring method applied to the gateway side according to any embodiment of the present application is implemented, and the same technical effect can be achieved, and is not described herein again to avoid repetition. The terminal device may be a smart phone, a personal computer, or the like.
Referring to fig. 22, in another aspect of the embodiment of the present application, a security monitoring method is further provided, which is applied to a security monitoring system, where the security monitoring method includes, but is not limited to, S301, S303, and S305, and the following specific descriptions include:
s301, the terminal equipment obtains a configuration instruction of a target security mode corresponding to a time period to be monitored and configuration parameters of the target security mode, and sends the configuration parameters to a cloud.
The configuration instruction refers to a trigger instruction for triggering the current security mode to be configured, for example, a configuration key for triggering the security mode to enter a security mode configuration process is arranged on a configuration interface of the security mode, and the configuration instruction is obtained according to the touch operation of a user on the configuration key.
S303, the cloud sends the configuration parameters of the target security mode to a gateway associated with the terminal equipment.
The gateway associated with the terminal device may comprise at least one of: the gateway is positioned under the same local area network with the terminal equipment, the gateway is positioned under the same family account with the user account corresponding to the terminal equipment, the gateway is determined according to the self setting of the user, and the gateway is positioned in a set range of the physical distance with the terminal equipment.
S305, the gateway acquires action execution information of associated trigger equipment, determines a risk event according to the action execution information and the configuration parameters, and sends security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
When the current state of the intelligent household equipment in the target security mode changes or equipment action is executed, the gateway obtains the latest state of the intelligent household equipment and information of the equipment action, determines whether a risk event occurs according to locally stored configuration parameters of the target security mode, and sends security monitoring information of the risk event in the target security mode to the terminal equipment.
In the embodiment, the target security mode is configured based on the terminal device, and the target security mode corresponds to the time period to be monitored, so that the target security mode can be configured according to different time periods to be monitored, and thus, the setting of the security condition is more flexible and changeable, the range of the intelligent household devices which can be covered by the terminal device is wider, and the security monitoring of more varieties of intelligent household devices is supported; secondly, different time periods to be monitored can correspond to different security modes, so that the monitoring mode is more diversified, and different requirements of users on security monitoring can be met more conveniently; in addition, the monitoring range can be diffused to multiple gateways in the same local area network or different local area networks based on interaction of the gateways and the cloud, a stronger warning prompt is formed, and monitoring safety performance can be improved.
In some embodiments, the security monitoring method further comprises:
the gateway sends a configuration synchronization instruction to other gateways in the same local area network according to a preset frequency;
the other gateways synchronize the configuration parameters according to the configuration synchronization instruction and the configuration state versions of different gateways; and/or
The gateway sends a configuration synchronization instruction to the cloud according to a preset period;
and the cloud sends the current latest configuration parameters to the gateway for synchronization according to the configuration synchronization instruction.
And the other gateways synchronize the configuration parameters according to the configuration synchronization instruction and the configuration state versions of different gateways, and control the corresponding alarm devices of the multi-target gateways in the same local area network to cooperatively execute alarm actions in the target security mode. The gateway sends a configuration synchronization instruction to the cloud according to a preset period, the cloud sends the current latest configuration parameters to the gateway according to the configuration synchronization instruction for synchronization, and controls corresponding alarm devices of the multi-target gateways in different local area networks in the target security mode to cooperatively execute alarm actions, so that a security monitoring range can be diffused to the multiple gateways in the wide area network, a stronger alarm prompt is formed, and the monitoring safety performance can be improved.
Referring to fig. 23, an embodiment of the present application further provides a security monitoring system, including a cloud, a terminal device according to the foregoing embodiment of the present application, a gateway according to the foregoing embodiment of the present application, and a trigger device, where the gateway includes a first type of gateway in a same local area network as the terminal device, and a second type of gateway communicatively connecting the trigger device to the terminal device through a wide area network path; and the first type of gateway controls corresponding alarm equipment in the target security mode in the same local area network or different local area networks to cooperatively execute an alarm action according to the synchronization of the monitored alarm state of the target security mode and the second type of gateway.
The user can configure information of a security mode at a terminal device end, and can select various devices and devices under multiple gateways under the same account as alarm triggering conditions, for example: the gateway 1 door magnetic sensor is opened, the gateway 2 water immersion sensor detects water leakage, the gateway 3 illumination sensor reaches 800Lux, the temperature of the gateway 1 temperature and humidity sensor is higher than 50 degrees, the gateway 2 switch is opened, the gateway 3 socket is opened and the like; after the alarm triggering condition is selected, various alarm actions and equipment control actions under multiple gateways can be selected, for example: controlling the lamp of the gateway 1 to be turned on, controlling the socket of the gateway 2 to be turned on, pushing alarm information, playing alarm sound and the like; after the user confirms, the AIOT cloud sends the configuration data to each gateway under the current account of the user for storage.
After receiving the configuration data, the gateway synchronizes the configuration state and the alarm state with other gateways in the configuration, and the synchronization has two modes: the gateways of the local area networks are synchronized through the local area networks, and the gateways of different local area networks are synchronized through AIOT cloud channels. Meanwhile, each gateway can be synchronized with the AIOT cloud at regular time, and the latest configuration is ensured.
After the information reported by the triggering alarm device configured by the user reaches the triggering condition, for example: the gateway 1 door magnetic sensor reports and opens, triggers the gateway 1 and begins to report to the police, and carries out all alarm actions (can cross LAN gateway action), and gives the gateway 2 through the synchronous alarm state of LAN, gives the gateway 3 through the synchronous alarm state of AIOT, and the user clicks the warning on APP or arbitrary gateway and confirms, and all gateways can stop the chimes of doom and alarm lamp light effect. Optionally, the user can also perform automatic function arming and disarming configuration operation through the terminal device, the arming mode does not need to be manually switched each time, and the corresponding automatic arming and disarming can be set according to the habit of the user.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned intelligent lamp control method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (23)

1. A security monitoring method is applied to terminal equipment and is characterized by comprising the following steps:
acquiring a configuration instruction of a target security mode corresponding to a time period to be monitored;
acquiring configuration parameters of the target security mode corresponding to the configuration instruction, sending the configuration parameters to a cloud end, and sending the configuration parameters of the target security mode to a gateway associated with the terminal equipment by the cloud end;
and receiving security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.
2. The security monitoring method according to claim 1, wherein before the obtaining of the configuration instruction of the target security mode corresponding to the time period to be monitored, the method comprises:
setting a plurality of security modes according to security risk monitoring requirements in different time periods, wherein the security modes comprise at least one of the following modes: all-day guard mode, at-home guard mode, away-home guard mode, night guard mode.
3. The security monitoring method of claim 1, wherein the obtaining the configuration parameters of the target security mode corresponding to the configuration instruction and sending the configuration parameters to a cloud comprises:
acquiring trigger condition information of the target security mode corresponding to the configuration instruction, and sending the trigger condition information serving as configuration parameters to a cloud; the trigger condition information comprises trigger equipment and execution actions of the trigger equipment.
4. The security monitoring method according to claim 3, wherein the obtaining of the trigger condition information of the target security mode corresponding to the configuration instruction and sending the trigger condition information as a configuration parameter to a cloud includes:
switching to a trigger condition configuration page of the target security mode according to the configuration instruction;
displaying a trigger device to be selected in the trigger condition configuration page, and switching to an action configuration page of the trigger device to be selected based on a selected instruction of the trigger device to be selected;
displaying a to-be-selected action in the action configuration page, and receiving a selection instruction of the to-be-selected action;
and forming triggering condition information of the target security mode according to the selected instruction of the to-be-selected triggering device and the selected instruction of the to-be-selected action, and sending the triggering condition information as a configuration parameter to a cloud.
5. The security monitoring method according to claim 3, wherein the obtaining of the configuration parameters of the target security mode corresponding to the configuration instruction and sending the configuration parameters to a cloud further comprises:
acquiring alarm scheme information of the target security mode corresponding to the configuration instruction, and sending the alarm scheme information serving as a configuration parameter to a cloud; the alarm scheme information comprises alarm equipment and alarm actions of the alarm equipment.
6. The security monitoring method of claim 5, wherein the obtaining of the alarm scheme information of the target security mode and the sending of the alarm scheme information as configuration parameters to a cloud comprises:
acquiring an alarm scheme setting instruction for the target security mode, switching to an alarm scheme configuration page according to the alarm scheme setting instruction;
displaying a to-be-selected alarm mode in the alarm scheme configuration page, wherein the to-be-selected alarm mode comprises at least one of the following modes: pushing alarm information, pushing an alarm notification short message, alarming by a loudspeaker of target equipment and alarming by light of a target lamp;
and receiving a selected command of the to-be-selected alarm mode, forming alarm scheme information of the target security mode according to the selected command of the to-be-selected alarm mode, and sending the alarm scheme information as a configuration parameter to a cloud.
7. The security monitoring method according to claim 3, wherein the obtaining of the configuration parameter of the target security mode corresponding to the configuration instruction and sending the configuration parameter to a cloud further comprises:
acquiring defense deploying strategy information of the target security mode corresponding to the configuration instruction, and sending the defense deploying strategy information serving as configuration parameters to a cloud; wherein the defense deploying strategy information comprises at least one of the following: whether delayed arming is started or not, delayed arming time, whether automatic arming is started or not, automatic arming starting conditions, whether automatic disarming is started or not, automatic disarming starting conditions and automatic arming and disarming switching conditions.
8. The security monitoring method of claim 7, wherein the method further comprises:
receiving confirmation information of dynamic defense deployment change sent by the gateway and/or the cloud according to the defense deployment strategy information; wherein the confirmation information of the arming dynamic change comprises at least one of the following information: whether to execute arming, whether to execute disarming and whether to execute arming switching;
and acquiring a confirmation command obtained based on the confirmation information of the defense deployment dynamic change, and sending the confirmation command to the gateway and/or the cloud.
9. The security monitoring method of claim 8, wherein the method further comprises:
receiving defense deployment updating information of alarm equipment corresponding to the target security mode, sending the defense deployment changing information to the gateway and/or the cloud, and updating configuration parameters of the target security mode by the gateway and/or the cloud according to the defense deployment changing information;
wherein the defense change information includes at least one of: the target alarm device starts arming, the target alarm device starts disarming and the target alarm device executes arming switching.
10. The security monitoring method of claim 1, wherein the receiving the security monitoring information of the risk event in the target security mode sent by the gateway and/or the cloud comprises:
receiving alarm confirmation information of the risk event in the target security mode, which is sent by the gateway and/or the cloud; the alarm confirmation information comprises an identifier of the target security mode, the type of the risk event and the time of the risk event;
and acquiring a confirmation instruction obtained based on the confirmation information, and sending the confirmation instruction to the gateway and/or the cloud.
11. The security monitoring method of claim 10, wherein the obtaining of the confirmation instruction obtained based on the confirmation information and sending the confirmation instruction to the gateway and/or the cloud comprises:
acquiring a confirmation instruction obtained based on the confirmation information;
when the confirmation instruction is a confirmation alarm instruction, the confirmation alarm instruction is sent to the gateway and/or the cloud end, and the gateway and/or the cloud end control the corresponding alarm equipment in the target security mode to execute an alarm action;
and under the condition that the confirmation instruction is an alarm instruction, sending the alarm instruction to the gateway and/or the cloud end, and controlling the corresponding alarm equipment in the target security mode to cancel the alarm or stop executing the alarm action by the gateway and/or the cloud end.
12. The security monitoring method of claim 1, wherein the method further comprises:
forming an alarm log according to the security monitoring information of the target security mode, wherein the alarm log comprises the target security mode identifier, a risk event, the time of the risk event and the current execution state of an alarm action corresponding to the risk event; and/or
And receiving an alarm push message which is sent by the gateway and/or the cloud and formed according to the security monitoring information of the target security mode, and displaying the alarm push message through a list.
13. A security monitoring method is applied to a gateway and is characterized by comprising the following steps:
acquiring configuration parameters corresponding to a target security mode issued by a cloud;
acquiring action execution information of associated trigger equipment, determining a risk event according to the action execution information and the configuration parameters, and sending security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
14. The security monitoring method of claim 13, further comprising:
reporting the updated configuration parameters of the target security mode to a cloud under the condition that the configuration parameters of the target security mode are determined to be updated, and issuing the updated configuration parameters of the target security mode to other associated gateways by the cloud; and/or synchronizing the updated configuration parameters of the target security mode to other associated gateways;
and the other associated gateways update the configuration of the target security mode stored by the gateways according to the updated configuration parameters.
15. The security monitoring method of claim 13, further comprising:
and under the condition that the security monitoring information meets the alarm triggering condition, synchronizing the alarm state to other associated gateways, and controlling corresponding alarm equipment of the multi-target gateways in the target security mode to cooperatively execute alarm actions in the same local area network or different local area networks.
16. A security monitoring method is applied to a security monitoring system and is characterized by comprising the following steps:
the method comprises the steps that terminal equipment obtains a configuration instruction of a target security mode corresponding to a time period to be monitored and configuration parameters of the target security mode, and sends the configuration parameters to a cloud end;
the cloud sends the configuration parameters of the target security mode to a gateway associated with the terminal equipment;
the gateway acquires action execution information of associated trigger equipment, determines a risk event according to the action execution information and the configuration parameters, and sends security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
17. The security monitoring method of claim 16, further comprising:
the gateway sends a configuration synchronization instruction to other gateways in the same local area network according to a preset frequency;
the other gateways synchronize the configuration parameters according to the configuration synchronization instruction and the configuration state versions of different gateways; and/or
The gateway sends a configuration synchronization instruction to the cloud according to a preset period;
and the cloud sends the current latest configuration parameters to the gateway for synchronization according to the configuration synchronization instruction.
18. The utility model provides a security protection monitoring device, is applied to terminal equipment, its characterized in that includes:
the acquisition module is used for acquiring a configuration instruction of a target security mode corresponding to a time period to be monitored;
the configuration module is used for acquiring the configuration parameters of the target security mode corresponding to the configuration instruction, sending the configuration parameters to a cloud, and sending the configuration parameters of the target security mode to a gateway associated with the terminal equipment by the cloud;
and the alarm module is used for receiving security monitoring information of the risk event in the target security mode, which is sent by the gateway and/or the cloud.
19. A terminal device, characterized by comprising a processor and a memory, wherein the memory stores a computer program executable by the processor, and when the computer program is executed by the processor, the terminal device implements the security monitoring method according to any one of claims 1 to 12.
20. The utility model provides a security protection monitoring device, is applied to the gateway which characterized in that includes:
the receiving module is used for acquiring configuration parameters corresponding to a target security mode issued by the cloud;
the event module is used for acquiring action execution information of the associated trigger equipment, determining a risk event according to the action execution information and the configuration parameters, and sending security monitoring information of the target security mode to the cloud and/or the terminal equipment according to the risk event.
21. A gateway comprising a processor and a memory, the memory having stored therein a computer program executable by the processor, the computer program when executed by the processor implementing the security monitoring method according to any one of claims 13 to 15.
22. A security monitoring system, comprising a cloud, the terminal device of claim 19, the gateway of claim 21, and a trigger device, wherein the gateway comprises a first type of gateway in the same lan as the terminal device, and a second type of gateway communicatively connecting the trigger device to the terminal device via a wan path;
and the first type of gateway controls corresponding alarm equipment in the target security mode in the same local area network or different local area networks to cooperatively execute an alarm action according to the monitored alarm state of the target security mode and the synchronization of the second type of gateway.
23. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when executed by a controller, implements the security monitoring method according to any one of claims 1 to 15.
CN202110338686.5A 2021-03-30 2021-03-30 Security monitoring method, device and system, terminal equipment, gateway and storage medium Pending CN115150421A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110338686.5A CN115150421A (en) 2021-03-30 2021-03-30 Security monitoring method, device and system, terminal equipment, gateway and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110338686.5A CN115150421A (en) 2021-03-30 2021-03-30 Security monitoring method, device and system, terminal equipment, gateway and storage medium

Publications (1)

Publication Number Publication Date
CN115150421A true CN115150421A (en) 2022-10-04

Family

ID=83403779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110338686.5A Pending CN115150421A (en) 2021-03-30 2021-03-30 Security monitoring method, device and system, terminal equipment, gateway and storage medium

Country Status (1)

Country Link
CN (1) CN115150421A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766447A (en) * 2022-11-14 2023-03-07 中国南方电网有限责任公司 Equipment function updating method and device
CN116300499A (en) * 2023-03-20 2023-06-23 深圳绿米联创科技有限公司 Equipment control method, device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819708A (en) * 2009-11-30 2010-09-01 广州市聚晖电子科技有限公司 Access management method of security terminal and security system
WO2013062101A1 (en) * 2011-10-27 2013-05-02 ホーチキ株式会社 Alert linking system and network adapter
US20150052578A1 (en) * 2013-08-13 2015-02-19 Herman Yau Wireless configuration and management of a security system
CN107316431A (en) * 2017-07-14 2017-11-03 义乌控客科技有限公司 A kind of intelligent household security system based on high in the clouds
CN110190986A (en) * 2019-05-07 2019-08-30 深圳绿米联创科技有限公司 Method, apparatus, system, electronic equipment and the storage medium of device configuration
CN110488692A (en) * 2019-08-08 2019-11-22 深圳绿米联创科技有限公司 Apparatus control method, device, system, electronic equipment and storage medium
US20200021596A1 (en) * 2018-07-16 2020-01-16 Alibaba Group Holding Limited Cloud Device Account Configuration Method, Apparatus and System, and Data Processing Method
CN111917635A (en) * 2020-07-08 2020-11-10 广东科徕尼智能科技有限公司 Security protection arming and disarming method and device based on gateway and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819708A (en) * 2009-11-30 2010-09-01 广州市聚晖电子科技有限公司 Access management method of security terminal and security system
WO2013062101A1 (en) * 2011-10-27 2013-05-02 ホーチキ株式会社 Alert linking system and network adapter
US20150052578A1 (en) * 2013-08-13 2015-02-19 Herman Yau Wireless configuration and management of a security system
CN107316431A (en) * 2017-07-14 2017-11-03 义乌控客科技有限公司 A kind of intelligent household security system based on high in the clouds
US20200021596A1 (en) * 2018-07-16 2020-01-16 Alibaba Group Holding Limited Cloud Device Account Configuration Method, Apparatus and System, and Data Processing Method
CN110190986A (en) * 2019-05-07 2019-08-30 深圳绿米联创科技有限公司 Method, apparatus, system, electronic equipment and the storage medium of device configuration
CN110488692A (en) * 2019-08-08 2019-11-22 深圳绿米联创科技有限公司 Apparatus control method, device, system, electronic equipment and storage medium
CN111917635A (en) * 2020-07-08 2020-11-10 广东科徕尼智能科技有限公司 Security protection arming and disarming method and device based on gateway and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766447A (en) * 2022-11-14 2023-03-07 中国南方电网有限责任公司 Equipment function updating method and device
CN116300499A (en) * 2023-03-20 2023-06-23 深圳绿米联创科技有限公司 Equipment control method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10032363B2 (en) Mobile user interface for event notifications arising from smart-home hazard detection devices
US9898175B2 (en) Home network manager for home automation
US10768784B2 (en) Systems and methods for rules-based automations and notifications
US10339773B2 (en) Home security system with automatic context-sensitive transition to different modes
US9892605B2 (en) Method, apparatus, and system for controlling smart home environment using LED lighting device
US9680982B2 (en) Emergency communication device
AU2021203063A1 (en) Control system user interface
CN111862498B (en) User interface for event prioritization and hazard detection in smart home environment
US9021044B2 (en) Modular intelligent power system
CN115150421A (en) Security monitoring method, device and system, terminal equipment, gateway and storage medium
JP2008219904A (en) System and method for infrastructure reporting
US20190246476A1 (en) Smart lighting system
EP2698774B1 (en) A method and a device for controlling a security system
CN111812993A (en) Scene linkage control method, device and storage medium
US10018981B2 (en) Monitoring removal of an automation control panel
CN113888826A (en) Monitoring processing method, device and system, computer equipment and storage medium
US20160065910A1 (en) Video gateway device
CN114723165A (en) Disaster early warning method and system based on intelligent equipment, electronic equipment and storage medium
CN114280953A (en) Scene mode creating method and device, electronic equipment and storage medium
US20180270078A1 (en) Method for configuring and method for controlling a home automation apparatus
JP7432861B2 (en) Control system and control method
CN111295008B (en) Security protection lighting control system
CN115987935A (en) Notification message pushing method and device, storage medium and electronic device
CN114815632A (en) Whole-house scene control method and device, terminal equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination