CN117037333A - Function management method, device, equipment and medium of intelligent door lock - Google Patents

Function management method, device, equipment and medium of intelligent door lock Download PDF

Info

Publication number
CN117037333A
CN117037333A CN202310991400.2A CN202310991400A CN117037333A CN 117037333 A CN117037333 A CN 117037333A CN 202310991400 A CN202310991400 A CN 202310991400A CN 117037333 A CN117037333 A CN 117037333A
Authority
CN
China
Prior art keywords
door lock
function
intelligent door
client
target function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310991400.2A
Other languages
Chinese (zh)
Inventor
王妙玉
孔林海
周亮
吴宁泉
欧宝星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Smart Home Co Ltd
Original Assignee
Guangdong Hotata Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Smart Home Co Ltd filed Critical Guangdong Hotata Smart Home Co Ltd
Priority to CN202310991400.2A priority Critical patent/CN117037333A/en
Publication of CN117037333A publication Critical patent/CN117037333A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a function management method, device, equipment and medium of an intelligent door lock. The application belongs to the technical field of intelligent home. The method comprises the following steps: acquiring operation behavior data of a user on the client in the intelligent terminal; determining target functions of the intelligent door lock and/or the client according to the operation behavior data, and optimizing instructions of the target functions; and sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client. Through adopting this scheme, can realize the optimization management to intelligent lock and to the function of customer end according to the operation of user to according to user's demand and hobby, automatic and individualized optimization function makes the user more careful to intelligent lock and to the use of customer end, improves customer's use experience, improves the ease of use and the functional availability of product.

Description

Function management method, device, equipment and medium of intelligent door lock
Technical Field
The application belongs to the technical field of intelligent home, and particularly relates to a function management method, device, equipment and medium of an intelligent door lock.
Background
With the continuous development of internet technology, smart home has gradually been integrated into the living environment of each home with the advantages of safety, convenience, comfort, artistry and the like.
The intelligent door lock is used as one of representative products of intelligent home, and the convenience of people in entering and exiting rooms is greatly improved in the aspect of opening and closing the door lock. Currently, control of the intelligent door lock is often based on default settings. Some manufacturers of smart door locks have gradually tried to control some functions of the door lock, such as opening the door, locking the door, playing an object, etc., by installing a client, such as a smart door lock APP (Application), or an applet, on a smart phone. However, with the gradual increase of the use demands of people on the intelligent door lock and the further increase of the demands on the intelligent degree of the intelligent door lock, the current default function setting of the intelligent door lock and the function setting of the client side cannot meet the use demands of users. Therefore, how to provide an intelligent and personalized intelligent door lock and a client of the intelligent door lock is a technical problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The embodiment of the application aims to provide a function management method, device, equipment and medium for an intelligent door lock, which can solve the problem that the functions of the traditional intelligent door lock and a client are inconvenient to operate only according to default settings, and achieve the optimal management of the functions of the intelligent door lock and the client based on the operation of a user on the client, so that the functions are optimized automatically and individually according to the demands and the favorites of the user, the intelligent door lock and the client are more convenient to use by the user, the use experience of the user is improved, and the usability and the functional practicability of products are improved.
In a first aspect, an embodiment of the present application provides a method for managing functions of an intelligent door lock, where the method is executed by a cloud server; the cloud server is connected with the intelligent terminal and the intelligent door lock, and the intelligent terminal is connected with the intelligent door lock through the client; the method comprises the following steps:
acquiring operation behavior data of a user on the client in the intelligent terminal;
determining target functions of the intelligent door lock and/or the client according to the operation behavior data, and optimizing instructions of the target functions;
And sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
In a second aspect, an embodiment of the present application provides a function management device for an intelligent door lock, where the device is configured on a cloud server; the cloud server is connected with the intelligent terminal and the intelligent door lock, and the intelligent terminal is connected with the intelligent door lock through the client; the device comprises:
the operation behavior data acquisition module is used for acquiring operation behavior data of a user on the client in the intelligent terminal;
the optimization instruction determining module is used for determining target functions of the intelligent door lock and/or the client according to the operation behavior data and optimizing instructions of the target functions;
and the function optimization module is used for sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, and a program or instruction stored on the memory and executable on the processor, the program or instruction implementing the steps of the method according to the first aspect when executed by the processor.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor perform the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and where the processor is configured to execute a program or instructions to implement a method according to the first aspect.
In the embodiment of the application, the operation behavior data of the user on the client side in the intelligent terminal is obtained; determining target functions of the intelligent door lock and/or the client according to the operation behavior data, and optimizing instructions of the target functions; and sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client. The technical scheme provided by the application can realize that the target function required to be optimized for the user is determined based on the operation behavior data of the user on the client, and the target function is optimized on the intelligent door lock or the client.
Drawings
Fig. 1 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application;
fig. 2 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application;
fig. 3 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application;
fig. 4 is a schematic diagram of a lock end verification process of an intelligent door lock according to an embodiment of the present application;
fig. 5 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application;
fig. 6 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application;
fig. 7 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a function management device of an intelligent door lock according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the following detailed description of specific embodiments of the present application is given with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the matters related to the present application are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are obtained by a person skilled in the art based on the embodiments of the present application, fall within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The method, the device, the equipment and the medium for managing the functions of the intelligent door lock provided by the embodiment of the application are described in detail through specific embodiments and application scenes thereof by combining the attached drawings.
Fig. 1 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application. The method is executed by a cloud server; the cloud server is connected with the intelligent terminal and the intelligent door lock, and the intelligent terminal is connected with the intelligent door lock through the client. As shown in fig. 1, the method specifically comprises the following steps:
s101, operation behavior data of a user on the client side in the intelligent terminal are obtained.
Firstly, the usage scenario of the scheme can be a scenario of performing functional configuration on the intelligent door lock, especially a scenario of further perfecting the function of the intelligent door lock according to the requirement of a user in the process of or after the user operates the client.
Based on the above usage scenario, it can be understood that the execution subject of the present application may be a cloud server, and in addition, if the function auto-configuration program for implementing the method is set in other intelligent terminals, such as a desktop computer, a smart phone, etc., the execution subject for implementing the present scheme may also be used, so that no excessive limitation is made here.
The intelligent terminal can be terminal equipment for performing functional test or use on the intelligent door lock by a user through scanning a two-dimensional code or a bar code of the intelligent door lock, for example, the intelligent terminal can be a smart phone, a tablet personal computer, a desktop personal computer and the like of the user, and the intelligent door lock is only illustrated by taking the smart phone as an example.
After the smart phone is connected with the intelligent door lock through the small program of the intelligent door lock or the client, the smart phone and the intelligent door lock can be connected to the cloud server. The cloud server may be used to provide access pages for clients and may provide remote services for smart door locks, such as remote firmware downloads, remote communications for smart door lock chips, and the like. It can be understood that the client may be an intelligent door lock client for controlling an intelligent door lock, or may be an integrated client for controlling the intelligent door lock, other intelligent home appliances other than the intelligent door lock, and intelligent home appliances. This is not overly limited herein.
Because the user has carried out the code scanning binding with the intelligent door lock through the intelligent mobile phone, the user can display the picture information for the current intelligent door lock provided by the cloud server after opening the client. The user may perform a corresponding operation based on the screen information, for example, the user may perform an opening operation on a control component of some functions to open the functions.
It can be appreciated that the operational behavior data of the user may be collected based on the client of the smart phone. Specifically, the data embedding can be performed for the operation behaviors of the user, and the operation behavior data of the user is recorded. The operational behavior data herein may include both forward behavior and reverse behavior.
The forward behavior may be an action that the user gradually realizes the requirement according to the functional design, for example, the forward behavior may include: the function names used, such as temporary passwords, active defenses, do not disturb modes, child modes, care reminders, snapshot settings, push settings, volume settings, defense setting modes, double verification, holiday modes and the like, the use time, the use times, the frequency, function options, such as the selection of high, medium and low setting items of door lock opening and alarm prompt volume, page stay time, page jump path sequences and the like. It will be appreciated that by acting in the forward direction, specific functions may be implemented.
The reverse behavior may be all behavior that represents actions that the user either ceases operation or does not meet the demand. For example, the reverse behavior may include: when the APP is operated by a user, the page is wrongly prompted by the system, such as page jump points, operation time, the number of times of errors, error types and the like. It will be appreciated that by reversing the behavior, it is possible to infer the specific function that the user wants to implement.
In this embodiment, optionally, the operation behavior data includes: the method comprises the steps of at least one of the frequency of function use of the client, the function setting of the client, the depth of a function operation path of the client, the stay time of an operation path page of the function of the client, the number of times of function operation errors of the client and the type of the function operation errors of the client.
In the scheme, the acquired data can be uploaded to the cloud server for storage and processing in real time or periodically.
And acquiring original information such as user use time, frequency, operation route sequence and the like, and acquiring functions such as function use preference, function setting preference, function use difficulty information and high-frequency abnormality or failure in the client through big data aggregation, association analysis and time sequence analysis. This step may be implemented by running a data analysis module on the cloud server. The data analysis module may be a tool provided by a third party platform or a self-developed algorithm. The data analysis module can perform operations such as cleaning, statistics, clustering, classification, association analysis and the like on the collected data to obtain various indexes and rules.
S102, determining target functions of the intelligent door lock and/or the client according to the operation behavior data and optimizing instructions of the target functions.
Here, it can be understood that, according to the operation behavior data, an optimization mode of a certain target function of the intelligent door lock can be determined, and an optimization instruction is obtained; according to the operation behavior data, an optimization mode of a certain target function of the client can be determined, and an optimization instruction is obtained; and the optimization mode of a certain target function of the intelligent door lock and the client can be determined simultaneously according to the operation behavior data to obtain an optimization instruction. For example, the prompt tone volume of the intelligent door lock is set, the display position of the unlocking case of the client is set, the touch key brightness of the intelligent door lock is set, and the display position of the touch key brightness change-over switch of the client is set.
In an embodiment, the target function may be any one or more functions supported by the intelligent door lock, such as a voice broadcast function after unlocking, a password entry function, and the like.
The optimization instruction of the target function can be instruction content for opening or closing the target function. However, the present solution is not limited to this, and other configurations of the target function may be used, for example, an activation manner of the target function, a setting convenience degree of the target function, and the like.
It will be appreciated that the present solution may determine the optimization instructions of the intelligent door lock target function based on the operational behavior data by means of intelligent algorithms, such as big data models, artificial intelligence models, or some statistical rules, etc. For example, through collected original information such as user use time, frequency, operation path sequence and the like, the function use preference, function setting preference and the like of the user on the intelligent door lock are obtained through big data aggregation, association analysis and time sequence analysis. The scheme can obtain the target function of the intelligent door lock and the optimization instruction for the target function based on the target function. For example, the default activation of the target function is by clicking three cursor keys at the same time, but since the user tends to turn the function on or off frequently, the activation may be set to click one cursor key, or the target function may be activated by a right swipe gesture over the cursor key, and the target function may be turned off by a left swipe gesture.
In another embodiment, the target function may be any one or more functions supported by the client, such as a remote unlocking function in the client, a password modification function, and the like.
The optimization instruction of the target function may be instruction content that optimizes a display position, an operation path depth, and the like of the target function in the client. The present solution is not limited thereto but may be other configurations of the target function, such as addition or cancellation of the target function, and the like.
The specific determination manner may refer to the above, and will not be described herein.
It is understood that the optimization instruction may be generated at the cloud server and sent by the cloud server to the client or the smart door lock to instruct the client or the smart door lock to optimize the target function.
S103, sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
In one embodiment, the information transmission mode between the cloud server and the intelligent door lock can be indirectly forwarded by adopting a client, or can be directly transmitted. After receiving the optimizing instruction, the intelligent door lock can analyze the target function pointed by the optimizing instruction and the optimizing mode of the target function. For example, conventional optimization instructions may be optimization with respect to target functions being turned on or off, etc. Some more complex optimization instructions may be to reorder the priorities of the target functions, simplify the operation mode, or optimize the switching control among multiple functions. For example, if the target function is a prompt tone of voice broadcasting "unlock successfully and welcome home", the optimization instruction of the target function may include turning on or off the prompt tone, or volume adjustment. In addition, the setting of the opening mode, the setting of the closing mode, and the setting of the volume adjustment mode of the alert tone may be set, for example, when the user slides left by a gesture command, the user opens the device, slides right, closes the device, slides up, increases the volume, and slides down, etc. It can be understood that if the gesture instruction for left sliding, right sliding, up sliding, and down sliding is originally used for performing the switching function of the multiple unlocking modes, the switching function of the multiple unlocking modes may be switched to the voice broadcasting function based on the target function of the preference of the current user, that is, the voice broadcasting function. For example, in the present scenario, the unlocking mode commonly used by the user is often fingerprint unlocking, and for the switching of the unlocking mode, simple switching operation is not suitable, but the flexible control of the target function can be realized through the determination and optimization of the target function favored by the user. The scheme is set in this way, and the personalized setting of the intelligent door lock can be improved.
In another embodiment, the cloud server may optimize the client function according to the analysis result of the operation behavior data, so as to improve usability of the client target function. This step may be implemented by updating or adjusting the target function interface and logic on the client.
Specifically, for example, according to the use frequency and the popularity of the target functions, the ordering and the display mode of the target functions are adjusted; simplifying or guiding the operation flow of a user according to the use difficulty level and the operation path of the target function; according to the target function used by the user at low frequency, part of functions and the like can be added or deleted at the client; updating a recommendation system strategy according to the target function setting preference, optimizing a product default setting item, and timely pushing the product default setting item to an intelligent door lock. For example, in the state of the smart phone wake-up networking, the Wi-Fi (Wireless Fidelity, wireless fidelity network) module of the smart door lock receives an optimization instruction issued by the cloud server to adjust relevant settings of the smart door lock.
In addition, for the target function of high-frequency errors, the target function can be pushed to relevant personnel such as products, operation and maintenance, after-sales personnel and the like for timely processing.
The scheme utilizes the data embedding point and big data analysis technology, can effectively utilize the operation behavior data of the user, optimizes the function of the client, and improves the user experience and satisfaction; according to the scheme, the target function of the client can be optimized in a customized mode according to the characteristics and requirements of different user groups and scenes, and the product competitiveness is enhanced. The scheme can realize real-time and dynamic optimization of the client function, and timely respond to market change and user feedback.
In some specific examples, the scheme can actively push the optimal configuration strategy to the intelligent door lock according to big data analysis of the cloud server. For example, updating default high, medium, and low volume settings of the intelligent door lock according to the zone characteristics; starting a night mute mode under the condition that the user returns home later; reminding and starting the user in the holiday in advance for the user who is used to use the holiday mode; and opening a care mode for a user with a child in the home to remind the child whether to go home in time, and the like. If the intelligent door lock with the screen is provided, push information can be displayed on the screen. The lock without the screen can be pushed by voice broadcasting or client information to remind the user.
The technical scheme provided by the embodiment of the application can realize that the target function required to be optimized for the user is determined based on the operation behavior data of the user on the client, and the target function is optimized on the intelligent door lock or the client.
Fig. 2 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application. As shown in fig. 2, the method specifically comprises the following steps:
s201, operation behavior data of a user on the client in the intelligent terminal is obtained.
The operation behavior data may be usage operation data, setting operation data, and searching operation data of each function in the client, where the usage operation data, setting operation data, and searching operation data are collected by burying points for the operation behavior data of the client.
The usage operation data of each function may include data such as the number of times each function is used, the duration of use, and the like. The setting operation data may include data for setting one or more functions, such as setting a reminder content, a reminder volume, etc. of the broadcast function. The search operation data may include function data input and searched in a search field, such as a search unlocking function, a photographing function, and the like in the search field.
S202, determining preference attributes of the functions in the client according to the using operation data, the setting operation data and the searching operation data of the functions in the client in the operation behavior data.
After the usage operation data, the setting operation data, and the lookup operation data are acquired, the preference attribute of the user for each function may be determined according to one or more of them. The preference attribute may be a score of the function preference, specifically, may be determined according to a proportion of the number of times that a certain function is used in the total number of times that the user opens the client, or a duration of using the function, or may be determined by a setting operation for the function, or may be determined according to a search operation that the user inputs a certain function in a search field to confirm and use.
It will be appreciated that the preference attribute may also contain other information, for example, the time of issuance of the user's operational behaviour data, and that in the presence of a variety of information, the smaller the time of issuance and the current time span, the higher the weighting of the settings to ensure that the determined preference attribute, and the manner of optimization determined based thereon, is more consistent with the current needs of the user.
S203, determining a target function of the client and an optimization instruction of the target function according to the preference attribute.
After obtaining the preference attribute, a target function of the client and an optimization manner for the target function can be determined based on the preference attribute.
For example, after the user opens the client multiple times, for use of a certain function, there is always a case of multiple false touches, and then the preference attribute of the user can be determined. And the optimization mode determined based on the preference attribute is to enlarge the size of the component of the target function in the client so as to improve the probability of accurate clicking of the user and improve the use experience of the user.
In the scheme, specifically, after the original information such as the use time, the frequency and the operation route sequence of the user is collected, big data aggregation, association analysis and time sequence analysis can be adopted to obtain functions such as function use preference, function setting preference, function use difficulty information, high-frequency abnormality or failure in the intelligent door lock App. Wherein the function use difficulty level information can be determined based on the size of the depth of the operation path of the function and the size of the complexity of the function operation.
The corresponding operation can be realized by running a data analysis module on the cloud server. The data analysis module may be a tool provided by a third party platform or a self-developed algorithm. The data analysis module can perform operations such as cleaning, statistics, clustering, classification, association analysis and the like on the collected data to obtain various indexes and rules.
S204, sending an optimization instruction to the client to optimize the target function of the client.
Specifically, the function ordering and the display mode are adjusted according to the function use preference and the function setting preference. And simplifying or guiding the operation flow of the user according to the difficulty level of the function and the operation path. Depending on the functions used by the user at low frequencies, it is also possible to consider that APP adds or deletes part of the functions, etc.
According to the technical scheme provided by the embodiment, the system strategy of the client is updated according to the function setting preference, the default setting of the client is optimized, and the client can be timely pushed to the intelligent door lock. In addition, the high-frequency error function can be pushed to related personnel such as products, operation and maintenance, after-sales personnel and the like for timely processing.
In the above scheme, the users can be further divided into different groups by machine learning or deep learning, such as a K-means algorithm in a clustering algorithm, so as to conduct intra-group recommendation.
Meanwhile, a large amount of user behaviors and interest data can be analyzed through a collaborative filtering algorithm, similar users or similar articles are detected, and mutual recommendation is performed. In this way, the user behavior is predicted and recommended, and more personalized and intelligent service is provided for the user;
in the process of optimizing the functions of the client, different optimization schemes can be evaluated and compared through methods such as an A/B test or a multi-version test, and the optimal scheme is selected for implementation. For example, a/B testing or multi-version testing is an important means of website optimization and user experience enhancement. It selects the best solution by testing different product designs in different user groups and then comparing the respective effects.
In the process of optimizing and upgrading, the App function can be optimized in an online updating or hot repairing mode, and normal use of a user is prevented from being influenced. In the running process of the APP, the on-line Update (Online Update) means that the APP is repaired by checking the Update on line and downloading the patch package, and the APP does not need to be exited and the equipment is restarted. The common technical scheme comprises incremental updating, multiple DEX support, an Android hot updating scheme based on Tinker and the like. Thermal fix (Hotfix) refers to repairing running APP program code without requiring an APP to be retired and restarted. Common technical solutions include an AndFix thermal repair framework, a Robust repair framework, and other open source thermal repair solutions. Meanwhile, the method can be used for rapidly diagnosing and analyzing the faults of the product according to the analysis result of the user behaviors.
On the basis of the above embodiments, optionally, after determining the target function of the client according to the preference attribute, the method further includes:
determining a first optimization instruction of the target function of the client according to the preference attribute and a second optimization instruction of the related function of the intelligent door lock when the related function of the intelligent door lock related to the target function of the client exists; and distributing the first optimizing instruction and the second optimizing instruction.
After determining the target function of the client according to the preference attribute, it can be identified whether the target function has a relevant function in the intelligent door lock. For example, the target function is a setting of the prompt tone volume, the intelligent door lock can also comprise a relevant function corresponding to the target function through recognition, for example, prompt tone volume adjustment of the intelligent door lock is determined, then the relevant function of the intelligent door lock can be determined at the same time as the target function of the client based on the preference attribute, a first optimized instruction of the target function of the client such as forward movement of a display position is determined based on the preference attribute, and a second optimized instruction of the relevant function of the intelligent door lock such as being related to an existing physical key is determined, so that the prompt tone volume can be quickly adjusted through the physical key, or the grade of the prompt tone volume can be quickly determined through a digital key of the intelligent door lock.
After determining the first optimization instruction and the second optimization instruction, the first optimization instruction and the second optimization instruction may be issued based on the communication protocol, respectively. In the issuing process, the issuing object of each optimizing instruction needs to be defined, specifically, object fields can be set in the first optimizing instruction and the second optimizing instruction, for example, writing 00 in the object fields is denoted as a client, and writing 01 is denoted as an intelligent door lock. After the object is explicitly issued, the first optimizing instruction and the second optimizing instruction are issued to the client and the intelligent door lock respectively according to the connection relation, so that the client and the intelligent door lock can complete optimization of the target function based on the first optimizing instruction and the second optimizing instruction.
The method has the advantages that according to the functional association of the client and the intelligent door lock, after the operation behavior data are identified, the client and the intelligent door lock can be simultaneously optimized based on the association, the optimized effect is improved, the setting or the embodiment of the functions of the client and the intelligent door lock are more in line with the use requirement of a user, the customized service for the user is realized, and the use experience of the user is improved.
In this embodiment, optionally, determining, according to the preference attribute, a target function of the client, and an optimization instruction of the target function, including:
Determining a function with a preference score greater than a first set threshold value in the preference attribute as a target function;
extracting the display position of the target function in the client;
generating a display position adjustment instruction of the target function under the condition that the display position of the target function meets a first adjustment condition;
or,
determining a function with a preference score greater than a second set threshold in the preference attribute as a target function;
an operation path in the client for the target function;
generating a path simplifying instruction of the target function under the condition that the operation path of the target function meets a second adjustment condition;
or,
and determining the function with the preference score smaller than the third set threshold value in the preference attribute as a target function, and generating a deleting instruction of the target function.
In this scenario, the preference score may be used to indicate how much the user prefers the current target function, and if this function is used frequently, the preference score will be higher, and if it is used rarely or never, the preference score will be lower.
In one case, a function that is greater than the first set threshold may be determined to be the target function, e.g., the first set threshold is 80 points, e.g., the current client has ten functions, where two functions have preference scores greater than 80 points, and then the two functions may be determined to be target functions.
Further, the display position of the target function in the client can be extracted, and whether the display position of the target function needs to be adjusted or not can be further identified. For example, one of the two target functions is displayed relatively forward and the other is displayed very backward. In this case, an optimization instruction of the target function may be generated to optimize the icon display position of the target function at a later time, for example, to adjust to a top page display at the client, or to perform a top-up display in a page of the client, so as to facilitate the operation of the user.
In another case, a function that is greater than the second set threshold may be determined as the target function, e.g., the second set threshold is 70 points, e.g., the current client has ten functions, where three functions have preference scores greater than 70 points, and then the three functions may be determined as target functions.
Further, an operation path of the target function in the client may be extracted, thereby identifying whether the operation path of the target function needs to be adjusted. For example, of three target functions, two of the operation paths are relatively short, e.g., the function control page can be reached by one click operation in the client, and the other operation path is relatively long, e.g., the function control page can be reached by four to six click operations in the client. In this case, an optimization instruction of the target function may be generated to optimize the operation path of the target function having a longer operation path, for example, to adjust to reach the function control page by one click operation, so as to facilitate the operation of the user.
In another case, a function less than the third set threshold may be determined as the target function, e.g., the third set threshold is 10 points, e.g., the current client has ten functions, where two functions have preference scores less than 10 points, and then the two functions may be determined as target functions.
Further, it is determined to delete the two functions in the client according to the use condition of the two functions. Therefore, the client interface can be simplified, and the user can use the client conveniently.
It will be appreciated that the first set threshold and the second set threshold may be the same or different and have no fixed size relationship. While the third set threshold is theoretically smaller, it will be smaller than the first set threshold and the second set threshold.
It can be understood that the determination manner of the target function provided by the scheme is determined based on the embodiment of all the functions, and in some schemes, a certain function operated by a user can be determined as the target function, so as to identify whether the target function operated currently needs to be optimized. Since the optimization and determination of the method are also understood to be within the scope of the present solution, the method is not limited and described in detail herein.
The embodiment can give a more specific determination mode of the optimization instruction of the target function of the client, and can improve the use experience of the client through the optimization. The basis of the optimization is the operation behavior data of the user, so that the client after the optimization can better meet the use requirement of the user, the requirement degree of the user on various functions is met, and the use effect of one touch is nearly achieved.
Fig. 3 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application. As shown in fig. 3, the method specifically comprises the following steps:
s301, operation behavior data of a user on the client side in the intelligent terminal are obtained.
S302, determining the use requirement attribute of each function in the intelligent door lock according to remote control operation data, set operation data and check operation data of each function in the intelligent door lock in the operation behavior data.
The remote control data may include remote unlocking of the intelligent door lock, and remote control of certain functions of the intelligent door lock. The remote control operation data can be transmitted to the intelligent door lock through the cloud server. In addition, a connection, such as a public network connection or a bluetooth connection, may be established between the smart terminal where the client is located and the smart door lock through short-range transmission.
The setting operation data may be an operation to set some functions of the intelligent door lock. Such as the setting of the volume of the alert tone. The viewing operation data may be to view the status of some functions of the intelligent door lock, etc., such as whether the intelligent door lock is in an open state, whether a broadcast function of the intelligent door lock is opened, etc.
In the scheme, the use requirement attribute of the user for the function of the intelligent door lock can be determined based on the various operation behavior data. The usage requirement attribute may include a value of usage requirement degree for various functions of the intelligent door lock, and may further include other information.
S303, determining a target function of the intelligent door lock and an optimization instruction of the target function according to the use requirement attribute.
The determining manner and the optimizing manner of the target function of the client according to the embodiment can be referred to. And will not be discussed in detail herein.
S304, sending an optimization instruction to the intelligent door lock so as to optimize the target function of the intelligent door lock.
The technical scheme is set in such a way, a determination mode of the target function of the intelligent door lock can be provided, and the optimization mode of the target function of the intelligent door lock is determined based on the use requirement attribute, so that the use experience of a user on the intelligent door lock can be improved, the usability of the intelligent door lock is improved, the target function can be optimized in a personalized mode, and the convenience of the user in the use process is improved.
On the basis of the above technical solution, optionally, after determining the target function of the intelligent door lock according to the usage requirement attribute, the method further includes:
determining a third optimization instruction of the target function of the intelligent door lock according to the use requirement attribute and a fourth optimization instruction of the relevant function of the client in the condition that the relevant function of the client associated with the target function of the intelligent door lock exists; and distributing the third optimization instruction and the fourth optimization instruction.
After determining the target function of the intelligent door lock according to the use requirement attribute, whether the target function has a relevant function at the client can be identified. For example, the target function is a setting of a password input mode, by identifying that the client may also include a related function corresponding to the target function, for example, a password switching function, then the related function of the client may be determined based on the use requirement attribute while the target function of the intelligent door lock is determined, and a third optimizing instruction for the target function of the intelligent door lock is determined based on the use requirement attribute, for example, the password input mode is set to be fingerprint input, and a fourth optimizing instruction for the related function of the client is determined, for example, the display position of a functional component of the password switching function is moved forward, or the setting path of the password switching function is reached by the original four-click operation to be reached by the simplified one-click operation.
After determining the third optimization instruction and the fourth optimization instruction, the third optimization instruction and the fourth optimization instruction may be issued based on the communication protocol, respectively. In the issuing process, the issuing object of each optimizing instruction needs to be defined, specifically, object fields can be set in the third optimizing instruction and the fourth optimizing instruction, for example, writing 01 in the object fields is indicated as an intelligent door lock, and writing 00 is indicated as a client. After the object is explicitly issued, a third optimization instruction and a fourth optimization instruction are issued to the intelligent door lock and the client according to the connection relation, so that the intelligent door lock and the client can complete optimization of the target function based on the third optimization instruction and the fourth optimization instruction.
The intelligent door lock and the intelligent door lock have the advantages that according to the functional association of the client and the intelligent door lock, after the operation behavior data are identified, the intelligent door lock and the client can be simultaneously optimized based on the association, the optimized effect is improved, meanwhile, the setting or the embodiment of the functions of the intelligent door lock and the client are more in line with the use requirement of a user, the customized service for the user is realized, and the use experience of the user is improved.
Fig. 4 is a schematic diagram of a lockend verification process of an intelligent door lock according to an embodiment of the present application. As shown in fig. 4, the method specifically comprises the following steps:
S401, operation behavior data of the user on the client side in the intelligent terminal are obtained.
S402, determining the use requirement attribute of each function in the intelligent door lock according to remote control operation data, set operation data and check operation data of each function in the intelligent door lock in the operation behavior data.
S403, determining the target function of the intelligent door lock according to the use requirement attribute.
S404, identifying whether the target function is a configured function of the intelligent door lock.
It can be appreciated that if the function is a configured function, the optimization instruction of the target function can be further determined, and the optimization instruction is sent to the intelligent door lock, so as to optimize the target function of the intelligent door lock.
S405, if not, identifying whether the target function is a hardware support function of the intelligent door lock.
Generally, the hardware of the intelligent door lock comprises five components, namely a shell, a lock body, a control panel, a power supply and a sensor. Specifically, the shell of the intelligent door lock is an external shell for protecting the lock body and the control panel, so that the lock body and the control panel can be prevented from being damaged and maliciously attacked; the lock body of the intelligent door lock is a part for connecting the door frame and the door leaf and comprises a lock tongue, a lock cylinder, a lock shell and the like; the control panel of the intelligent door lock is a core component for controlling the switch of the lock body and realizing intelligent functions, and comprises a singlechip, a memory, a radio frequency module, power management and the like; the power supply of the intelligent door lock usually adopts a lithium battery, a dry battery or a rechargeable battery and the like, so that the power supply can be provided for the intelligent door lock; intelligent door locks are typically equipped with various sensors, such as fingerprint recognition sensors, such as fingerprint collectors, password entry sensors, such as cursor keys that may be displayed and hidden, card readers, cameras, and human body sensing sensors, etc., for sensing the identity and operation of a user.
After the user purchases the intelligent door lock, the binding between the client and the intelligent door lock can be realized by adopting modes of scanning a two-dimensional code or inputting a device number and the like. After binding is completed, the client can directly extract information such as the model, version and the like of the intelligent door lock, send the information such as the model, version and the like of the intelligent door lock and the target function to the cloud server, the cloud server queries the existing hardware information of the intelligent door lock in the door lock data storage table by taking the information such as the model, version and the like of the intelligent door lock as keywords, queries the required hardware information of the target function in the function data storage table by taking the target function as keywords, and if the cloud server determines that the existing hardware information comprises the required hardware information, the cloud server identifies that the target function is the hardware support function of the intelligent door lock, and if the cloud server does not comprise the hardware support function of the intelligent door lock, the cloud server identifies that the target function is not the hardware support function of the intelligent door lock. For example, the key word identifying the target function is face recognition, the required hardware is determined to be a camera, and if the current intelligent door lock is identified not to include the camera, the target function is determined not to be the hardware support function of the intelligent door lock.
The door lock data storage table can be a relational database table established by taking information such as a door lock model, version, hardware, production date, production batch and the like as fields and taking information such as the model, the version and the like as a main key; the function data storage table may be a relational database table established with the function name as a primary key by taking information such as the function name, function implementation operation, required hardware, and the like as fields. The relational database can be a database which adopts a relational model to organize data, and the data is stored in the form of rows and columns so as to be convenient for users to understand; a field may be a header of each column in the data table; the primary key may be a field or combination of fields that can uniquely represent each record in the data table.
S406, in the case of the hardware support function of the intelligent door lock, configuring the target function for the intelligent door lock.
The cloud server returns the target function record inquired in the function data storage table to the APP, and adds the target function in the existing function list of the intelligent door lock which is bound in the picture information displayed by the APP; and the cloud server opens a hardware (generally a sensor) switch of the intelligent door lock according to the queried hardware information required by the target function, so that the required hardware of the target function can be ensured to normally operate. For example, the target function is face recognition unlocking, and a color camera of the intelligent door lock is opened.
Accordingly, in the case of not being a hardware support function of the intelligent door lock, report information of hardware upgrade of the intelligent door lock may be generated.
The report information of the hardware upgrade of the intelligent door lock can comprise report information generation time, model and version information of the intelligent door lock, a target function name, hardware information required by a target function, existing hardware information of the intelligent door lock, hardware information required to be upgraded, a hardware upgrade scheme and the like. The hardware information to be upgraded can also comprise the number of times that the hardware is generated into an upgrade report on the basis of the information such as the hardware name, the hardware model, the hardware version and the like, so that staff can know the upgrade priority of each hardware, and the hardware with larger upgrade requirement is preferentially upgraded.
According to the technical scheme provided by the embodiment, the target function can be autonomously configured according to the requirement of the user by identifying the target function of the user and identifying whether the intelligent door lock can be directly added with the target function, the use requirement of the user is met, and corresponding information can be generated to provide for staff when the intelligent door lock cannot be configured, so that the intelligent door lock is better improved.
Fig. 5 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application. As shown in fig. 5, the method specifically comprises the following steps:
s501, operation behavior data of a user on the client in the intelligent terminal is obtained.
S502, acquiring locking end operation data acquired by the intelligent door lock.
The lockend operating data may be information including user behavior information and user identity information. The user behavior information may include a user behavior time and a user behavior type; the user identity information may include a user name, a user gender, a user age, and user unlock information. User behavior types can be classified into unlocking, locking, password changing and the like. The user unlocking information may include user fingerprint, user password, user door magnetic card information, user face information, and the like. The user behavior information in the lock end operation data can be acquired by the intelligent door lock, and the user identity information in the lock end operation data can be acquired by retrieving a storage record in the APP.
It will be appreciated that in this embodiment, the execution sequence of the two steps S501 and S502 may be performed separately, or it is also possible to perform S502 and then S501.
S503, determining target functions of the intelligent door lock and/or the client and optimization instructions of the target functions according to the operation behavior data and the locking end operation data.
The cloud server receives lock end operation data sent by the intelligent door lock, judges whether the lock end operation data accords with a function opening condition in operation behavior data, and if so, determines that a function optimization instruction in the operation behavior data is an optimization instruction for a target function of the intelligent door lock. For example, a user performs an operation in an APP, sets "the unlocking prompt volume at night unlocking to be low gear" and sets "the night time to be from the current day 22:00 to the rotation day 5:00", forms a function opening condition together with "the night", "unlocking" and "the night time to be from the current day 22:00 to the rotation day 5:00", and "the unlocking prompt volume is low gear" is a function optimization instruction; user 23:00, unlocking the door lock, wherein the intelligent door lock extracts '23:00' and 'unlocking' as lock end operation data and sends the lock end operation data to the cloud server, and the cloud server judges that the lock end operation data accords with a function unlocking condition in the operation behavior data and determines 'unlocking prompt volume is low-grade' as an optimization instruction for the target function of the intelligent door lock.
S504, sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
After receiving the optimizing instruction, the client and the intelligent door lock change the relevant parameters of the target function according to the optimizing instruction. For example, the intelligent door lock changes the sound volume value of the output sound box to 30%, executes the voice prompt program, and outputs the voice prompt of the output sound box. In addition, the function icons of the voice broadcasting function are set up in the client side.
According to the embodiment, through the arrangement, the control mode of the target function can be comprehensively analyzed based on the data of the user operating at the client and the locking end, so that the function optimization of the intelligent door lock and the client is more reasonable, and the use experience of the user is greatly improved.
Fig. 6 is a flow chart of a method for managing functions of an intelligent door lock according to an embodiment of the present application. As shown in fig. 6, the method specifically comprises the following steps:
s601, operation behavior data of a user on the client in the intelligent terminal is obtained.
S602, acquiring indoor personnel information acquired by the intelligent door lock.
The indoor personnel information may include the number of indoor personnel and user personal information. The user personal information may include user identity information and a user unlock sample. The user identity information may include a user name, a user gender, a user age, a user type, whether the user is indoors, etc. The unlocking sample of the user can comprise user fingerprints, user passwords, user door magnetic card information, user face information and the like which are input when the user uses the intelligent door lock for the first time, and the unlocking sample is used for comparing unlocking information input by the user when unlocking each time so as to realize control of the closing/opening state of the intelligent door lock. The user types can be classified into four stages of children (0-12 years old), teenagers (13-18 years old), adults (18-60 years old) and elderly people (over 60 years old) according to the ages of the users.
In addition, in the process that a person enters the room, image acquisition and recognition are performed on the entered person or persons, whether the person or persons include old people, children and the like is determined, and whether the person or persons include guests can be recognized.
S603, determining target functions of the intelligent door lock and/or the client according to the operation behavior data and optimizing instructions of the target functions.
The cloud server receives lock end operation data sent by the intelligent door lock, judges whether the lock end operation data accords with a function opening condition in operation behavior data, and if so, determines that a function optimization instruction in the operation behavior data is an optimization instruction for a target function of the intelligent door lock. For example, a user performs an operation in an APP, and sets "start child mode when indoor personnel have only children", "only" and "child" together constitute a function start condition, and "start child mode" is a function optimization instruction; after the user performs the locking action, the intelligent door lock extracts the user type and the locking action as locking end operation data and sends the locking end operation data to the cloud server, the cloud server sets whether the user is in an indoor option as no, and when the user type in the indoor is only children, the cloud server judges that the unlocking condition of the function in the operation action data is met, and determines an unlocking child mode as an optimization instruction for the target function of the intelligent door lock.
For example, when guests are included indoors, the opening time of the door lock, the welcome mode and the like are adjusted to meet the use requirements of users facing different people.
S604, sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
After receiving the optimizing instruction, the intelligent door lock changes relevant hardware parameters of the intelligent door lock according to the optimizing instruction and realizes a target function according to a relevant program. For example, the intelligent door lock is prohibited from being opened indoors until the intelligent door lock is closed in a child mode after a user of a user type other than child clicks an "unlock" button on the APP or opens the intelligent door lock by inputting a key, face recognition, or the like.
According to the technical scheme provided by the embodiment of the application, the function of the door lock can be opened or closed according to the information acquisition of indoor personnel, so that the use requirements of users under different conditions are met, and the use experience of the users is improved.
In this embodiment, optionally, acquiring the indoor personnel information acquired by the intelligent door lock includes:
acquiring information of the work and rest states of indoor personnel acquired by the intelligent door lock;
Correspondingly, according to the operation behavior data of the client and the indoor personnel information collected by the intelligent door lock, determining an optimization instruction for the target function of the intelligent door lock comprises the following steps:
and determining an optimization instruction for the target function of the intelligent door lock according to the operation behavior data of the client and the information of the work and rest states of indoor personnel collected by the intelligent door lock.
The work and rest state information can comprise a work and rest state, a weekend rest state and the like, and a time period corresponding to each state. The work and rest state information can be obtained through big data aggregation, association analysis and time sequence analysis based on a large amount of historical locking end operation data.
The cloud server receives lock end operation data sent by the intelligent door lock, judges whether the lock end operation data accords with a function opening condition in operation behavior data, and if so, determines that a function optimization instruction in the operation behavior data is an optimization instruction for a target function of the intelligent door lock. After receiving the optimizing instruction, the intelligent door lock changes relevant hardware parameters of the intelligent door lock according to the optimizing instruction and realizes a target function according to a relevant program.
For example:
The user operates in the APP, and sets the functions of automatically and synchronously opening the hall light after going off duty, and jointly forming the functions of automatically and synchronously opening the hall light after going off duty and unlocking. The condition after work can be obtained according to the information of the work and rest states in the information of the indoor personnel collected by the intelligent door lock.
User is 19:00 unlocking behavior is carried out to the door lock, and the intelligent door lock extracts' 19:00"" unlocking "is lock end operation data and is sent to a cloud server, the cloud server compares the corresponding time periods of the 19:00 and the off-duty state, judges that the lock end operation data accords with the function opening conditions in the operation behavior data, and determines" automatically and synchronously opening the hall light "as an optimization instruction for the target function of the intelligent door lock.
After receiving the optimizing instruction, the intelligent door lock sends the instruction to the indoor hall light control equipment, and the hall light is synchronously started after the light control equipment receives the instruction.
Meanwhile, according to the work and rest states of indoor personnel, for example, when the indoor personnel have had a rest, the atmosphere lamp of the hall is dimmed after the door is opened, and the operations such as closing the door by the welcome or lowering the volume are performed to remind the indoor personnel of the rest, and the interference of light or sound on the indoor personnel having the rest can be avoided.
This scheme can be to the indoor condition of difference through such setting, realizes different settings to the function of intelligent lock to improve user's use experience, ensure that indoor personnel's work and rest can not receive the influence of intelligent lock function.
Fig. 7 is a flowchart of a method for managing functions of an intelligent door lock according to an embodiment of the present application. As shown in fig. 7, the method specifically comprises the following steps:
s701, acquiring a peer authorization instruction of a user to the client in the intelligent terminal.
The peer authorization instruction may be that the user clicks the "add peer" button in the APP, inputs corresponding information in the pop-up blank peer information box, and clicks the "confirm" button after completing the input. The information may include the name, sex, age, etc. of the layperson.
S702, determining an authorization instruction of a temporary key and/or temporary face authority of the intelligent door lock according to the peer authorization instruction.
After detecting the authorization instruction of the peer, the cloud server pops up an input page of the temporary key and/or temporary face information, the peer completes the input operation of the temporary key and/or temporary face information on the page, the cloud server performs authorization operation on the input temporary key and/or temporary face information, and the authorization operation can include, but is not limited to, adding a user, setting a user mode as a temporary user, setting an authorization time period, automatically deleting the temporary user after reaching the authorization time period, and the like. The cloud server determines ' allow the co-person to unlock the door lock ' and ' intelligent door lock voice output ' welcome visit ' "as an optimization instruction for the target function of the intelligent door lock.
S703, sending the optimization instruction to the intelligent door lock through the client, or directly sending the optimization instruction to the intelligent door lock, wherein the optimization instruction is used for enabling the intelligent door lock to execute the operation of allowing unlocking of the door lock on the temporary secret key and/or the temporary face authority within a specified duration.
After the secret key is input and/or face recognition is carried out on the same person, the intelligent door lock sends the input secret key and/or face information to the cloud server, the cloud server compares the input secret key with the temporary secret key, compares the face information with the temporary face information, if the comparison result is consistent, the user who executes unlocking action is judged to be the same person, and the intelligent door lock is opened and outputs voice to welcome visit.
The technical scheme provided by the embodiment of the application can make more optimized improvement aiming at the scene of temporary authorization for the fellow passenger, ensures the privacy safety of the intelligent door lock of the user, simultaneously can provide a convenient fellow passenger authorization mode for the user, improves the operation convenience and ensures the privacy and the safety.
On the basis of the above technical solutions, optionally, after determining a target function of the intelligent door lock and/or the client according to the operation behavior data, and an optimization instruction of the target function, the method further includes:
Acquiring user data of a user of a current client;
identifying a target group of guests associated with the user data;
and sending an optimization instruction to the intelligent door locks and/or clients of all users in the target guest group.
In the process that the user uses the door lock through the client, personal information of the user, namely user data, can be acquired based on a predetermined authorization range. For example, geographical location data, family member data, commute time data, living data, and other life habit data of the user may be included. After the user data is obtained, the guest group of the user may be determined based on the user data.
Here, the guest group may be divided in various ways, for example, users in jingjing may be divided into northern living guest groups, and users in northern wide depths may be divided into guest groups in first line cities. Thus, the same user may be divided among different groups of guests based on different data. Here, the partition manner and the partition result of the guest group may be determined in advance, and the present solution only needs to obtain the corresponding data.
For example, in combination with the current user data, the guest group 1 to which the user belongs is determined as the target guest group. After determining the target function of the intelligent door lock and/or the client and the optimization instruction of the target function, the optimization instruction can be pushed to clients or intelligent door locks of all users in a target guest group for function optimization.
According to the scheme, the personalized App is obtained by analyzing each user, the optimized App can be pushed to the corresponding group according to the analysis of each user, namely, all users of the target guest group, for example, 70% of iPhone users in the north prefer to set the unlocking volume to be low (default set to be medium) after the intelligent door lock is bound, and the unlocking volume default mode of the optimized App can be modified to be low after the intelligent door lock is bound by the same newly added user in the later stage.
Through the setting, individual-to-group preference recommendation can be performed based on user data of a current user, change of default function parameters can be achieved, the acceptance degree of the user on recommendation results can be improved, each recommendation is attached to the use requirement of the user as much as possible, triggering based on operation behavior data of the user is not needed, and setting of an intelligent door lock and a client is more intelligent for the user. Meanwhile, the degree of meeting the user demands of the default mode can be improved, and the use experience of the user is improved.
Fig. 8 is a schematic structural diagram of a function management device of an intelligent door lock according to an embodiment of the present application. The device is configured on the cloud server; the cloud server is connected with the intelligent terminal and the intelligent door lock, and the intelligent terminal is connected with the intelligent door lock through the client; as shown in fig. 8, the method specifically includes the following steps:
An operation behavior data obtaining module 801, configured to obtain operation behavior data of a user on the client in the intelligent terminal;
an optimization instruction determining module 802, configured to determine a target function of the intelligent door lock and/or the client according to the operation behavior data, and an optimization instruction of the target function;
and the function optimization module 803 is configured to issue an optimization instruction to the intelligent door lock and/or the client to optimize a target function of the intelligent door lock and/or the client.
According to the technical scheme provided by the embodiment of the application, the operation behavior data of the user on the client in the intelligent terminal is obtained; determining target functions of the intelligent door lock and/or the client according to the operation behavior data, and optimizing instructions of the target functions; and sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client. The technical scheme provided by the application can realize that the target function required to be optimized for the user is determined based on the operation behavior data of the user on the client, and the target function is optimized on the intelligent door lock or the client.
The function management device of the intelligent door lock in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a cell phone, tablet computer, notebook computer, palm computer, vehicle mounted electronic device, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device may be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and embodiments of the present application are not limited in particular.
The function management device of the intelligent door lock in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an iOS operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The function management device of the intelligent door lock provided by the embodiment of the application can realize each process realized by the embodiment of the method, and in order to avoid repetition, the description is omitted.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 9, the embodiment of the present application further provides an electronic device 900, which includes a processor 901, a memory 902, and a program or an instruction stored in the memory 902 and capable of running on the processor 901, where the program or the instruction implements each process of the above-mentioned embodiment of the function management method of the intelligent door lock when executed by the processor 901, and the process can achieve the same technical effect, so that repetition is avoided, and no further description is given here.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device.
The embodiment of the application also provides a readable storage medium, wherein the readable storage medium stores a program or an instruction, and the program or the instruction realizes each process of the functional management method embodiment of the intelligent door lock when being executed by a processor, and can achieve the same technical effect, so that repetition is avoided and redundant description is omitted.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, the chip comprises a processor and a communication interface, the communication interface is coupled with the processor, the processor is used for running programs or instructions, the processes of the functional management method embodiment of the intelligent door lock can be realized, the same technical effects can be achieved, and the repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.
The foregoing description is only of the preferred embodiments of the application and the technical principles employed. The present application is not limited to the specific embodiments described herein, but is capable of numerous modifications, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit of the application, the scope of which is set forth in the following claims.

Claims (12)

1. The function management method of the intelligent door lock is characterized in that the method is executed by a cloud server; the cloud server is connected with the intelligent terminal and the intelligent door lock, and the intelligent terminal is connected with the intelligent door lock through the client; the method comprises the following steps:
acquiring operation behavior data of a user on the client in the intelligent terminal;
determining target functions of the intelligent door lock and/or the client according to the operation behavior data, and optimizing instructions of the target functions;
and sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
2. The method of claim 1, wherein determining a target function of the client from the operational behavior data, and an optimization instruction for the target function, comprises:
determining preference attributes of each function in the client according to using operation data, setting operation data and searching operation data of each function in the client in the operation behavior data;
and determining a target function of the client and an optimization instruction of the target function according to the preference attribute.
3. The method of claim 2, wherein determining the target function of the client based on the preference attribute, and the optimization instructions for the target function, comprises:
determining a function with a preference score greater than a first set threshold value in the preference attribute as a target function;
extracting the display position of the target function in the client;
generating a display position adjustment instruction of the target function under the condition that the display position of the target function meets a first adjustment condition;
or,
determining a function with a preference score greater than a second set threshold in the preference attribute as a target function;
Extracting an operation path of the target function in the client;
generating a path simplifying instruction of the target function under the condition that the operation path of the target function meets a second adjustment condition;
or,
and determining the function with the preference score smaller than the third set threshold value in the preference attribute as a target function, and generating a deleting instruction of the target function.
4. The method of claim 2, wherein after determining the target function of the client based on the preference attribute, the method further comprises:
determining a first optimization instruction of the target function of the client according to the preference attribute and a second optimization instruction of the related function of the intelligent door lock when the related function of the intelligent door lock related to the target function of the client exists; and distributing the first optimizing instruction and the second optimizing instruction.
5. The method of claim 1, wherein determining a target function of the intelligent door lock based on the operational behavior data, and an optimization instruction for the target function, comprises:
determining the use requirement attribute of each function in the intelligent door lock according to remote control operation data, set operation data and check operation data of each function in the intelligent door lock in the operation behavior data;
And determining a target function of the intelligent door lock and an optimization instruction of the target function according to the use requirement attribute.
6. The method of claim 5, wherein after determining an optimization instruction for a target function of a smart door lock based on the operational behavior data, the method further comprises:
identifying whether the target function is a configured function of the intelligent door lock;
identifying whether the target function is a hardware support function of the intelligent door lock if the target function is not a configured function of the intelligent door lock;
and in the case of a hardware support function of the intelligent door lock, configuring the target function for the intelligent door lock.
7. The method of claim 5, wherein after determining the target function of the intelligent door lock based on the usage demand attribute, the method further comprises:
determining a third optimization instruction of the target function of the intelligent door lock according to the use requirement attribute and a fourth optimization instruction of the relevant function of the client in the condition that the relevant function of the client associated with the target function of the intelligent door lock exists; and distributing the third optimization instruction and the fourth optimization instruction.
8. The method according to claim 1, wherein prior to determining a target function of the smart door lock and/or the client from the operational behavior data, and an optimization instruction of the target function, the method further comprises:
acquiring lock end operation data acquired by the intelligent door lock;
correspondingly, determining the target function of the intelligent door lock and/or the client according to the operation behavior data, and the optimization instruction of the target function, wherein the optimization instruction comprises the following steps:
and determining target functions of the intelligent door lock and/or the client and optimization instructions of the target functions according to the operation behavior data and the locking end operation data.
9. The method according to claim 1, wherein after determining a target function of the smart door lock and/or the client from the operational behavior data, and an optimization instruction of the target function, the method further comprises:
acquiring user data of a user of a current client;
identifying a target group of guests associated with the user data;
and sending an optimization instruction to the intelligent door locks and/or clients of all users in the target guest group.
10. The function management device of the intelligent door lock is characterized by being configured on a cloud server; the cloud server is connected with the intelligent terminal and the intelligent door lock, and the intelligent terminal is connected with the intelligent door lock through the client; the device comprises:
the operation behavior data acquisition module is used for acquiring operation behavior data of a user on the client in the intelligent terminal;
the optimization instruction determining module is used for determining target functions of the intelligent door lock and/or the client according to the operation behavior data and optimizing instructions of the target functions;
and the function optimization module is used for sending an optimization instruction to the intelligent door lock and/or the client so as to optimize the target function of the intelligent door lock and/or the client.
11. An electronic device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the method of managing functions of a smart door lock according to any one of claims 1 to 9.
12. A readable storage medium, characterized in that it stores thereon a program or instructions that, when executed by a processor, implement the steps of the function management method of a smart door lock according to any one of claims 1 to 9.
CN202310991400.2A 2023-08-07 2023-08-07 Function management method, device, equipment and medium of intelligent door lock Pending CN117037333A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310991400.2A CN117037333A (en) 2023-08-07 2023-08-07 Function management method, device, equipment and medium of intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310991400.2A CN117037333A (en) 2023-08-07 2023-08-07 Function management method, device, equipment and medium of intelligent door lock

Publications (1)

Publication Number Publication Date
CN117037333A true CN117037333A (en) 2023-11-10

Family

ID=88623870

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310991400.2A Pending CN117037333A (en) 2023-08-07 2023-08-07 Function management method, device, equipment and medium of intelligent door lock

Country Status (1)

Country Link
CN (1) CN117037333A (en)

Similar Documents

Publication Publication Date Title
CN104125335B (en) Right management method, apparatus and system
US11016634B2 (en) Refrigerator storage system having a display
WO2018108050A1 (en) Intelligent terminal and application program right control method and apparatus therefor, and server
CN111766798A (en) Intelligent household equipment control method and device
US20180323996A1 (en) Automatic generation of scenes using an assistant device
CN108885608A (en) Intelligent automation assistant in home environment
US8108666B2 (en) System and method for transferring user preferences
CN104520842A (en) Method and apparatus for improving user experience
CN205121562U (en) System and electronic equipment based on biological measurement configuration electronic equipment of remote user
CN106098060A (en) The correction processing method of voice and device, the device of correction process for voice
WO2020207413A1 (en) Content pushing method, apparatus, and device
EP3019919A1 (en) Physical environment profiling through internet of things integration platform
TW200832167A (en) Method and system of automatically adapting a user interface
US20200070839A1 (en) Electronic device and method using machine learning for identifying characteristics of users located within a specific space
CN107490971A (en) Intelligent automation assistant in home environment
CN110462647B (en) Electronic device and method for executing functions of electronic device
KR20180120427A (en) Apparatus and Method for managing Intelligence Agent Service
CN109413515A (en) Apparatus control method, device, mobile terminal and server
US10642231B1 (en) Switch terminal system with an activity assistant
US20180167467A1 (en) Automated learning universal gateway
CN113778537B (en) System mode switching method and device
CN108958503A (en) input method and device
US20130097547A1 (en) Information processing apparatus, information processing method, and computer program
CN115062213A (en) Method, system, computer device and readable storage medium for device configuration
CN107919988A (en) Data statistical approach and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination