CN115884004B - Security equipment control method and device - Google Patents

Security equipment control method and device Download PDF

Info

Publication number
CN115884004B
CN115884004B CN202310042946.3A CN202310042946A CN115884004B CN 115884004 B CN115884004 B CN 115884004B CN 202310042946 A CN202310042946 A CN 202310042946A CN 115884004 B CN115884004 B CN 115884004B
Authority
CN
China
Prior art keywords
target
operation instruction
manufacturer
equipment
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310042946.3A
Other languages
Chinese (zh)
Other versions
CN115884004A (en
Inventor
曹进朝
孔庆新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing BlueSky Technologies Co Ltd
Original Assignee
Beijing BlueSky Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing BlueSky Technologies Co Ltd filed Critical Beijing BlueSky Technologies Co Ltd
Priority to CN202310042946.3A priority Critical patent/CN115884004B/en
Publication of CN115884004A publication Critical patent/CN115884004A/en
Application granted granted Critical
Publication of CN115884004B publication Critical patent/CN115884004B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Alarm Systems (AREA)

Abstract

The embodiment of the invention provides a security equipment control method and a security equipment control device, and relates to the technical field of security equipment, wherein the method comprises the following steps: after receiving a request for controlling the security equipment to realize a target function, which is input by a worker, determining a target manufacturer of the security equipment; determining a target operation instruction corresponding to a target function and a target manufacturer based on pre-stored global correspondence information; and sending a target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function. By applying the embodiment of the invention, the security equipment of different manufacturers can be uniformly controlled.

Description

Security equipment control method and device
Technical Field
The invention relates to the technical field of security equipment, in particular to a security equipment control method and device.
Background
Vendors of different security devices often develop matched control software, so that staff can control the security devices of the vendors by using management software. However, the control software developed by different manufacturers is different, so that in the actual control process of the security equipment, the configuration condition, the operation method and the like of the security equipment of different manufacturers are different, that is, if workers want to control the security equipment of different manufacturers at the same time, different control software is needed, and different control modes are adopted for management, so that the control process of the security equipment is complicated.
In view of the above, it is desirable to provide a solution that can uniformly control security devices of different manufacturers.
Disclosure of Invention
The embodiment of the invention aims to provide a security equipment control method and a security equipment control device, which can uniformly control security equipment of different manufacturers. The specific technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a method for controlling a security device, where the method includes:
after receiving a request for controlling security equipment to realize a target function, which is input by a worker, determining a target manufacturer of the security equipment;
determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global correspondence information, wherein the target operation instruction is: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved;
and sending the target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function.
Optionally, the determining, based on the pre-stored global correspondence information, a target operation instruction corresponding to the target function and the target vendor includes:
determining a manufacturer operation instruction corresponding to the target manufacturer based on a preset manufacturer corresponding relation represented by pre-stored global corresponding relation information, wherein the manufacturer operation instruction is as follows: an operation instruction for indicating security equipment of a target manufacturer;
and determining a target operation instruction corresponding to the target function in manufacturer operation instructions based on the preset function corresponding relation represented by the global corresponding relation information.
Optionally, the sending, by the security device, the target operation instruction to control the security device to respond to the target operation instruction to complete a target function includes:
and sending the target operation instruction to an interface of the security equipment so that the security equipment responds to the target operation instruction to complete a target function.
Optionally, the security device at least includes one of the following devices: the system comprises access control equipment for opening and closing a door, intercom equipment for calling and answering, video equipment for video communication and alarm equipment for processing emergency.
In a second aspect, an embodiment of the present invention provides a security device control apparatus, where the apparatus includes:
the manufacturer determining module is used for determining a target manufacturer of the security equipment after receiving a request for controlling the security equipment to realize a target function, which is input by a worker;
the instruction determining module is used for determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global corresponding relation information, wherein the target operation instruction is as follows: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved;
and the equipment control module is used for sending the target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function.
Optionally, the instruction determining module is specifically configured to:
determining a manufacturer operation instruction corresponding to the target manufacturer based on a preset manufacturer corresponding relation represented by pre-stored global corresponding relation information, wherein the manufacturer operation instruction is as follows: an operation instruction for indicating security equipment of a target manufacturer;
And determining a target operation instruction corresponding to the target function in manufacturer operation instructions based on the preset function corresponding relation represented by the global corresponding relation information.
Optionally, the device control module is specifically configured to:
and sending the target operation instruction to an interface of the security equipment so that the security equipment responds to the target operation instruction to complete a target function.
Optionally, the security device at least includes one of the following devices: the system comprises access control equipment for opening and closing a door, intercom equipment for calling and answering, video equipment for video communication and alarm equipment for processing emergency.
In a third aspect, an electronic device includes a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory perform communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing any of the method steps of the first aspect described above when executing a program stored on a memory.
In a fourth aspect, a computer readable storage medium has a computer program stored therein, which when executed by a processor, implements any of the method steps of the first aspect.
The embodiment of the invention has the beneficial effects that:
the embodiment of the invention provides a security equipment control method which is applied to control equipment and is used for determining a target manufacturer of the security equipment after receiving a request for controlling the security equipment to realize a target function, which is input by a worker; determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global correspondence information, wherein the target operation instruction is: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved; and sending the target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function.
From the above, after the control device receives the request for controlling the security device to implement the target function, which is input by the staff, the control device determines the target manufacturer of the security device first, because the global correspondence information indicates the preset manufacturer correspondence between the manufacturer of the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target manufacturer, and because the global correspondence information also indicates the preset function correspondence between the function implemented by the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target function, that is, can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security device of the target manufacturer to implement the target function, so that the control device can send the target operation instruction to the security device to control the security device to respond to the target operation instruction to implement the target function, and can further control the security device.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, that is, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
FIG. 1 is a schematic flow chart of a first security device control method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a second security device control method according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of a third security device control method according to an embodiment of the present invention;
Fig. 4 is a schematic structural diagram of a security device control method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a security device control apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, those of ordinary skill in the art will be able to devise all other embodiments that are obtained based on this application and are within the scope of the present invention.
In order to uniformly control security equipment of different manufacturers, the embodiment of the invention provides a security equipment control method and device.
The embodiment of the invention provides a security equipment control method, which comprises the following steps:
after receiving a request for controlling security equipment to realize a target function, which is input by a worker, determining a target manufacturer of the security equipment;
determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global correspondence information, wherein the target operation instruction is: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved;
And sending the target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function.
From the above, after the control device receives the request for controlling the security device to implement the target function, which is input by the staff, the control device determines the target manufacturer of the security device first, because the global correspondence information indicates the preset manufacturer correspondence between the manufacturer of the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target manufacturer, and because the global correspondence information also indicates the preset function correspondence between the function implemented by the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target function, that is, can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security device of the target manufacturer to implement the target function, so that the control device can send the target operation instruction to the security device to control the security device to respond to the target operation instruction to implement the target function, and can further control the security device.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, that is, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers.
Fig. 1 is a flow chart of a first security device control method provided by an embodiment of the present invention, as shown in fig. 1, may include the following steps: step S101 to step S103.
Step S101: after receiving a request for controlling the security equipment to realize the target function, which is input by a worker, determining a target manufacturer of the security equipment.
Specifically, when a worker uses the control device to control the security equipment of the target manufacturer to realize the target function, the worker can input an instruction for realizing the target function to the control device in a mode of clicking a mouse, inputting a keyboard or touching a screen and the like, and then after the control device receives a request for controlling the security equipment to realize the target function, which is input by the worker, the worker determines the target manufacturer of the security equipment.
In one embodiment of the present invention, different security devices may implement different functions, where the security device at least includes one of the following devices:
and (I) access control equipment.
Specifically, the door control device has the function of opening and closing the door. Such as: the entrance guard equipment can control the gate of the district, when the pedestrian is ready to get in or out of the district, the entrance guard equipment can control the gate of the district to be opened, after the pedestrian gets in or out of the district, the entrance guard equipment can control the gate of the district, or the entrance guard equipment can control the gate of the unit building in the district, for example, when the resident is ready to get in the unit building, the entrance guard equipment can control the gate of the unit building to be opened, and when the resident is ready to get out of the unit building, the entrance guard equipment can control the gate of the unit building to be closed.
And (II) intercom equipment.
In particular, the intercom device functions for calling and answering. Such as: when a worker needs to transmit information to other workers far away, the worker can call the intercom equipment of the other workers through the intercom equipment, when the other workers answer through the intercom equipment, the worker can transmit information to the other workers, or when a guest needs to request a resident in a unit building to open a door, the guest can call the intercom equipment of the resident through the intercom equipment, and then the resident can answer through the intercom equipment.
And (III) video equipment.
Specifically, the video device functions to turn on or off monitoring of a certain area and to play back a monitoring video for a certain period of time. Such as: the staff can monitor the corridor in the writing building through controlling the video equipment, and can monitor the street in the district, or the staff plays back the video monitoring of a certain area in a certain past time period through controlling the video equipment.
And (IV) an alarm device.
Specifically, the function of the alarm device is to detect an emergency based on a sensor connected in the alarm device, and to alarm when the emergency is detected, wherein the sensor connected in the alarm device may be a temperature sensor, a smoke sensor, a water immersion sensor, etc. Such as: if fire occurs in the office building, when a temperature sensor connected to the alarm equipment detects that the temperature in the office building is too high, the alarm equipment alarms in modes of whistling, dialing an alarm phone and the like; or when water leakage occurs indoors, when the immersion sensor connected into the alarm equipment detects that the immersion depth of the alarm equipment is too high, the alarm equipment alarms in modes of whistling, dialing an alarm phone and the like, then staff receiving the alarm can make a corresponding processing mode, and the state of the alarm equipment is recovered from the alarm state to the normal state.
Step S102: and determining a target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global corresponding relation information.
First, since control software developed by different manufacturers is different, operation instructions for instructing security devices of different manufacturers that realize target functions are different, and thus it is necessary to determine target manufacturers of the security devices and then determine target operation instructions corresponding to the target functions and the target manufacturers.
Such as: if the security device is an entrance guard device, the target function is door opening and door closing, an operation instruction for indicating the entrance guard device of a first manufacturer to realize door opening and door closing is different from an operation instruction for indicating the entrance guard device of a second manufacturer to realize door opening and door closing, and if the security device is an intercom device, the target function is calling and answering, an operation instruction for indicating the intercom device of the first manufacturer to realize calling and answering is different from an operation instruction for indicating the intercom device of a third manufacturer to realize calling and answering.
The target operation instruction is as follows: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps of presetting a manufacturer corresponding relation between manufacturers of security equipment and operation instructions, and presetting a function corresponding relation between functions realized by the security equipment and the operation instructions.
Specifically, since the global correspondence information represents a preset vendor correspondence between a vendor of the security device and an operation instruction, the operation instruction corresponding to the target vendor may be determined based on the preset vendor correspondence represented by the global correspondence information, and since the global correspondence information also represents a preset function correspondence between a function implemented by the security device and the operation instruction, the operation instruction corresponding to the target function may be determined based on the preset function correspondence represented by the global correspondence information, that is, the target operation instruction corresponding to the target function and the target vendor may be determined based on the pre-stored global correspondence information.
In one embodiment of the present invention, the global correspondence information may be stored in the control device in the form of text, a list, or the like.
In another embodiment of the present invention, the step S102 may be implemented by the following steps S102A-S102B in fig. 3, which are described in detail in the following embodiments, and are not described in detail herein.
Step S103: and sending the target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function.
Specifically, the control device may send the target operation instruction to the security device, where the target control instruction is an operation instruction indicating that the security device of the target manufacturer implements the target function, and because the manufacturer of the security device is the target manufacturer, the security device may respond to the target operation instruction and implement the target function.
In one embodiment of the present invention, the step S103 may be implemented by the step S103A in fig. 2 below, which is described in detail in the following embodiments, which are not described in detail herein.
From the above, after the control device receives the request for controlling the security device to implement the target function, which is input by the staff, the control device determines the target manufacturer of the security device first, because the global correspondence information indicates the preset manufacturer correspondence between the manufacturer of the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target manufacturer, and because the global correspondence information also indicates the preset function correspondence between the function implemented by the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target function, that is, can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security device of the target manufacturer to implement the target function, so that the control device can send the target operation instruction to the security device to control the security device to respond to the target operation instruction to implement the target function, and can further control the security device.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, that is, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers.
Fig. 2 is a schematic flow chart of a second security device control method according to an embodiment of the present invention, and compared with the embodiment shown in fig. 1, the step S103 may be implemented by the step S103A.
Step S103A: and sending the target operation instruction to an interface of the security equipment so that the security equipment responds to the target operation instruction to complete a target function.
Specifically, the interface of the security device is configured to receive the target operation instruction, and after receiving the target operation instruction, the security device may respond to the target operation instruction to complete a target function.
In one embodiment of the present invention, the control device may send the target operation instruction to an interface of the security device through an interface adapter, where the interface adapter may include: access control interface adapter, talkback interface adapter, video interface adapter and warning interface adapter.
Such as: if the worker inputs a request for controlling the door control equipment to realize the door opening and closing functions, the control equipment determines that a target manufacturer of the door control equipment is a first manufacturer after receiving the request, and then can send a target operation instruction to an interface of the door control equipment of the first manufacturer based on the door control interface adapter; if the worker inputs a request for controlling the door control equipment to realize the door opening and closing functions, the control equipment determines that a target manufacturer of the door control equipment is a second manufacturer after receiving the request, and then can send a target operation instruction to an interface of the door control equipment of the second manufacturer based on the door control interface adapter; if the operator inputs a request for realizing the monitoring of a certain area to be opened or closed by the video equipment and playing back the monitoring video in a certain time period, the control equipment determines that the target manufacturer of the video equipment is a first manufacturer after receiving the request, and then can send a target operation instruction to an interface of the video equipment of the first manufacturer based on the video interface adapter; if the staff inputs a request for realizing the calling and answering functions of the intercom device, the control device determines that the target manufacturer of the intercom device is a third manufacturer after receiving the request, and then can send a target operation instruction to an interface of the intercom device of the third manufacturer based on the intercom interface adapter; if the operator inputs a request for realizing that the alarm device detects an emergency based on a sensor and alarms when the emergency is detected, the control device determines that a target manufacturer of the alarm device is a first manufacturer after receiving the request, and then can send a target operation instruction to an interface of the alarm device of the first manufacturer based on the alarm interface adapter.
From the above, it can be seen from the general knowledge that, for a certain manufacturer and a security device implementing a certain function, the interface of the security device should only receive an operation instruction indicating that the security device of the manufacturer implements the function, because the manufacturer of the security device is a target manufacturer, the function implemented by the security device is a target function, which indicates that the interface of the security device can receive the operation instruction indicating that the security device of the target manufacturer implements the target function, and the target operation instruction is: and an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, so that the interface of the security equipment can receive the target operation instruction and the security equipment can respond to the target operation instruction to complete the target function.
Fig. 3 is a schematic flow chart of a third security device control method according to an embodiment of the present invention, and compared with the embodiment shown in fig. 1, the step S102 may include the following steps: step S102A-step S102B.
Step S102A: and determining a manufacturer operation instruction corresponding to the target manufacturer based on a preset manufacturer corresponding relation indicated by the pre-stored global corresponding relation information.
Wherein, the manufacturer operation instruction is: and indicating the operation instruction of the security equipment of the target manufacturer.
Specifically, since the preset vendor correspondence represents a correspondence between a vendor of the security device and an operation instruction, the control device may determine a vendor operation instruction corresponding to the target vendor after determining the target vendor, and in addition, the control device may determine a plurality of vendor operation instructions simultaneously.
Such as: the target manufacturer determined by the control device is a first manufacturer, and then a first manufacturer operation instruction, a second manufacturer operation instruction and a third manufacturer operation instruction which are corresponding to the first manufacturer and used for realizing different functions can be determined based on the preset manufacturer corresponding relation, wherein the first manufacturer operation instruction can be an operation instruction for realizing the first function by the security device of the first manufacturer, the second manufacturer operation instruction can be an operation instruction for realizing the second function by the security device of the first manufacturer, and the third manufacturer operation instruction can be an operation instruction for realizing the third function by the security device of the first manufacturer.
Step S102B: and determining a target operation instruction corresponding to the target function in the manufacturer operation instructions based on the preset function corresponding relation indicated by the global corresponding relation information.
Specifically, because the preset function correspondence represents the correspondence between the target function implemented by the security device and the operation instruction, and because the vendor operation instruction determined in the step S102A is the operation instruction indicating the security device of the target vendor, the operation instruction determined in the vendor operation instruction may be considered to be the operation instruction indicating the security device of the target vendor to implement the target function, that is, the target operation instruction, based on the preset function correspondence.
Such as: if the target function is the first function, the vendor operation instruction determined in the step is an operation instruction of the second vendor, and the control device may determine, based on the preset function correspondence indicated by the global correspondence information, an operation instruction corresponding to the first function in the vendor operation instruction, where the operation instruction is: and the target operation instruction for indicating the security equipment of the second manufacturer to realize the first function.
From the above, since the global correspondence information described above represents: the control device can determine the manufacturer operation instruction corresponding to the target manufacturer based on the preset manufacturer corresponding relation, and the operation instruction corresponding to the target function determined in the manufacturer operation instruction based on the preset function corresponding relation is the target operation instruction for indicating the target function of the security device of the target manufacturer.
Fig. 4 is a schematic structural diagram of a security device control method according to an embodiment of the present invention, as shown in fig. 4, may include the following steps: the system comprises a unified control and management module, an access control interface adapter, an intercom interface adapter, a video interface adapter, an alarm interface adapter, a first manufacturer access control device, a second manufacturer access control device, a first manufacturer intercom device, a second manufacturer intercom device, a first manufacturer video device, a second manufacturer video device, a first manufacturer alarm device and a second manufacturer alarm device.
The unified control and management module is used for determining a target manufacturer of the security equipment after receiving a request for controlling the security equipment to realize a target function, which is input by a worker, and determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global corresponding relation information.
The unified control and management module can also be used for determining a target manufacturer of the security equipment after receiving a request for controlling the security equipment to perform target maintenance operation, which is input by a worker, and determining maintenance operation instructions corresponding to the target maintenance operation and the target manufacturer based on the pre-stored maintenance correspondence information.
The access control interface adapter is used for sending a target operation instruction to an interface of access control equipment of a first manufacturer or access control equipment of a second manufacturer, so that the access control equipment receiving the target operation instruction can realize a target function.
The intercom interface adapter is used for sending a target operation instruction to an interface of intercom equipment of a first manufacturer or intercom equipment of a second manufacturer, so that the intercom equipment receiving the target operation instruction can realize a target function.
The video interface adapter is used for sending a target operation instruction to an interface of the first manufacturer video equipment or the second manufacturer video equipment so that the video equipment receiving the target operation instruction can realize a target function.
The alarm interface adapter is used for sending a target operation instruction to an interface of the first manufacturer alarm device or the second manufacturer alarm device so that the alarm device receiving the target operation instruction can realize a target function.
Fig. 5 is a schematic structural diagram of a control device for security equipment, provided by an embodiment of the present invention, applied to control equipment, where the device includes the following modules: 501-503.
Vendor determination module 501: the method comprises the steps that after a request for controlling security equipment to achieve a target function, which is input by a worker, is received, a target manufacturer of the security equipment is determined;
The instruction determination module 502: the method is used for determining target operation instructions corresponding to the target functions and the target manufacturers based on pre-stored global corresponding relation information, wherein the target operation instructions are as follows: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved;
device control module 503: and the security device is used for sending the target operation instruction to the security device so as to control the security device to respond to the target operation instruction to complete a target function.
From the above, after the control device receives the request for controlling the security device to implement the target function, which is input by the staff, the control device determines the target manufacturer of the security device first, because the global correspondence information indicates the preset manufacturer correspondence between the manufacturer of the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target manufacturer, and because the global correspondence information also indicates the preset function correspondence between the function implemented by the security device and the operation instruction, the control device can determine the operation instruction corresponding to the target function, that is, can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security device of the target manufacturer to implement the target function, so that the control device can send the target operation instruction to the security device to control the security device to respond to the target operation instruction to implement the target function, and can further control the security device.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, that is, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers.
In one embodiment of the present invention, the instruction determining module 502 is specifically configured to:
determining a manufacturer operation instruction corresponding to the target manufacturer based on a preset manufacturer corresponding relation represented by pre-stored global corresponding relation information, wherein the manufacturer operation instruction is as follows: an operation instruction for indicating security equipment of a target manufacturer;
and determining a target operation instruction corresponding to the target function in manufacturer operation instructions based on the preset function corresponding relation represented by the global corresponding relation information.
From the above, since the global correspondence information described above represents: the control device can determine the manufacturer operation instruction corresponding to the target manufacturer based on the preset manufacturer corresponding relation, and the operation instruction corresponding to the target function determined in the manufacturer operation instruction based on the preset function corresponding relation is the target operation instruction for indicating the target function of the security device of the target manufacturer.
In another embodiment of the present invention, the device control module 503 is specifically configured to:
and sending the target operation instruction to an interface of the security equipment so that the security equipment responds to the target operation instruction to complete a target function.
From the above, it can be seen from the general knowledge that, for a certain manufacturer and a security device implementing a certain function, the interface of the security device should only receive an operation instruction indicating that the security device of the manufacturer implements the function, because the manufacturer of the security device is a target manufacturer, the function implemented by the security device is a target function, which indicates that the interface of the security device can receive the operation instruction indicating that the security device of the target manufacturer implements the target function, and the target operation instruction is: and an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, so that the interface of the security equipment can receive the target operation instruction and the security equipment can respond to the target operation instruction to complete the target function.
The embodiment of the invention also provides an electronic device, as shown in fig. 6, which comprises a processor 601, a communication interface 602, a memory 603 and a communication bus 604, wherein the processor 601, the communication interface 602 and the memory 603 complete communication with each other through the communication bus 604,
A memory 603 for storing a computer program;
the processor 601 is configured to implement any one of the above-mentioned security device control methods when executing the program stored in the memory 603.
When the electronic device provided by the embodiment of the invention is used for controlling security equipment, after receiving a request for controlling the security equipment to realize a target function, the control device firstly determines the target manufacturer of the security equipment, and because the global correspondence information represents the preset manufacturer correspondence between the manufacturer of the security equipment and the operation instruction, the control device can determine the operation instruction corresponding to the target manufacturer, and further can determine the operation instruction corresponding to the target function, that is to say, can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security equipment of the target manufacturer to realize the target function, so that the control device can send the target operation instruction to the security equipment to control the security equipment to respond to the target operation instruction to complete the target function, and further can control the security equipment.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, that is, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-ProgrammableGate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment of the present invention, a computer readable storage medium is provided, in which a computer program is stored, where the computer program, when executed by a processor, implements the steps of any of the above-mentioned security device control methods.
When the computer readable storage medium provided by the embodiment of the invention is used for controlling security equipment, after receiving a request for controlling the security equipment to realize a target function, the control equipment firstly determines the target manufacturer of the security equipment, and because the global correspondence information represents the preset manufacturer correspondence between the manufacturer of the security equipment and the operation instruction, the control equipment can determine the operation instruction corresponding to the target manufacturer, and further can determine the operation instruction corresponding to the target function, namely can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security equipment of the target manufacturer to realize the target function, so that the control equipment can send the target operation instruction to the security equipment to control the security equipment to respond to the target operation instruction to complete the target function, and further can control the security equipment.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, that is, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers.
In yet another embodiment of the present invention, a computer program product containing instructions that, when run on a computer, cause the computer to perform the security device control method of any of the above embodiments is also provided.
When the computer program product provided by the embodiment of the invention is used for controlling security equipment, after receiving a request for controlling the security equipment to realize a target function, the control equipment firstly determines the target manufacturer of the security equipment, and because the global correspondence information represents the preset manufacturer correspondence between the manufacturer of the security equipment and the operation instruction, the control equipment can determine the operation instruction corresponding to the target manufacturer, and further can determine the operation instruction corresponding to the target function, that is to say, can determine the target operation instruction corresponding to the target function and the target manufacturer based on the pre-stored global correspondence information, and the target operation instruction is the operation instruction for indicating the security equipment of the target manufacturer to realize the target function, so that the control equipment can send the target operation instruction to the security equipment to control the security equipment to respond to the target operation instruction to complete the target function, and further can control the security equipment.
In addition, according to the scheme provided by the embodiment of the invention, for the security equipment of any manufacturer, the control equipment only needs to determine the target manufacturer of the security equipment, then determine the target operation instruction based on the global corresponding relation information, and send the target operation instruction to the security equipment to control the security equipment, namely, the security equipment of different manufacturers is not required to be controlled by adopting different control modes, namely, the scheme can uniformly control the security equipment of different manufacturers
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, electronic devices, storage media, computer program product embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the description of method embodiments in part.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (8)

1. A security device control method, applied to a control device, comprising:
after receiving a request for controlling security equipment to realize a target function, which is input by a worker, determining a target manufacturer of the security equipment;
determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global correspondence information, wherein the target operation instruction is: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved;
the target operation instruction is sent to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function;
the determining, based on the pre-stored global correspondence information, a target operation instruction corresponding to the target function and the target vendor includes:
Determining a manufacturer operation instruction corresponding to the target manufacturer based on a preset manufacturer corresponding relation represented by pre-stored global corresponding relation information, wherein the manufacturer operation instruction is as follows: an operation instruction for indicating security equipment of a target manufacturer;
and determining a target operation instruction corresponding to the target function in manufacturer operation instructions based on the preset function corresponding relation represented by the global corresponding relation information.
2. The method of claim 1, wherein the sending the target operation instruction to the security device to control the security device to complete a target function in response to the target operation instruction comprises:
and sending the target operation instruction to an interface of the security equipment so that the security equipment responds to the target operation instruction to complete a target function.
3. The method according to claim 1 or 2, wherein the security device comprises at least one of the following: the system comprises access control equipment for opening and closing a door, intercom equipment for calling and answering, video equipment for video communication and alarm equipment for processing emergency.
4. A security device control apparatus, for use with a control device, the apparatus comprising:
The manufacturer determining module is used for determining a target manufacturer of the security equipment after receiving a request for controlling the security equipment to realize a target function, which is input by a worker;
the instruction determining module is used for determining a target operation instruction corresponding to the target function and the target manufacturer based on pre-stored global corresponding relation information, wherein the target operation instruction is as follows: an operation instruction for indicating the security equipment of the target manufacturer to realize the target function, wherein the global corresponding relation information indicates: the method comprises the steps that a preset manufacturer corresponding relation between manufacturers of security equipment and operation instructions and a preset function corresponding relation between functions realized by the security equipment and the operation instructions are achieved;
the equipment control module is used for sending the target operation instruction to the security equipment so as to control the security equipment to respond to the target operation instruction to complete a target function;
the instruction determining module is specifically configured to:
determining a manufacturer operation instruction corresponding to the target manufacturer based on a preset manufacturer corresponding relation represented by pre-stored global corresponding relation information, wherein the manufacturer operation instruction is as follows: an operation instruction for indicating security equipment of a target manufacturer;
And determining a target operation instruction corresponding to the target function in manufacturer operation instructions based on the preset function corresponding relation represented by the global corresponding relation information.
5. The apparatus of claim 4, wherein the device control module is specifically configured to:
and sending the target operation instruction to an interface of the security equipment so that the security equipment responds to the target operation instruction to complete a target function.
6. The apparatus of claim 4 or 5, wherein the security device comprises at least one of: the system comprises access control equipment for opening and closing a door, intercom equipment for calling and answering, video equipment for video communication and alarm equipment for processing emergency.
7. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1-3 when executing a program stored on a memory.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-3.
CN202310042946.3A 2023-01-28 2023-01-28 Security equipment control method and device Active CN115884004B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310042946.3A CN115884004B (en) 2023-01-28 2023-01-28 Security equipment control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310042946.3A CN115884004B (en) 2023-01-28 2023-01-28 Security equipment control method and device

Publications (2)

Publication Number Publication Date
CN115884004A CN115884004A (en) 2023-03-31
CN115884004B true CN115884004B (en) 2023-05-23

Family

ID=85758483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310042946.3A Active CN115884004B (en) 2023-01-28 2023-01-28 Security equipment control method and device

Country Status (1)

Country Link
CN (1) CN115884004B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493211A (en) * 2017-08-29 2017-12-19 海信集团有限公司 The control method and device of intelligent home device
CN109285336A (en) * 2018-11-12 2019-01-29 南京迈瑞生物医疗电子有限公司 Medical Devices control device, system, method, computer equipment and storage medium
CN113330724A (en) * 2019-04-12 2021-08-31 深圳市欢太科技有限公司 Intelligent home scheduling method, device, system, server and storage medium
CN114115074A (en) * 2021-12-10 2022-03-01 珠海格力电器股份有限公司 Device control method and device, computer readable storage medium, processor

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102545127B1 (en) * 2018-04-02 2023-06-20 삼성전자 주식회사 Electronic device for managing application associated with a key of external electronic device and the method for the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493211A (en) * 2017-08-29 2017-12-19 海信集团有限公司 The control method and device of intelligent home device
CN109285336A (en) * 2018-11-12 2019-01-29 南京迈瑞生物医疗电子有限公司 Medical Devices control device, system, method, computer equipment and storage medium
CN113330724A (en) * 2019-04-12 2021-08-31 深圳市欢太科技有限公司 Intelligent home scheduling method, device, system, server and storage medium
CN114115074A (en) * 2021-12-10 2022-03-01 珠海格力电器股份有限公司 Device control method and device, computer readable storage medium, processor

Also Published As

Publication number Publication date
CN115884004A (en) 2023-03-31

Similar Documents

Publication Publication Date Title
US10854059B2 (en) Wireless sensor network
US11908257B2 (en) Premises access system
JP6144307B2 (en) Method and system for remotely managing a security system
CN103680083B (en) Event is notified
US11941537B2 (en) Home wireless discovery
CN112468527B (en) Linkage control system and linkage control method
US20150052578A1 (en) Wireless configuration and management of a security system
EP2128834A1 (en) Inexpensive mass market alarm system with alarm monitoring and reporting
WO2022242024A1 (en) Network management system, method, and apparatus, and electronic device
KR20170122107A (en) Intelligent security hub for providing smart alerts
Sunehra et al. An intelligent surveillance with cloud storage for home security
EP3328022B1 (en) Managing wireless network connection
US10152197B1 (en) Dynamic indication of a status of an application
CN115884004B (en) Security equipment control method and device
JP6282204B2 (en) System and method for monitoring access to network in secure site
US9183735B1 (en) Methods and systems for remote management of security systems
CN206656471U (en) Air-conditioning and the monitoring system based on air-conditioning
KR102062536B1 (en) System of managing resistant defect
CA2969388C (en) Remote-control security monitoring system and method
CN114967510A (en) Method, device, system, equipment and medium for configuring intelligent linkage action of equipment
CN109787812B (en) Access method and system of application programming interface service based on cloud transmission
KR102055755B1 (en) Home automation method afor using communication application
KR101859598B1 (en) System for remote management of security equipment
US20230107818A1 (en) Home automation platform
KR20090062370A (en) Method and system for maintaning the network devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant