CN115941882A - Method and device for controlling security equipment - Google Patents

Method and device for controlling security equipment Download PDF

Info

Publication number
CN115941882A
CN115941882A CN202110929241.4A CN202110929241A CN115941882A CN 115941882 A CN115941882 A CN 115941882A CN 202110929241 A CN202110929241 A CN 202110929241A CN 115941882 A CN115941882 A CN 115941882A
Authority
CN
China
Prior art keywords
communication module
camera module
module
event
working mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110929241.4A
Other languages
Chinese (zh)
Inventor
刘达生
于海波
张东胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Network Technology Beijing Co Ltd
Original Assignee
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Network Technology Beijing Co Ltd filed Critical Yunding Network Technology Beijing Co Ltd
Priority to CN202110929241.4A priority Critical patent/CN115941882A/en
Priority to CN202280048533.XA priority patent/CN117730524A/en
Priority to PCT/CN2022/104406 priority patent/WO2023280273A1/en
Publication of CN115941882A publication Critical patent/CN115941882A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Closed-Circuit Television Systems (AREA)

Abstract

The embodiment of the application discloses a method and a device for controlling security equipment, wherein a communication module in the security equipment receives a trigger event; and responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of a camera module in the security equipment through the communication module. The communication module can receive the trigger event, and indicates that the communication module is in a power-on state, so that a cold start link can be omitted when the communication module responds to the trigger event, the working state of the camera module is directly controlled, and the time consumed for switching the camera module from one working state to another working state is shortened. For example, the communication module can save a cold start link to wake up the camera module, so that the time consumption for waking up the camera module is shortened, and the recording start of the camera module is accelerated. And the communication module can enable the communication module to be in a working mode matched with the trigger event according to the trigger event, so that the working mode of the communication module is matched with the trigger event, and the flexibility of mode selection is improved.

Description

Method and device for controlling security equipment
Technical Field
The embodiment of the application relates to the technical field of equipment, in particular to a method and a device for controlling security equipment.
Background
The security equipment comprises a camera module and a communication module, the camera module is used for recording videos of the environment where the security equipment is located, the communication module is used for uploading the videos of the environment where the security equipment is located, and the communication module can control the power supply of the camera module. The working process of the camera module and the communication module is as follows:
if the camera module in the security equipment is in an idle state, the communication module controls the camera module to be powered off, and the communication module is also powered off; if the security equipment detects a trigger event, the communication module is powered on, network connection is established through the communication module, the communication module responds to the trigger event after being powered on, the camera module is controlled to be powered on, and videos are recorded through the camera module.
However, the communication module needs to be subjected to cold start from power-off to power-on, and the cold start of the communication module takes longer time, so that delay exists in the power-on of the camera module, and the recording start of the camera module is slow.
Disclosure of Invention
The embodiment of the application provides a method and a device for controlling security equipment.
In one aspect, the present application provides a method for controlling a security device, the method comprising:
a communication module in the security equipment receives a trigger event;
responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of a camera module in the security equipment through the communication module.
Optionally, the responding to the trigger event, the communication module being in a working mode matched with the trigger event, and controlling the working state of the camera module in the security device through the communication module includes:
responding to the trigger event, enabling the communication module to be in a first working mode, and awakening the camera module through the communication module; wherein the communication module is in a networking state in the first mode of operation.
Optionally, the responding to the trigger event, the placing of the communication module in the first operating mode includes:
responding to the trigger event, if the communication module is in a second working mode, the communication module is switched to the first working mode from the second working mode, wherein the communication module is in a network disconnection state in the second working mode.
Optionally, the responding to the trigger event, the placing of the communication module in the first operating mode further includes:
responding to the trigger event, if the communication module is in a third working mode, the communication module is maintained in the third working mode according to a preset rule, wherein the communication module is in a networking state in the third working mode, and the networking time of the communication module in the third working mode is longer than that of the communication module in the first working mode.
Optionally, the waking up the camera module through the communication module includes: and controlling the camera module to start through the communication module.
Optionally, the triggering event is at least one event of a personnel detection event and an equipment linkage event, and the personnel detection event and the equipment linkage event are used for indicating that personnel enter a monitoring area of the security equipment;
the detection module of the trigger event is connected with the communication module in an electric connection mode or a wireless mode for communication.
Optionally, the responding to the trigger event, the communication module being in a working mode matched with the trigger event, and controlling the working state of the camera module in the security device through the communication module includes:
responding to a closing instruction of the camera module, and maintaining the communication module in a first working mode and controlling the camera module to be in an awakening state;
after a first preset time length, the communication module is switched from the first working mode to a second working mode, and the camera module is closed, wherein the first preset time length takes the received closing instruction as the starting time.
Optionally, the turning off the camera module includes:
controlling the camera module to power off through the communication module;
or
Controlling the camera module to be in a low power consumption state through the communication module;
or
And controlling the camera module to be in a dormant state through the communication module.
Optionally, the responding to the trigger event, the communication module being in a working mode matched with the trigger event, and controlling the working state of the camera module in the security device through the communication module includes:
responding to a mode switching instruction, and enabling the communication module to enter a working mode pointed by the mode switching instruction;
and after receiving at least one type of event of a personnel detection event and an equipment linkage event, the communication module controls the working state of the camera module according to the at least one type of event of the personnel detection event and the equipment linkage event.
Optionally, the method further includes:
after the camera module is awakened, recording a video of a monitoring area of the security equipment through the camera module;
obtaining a human shape detection result obtained by human shape detection based on the video;
and if the human shape detection result indicates that the human shape is not detected from the video within a second preset time, controlling the camera module to end the video recording.
Optionally, the method further includes:
if the human shape detection result indicates that the human shape is detected from the video within the second preset time length, controlling the camera module to prolong the recording time length;
and if the recording time of the camera module is prolonged by a third preset time and no personnel detection event is received within the third preset time, controlling the camera module to finish recording.
Optionally, the method further includes:
receiving a setting instruction aiming at the security protection equipment;
responding to the setting instruction, and controlling the security equipment to synchronously update based on the setting in the setting instruction;
when the communication module is in a first working mode or a third working mode, the security equipment is synchronously updated; when the communication module is in a second working mode, the security equipment receives the trigger event or responds to the setting instruction every fourth preset time.
Optionally, the setting instruction is for the camera module, and the setting instruction is used for setting working parameters of the camera module;
and/or
The setting instruction is used for setting the linkage condition and the linkage operation of the security equipment.
Optionally, the method further includes:
obtaining a plurality of historical trigger distance values and/or a humanoid detection result of each historical trigger distance value, and determining a target trigger distance value according to the plurality of historical trigger distance values and/or the humanoid detection results of the historical trigger distance values.
In another aspect, the present application provides a communication module comprising: a control module and a communication module; the control module is used for executing the method for controlling the security equipment; the communication module is used for providing a network for the security equipment.
In still another aspect, the present application provides a computer-readable storage medium having computer program codes stored therein, where the computer program codes implement the above method for controlling security equipment when running.
According to the method and the device for controlling the security equipment, the communication module in the security equipment receives the trigger event; and responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of a camera module in the security equipment through the communication module. The communication module can receive the trigger event, and indicates that the communication module is in a power-on state, so that a cold start link can be omitted when the communication module responds to the trigger event, the working state of the camera module is directly controlled, and the time consumed for switching the camera module from one working state to another working state is shortened. For example, the communication module can save a cold start link to wake up the camera module, so that the time consumed for waking up the camera module is shortened, and the recording start of the camera module is accelerated. And the communication module can enable the communication module to be in a working mode matched with the trigger event according to the trigger event, so that the working mode of the communication module is matched with the trigger event, and the flexibility of mode selection is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some examples or embodiments of the present application, and that for a person skilled in the art, other drawings can be obtained from the provided drawings without inventive effort, and that the present application can also be applied to other similar scenarios from the provided drawings. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
FIG. 1 is an exemplary system architecture diagram to which some embodiments of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for controlling a security device according to the present application;
FIG. 3 is a flow diagram of another embodiment of a method for controlling a security device according to the present application;
FIG. 4 is a flow diagram of yet another embodiment of a method for controlling a security device according to the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. The embodiments described are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present application may be combined with or substituted for each other without conflict.
It should be understood that "system", "apparatus", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements. An element defined by the phrase "comprising a … …" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
Wherein in the description of the embodiments of the present application, "/" indicates an inclusive meaning, for example, a/B may indicate a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, "a plurality" means two or more than two.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
The inventor of the application finds out through research that: the security device comprises a communication module and a camera module, wherein the communication module can be a module with a control function, such as a module with power consumption control, for example, the communication module controls the camera module to be awakened and turned off. One way is that: if the camera module is in an idle state, controlling the communication module and the camera module to be closed, and if the communication module and the camera module are controlled to be powered off; if a trigger event is detected, the camera module is required to record a video, the communication module is awakened and then controls the camera module to be awakened, and if the communication module is electrified, the camera module is controlled to be electrified. Although when the camera module is in an idle state, the power consumption can be greatly reduced by closing the communication module and the camera module, when the camera module is required to record videos, the camera module can be waken up only after the communication module is waken up. For example, the communication module needs to be powered on through cold start, and then the camera module is powered on for video recording, which may cause the time consumption from power-off to power-on of the camera module to be too long, so that the recording of the camera module is slow to start.
In order to solve the above problems, embodiments of the present application provide a method and an apparatus for controlling a security device, where a communication module in the security device receives a trigger event; and responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of the camera module in the security equipment through the communication module. The communication module can receive the trigger event, and indicates that the communication module is in a power-on state, so that a cold start link can be omitted when the communication module responds to the trigger event, the working state of the camera module is directly controlled, and the time consumed for switching the camera module from one working state to another working state is shortened. For example, the communication module can save a cold start link to wake up the camera module, so that the time consumption for waking up the camera module is shortened, and the recording start of the camera module is accelerated. And the communication module can enable the communication module to be in a working mode matched with the trigger event according to the trigger event, so that the working mode of the communication module is matched with the trigger event, and the flexibility of mode selection is improved.
Fig. 1 illustrates an exemplary system architecture 100 to which some embodiments of the method for controlling security devices or the apparatus for controlling security devices of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include a terminal device 101, a security device 102, a network 103, and a server 104. The network 103 is used to provide a medium for communication links between the terminal device 101, the security device 102, and the server 104. Network 103 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal device 101 to interact with the security device 102 through the network 103 and the server 104, for example, the user may use the terminal device 101 to send a parameter setting instruction, a live instruction, and the like to the security device 102. Various client applications can be installed on the terminal device 101, for example, a client application matched with the security device 102 is installed, the client application sets the working parameters of the security device 102, requests the security device 102 to upload a video, and the like.
The terminal apparatus 101 may be hardware or software. When the terminal device 101 is hardware, it may be various electronic devices having a display screen, including but not limited to a smart phone, a tablet computer, a wearable device, a vehicle-mounted device, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), an e-book reader, a laptop portable computer, a desktop computer, and other electronic devices. When the terminal apparatus 101 is software, it can be installed in the electronic apparatuses listed above. It may be implemented as a plurality of software or software modules (for example to provide distributed services) or as a single software or software module. The embodiment of the present application does not set any limit to the specific type of the electronic device.
The server 104 may be a server that provides various services, such as a background server that provides support for the terminal device 101. The background server may serve as a transfer node between the terminal device 101 and the security device 102, and the transfer node may temporarily store information sent by both parties. For example, if the communication module in the security device 102 disconnects the network connection, and the instruction sent by the terminal device 101 to the security device 102 cannot be transmitted to the security device 102, the server 104 temporarily stores the instruction sent by the terminal device 101. After the communication module reestablishes the network connection, the server 104 may transmit the buffered instruction to the security device 102.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein. It should be understood that the number of terminal devices, security devices, networks, and servers in FIG. 1 are merely illustrative. Any number of terminal devices, security devices, networks, and servers may be present, as desired for implementation.
The method for controlling the security device provided by the embodiment of the application may be executed by the security device 102, for example, may be executed by a communication module of the security device 102, and accordingly, the apparatus for controlling the security device is generally disposed in the security device 102.
For example, the security device 102 in this embodiment may be a video lock, and the video lock is a door lock with a camera module, and when the unlocking and opening functions are realized, a visual function is added to form video interaction with the door opening. For example, carry on intelligent cat eye on the lock, intelligent cat eye can regard as a camera module to use, monitors the environment that the video lock is located through intelligent cat eye, like gather the image through intelligent cat eye, record video etc. can also live etc. to the picture of the environment that the video lock is located. The communication module in the video lock can be a WIFI communication module, and the working state of the intelligent cat eye can be controlled while a WIFI network is provided for the intelligent cat eye through the WIFI communication module, such as awakening and closing of the intelligent cat eye.
With continued reference to FIG. 2, a flow 200 of one embodiment of a method for controlling a security device in accordance with the present application is shown. The method for controlling the security equipment comprises the following steps:
step 201, a communication module in security equipment receives a trigger event.
In this embodiment, the communication module may be a module with control functions, such as power consumption control, for example, the communication module controls the camera module to wake up and shut down, such as controlling the camera module to power on and off. The communication module may be a System On Chip (SOC) type communication module, the SOC type communication module may include a control module and a communication module, the control module may execute the method for controlling the security device, the communication module is used for providing network connection for the security device, such as providing wireless network for the security device, and the security device may communicate using the wireless network provided by the communication module,
wherein the communication module is capable of receiving a trigger event indicating that the communication module is in a powered state such that the communication module is capable of receiving the trigger event. For example, a control module in the communication module is in a powered state, and the control module can receive a trigger event when the trigger event is detected. The trigger event is used for controlling the working mode of the communication module on one hand, and can also control the working state of the camera module in the security equipment on the other hand, such as controlling the camera module to wake up from closing.
The triggering event can be at least one event of a personnel detection event and an equipment linkage event, and the personnel detection event and the equipment linkage event are used for indicating that personnel enter a monitoring area of the security equipment; the personnel detection event can be that personnel are detected in a monitoring area of the security equipment, and the equipment linkage event can be that a certain component in the security equipment triggers a camera module and the like. Taking security equipment as an example of a video lock, the triggering event comprises the fact that a person passes by the door, the person stays in front of the door, unlocking is successful, the door is opened in a defense arrangement mode, a door bell is pressed, unlocking is carried out for multiple times, lock picking is carried out, unlocking is forced, and the like. The person passing by and the person staying in front of the door may be a person detection event, and the other events are equipment linkage events.
The trigger event can be detected by a detection module in the security device, the security device can include a plurality of detection modules in this embodiment, and different types of trigger events can be detected by different detection modules. For example, a person detection event can be detected by a human face detection module and/or a PIR (human infrared sensor) in the security device, and a door lock event and the like can be detected through a door lock mainboard. The trigger event detected by the detection module may be directly transmitted to the communication module, for example, the detection module and the communication module of the trigger event are connected and communicated in an electrical connection manner or a wireless manner, and the trigger event may be transmitted to the communication module in an electrical connection manner or a wireless manner.
When a trigger event is received, a control module in the communication module is in a power-on state, and the communication module is in a power-off state, so that the control module can receive the trigger event in an electric connection mode; for another example, the communication module comprises at least two communication modules, the network types and the power consumptions corresponding to the two communication modules are different, if the communication module comprises a WIFI communication module and a Bluetooth communication module, the power consumption of the Bluetooth communication module is smaller than that of the WIFI communication module, the Bluetooth communication module is in a power-on state, the WIFI communication module is in a power-off state, and the control module can receive the trigger event through the Bluetooth communication module.
Step 202, responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of the camera module in the security equipment through the communication module.
In this embodiment, the control system of the camera module may be embedded in the control module of the communication module, so as to control the camera module through the communication module, for example, the communication module controls the camera module to wake up and shut down, and also can control the camera module to record videos in response to a trigger event. For example, the communication module can be a WIFI communication module of an SOC type, the camera module is controlled through the WIFI communication module, meanwhile, a WIFI network can be provided for the camera module through the WIFI communication module, and videos, collected images and the like recorded by the camera module are uploaded through the WIFI network.
The working modes of the communication module comprise a first working mode, a second working mode and a third working mode, and the power consumption relations of the three working modes are as follows: the power consumption of the communication module in the first working mode is larger than that of the communication module in the second working mode, but is smaller than that of the communication module in the third working mode.
For example, under first mode to third mode, communication module is in the live state, if control module group in communication module is in the live state, if control module group and bluetooth communication module in communication module are in the live state again. The communication module is in a networking state in the first working mode, the communication module is in a disconnected state in the second working mode, the communication module is also in a networking state in the third working mode, but the networking time of the communication module in the third working mode is longer than that of the communication module in the first working mode, for example, the networking time of the communication module in the third working mode is 7 × 24 hours and 7 days, the networking time of the communication module in the first working mode is related to the working time of the camera module, and the working time of the camera module is the time spent by the camera module in recording and collecting images, so that the videos and the collected images recorded by the camera module can be uploaded through the communication module.
Correspondingly, the feasible ways in which the communication module is in the matched working mode in response to the trigger event and controls the working state of the camera module include, but are not limited to, the following ways:
in one mode, a trigger event is responded, the communication module is in a first working mode, and the camera module is awakened through the communication module; wherein in the first mode of operation the communication module is in a networked state.
Wherein the communication module is in a first mode of operation for providing a network to the camera module; if the communication module has started the first mode of operation, the communication module will remain in the first mode of operation; and if the communication module is in the second working mode, the communication module is switched from the second working mode to the first working mode. In response to the trigger event, if the communication module is in the third operating mode, the communication module is maintained in the third operating mode according to the preset rule, and the mode switching is not performed because the communication module is in the networking state in the third operating mode. The preset rule may be that when the communication module is in the third operating mode, if a trigger event is received, the communication module maintains the operating mode unchanged, that is, is still in the third operating mode.
When the communication module is switched from the second working mode to the first working mode, the communication module actively establishes network connection, such as an active connection router, and establishes network connection (such as wireless connection) through the router. The communication module establishes network connection and wakes up the camera module simultaneously, or awakens up the camera module earlier, and the communication module establishes network connection in the process of waking up the camera module, although the awakening of the camera module is earlier than the network connection establishment of the communication module, the camera module starts video recording after awakening, and the communication module may already complete the network connection establishment in the process and can also upload the video recorded by the camera module in time. The sequence of the network connection establishment of the communication module and the wake-up of the camera module is not limited in this embodiment.
The camera module may be awakened in a manner that the communication module controls the camera module to start, for example, the communication module controls the camera module to be powered on, or the communication module controls the camera module to perform state switching, for example, the communication module switches from a low power consumption state or a sleep state to a working state, and the working state indicates that the camera module can start recording or collecting images; no matter the camera module is powered on or switched over, the communication module is implemented in a power-on state, and compared with the case that the communication module is switched from a power-off state to a power-on state and then implemented, the method saves a power-on and cold-starting link, shortens the time consumed for awakening the camera module and accelerates the recording and starting of the camera module.
In another mode, in response to a closing instruction of the camera module, the communication module is maintained in the first working mode and controls the camera module to be in an awakening state; after the first preset time length, the communication module is switched from the first working mode to the second working mode, the camera module is closed, and the first preset time length takes the received closing instruction as the starting time.
The closing instruction is also used for instructing the camera module to switch states, after the closing instruction of the camera module is received, the communication module does not immediately control the camera module to be closed, but maintains the camera module to be continuously in an awakening state, and the camera module is closed after a first preset time period, and the camera module is controlled in such a way, which is mainly based on the following scene consideration:
in a short time after the camera module is turned off, the detection module in the security device detects the trigger event again, for example, the detection module detects the trigger event again at the moment when the camera module is turned off, or the detection module delays the transmission of the trigger event, and the communication module immediately receives the trigger event after the camera module is turned off. The camera module can be immediately awakened after the camera module is closed by the communication module in the two scenes, so that the state of the camera module is frequently switched, and the power consumption can be improved to a certain extent.
The feasible way of closing the camera module is to control the camera module to be powered off through the communication module; or, the camera module is controlled to be in a low power consumption state through the communication module; or, the camera module is controlled to be in a dormant state through the communication module.
In another mode, in response to the mode switching command, the communication module enters a working mode pointed by the mode switching command; and after receiving at least one type of event of the personnel detection event and the equipment linkage event, the communication module controls the working state of the camera module according to the at least one type of event of the personnel detection event and the equipment linkage event.
In this embodiment, a parameter setting interface may be displayed in the terminal device, and the parameter setting interface may set a working mode of the communication module, an identifier of the communication module, and parameters of other modules in the security device, for example, the parameter setting interface may set a resolution of a camera module in the security device, and trigger an event that the camera module records a video. When the working mode of the communication module is switched by a user, the working mode of the communication module can be selected in the parameter setting interface, and then a mode switching instruction can be sent to the security equipment through the terminal equipment and the server, wherein the working mode of the communication module can be carried in the mode switching instruction. After the communication module receives the mode switching instruction, the communication mode enters the working mode pointed by the mode switching instruction. After receiving the trigger event, the communication module can also adjust its working mode according to the trigger event, and the mode of adjusting the working mode can refer to the description of the two modes, and is not described in detail here.
The communication module may control the operating state of the camera module such that when at least one type of event of the person detection event and the device linkage event indicates that a person enters the monitoring area of the security device, the communication module wakes up the camera module. When the communication module receives a closing instruction of the camera module, the communication module can control the camera module to be in an awakening state, and after a first preset time period, the camera module is closed. For example, the power of the camera module is controlled by the communication module; or, the camera module is controlled to be in a low power consumption state through the communication module; or, the camera module is controlled to be in a dormant state through the communication module.
The method for controlling the security device provided in this embodiment is described below by taking the security device as an example of a video lock, and detection modules such as a door lock main board and a PIR in the video lock can detect whether a person enters a monitoring area of the video lock, for example, an unlocking event and a doorbell event (device linkage event) can be detected by the door lock main board, for example, the door lock main board detects that unlocking is successful, the door is opened in a defense deployment mode, the doorbell is pressed, multiple times of unlocking errors occur, lock picking, lock forcing unlocking and the like. People detection events such as passing of people in front of the door, staying of people in front of the door and the like can be detected through the PIR.
The trigger event detected by the door lock main board and the PIR can be transmitted to the communication module in an electric connection mode or a wireless mode, for example, a control module in the communication module is in an electric state, and the control module receives the trigger event in the electric connection mode. And the communication module responds to the trigger event, switches from the second working mode of the power-on and power-off network to the first working mode of the power-on and power-on network, and controls the camera module to start, for example, controls the camera module to be powered on, and records videos through the camera module. When the camera module records the video, the communication module provides a wireless network for the camera module, and the video recorded by the camera module is uploaded through the wireless network. If the communication module is in the third working mode (for example, the working mode of 7 × 24 hours networking) in response to the trigger event, the communication module may be maintained in the third working mode, and the camera module may be controlled to be powered on.
After the camera module finishes video recording, the camera module enters an idle state, under the condition, the possibility that the security and protection device continues to use the communication module and the camera module also becomes small, the communication module can be disconnected from the network but the communication module is not powered off, namely, the security and protection device enters a second working mode, and the camera module can be powered off or is in a low power consumption state or a dormant state, so that the power consumption of the security and protection device is reduced.
The reason why the communication module is disconnected from the network and is not powered off (the network connection is disconnected but the power is not powered off) is that the power off and the power on of the camera module are controlled by the communication module, if the communication module and the camera module are powered off, the process from the power off to the power on of the communication module and the camera module is that the communication module is powered on first and then the camera module is controlled to be powered on, the power on of the communication module needs to be subjected to a cold start process, the time consumption of the cold start process is long, and correspondingly, the time consumption of the camera module from the power off to the power on is also long. For the problem, in this embodiment, the communication module is disconnected from the network and is not powered off, although the power consumption of the security device is larger than that of the communication module when the network is disconnected from the network and the power is powered off, when the camera module needs to be powered on, the communication module omits a cold start process, and time consumption of the camera module from power off to power on is shortened.
In addition, when the communication module is in the third working mode, the camera module can be powered on all the time, or the camera module determines to be powered on or powered off according to the self state, for example, when the camera module is in an idle state, a power-off request can be sent to the communication module, and the communication module controls the camera module to be powered off; and if a trigger event or a video control instruction and the like are detected, the communication module can control the camera module to be powered on.
The video control instruction can be a live broadcasting instruction, a remote main control viewing instruction, a video call instruction and the like. When the communication module is in a third working mode, the video control instruction sent by the terminal equipment can be received; and responding to the video control instruction, controlling the camera module to record the video, and transmitting the video to the terminal equipment through the communication module.
In this embodiment, the first operating mode may be regarded as a standard mode, and the third operating mode may be regarded as a real-time viewing mode, in the standard mode, the communication module defaults to turn off the networking function but does not power off, that is, in the standard mode, the communication module defaults to not keep connected with the router, so that the standby power consumption is at a minimum; if the communication module receives the trigger event in the standard mode, if people pass through the security equipment, the communication module is actively connected with the router and controls the camera module to be powered on so as to remotely push and upload videos recorded by the camera module, so that the security equipment has low power consumption and long endurance in the standard mode, but a user cannot actively watch live broadcasts (because the camera module is powered off and does not record videos), and the user can check the videos only after the trigger event is awakened. In this embodiment, the working time of the camera module after the trigger event can be set so that the live broadcast can be actively watched within a period of time after the trigger event is awakened. Under the real-time mode of looking over, communication module can be connected with the router always, can realize but not limiting to 7 x 24 hours and look over the live broadcast at any time for security protection equipment's high continuation of the journey of consumption is short.
The process of viewing live broadcast at any time for 7 × 24 hours may be: if the working mode of the communication module is the third working mode, receiving a live broadcast instruction sent by the terminal equipment; responding to a live broadcast instruction, and controlling a camera module to record a video; and transmitting the video to the terminal equipment through the communication module. The terminal equipment can provide a live broadcast entrance in the parameter setting interface, and if starting operation aiming at the live broadcast entrance is detected (if a user clicks the live broadcast entrance), the terminal equipment sends a live broadcast instruction to the security equipment. The communication module triggers the camera module to record videos after receiving the live broadcasting instruction, and if the camera module is powered off when receiving the live broadcasting instruction, the communication module controls the camera module to be powered on and then instructs the camera module to record videos. If the working mode of the communication module is the first working mode but the communication module establishes network connection, the camera module can record videos under the condition, and a live broadcast inlet in corresponding terminal equipment can be in an effective state, namely the live broadcast inlet can be triggered, so that real-time videos can be remotely checked in a live broadcast mode when the working mode of the communication module is the first working mode but the communication module establishes network connection. When the real-time video is remotely checked in a live broadcasting mode, voice data can be transmitted in a full duplex mode, seamless talkback is achieved, and remote conversation is more in image-to-surface communication.
For two working modes, namely a standard mode and a real-time viewing mode, a user can control the communication module to switch between the two working modes through the terminal device, for example, the working mode switching can be completed through a parameter setting interface in the terminal device, and refer to the above description.
In this embodiment, a communication module in the security device receives a trigger event; and responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of a camera module in the security equipment through the communication module. The communication module can receive the trigger event, and indicates that the communication module is in a power-on state, so that a cold start link can be omitted when the communication module responds to the trigger event, the working state of the camera module is directly controlled, and the time consumed for switching the camera module from one working state to another working state is shortened. For example, the communication module can save a cold start link to wake up the camera module, so that the time consumption for waking up the camera module is shortened, and the recording start of the camera module is accelerated. And the communication module can enable the communication module to be in a working mode matched with the trigger event according to the trigger event, so that the working mode of the communication module is matched with the trigger event, and the flexibility of mode selection is improved.
With continued reference to fig. 3, another optional flow 300 of the method for controlling a security device provided by the embodiment of the present application is shown, which may include the following steps:
step 301, a communication module in the security device receives a trigger event.
And step 302, responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of a camera module in the security equipment through the communication module.
And 303, recording the video of the monitoring area of the security equipment through the camera module after the camera module is awakened. The recording duration of the camera module can be determined according to the trigger event. If the recording duration and the maximum recording duration corresponding to each trigger event are preset, after the trigger event is received, the matched recording duration is searched from the preset recording durations, and then the camera module is controlled to record at least the video with the matched recording duration.
And 304, obtaining a human shape detection result obtained by human shape detection based on the video.
The human shape detection aims to detect whether human shapes exist in the video, if the human shapes indicate that people exist/stay in the monitored area, the video recording is continuously carried out on the monitored area through the camera module, and the behaviors of the people in the monitored area are supervised through the video. The human shape detection can be performed by the security device or by a server, a terminal device, and the like which are in communication with the security device. The way of human shape detection based on video includes but is not limited to the following ways:
a human shape detection mode is characterized in that human shape detection is carried out once every preset time within a time period recorded by a camera module; in another human shape detection mode, human shape detection is started after a period of time is recorded by the camera module, if the human shape detection is started, the human shape detection can be performed once every preset time interval, or the human shape detection is continuously performed; in another mode, human shape detection is continuously performed during the time period recorded by the camera module. The value of the preset time is not limited when human shape detection is carried out. The continuous human shape detection can be performed by extracting another frame of image from the video for human shape detection after completing one human shape detection, or by extracting another frame of image from the video during human shape detection of one frame of image.
In this embodiment, images in a video may change during a process of recording the video by the camera module, and then the purpose of continuously extracting at least one frame of image from the video is to extract different images from the video so as to perform human shape detection on the different images, and a plurality of frames of images for performing human shape detection may change along with the lapse of recording time, so that human shape detection can be performed on images in a changed environment when the environment where the security device is located changes. The human shape detection can be to detect whether human shapes exist in the images by adopting an image recognition algorithm, because the images are obtained from videos corresponding to the monitoring areas of the security equipment, whether human shapes exist in the monitoring areas can be determined by detecting whether human shapes exist in the images, so that whether the triggering events are caused by human bodies is determined, and the false triggering of the camera module is avoided.
Taking PIR as an example, PIR is easily falsely triggered by environmental temperature change, and can be detected only when the human body moves in a large amplitude in some situations or environments. If the monitoring area of the security equipment has no people but the PIR detects a trigger event due to the temperature change of the monitoring area of the security equipment, the camera module is started to record a video. For the video recorded by the camera module, the security equipment or the server can extract multi-frame images from the video, perform human shape detection on each extracted frame image, and determine that the PIR triggers the camera module by mistake if no human shape is detected from the multi-frame images, so that the triggering accuracy is improved by filtering false triggering of the human shape detection as a triggering event.
And 305, if the human shape detection result indicates that the human shape is not detected from the video within a second preset time period, controlling the camera module to finish the video recording. The second preset time length is used for extracting multiple frames of images from the video to perform human shape detection on the multiple frames of images, and the value of the second preset time length is not limited in this embodiment.
If no human shape is detected from the video within the second preset time, the camera module is determined to be triggered by the trigger event in error, and the camera module can be controlled to finish recording at the moment, so that the time of invalid work of the camera module is shortened, and the effect of reducing power consumption is achieved.
The method for controlling the security device shown in fig. 3 may further include the following steps:
and step 306, if the human shape detection result indicates that the human shape is detected from the video within a second preset time period, controlling the camera module to prolong the recording time period.
And 307, if the recording time of the camera module is prolonged by a third preset time and no personnel detection event is received within the third preset time, controlling the camera module to finish recording.
In this embodiment, another purpose of human shape detection on a video is that a trigger event may have a condition of omitting to trigger a camera module, for example, when a person stands in front of a door for a long time and does not move, PIR cannot detect that the person stands in front of the door, so that PIR does not generate a trigger event, and the camera module may omit the recording, and therefore, the human shape detection is used as a supplement of the trigger event, which does not trigger, and the accuracy is further improved.
The control of the camera module to prolong the recording time can control the camera module to prolong a certain time, such as 5 seconds. And continuously extracting at least one frame of image from the video to carry out human shape detection in the process of prolonging the recording time length so as to determine whether to continuously prolong the recording time length.
In the process of controlling the camera module to prolong the recording time, whether a person detects an event can be detected, and if the recording time of the camera module is prolonged by a third preset time and no person detection event is detected within the third preset time, the camera module is controlled to finish recording; and if the recording time of the camera module detects a personnel detection event in the period of prolonging to a third preset time, controlling the camera module to continue recording. In this embodiment, the introduction of human shape detection and the extension of recording duration are to solve the problem of discontinuous video slicing, and the following description is given by using an example:
the PIR can detect that a human body acts greatly, and the PIR detection distance is limited; and the video recording time is prolonged by 5 seconds every time PIR is triggered. If the person is still or out of the detection distance, the PIRs cannot generate the trigger events, the corresponding camera modules stop recording the video after recording for 5 seconds, but if the person does large-scale motion or the person is within the detection distance of the PIRs at the moment, the PIRs generate the trigger events, the corresponding video is restarted after the video recording is stopped, and two sections of videos which are close to each other are formed. If human shape detection is used as supplement, the video recording can be carried out all the time as long as the human shape is detected, and the video recording interruption is avoided, so that the problem of discontinuous video recording is solved.
The purpose of detecting whether a trigger event exists within the third preset time is to control the video time not to be too long while the recording time is prolonged, because a person detection event is not detected within a period of time, the possibility that the monitored area of the security device changes is relatively low, the video content within the period of time does not change greatly, and unnecessary video content may be recorded besides increasing the data volume, so that the video recording of the camera module can be ended if no person detection event is detected within the third preset time, and the value of the third preset time is not limited in this embodiment.
After the camera module finishes recording, the camera module can send a closing instruction to the communication module, and the communication module responds to the closing instruction and controls the camera module to be in an awakening state; and closing the camera module after a first preset time length, wherein the first preset time length takes the received closing instruction as the starting time. When responding to the closing instruction, the communication module is in a first working mode, and the communication module can be maintained in the first working mode; after the first preset time length, the communication module is switched from the first working mode to the second working mode.
With continued reference to fig. 4, there is shown still another optional flow 400 of the method for controlling a security device provided in the embodiment of the present application, which may include the following steps:
step 401, a communication module in the security device receives a trigger event.
And 402, responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of the camera module in the security equipment through the communication module.
Step 403, receiving a setting instruction for the security device. The setting instruction is generated when the user designates the working parameters of the security equipment, and the working parameters can be set through a parameter setting interface displayed by the terminal equipment. The setting instruction can be specific to the camera module and is used for setting working parameters of the camera module; and/or the setting instruction can be used for setting the linkage condition and the linkage operation of the security equipment.
In this embodiment, the terminal device may display a parameter setting interface, where the parameter setting interface may set a working mode of the communication module, an identifier of the communication module, and parameters of other modules in the security device, for example, the parameter setting interface may set a resolution of the camera module in the security device, a detection sensitivity (for example, a sensitivity to a trigger event), and a trigger event that triggers the camera module to record a video; and for example, setting linkage of the security equipment and other equipment, and the like. For example, a trigger distance value corresponding to the PIR is set, the PIR triggers the camera module when detecting that a person passes by, the camera module after detecting a door lock event, and the like, where the trigger distance value is a distance value used by the PIR to detect whether a person is in a monitored area, that is, a monitoring range of the PIR is a circular area with the PIR as a center and the trigger distance value as a radius. The working parameters set by the user through the parameter setting interface can be carried in the setting instruction, and the terminal equipment sends the setting instruction to the security equipment so as to control the security equipment to update the working parameters.
Setting the linkage of the security device with other devices may be setting the linkage device associated with the security device, for example setting the speaker to the linkage device associated with the security device, and the linkage of the speaker may be turning on the speaker upon detecting an event, for example, upon detecting voice communication. In addition, the linkage of the security equipment and other equipment can be set to trigger the events of the work of other equipment, and for different security equipment, the events of the trigger of other equipment can be different, and the following description takes a video lock as an example:
the method supports the linkage of equipment with a screen (electronic equipment with a display screen) when a doorbell is pressed, and puts pictures (such as videos) in front of a door into a sound box/television in real time;
the linkage (if condition) between the reported trigger event and the self or other equipment is supported;
supporting the execution linkage (then execution) in response to the trigger events reported by other equipment;
if linkage conditions:
1) Someone passes in front of the door;
2) Someone lingers in front of the door;
3) The electric quantity of the camera is lower than 10%;
4) Recognizing a face in the video;
5) Someone presses a doorbell;
6) The door lock is pried;
then executing linkage operation:
1) Recording and uploading a video;
2) And remotely calling a camera module in the security equipment.
The if linkage condition and the then linkage operation can be matched in a parameter setting interface by a user, namely the user sets a condition selected from the if condition and a linkage function selected from the then, the security protection equipment is executed according to the selection of the user, the user can also manually input the if condition and the then linkage function in the parameter setting interface, and the embodiment does not limit the if condition and the then linkage function.
And step 404, responding to the setting instruction, and controlling the security equipment to synchronously update based on the setting in the setting instruction. For example, the working parameters carried by the setting instruction are used for setting the identifier of the communication module, such as the network identifier of the WIFI module, and after the parameter setting instruction is received, the network identifier of the WIFI module is updated to the network identifier carried in the setting instruction.
However, when the terminal device sends a setting instruction to the security device, the communication module of the security device may be in any one of the first working mode to the third working mode, the communication module is disconnected from the network in the second working mode, and the network connection of the communication module is valid in the first working mode and the third working mode. When the network connection of the communication module is disconnected and valid, there may be a difference in response to the setting instruction, and the difference is as follows:
when the communication module is in the first working mode or the third working mode, the security equipment is synchronously updated; when the communication module is in the second working mode, the security equipment receives a trigger event or a fourth preset duration response setting instruction every interval.
The difference is that if the communication module disconnects the network connection when sending the setting instruction, the setting instruction sent by the terminal device is temporarily stored in the server, and after the communication module reestablishes the network connection, the server sends the setting instruction to the security device or the security device actively acquires the setting instruction from the server, which causes a delay in the response of the setting instruction, which means a delay in the synchronization of the working parameters between the terminal device and the security device; if the network connection of the communication module is effective when the setting instruction is sent, the setting instruction sent by the terminal equipment can be immediately sent to the security equipment, the security equipment can synchronously update working parameters, and the working parameters in the security equipment can be immediately updated when the terminal equipment updates the working parameters of the security equipment.
The reestablishing of the network connection by the communication module may be reestablishing the network connection when a trigger event is detected or every fourth preset time interval, where the reestablishing of the network connection every fourth preset time interval is to synchronously update the operating parameters, and a value of the fourth preset time interval is not limited in this embodiment.
The method for controlling the security device may further include: the self-adaptive adjustment of the trigger distance value of the PIR is implemented by a camera module or a communication module in the security equipment or a main control module of the security equipment, and the self-adaptive adjustment of the trigger distance value of the PIR is implemented after a user starts the function.
For example, the communication module obtains a plurality of historical trigger distance values and a humanoid detection result of each historical trigger distance value, and determines a target trigger distance value according to the plurality of historical trigger distance values and the humanoid detection results of the historical trigger distance values.
The human shape detection result is used for indicating whether human shapes exist in the video recorded by the camera module, and the fact that the human shape detection result is associated with the PIR when the video recorded by the camera module can be a person detection event sent by the PIR can be shown; if the human shape is detected according to the human shape detection result, the fact that the personnel detection event sent by the PIR is an accurate event means that the PIR can accurately detect personnel in time, and the historical trigger distance value is a more accurate distance value; if the human shape detection result indicates that the human shape is not detected, the fact that a personnel detection event sent by the PIR is an error event is indicated, and the historical trigger distance value is a distance value with low accuracy, so that the security and protection equipment can adjust the historical trigger distance value according to the human shape detection result corresponding to the historical trigger distance value to obtain a target trigger distance value. For example, the historical trigger distance values corresponding to the multiple human shape detection results with the highest accuracy are selected, and the historical trigger distance values are calculated (for example, an average value is obtained) to obtain the target trigger distance value.
Another way to determine the target trigger distance value is to obtain a plurality of historical trigger distance values or a humanoid detection result of each historical trigger distance value, and determine the target trigger distance value according to the humanoid detection result of the plurality of historical trigger distance values or each historical trigger distance value. For example, the communication module at least processes the plurality of historical trigger distance values according to a preset adjustment rule to obtain a target trigger distance value. For example, a preset adjustment rule is to adjust a current trigger distance value according to a variation trend of a plurality of historical trigger distance values to obtain a target trigger distance value. And if the change trend of the plurality of historical trigger distance values indicates that the trigger distance values show a gradually decreasing trend, decreasing or increasing the current trigger distance value. If another preset adjustment rule is, the communication module obtains operation results of a plurality of historical trigger distance values, and the operation results are target trigger distance values; such as obtaining an average of a plurality of historical trigger distance values, etc.
When the target trigger distance value is obtained according to the human shape detection result of each historical trigger distance value, the communication module can obtain the target trigger distance value according to the detection accuracy indicated by the human shape detection result, and if the human shape detection result indicates that the human shape is detected, the detection accuracy is high; if the human shape detection result indicates that no human shape is detected, the detection accuracy is low. The communication module can obtain a target trigger distance value according to a historical trigger distance value corresponding to a humanoid detection result with high detection accuracy. For example, the historical trigger distance value corresponding to the human shape detection result with the highest detection accuracy is selected as the target trigger distance value, the historical trigger distance value corresponding to the human shape detection result with the highest detection accuracy is subjected to average processing, and the like, and the historical trigger distance value corresponding to the obtained human shape detection result is subjected to weighted average processing according to the detection accuracy of the human shape detection result, and the like.
Further, as an implementation of the methods shown in the above figures, the present application provides a communication module, where an embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to security equipment. The communication module includes: a control module and a communication module. The control module is used for receiving a trigger event; and responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of the camera module in the security equipment through the communication module. And the communication module is used for providing a network for the security equipment.
The triggering event is at least one event of a personnel detection event and an equipment linkage event, and the personnel detection event and the equipment linkage event are used for indicating that personnel enter a monitoring area of the security equipment; the detection module of the trigger event is connected with the control module in an electric connection mode or a wireless mode for communication.
In some optional implementations of this embodiment, the control module is configured to respond to a trigger event, the communication module is in a first working mode, and wake up the camera module through the communication module; wherein in the first mode of operation the communication module is in a networked state.
Optionally, the control module responds to the trigger event, and if the communication module is in the second working mode, the communication module switches from the second working mode to the first working mode, where in the second working mode, the communication module is in the network disconnection state, and power consumption of the communication module in the first working mode is greater than power consumption of the communication module in the second working mode.
For example, in response to a triggering event, if the communication module is in a third operating mode in which the communication module is in a networking state, the communication module is maintained in the third operating mode in which the networking duration of the communication module is greater than the networking duration of the communication module in the first operating mode.
Optionally, waking up the camera module through the communication module includes: and controlling the starting of the camera module through the communication module.
In some optional implementations of this embodiment, the control module is configured to respond to a shutdown instruction of the camera module, maintain the communication module in the first working mode, and control the camera module to be in an awake state; after the first preset time length, the communication module is switched from the first working mode to the second working mode, the camera module is closed, and the first preset time length takes the received closing instruction as the starting time.
Wherein, closing the camera module includes: controlling the camera module to power off through the communication module; or, the camera module is controlled to be in a low power consumption state through the communication module; or, the camera module is controlled to be in a dormant state through the communication module.
In some optional implementations of this embodiment, the control module is configured to respond to the mode switching instruction, and the communication module enters the working mode pointed by the mode switching instruction; and after receiving at least one type of event of the personnel detection event and the equipment linkage event, the communication module controls the working state of the camera module according to the at least one type of event of the personnel detection event and the equipment linkage event.
In this embodiment, after the camera module is awakened, a video in the monitoring area of the security device is recorded through the camera module; the control module obtains a human shape detection result obtained by human shape detection based on the video; and if the human shape detection result indicates that the human shape is not detected from the video within the second preset time, controlling the camera module to finish the video recording.
If the human shape detection result indicates that the human shape is detected from the video within a second preset time period, controlling the camera module to prolong the recording time period; and if the recording time of the camera module is prolonged by a third preset time and no personnel detection event is received within the third preset time, controlling the camera module to finish recording.
In some optional implementations of this embodiment, the control module receives a setting instruction for the security device; responding to the setting instruction, and controlling the security equipment to perform synchronous updating based on the setting in the setting instruction; when the communication module is in the first working mode or the third working mode, the security equipment is synchronously updated; when the communication module is in the second working mode, the security equipment receives a trigger event or responds to a setting instruction every fourth preset time interval.
The setting instruction aims at the camera module, and the setting instruction is used for setting working parameters of the camera module; and/or setting an instruction for setting the linkage condition and the linkage operation of the security equipment.
In some optional implementation manners of this embodiment, the control module obtains a plurality of historical trigger distance values and/or a human shape detection result of each historical trigger distance value, and determines the target trigger distance value according to the plurality of historical trigger distance values and/or the human shape detection results of the historical trigger distance values.
The embodiment of the application provides a computer readable storage medium, on which a computer program code is stored, wherein the computer program code is executed to implement the method for controlling a security device described in the above method embodiments.
The embodiment of the present application provides a processor, where the processor is configured to execute a program, where when the program runs, the method for controlling a security device described in the above method embodiments is implemented.
The present application further provides a computer program product, which when executed on a data processing device, causes the data processing device to implement the method for controlling a security device described in the above method embodiments.
The processor, the computer readable medium, or the computer program product provided in the foregoing embodiments of the present application may all be configured to execute the corresponding method provided above, and therefore, the beneficial effects achieved by the processor, the computer readable medium, or the computer program product may refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The above description is only for the purpose of illustrating the preferred embodiments of the present application and the technical principles applied, and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. The scope of the invention according to the present application is not limited to the specific combinations of the above-described features, and may also cover other embodiments in which the above-described features or their equivalents are arbitrarily combined without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (16)

1. A method for controlling a security device, the method comprising:
a communication module in the security equipment receives a trigger event;
responding to the trigger event, enabling the communication module to be in a working mode matched with the trigger event, and controlling the working state of a camera module in the security equipment through the communication module.
2. The method according to claim 1, wherein in response to the trigger event, the communication module is in an operating mode matching the trigger event, and controlling an operating state of a camera module in the security device through the communication module comprises:
responding to the trigger event, enabling the communication module to be in a first working mode, and awakening the camera module through the communication module; wherein the communication module is in a networking state in the first mode of operation.
3. The method of claim 2, wherein in response to the triggering event, the communication module being in a first mode of operation comprises:
responding to the trigger event, if the communication module is in a second working mode, the communication module is switched from the second working mode to the first working mode, wherein the communication module is in a network disconnection state in the second working mode.
4. The method of claim 3, wherein in response to the triggering event, the communication module being in the first mode of operation further comprises:
responding to the trigger event, if the communication module is in a third working mode, the communication module is maintained in the third working mode according to a preset rule, wherein the communication module is in a networking state in the third working mode, and the networking time of the communication module in the third working mode is longer than that of the communication module in the first working mode.
5. The method of any of claims 2 to 4, wherein waking up a camera module by the communication module comprises: and controlling the camera module to start through the communication module.
6. The method according to any one of claims 2 to 4, wherein the triggering event is at least one of a personnel detection event and a device linkage event, and the personnel detection event and the device linkage event are used for indicating that personnel enter a monitoring area of the security device;
the detection module of the trigger event is connected with the communication module in an electric connection mode or a wireless mode for communication.
7. The method according to claim 1, wherein in response to the trigger event, the communication module is in an operating mode matching the trigger event, and controlling an operating state of a camera module in the security device through the communication module comprises:
responding to a closing instruction of the camera module, and maintaining the communication module in a first working mode and controlling the camera module to be in an awakening state;
after a first preset time length, the communication module is switched from the first working mode to a second working mode, and the camera module is closed, wherein the first preset time length takes the received closing instruction as the starting time.
8. The method of claim 7, wherein the turning off the camera module comprises:
controlling the camera module to power off through the communication module;
or
Controlling the camera module to be in a low power consumption state through the communication module;
or
And controlling the camera module to be in a dormant state through the communication module.
9. The method according to claim 1, wherein in response to the trigger event, the communication module is in an operating mode matching the trigger event, and controlling an operating state of a camera module in the security device through the communication module comprises:
responding to a mode switching instruction, and enabling the communication module to enter a working mode pointed by the mode switching instruction;
and after receiving at least one type of event of a personnel detection event and an equipment linkage event, the communication module controls the working state of the camera module according to the at least one type of event of the personnel detection event and the equipment linkage event.
10. The method of any one of claims 1, 2, 3, 4, 7, 8 and 9, further comprising:
after the camera module is awakened, recording a video of a monitoring area of the security equipment through the camera module;
obtaining a human shape detection result obtained by human shape detection based on the video;
and if the human shape detection result indicates that the human shape is not detected from the video within a second preset time period, controlling the camera module to finish recording.
11. The method of claim 10, further comprising:
if the human shape detection result indicates that the human shape is detected from the video within the second preset time period, controlling the camera module to prolong the recording time period;
and if the recording time of the camera module is prolonged by a third preset time and no personnel detection event is received within the third preset time, controlling the camera module to finish recording.
12. The method of any one of claims 1, 2, 3, 4, 7, 8 and 9, further comprising:
receiving a setting instruction aiming at the security equipment;
responding to the setting instruction, and controlling the security equipment to synchronously update based on the setting in the setting instruction;
when the communication module is in a first working mode or a third working mode, the security equipment is synchronously updated; when the communication module is in a second working mode, the security equipment receives the trigger event or responds to the setting instruction every fourth preset time.
13. The method of claim 12, wherein the setting instructions are for the camera module, the setting instructions being for setting operating parameters of the camera module;
and/or
The setting instruction is used for setting the linkage condition and the linkage operation of the security equipment.
14. The method of any one of claims 1, 2, 3, 4, 7, 8 and 9, further comprising:
obtaining a plurality of historical trigger distance values and/or a humanoid detection result of each historical trigger distance value, and determining a target trigger distance value according to the plurality of historical trigger distance values and/or the humanoid detection results of the historical trigger distance values.
15. A communication module, comprising: a control module and a communication module;
the control module is used for executing the method for controlling the security equipment according to any one of claims 1 to 14; the communication module is used for providing a network for the security equipment.
16. A computer-readable storage medium, characterized in that a computer program code is stored in the computer-readable storage medium, which computer program code when executed implements the method for controlling a security device according to any one of claims 1 to 14.
CN202110929241.4A 2021-07-08 2021-08-13 Method and device for controlling security equipment Pending CN115941882A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110929241.4A CN115941882A (en) 2021-08-13 2021-08-13 Method and device for controlling security equipment
CN202280048533.XA CN117730524A (en) 2021-08-13 2022-07-07 Control method and system
PCT/CN2022/104406 WO2023280273A1 (en) 2021-07-08 2022-07-07 Control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110929241.4A CN115941882A (en) 2021-08-13 2021-08-13 Method and device for controlling security equipment

Publications (1)

Publication Number Publication Date
CN115941882A true CN115941882A (en) 2023-04-07

Family

ID=86647763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110929241.4A Pending CN115941882A (en) 2021-07-08 2021-08-13 Method and device for controlling security equipment

Country Status (1)

Country Link
CN (1) CN115941882A (en)

Similar Documents

Publication Publication Date Title
US10872231B2 (en) Systems and methods of activity based recording for camera applications
US20190235617A1 (en) Power-Optimized Image Capture and Push
US11743578B2 (en) Systems and methods of power-management on smart devices
CN109920418B (en) Method and device for adjusting awakening sensitivity
US10581872B1 (en) Service authorization for IoT devices operating locally
CN107920231B (en) Video call system and control method thereof
WO2016045525A1 (en) Method and apparatus for processing state of terminal
US9648289B1 (en) Doorbell-triggering method
US20230016900A1 (en) Anomalous path detection within cameras' fields of view
WO2023034169A1 (en) Camera operating system and method
WO2023015152A1 (en) Systems and methods for on-device person recognition and provision of intelligent alerts
CN115941882A (en) Method and device for controlling security equipment
CN111447422A (en) Audio and video data acquisition method and device and computer equipment
CN116132740A (en) Energy saving method and device for video watching equipment, video watching equipment and readable storage medium
KR100923747B1 (en) Apparatus and method for controllign low power security system
CN112867104A (en) Method and apparatus for saving device power consumption
US11283642B2 (en) Event management method and event management device
CN114697605A (en) Video dynamic acquisition method, device and system, image acquisition equipment and medium
CN116582650A (en) Image display method, system and device and electronic equipment
US20230068136A1 (en) Electronic Monitoring System Implementing Coordinated Waking of Wireless Battery-Powered Monitoring Devices
CN115277931B (en) Information presentation method, information presentation device, and storage medium
CN116405749B (en) Door lock monitoring device, door lock system and implementation method for low-power-consumption continuous video recording
CN116347165B (en) Display control method, electronic device and readable storage medium
US10832543B2 (en) Activity sensor
CN211296789U (en) Intelligent monitoring screen

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination